全文获取类型
收费全文 | 407篇 |
免费 | 23篇 |
专业分类
电工技术 | 6篇 |
综合类 | 1篇 |
化学工业 | 95篇 |
金属工艺 | 14篇 |
机械仪表 | 12篇 |
建筑科学 | 22篇 |
矿业工程 | 5篇 |
能源动力 | 29篇 |
轻工业 | 34篇 |
水利工程 | 2篇 |
无线电 | 33篇 |
一般工业技术 | 69篇 |
冶金工业 | 25篇 |
自动化技术 | 83篇 |
出版年
2023年 | 8篇 |
2021年 | 22篇 |
2020年 | 13篇 |
2019年 | 19篇 |
2018年 | 15篇 |
2017年 | 12篇 |
2016年 | 18篇 |
2015年 | 21篇 |
2014年 | 22篇 |
2013年 | 21篇 |
2012年 | 19篇 |
2011年 | 36篇 |
2010年 | 26篇 |
2009年 | 26篇 |
2008年 | 23篇 |
2007年 | 13篇 |
2006年 | 14篇 |
2005年 | 11篇 |
2004年 | 13篇 |
2003年 | 8篇 |
2002年 | 11篇 |
2001年 | 2篇 |
2000年 | 5篇 |
1999年 | 5篇 |
1998年 | 4篇 |
1997年 | 1篇 |
1996年 | 3篇 |
1995年 | 6篇 |
1994年 | 6篇 |
1993年 | 3篇 |
1990年 | 1篇 |
1986年 | 1篇 |
1985年 | 5篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1971年 | 1篇 |
1969年 | 1篇 |
1963年 | 2篇 |
排序方式: 共有430条查询结果,搜索用时 31 毫秒
1.
Hannes Verlinde Martine De Cock Raymond Boute 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》2006,36(3):679-684
As opposed to quantitative association rule mining, fuzzy association rule mining is said to prevent the overestimation of boundary cases, as can be shown by small examples. Rule mining, however, becomes interesting in large databases, where the problem of boundary cases is less apparent and can be further suppressed by using sensible partitioning methods. A data-driven approach is used to investigate if there is a significant difference between quantitative and fuzzy association rules in large databases. The influence of the choice of a particular triangular norm in this respect is also examined. 相似文献
2.
Jan Lindblad 《电子设计技术》2004,11(10):58-64
即使在系统中事实上仍然有许多空闲内存时,内存碎片还会最终导致出现内存用完的情况.一个不断产生内存碎片的系统,不管产生的内存碎片多么小,只要时间足够长,就会将内存用完. 相似文献
3.
J Holst B Lindblad D Bergqvist O Nordfang PB Ostergaard JG Petersen G Nielsen U Hedner 《Canadian Metallurgical Quarterly》1994,71(2):214-219
The aim was to investigate whether a truncated recombinant Tissue Factor Pathway Inhibitor (TFPI1-161), which lacked the third Kunitz-type domain and the basic c-terminal region, had an antithrombotic effect comparable to LMWH in a randomised double-dummy study. The experimental thrombosis was induced in jugular veins, in a total of 40 rabbits by a combination of destruction of the endothelium and restricted blood flow. Group 1: placebo, gr 2: LMWH 60 anti-FXa IU/kg, gr 3-5: 0.1, 1.0 and 10.0 mg/kg TFPI1-161. TFPI1-161 reduced the thrombus weights in all treated groups, significantly in doses of 1.0 and 10.0 mg/kg compared to placebo. The frequency of thrombosis and occlusive thrombosis were also significantly reduced in those doses. The antithrombotic properties of TFPI1-161 (1.0-10.0 mg/kg) measured as thrombus weight, frequency of thrombosis and frequency of occlusive thrombosis was equivalent to the anti-thrombotic properties of LMWH. In the anti-FXa, APTT and PT-assays TFPI1-161 displayed a dose dependent increase of activity. Recombinant-TFPI1-161 did not influence the anti-FIIa-assay. No haemorrhagic side effects were noted. 相似文献
4.
Andreas Klenk Andreas Beck-Greinwald Hannes Angst Georg Carle 《Service Oriented Computing and Applications》2012,6(4):321-335
Inter-domain collaborations suffer not only from technological obstacles that hinder interoperability, but also from diverting business objectives of the involved domains. Today, hand-crafted contracts define the terms and conditions for service interactions. Electronic negotiation can serve as the enabler of dynamic interdomain collaborations by providing a large degree of freedom for the automation of agreement formation and electronic contracting. Negotiation by electronic means has been an area of intensive research for many years now. However, most effort was put on the determination of prices and neglected that real-world agreements also consist of complex dependencies of interdependent obligations. In this paper we present agreement negotiation as a tool to establish ad hoc services collaborations. Our novel protocol allows for the discovery of complex agreement options and for the formation of multi-party agreements. The protocol works through an iterative exchange of requirements and offers. A major benefit over existing bilateral negotiation protocols is that our protocol is capable of discovering potential collaborations between different parties. It will leave each negotiating party with a complete agreement document after a successful negotiation. This comprehensive agreement document defines the interdependent obligations between all parties and is well suited for E-Contracting. 相似文献
5.
