全文获取类型
收费全文 | 812篇 |
免费 | 30篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 9篇 |
综合类 | 3篇 |
化学工业 | 274篇 |
金属工艺 | 13篇 |
机械仪表 | 20篇 |
建筑科学 | 24篇 |
能源动力 | 27篇 |
轻工业 | 57篇 |
水利工程 | 1篇 |
石油天然气 | 1篇 |
武器工业 | 2篇 |
无线电 | 51篇 |
一般工业技术 | 130篇 |
冶金工业 | 46篇 |
原子能技术 | 2篇 |
自动化技术 | 183篇 |
出版年
2024年 | 1篇 |
2023年 | 7篇 |
2022年 | 36篇 |
2021年 | 33篇 |
2020年 | 16篇 |
2019年 | 14篇 |
2018年 | 28篇 |
2017年 | 22篇 |
2016年 | 25篇 |
2015年 | 27篇 |
2014年 | 38篇 |
2013年 | 59篇 |
2012年 | 49篇 |
2011年 | 56篇 |
2010年 | 31篇 |
2009年 | 49篇 |
2008年 | 37篇 |
2007年 | 48篇 |
2006年 | 30篇 |
2005年 | 25篇 |
2004年 | 19篇 |
2003年 | 19篇 |
2002年 | 15篇 |
2001年 | 10篇 |
2000年 | 13篇 |
1999年 | 6篇 |
1998年 | 14篇 |
1997年 | 13篇 |
1996年 | 10篇 |
1995年 | 1篇 |
1994年 | 10篇 |
1993年 | 8篇 |
1992年 | 6篇 |
1991年 | 6篇 |
1990年 | 4篇 |
1989年 | 6篇 |
1988年 | 3篇 |
1987年 | 4篇 |
1986年 | 3篇 |
1985年 | 7篇 |
1983年 | 5篇 |
1982年 | 5篇 |
1981年 | 11篇 |
1980年 | 6篇 |
1978年 | 1篇 |
1976年 | 3篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1970年 | 2篇 |
排序方式: 共有843条查询结果,搜索用时 15 毫秒
41.
Bogdan Korel 《Software Testing, Verification and Reliability》1992,2(4):203-213
Test data generation in program testing is the process of identifying a set of test data which satisfies a given testing criterion. Existing pathwise test data generators proceed by selecting program paths that satisfy the selected criterion and then generating program inputs for these paths. One of the problems with this approach is that unfeasible paths are often selected; as a result, significant computational effort can be wasted in analysing those paths. In this paper, an approach to test data generation, referred to as a dynamic approach for test data generation, is presented. In this approach, the path selection stage is eliminated. Test data are derived based on the actual execution of the program under test and function minimization methods. The approach starts by executing a program for an arbitrary program input. During program execution for each executed branch, a search procedure decides whether the execution should continue through the current branch or an alternative branch should be taken. If an undesirable execution flow is observed at the current branch, then a real-valued function is associated with this branch, and function minimization search algorithms are used to locate values of input variables automatically, which will change the flow of execution at this branch. 相似文献
42.
Dr. Lilia Clima Bogdan Florin Craciun Dr. Andrea Angeli Andrea Petreni Alessandro Bonardi Dr. Alessio Nocentini Dr. Fabrizio Carta Prof. Paola Gratteri Prof. Mariana Pinteala Prof. Claudiu T. Supuran 《ChemMedChem》2020,15(21):2052-2057
We report novel molecules incorporating the nontoxic squalene scaffold and different carbonic anhydrase inhibitors (CAIs). Potent inhibitory action, in the low-nanomolar range, was detected against isoforms hCA II for sulfonamide derivatives, which proved to be selective against this isoform over the tumor-associate hCA IX and XII isoforms. On the other hand, coumarin derivatives showed weak potency but high selectivity against the tumor-associated isoform CA IX. These compounds are interesting candidates for preclinical evaluation in glaucoma or various tumors in which the two enzymes are involved. In addition, an in silico study of inhibitor-bound hCA II revealed extensive interactions with the hydrophobic pocket of the active site and provided molecular insights into the binding properties of these new inhibitors. 相似文献
43.
Bogdan M. Leu Hasan Yavaş Innokenty Kantor Vitali B. Prakapenka 《Journal of the American Oil Chemists' Society》2010,87(12):1517-1520
We measured the velocity of sound in olive oil under pressure with the Brillouin light scattering technique. Using the values
for the density and the thermal conductivity that have only recently been reported, we calculated the adiabatic compressibility
and the isobaric specific heat up to 356 MPa and the thermal diffusivity up to 200 MPa. The specific heat displays a maximum
at 124 MPa, suggesting a possible phase transition around this pressure. Apart from the theoretical and practical importance
of these results for the food industry and beyond, this work shows that Brillouin light scattering and macroscopic methods
are complementary and can be employed to measure thermophysical parameters of food liquids under pressure. 相似文献
44.
