全文获取类型
收费全文 | 292篇 |
免费 | 17篇 |
专业分类
电工技术 | 4篇 |
化学工业 | 86篇 |
金属工艺 | 2篇 |
机械仪表 | 5篇 |
建筑科学 | 13篇 |
能源动力 | 4篇 |
轻工业 | 20篇 |
水利工程 | 6篇 |
石油天然气 | 7篇 |
无线电 | 18篇 |
一般工业技术 | 41篇 |
冶金工业 | 20篇 |
原子能技术 | 4篇 |
自动化技术 | 79篇 |
出版年
2024年 | 3篇 |
2023年 | 8篇 |
2022年 | 2篇 |
2021年 | 10篇 |
2020年 | 18篇 |
2019年 | 11篇 |
2018年 | 15篇 |
2017年 | 10篇 |
2016年 | 20篇 |
2015年 | 11篇 |
2014年 | 16篇 |
2013年 | 22篇 |
2012年 | 16篇 |
2011年 | 31篇 |
2010年 | 13篇 |
2009年 | 9篇 |
2008年 | 11篇 |
2007年 | 9篇 |
2006年 | 8篇 |
2005年 | 3篇 |
2004年 | 3篇 |
2003年 | 3篇 |
2001年 | 1篇 |
2000年 | 1篇 |
1999年 | 2篇 |
1998年 | 9篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1993年 | 3篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1986年 | 4篇 |
1984年 | 4篇 |
1982年 | 2篇 |
1981年 | 3篇 |
1980年 | 5篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1976年 | 4篇 |
1973年 | 2篇 |
1972年 | 1篇 |
1969年 | 1篇 |
1958年 | 1篇 |
排序方式: 共有309条查询结果,搜索用时 15 毫秒
241.
On delay-dependent stability for linear neutral systems 总被引:1,自引:0,他引:1
Dan Iv?nescu Author Vitae Author Vitae Luc Dugard Author Vitae Author Vitae Erik I. Verriest Author Vitae 《Automatica》2003,39(2):255-261
This paper focuses on the problem of uniform asymptotic stability of a class of linear neutral systems. Sufficient conditions for delay-dependent stability are given in terms of the existence of solutions of some linear matrix inequalities. Furthermore, the proposed technique extends to neutral systems the results obtained for delay-difference equations using model transformations. Illustrative examples are included. 相似文献
242.
Mário David Gonçalo Borges Jorge Gomes João Pina Isabel Campos Plasencia Enol Fernández-del-Castillo Iván Díaz Carlos Fernandez Esteban Freire Álvaro Simón Kostas Koumantaros Michel Dreschner Tiziana Ferrari Peter Solagna 《Journal of Grid Computing》2014,12(3):543-558
The European Grid Infrastructure (EGI) is providing a sustainable pan–European Computing Grid to support e–Science, integrating more than 350 computing resource centers worldwide. One of its main challenges is that the middleware driving this production infrastructure is constantly evolving, as it adapts to the changing needs of the EGI Community. Since the software is provided by external technology providers, it needs to pass through a quality verification process before it is included in the EGI official release called Unified Middleware Distribution (UMD). Therefore, all software components undergo a release process covering the definition of the functionality and quality criteria, the verification of those criteria, and the testing under production environments. This paper details the design, development and implementation of this software validation process. An analysis is performed on several metrics to evaluate the process impact on the stability of the production infrastructure, by capturing malfunctions and other issues at the initial testing phases. 相似文献
243.
Jesús Pestana Ignacio Mellado-Bataller Jose Luis Sanchez-Lopez Changhong Fu Iván F. Mondragón Pascual Campoy 《Journal of Intelligent and Robotic Systems》2014,73(1-4):387-400
This research on odometry based GPS-denied navigation on multirotor Unmanned Aerial Vehicles is focused among the interactions between the odometry sensors and the navigation controller. More precisely, we present a controller architecture that allows to specify a speed specified flight envelope where the quality of the odometry measurements is guaranteed. The controller utilizes a simple point mass kinematic model, described by a set of configurable parameters, to generate a complying speed plan. For experimental testing, we have used down-facing camera optical-flow as odometry measurement. This work is a continuation of prior research to outdoors environments using an AR Drone 2.0 vehicle, as it provides reliable optical flow on a wide range of flying conditions and floor textures. Our experiments show that the architecture is realiable for outdoors flight on altitudes lower than 9 m. A prior version of our code was utilized to compete in the International Micro Air Vehicle Conference and Flight Competition IMAV 2012. The code will be released as an open-source ROS stack hosted on GitHub. 相似文献
244.