Anna Kutschenko Selma Staege Karen Grütz Hannes Glaß Norman Kalmbach Thomas Gschwendtberger Lisa M. Henkel Johanne Heine Anne Grünewald Andreas Hermann Philip Seibler Florian Wegner 《International journal of molecular sciences》2021,22(7)
Myoclonus-dystonia (DYT-SGCE, formerly DYT11) is characterized by alcohol-sensitive, myoclonic-like appearance of fast dystonic movements. It is caused by mutations in the SGCE gene encoding ε-sarcoglycan leading to a dysfunction of this transmembrane protein, alterations in the cerebello-thalamic pathway and impaired striatal plasticity. To elucidate underlying pathogenic mechanisms, we investigated induced pluripotent stem cell (iPSC)-derived striatal medium spiny neurons (MSNs) from two myoclonus-dystonia patients carrying a heterozygous mutation in the SGCE gene (c.298T>G and c.304C>T with protein changes W100G and R102X) in comparison to two matched healthy control lines. Calcium imaging showed significantly elevated basal intracellular Ca2+ content and lower frequency of spontaneous Ca2+ signals in SGCE MSNs. Blocking of voltage-gated Ca2+ channels by verapamil was less efficient in suppressing KCl-induced Ca2+ peaks of SGCE MSNs. Ca2+ amplitudes upon glycine and acetylcholine applications were increased in SGCE MSNs, but not after GABA or glutamate applications. Expression of voltage-gated Ca2+ channels and most ionotropic receptor subunits was not altered. SGCE MSNs showed significantly reduced GABAergic synaptic density. Whole-cell patch-clamp recordings displayed elevated amplitudes of miniature postsynaptic currents and action potentials in SGCE MSNs. Our data contribute to a better understanding of the pathophysiology and the development of novel therapeutic strategies for myoclonus-dystonia. 相似文献
6.
Vladimir Ćurić Joakim Lindblad Nataša Sladoje Hamid Sarve Gunilla Borgefors 《Pattern Analysis & Applications》2014,17(1):141-152
We propose a new distance measure, called Complement weighted sum of minimal distances, between finite sets in ${\mathbb Z }^n$ and evaluate its usefulness for shape registration and matching. In this set distance the contribution of each point of each set is weighted according to its distance to the complement of the set. In this way, outliers and noise contribute less to the new similarity measure. We evaluate the performance of the new set distance for registration of shapes in binary images and compare it to a number of often used set distances found in the literature. The most extensive evaluation uses a set of synthetic 2D images. We also show three examples of real problems: registering a set of 2D images extracted from synchrotron radiation micro-computed tomography (SR $\upmu $ CT) volumes depicting bone implants; the difficult multi-modal registration task of finding the exact location of a 2D slice of a bone implant, as imaged by a light microscope, within a 3D SR $\upmu $ CT volume of the same implant; and finally recognition of handwritten characters. The evaluation shows that our new set distance performs well for all tasks and outperforms the other observed distance measures in most cases. It is therefore useful in many image registration and shape comparison tasks. 相似文献
7.
Hannes Holm Markus Buschle Robert Lagerström Mathias Ekstedt 《Software and Systems Modeling》2014,13(2):825-841
Enterprise Architecture (EA) is an approach used to provide decision support based on organization-wide models. The creation of such models is, however, cumbersome as multiple aspects of an organization need to be considered, making manual efforts time-consuming, and error prone. Thus, the EA approach would be significantly more promising if the data used when creating the models could be collected automatically—a topic not yet properly addressed by either academia or industry. This paper proposes network scanning for automatic data collection and uses an existing software tool for generating EA models (ArchiMate is employed as an example) based on the IT infrastructure of enterprises. While some manual effort is required to make the models fully useful to many practical scenarios (e.g., to detail the actual services provided by IT components), empirical results show that the methodology is accurate and (in its default state) require little effort to carry out. 相似文献
8.
Hannes Tschofenig 《Datenschutz und Datensicherheit - DuD》2016,40(4):222-224
Over the last few years Internet of Things products have become known for their weak security. News articles regularly describe security vulnerabilities of cars, surveillance cameras, kettles, and other IoT devices. There are, however, recent standardization activities addressing some of these security challenges. This article describes how the work of the IETF and the FIDO Alliance can lead to improved security. 相似文献
9.
10.
Georg Menge Hannes Lorenz Zongwen Fu Franziska Eichhorn Florian Schader Kyle G. Webber Tobias Fey Peter Greil Nahum Travitzky 《Advanced Engineering Materials》2018,20(7)