Coordination‐Assisted Bioorthogonal Chemistry: Orthogonal Tetrazine Ligation with Vinylboronic Acid and a Strained Alkene 下载免费PDF全文
Selma Eising Dr. Bo‐Tao Xin Fleur Kleinpenning Jurriaan J. A. Heming Dr. Bogdan I. Florea Prof. Dr. Herman S. Overkleeft Dr. Kimberly M. Bonger 《Chembiochem : a European journal of chemical biology》2018,19(15):1648-1652
Bioorthogonal chemistry can be used for the selective modification of biomolecules without interfering with any other functionality that might be present. Recent developments in the field include orthogonal bioorthogonal reactions to modify multiple biomolecules simultaneously. During our research, we observed that the reaction rates for the bioorthogonal inverse‐electron‐demand Diels–Alder (iEDDA) reactions between nonstrained vinylboronic acids (VBAs) and dipyridyl‐s‐tetrazines were exceptionally higher than those between VBAs and tetrazines bearing a methyl or phenyl substituent. As VBAs are mild Lewis acids, we hypothesised that coordination of the pyridyl nitrogen atom to the boronic acid promoted tetrazine ligation. Herein, we explore the molecular basis and scope of VBA–tetrazine ligation in more detail and benefit from its unique reactivity in the simultaneous orthogonal tetrazine labelling of two proteins modified with VBA and norbornene, a widely used strained alkene. We further show that the two orthogonal iEDDA reactions can be performed in living cells by labelling the proteasome by using a nonselective probe equipped with a VBA and a subunit‐selective VBA bearing a norbornene moiety. 相似文献
45.
Bogdan M. Diaconu 《Energy and Buildings》2009,41(2):212-219
Over the last years the use of phase change slurries (PCSs) based on microencapsulated phase change material (MEPCM) increased considerably due to their capacity of adaptation to various heat storage systems. PCSs are obtained by dispersing a microencapsulated PCM (particle diameter 5-20 μm) into a heat carrier fluid (e.g. water). Heat storage systems are used in applications where the available energy supply is not synchronous with the demand, such as solar thermal and waste heat recovery systems. The theoretical study conducted here - based on heat transfer and energy conservation equations - is intended to developing a theoretical model of the heat storage properties of phase change slurries capable of predicting the transient thermal response of a thermal energy storage system (TES). Most of the research work was focused on investigating the enthalpy-temperature curves resulting from a heating-cooling cycle around the melting point of the PCM. The influence of other parameters such as mico-particles diameter was assessed. 相似文献
46.
47.
48.
Bogdan C. Donose Elena Taran Marc A. Hampton Stoyan I. Karakashev Anh V. Nguyen 《Advanced Powder Technology》2009,20(3):257-261
Interaction forces between a multi-walled carbon nanotube (MWCNT) and an air-bubble in pure deionized water and methyl isobutyl carbinol (MIBC) solutions were measured by atomic force microscopy (AFM). The MWCNT terminated probe was brought into contact with the bubble at controlled applied forces. The repulsive steps followed by attractive jumps recorded in the approach force curves correspond to changes in the MWCNT diameter along its length, an observation confirmed by transmission electron microscopy (TEM) data. By processing the retraction part of the force curves obtained in pure water it is possible to estimate the end diameter of the carbon nanotube with nanometer resolution using a capillary force model. 相似文献
49.
50.
V��ronique Cortier Steve Kremer Bogdan Warinschi 《Journal of Automated Reasoning》2011,46(3-4):225-259
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and probability. This approach captures a strong notion of security, guaranteed against all probabilistic polynomial-time attacks. The other approach relies on a symbolic model of protocol executions in which cryptographic primitives are treated as black boxes. Since the seminal work of Dolev and Yao, it has been realized that this latter approach enables significantly simpler and often automated proofs. However, the guarantees that it offers with respect to the more detailed computational models have been quite unclear. For more than 20 years the two approaches have coexisted but evolved mostly independently. Recently, significant research efforts attempt to develop paradigms for cryptographic systems analysis that combines the best of both worlds. There are two broad directions that have been followed. Computational soundness aims to establish sufficient conditions under which results obtained using symbolic models imply security under computational models. The direct approach aims to apply the principles and the techniques developed in the context of symbolic models directly to computational ones. In this paper we survey existing results along both of these directions. Our goal is to provide a rather complete summary that could act as a quick reference for researchers who want to contribute to the field, want to make use of existing results, or just want to get a better picture of what results already exist. 相似文献