The term tubulitis denotes infiltration of the renal tubular epithelium by mononuclear cells. Tubulitis is one of the most reliable signs of acute renal allograft rejection. However, its segmental localization and quantitative characteristics are not precisely known. To investigate this question, formalin-fixed kidney biopsy specimens from 15 patients with transplanted allografts undergoing acute rejection were studied stereologically by identifying cortical tubules with segment-specific markers. The periodic acid-Schiff reaction, peanut lectin, and antibodies against Tamm-Horsfall protein and epidermal cytokeratins, all applied to the same section, were used to identify the profiles of proximal tubules (PTs), distal convoluted tubules (DCTs), distal straight tubules (DSTs), and the cortical collecting system (CCS, connecting tubules and cortical collecting ducts), respectively. Two parameters, the relative intrasegmental length and the average intensity of tubular damage, were determined to describe the degree of tubulitis quantitatively. Tubulitis was most prominent in the DCTs, followed by the CCS. The average intensity of tubulitis was lowest in the DSTs. The results indicate that the PTs are not the main site of tubulitis, despite the fact that they are regarded primary targets of the rejection response. 相似文献
245.
We had previously found in autologous human leukocyte cultures, in which dead neutrophils phagocytosis by macrophages occur, macrophages and T CD4 lymphocytes perform a selective cell-cell interaction showing many figures of either one, two or several T- lymphocytes adhering to a central macrophage were seen. Considering that antigen presentation would be necessary for the formation of these immune synapses, we attempted to block rosette formation (i.e., the formation of macrophage associations with at least three lymphocytes) by interfering with both antigen processing and presentation. Culture samples of autologous leukocytes from 7 healthy donors were subjected to either brefeldin A, chloroquine or to an anti-HLA DR antibody. Rosette formation was significantly inhibited in the treated samples (either with brefeldin A, chloroquine or the anti- HLA DR; ANOVA, p<0.001, as compared with the untreated controls). It is concluded that interference with antigen processing and presentation precludes the formation of these cell-cell interactions. 相似文献
246.
Macroreticular chelating resins containing carboxylic groups, poly(N-hydroxymethyl acrylamide-co-acrylic acid) P(HMA-co-AA) and poly(N-hydroxymethyl acrylamide-co-2-acrylamido glycolic acid) P(HMA-co-AGA) were synthesized by solution radical polymerization with ammonium persulfate as initiator and N,N′-methylene-bis-acrylamide as cross-linking reagent. The polymerization yield was 98.9 and 91.9% for P(HMA-co-AA) and P(HMA-co-AGA), respectively. The retention properties were studied under competitive and noncompetitive conditions by batch equilibrium
procedure for the following metal ions: Cd(II), Cr(III), Zn(II), Pb(II), and Hg(II). The effects of pH, time, temperature,
and initial ion concentration on adsorption were investigated. The resins showed a significant ability to retain Pb(II), greater
than 79%, at pH 5. 相似文献
247.
Jesús Albarrán-Velo Dr. Iván Lavandera Dr. Vicente Gotor-Fernández 《Chembiochem : a European journal of chemical biology》2020,21(1-2):200-211
A sequential two-step chemoenzymatic methodology for the stereoselective synthesis of (3E)-4-(het)arylbut-3-en-2-amines in a highly selective manner and under mild reaction conditions is described. The approach consists of oxidation of the corresponding racemic alcohol precursors by the use of a catalytic system made up of the laccase from Trametes versicolor and the oxy-radical TEMPO, followed by the asymmetric reductive bio-transamination of the corresponding ketone intermediates. Optimisation of the oxidation reaction, exhaustive amine transaminase screening for the bio-transaminations and the compatibility of the two enzymatic reactions were studied in depth in search of a design of a compatible sequential cascade. This synthetic strategy was successful and the combinations of enzymes displayed a broad substrate scope, with 16 chiral amines being obtained in moderate to good isolated yields (29–75 %) and with excellent enantiomeric excess values (94 to >99 %). Interestingly, both amine enantiomers can be achieved, depending on the selectivity of the amine transaminase employed in the system. 相似文献
248.
