全文获取类型
收费全文 | 419篇 |
免费 | 22篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 5篇 |
化学工业 | 132篇 |
机械仪表 | 1篇 |
建筑科学 | 31篇 |
矿业工程 | 1篇 |
能源动力 | 27篇 |
轻工业 | 24篇 |
水利工程 | 4篇 |
无线电 | 35篇 |
一般工业技术 | 52篇 |
冶金工业 | 7篇 |
原子能技术 | 1篇 |
自动化技术 | 122篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 17篇 |
2021年 | 23篇 |
2020年 | 14篇 |
2019年 | 17篇 |
2018年 | 10篇 |
2017年 | 9篇 |
2016年 | 21篇 |
2015年 | 15篇 |
2014年 | 11篇 |
2013年 | 45篇 |
2012年 | 27篇 |
2011年 | 36篇 |
2010年 | 27篇 |
2009年 | 17篇 |
2008年 | 20篇 |
2007年 | 16篇 |
2006年 | 16篇 |
2005年 | 14篇 |
2004年 | 11篇 |
2003年 | 11篇 |
2002年 | 3篇 |
2001年 | 11篇 |
2000年 | 6篇 |
1999年 | 6篇 |
1998年 | 2篇 |
1997年 | 4篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1994年 | 3篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1989年 | 4篇 |
1987年 | 3篇 |
1985年 | 1篇 |
1984年 | 4篇 |
1977年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有442条查询结果,搜索用时 15 毫秒
31.
Dr. Jakob Franke Dr. Jeongwoon Kim John P. Hamilton Dr. Dongyan Zhao Gina M. Pham Krystle Wiegert-Rininger Emily Crisovan Linsey Newton Brieanne Vaillancourt Dr. Evangelos Tatsis Prof. Dr. C. Robin Buell Prof. Dr. Sarah E. O'Connor 《Chembiochem : a European journal of chemical biology》2019,20(1):83-87
Genome mining is a routine technique in microbes for discovering biosynthetic pathways. In plants, however, genomic information is not commonly used to identify novel biosynthesis genes. Here, we present the genome of the medicinal plant and oxindole monoterpene indole alkaloid (MIA) producer Gelsemium sempervirens (Gelsemiaceae). A gene cluster from Catharanthus roseus, which is utilized at least six enzymatic steps downstream from the last common intermediate shared between the two plant alkaloid types, is found in G. sempervirens, although the corresponding enzymes act on entirely different substrates. This study provides insights into the common genomic context of MIA pathways and is an important milestone in the further elucidation of the Gelsemium oxindole alkaloid pathway. 相似文献
32.
Jose Marquez-Velasco Maria-Elena Vlachopoulou Angeliki Tserepi Evangelos Gogolides 《Microelectronic Engineering》2010,87(5-8):782-785
SU-8 is a photosensitive resist widely used for the fabrication of MEMS and lab-on-a-chip devices, as well as of model structures for testing wetting theories. In this work, superhydrophobic surfaces are fabricated on SU-8 by combining micro- and nano-sized structures formed by means of lithography and plasma etching, respectively. It is found that nanotexturing of the micropatterned SU-8 surfaces is essential in enhancing surface hydrophobicity and rendering the surfaces water repellent (i.e. minimizing contact angle hysteresis). The proposed method will be shown to be of paramount importance for the fabrication of mechanically stable and robust superhydrophobic SU-8 surfaces with low aspect ratio microstructuring. 相似文献
33.
Andreas Bück Günter Klaunick Jitendra Kumar Mirko Peglow Evangelos Tsotsas 《American Institute of Chemical Engineers》2012,58(8):2309-2319
Results of application of pseudospectral methods, also known as spectral collocation methods, to practical particulate processes including growth, nucleation, aggregation, and breakage are presented. For growth‐dominated processes, a considerable reduction in model dimension can be achieved; for pure aggregation and breakage they form a viable option. To handle problems that include aggregation, breakage, and growth phenomena simultaneously, we introduce a hybrid algorithm combining the advantages of spectral methods and cell average or fixed pivot methods for aggregation and breakage. Results are shown for analytical examples as well as real processes taken from the fields of granulation and crystallization. © 2011 American Institute of Chemical Engineers AIChE J, 58: 2309–2319, 2012 相似文献
34.
35.
36.
Georgios Kontaxis Michalis Polychronakis Evangelos P. Markatos 《International Journal of Information Security》2012,11(5):321-332
Over the past few years, a large and ever increasing number of Web sites have incorporated one or more social login platforms and have encouraged users to log in with their Facebook, Twitter, Google, or other social networking identities. Research results suggest that more than two million Web sites have already adopted Facebook’s social login platform, and the number is increasing sharply. Although one might theoretically refrain from such social login features and cross-site interactions, usage statistics show that more than 250 million people might not fully realize the privacy implications of opting-in. To make matters worse, certain Web sites do not offer even the minimum of their functionality unless users meet their demands for information and social interaction. At the same time, in a large number of cases, it is unclear why these sites require all that personal information for their purposes. In this paper, we mitigate this problem by designing and developing a framework for minimum information disclosure in social login interactions with third-party sites. Our example case is Facebook, which combines a very popular single sign-on platform with information-rich social networking profiles. Whenever users want to browse to a Web site that requires authentication or social interaction using a Facebook identity, our system employs, by default, a Facebook session that reveals the minimum amount of information necessary. Users have the option to explicitly elevate that Facebook session in a manner that reveals more or all of the information tied to their social identity. This enables users to disclose the minimum possible amount of personal information during their browsing experience on third-party Web sites. 相似文献
37.
38.
We present a real-time relighting and shadowing method for dynamic scenes with varying lighting, view and BRDFs. Our approach is based on a compact representation of reflectance data that allows for changing the BRDF at run-time and a data-driven method for accurately synthesizing self-shadows on articulated and deformable geometries. Unlike previous self-shadowing approaches, we do not rely on local blocking heuristics. We do not fit a model to the BRDF-weighted visibility, but rather only to the visibility that changes during animation. In this manner, our model is more compact than previous techniques and requires less computation both during fitting and at run-time. Our reflectance product operators can re-integrate arbitrary low-frequency view-dependent BRDF effects on-the-fly and are compatible with all previous dynamic visibility generation techniques as well as our own data-driven visibility model. We apply our reflectance product operators to three different visibility generation models, and our data-driven model can achieve framerates well over 300Hz. 相似文献
39.
Several studies explore information security awareness focusing on individual and/or organisational aspects. This paper argues that security awareness processes are associated with interrelated changes that occur at the organisational, the technological and the individual level. We introduce an integrated analytical framework that has been developed through action research in a public sector organisation, comprising actor-network theory (ANT), structuration theory and contextualism. We develop and use this framework to analyse and manage changes introduced by the implementation of a security awareness programme in the research setting. The paper illustrates the limitations of each theory (ANT, structuration theory and contextualism) to study multi-level changes when used individually, demonstrates the synergies of the three theories, and proposes how they can be used to study and manage awareness-related changes at the individual, organisational and technological level. 相似文献
40.
Consider a situation where people have to choose among a sequence of n linearly ordered positions to perform some task requiring a certain amount of privacy. Which position should one choose so as to maximize one’s privacy, i.e., minimize the chances that one of your neighboring positions becomes occupied by a later arrival? In this paper, we attempt to answer this question under a variety of models for the behavior of the later arrivals. Our results suggest that for the most part one should probably choose one of the extreme positions (with some interesting exceptions). We also suggest a number of variations on the problem that lead to many open problems. 相似文献