Iván Gallego Alicia Rioboo Dr. José J. Reina Bernardo Díaz Dr. Ángeles Canales Dr. F. Javier Cañada Dr. Jorge Guerra-Varela Prof. Laura Sánchez Dr. Javier Montenegro 《Chembiochem : a European journal of chemical biology》2019,20(11):1400-1409
The cell membrane regulates the exchange of molecules and information with the external environment. However, this control barrier hinders the delivery of exogenous bioactive molecules that can be applied to correct cellular malfunctions. Therefore, the traffic of macromolecules across the cell membrane represents a great challenge for the development of the next generation of therapies and diagnostic methods. Cell-penetrating peptides are short peptide sequences capable of delivering a broad range of biomacromolecules across the cellular membrane. However, penetrating peptides still suffer from limitations, mainly related to their lack of specificity and potential toxicity. Glycosylation has emerged as a potential promising strategy for the biological improvement of synthetic materials. In this work we have developed a new convergent strategy for the synthesis of penetrating peptides functionalized with glycan residues by an oxime bond connection. The uptake efficiency and intracellular distribution of these glycopeptides have been systematically characterized by means of flow cytometry and confocal microscopy and in zebrafish animal models. The incorporation of these glycan residues into the peptide structure influenced the internalization efficiency and cellular toxicity of the resulting glycopeptide hybrids in the different cell lines tested. The results reported herein highlight the potential of the glycosylation of penetrating peptides to modulate their activity. 相似文献
249.
Iván Machón-González Hilario López-García 《Engineering Applications of Artificial Intelligence》2010,23(3):411-419
Updating individually the kernel radii of the neurons according to Van Hulle's approach in the Fuzzy Labeled Self-Organizing Map (FLSOM) algorithm can produce a significant reduction of the mean quantization error as it is demonstrated in this paper using four datasets. The algorithm takes advantage of the available classification of the instances of the dataset since FLSOM is a version of SOM algorithm where the prototype vectors are influenced by the labeling data vectors that define the clusters of the dataset. In this work, the proposed modified version of the FLSOM is able to achieve a better approximation to the numerical variables by means of decreasing the mean quantization error using an individual adaptation of the kernel radii. The aim of this paper is to apply this idea to a pickling line of the steel industry to obtain a model trained with categorical and numerical process variables preserving the topological distribution of the output space in order to reach a visualization of the industrial process and estimate the optimum line speed that minimizes the pickling defects over the steel strip. 相似文献
250.
Fernando Román Muñoz Iván Israel Sabido Cortes Luis Javier García Villalba 《The Journal of supercomputing》2018,74(12):6598-6617
There are two main kinds of vulnerable web applications, usual applications developed with a specific aim and applications which are vulnerable by design. On one hand, the usual applications are those that are used everywhere and on a daily basis, and where vulnerabilities are detected, and often mended, such as online banking systems, newspaper sites, or any other Web site. On the other hand, vulnerable by design web applications are developed for proper evaluation of web vulnerability scanners and for training in detecting web vulnerabilities. The main drawback of vulnerable by design web applications is that they used to include just a short set of well-known types of vulnerabilities, usually from famous classifications like the OWASP Top Ten. They do not include most of the types of web vulnerabilities. In this paper, an analysis and assessment of vulnerable web applications is conducted in order to select the applications that include the larger set of types of vulnerabilities. Then those applications are enlarged with more types of web vulnerabilities that vulnerable web applications do not include. Lastly, the new vulnerable web applications have been analyzed to check whether web vulnerability scanners are able to detect the new added vulnerabilities, those vulnerabilities that vulnerable by design web applications do not include. The results show that the tools are not very successful in detecting those vulnerabilities, less than well-known vulnerabilities. 相似文献