全文获取类型
收费全文 | 81篇 |
免费 | 7篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 21篇 |
金属工艺 | 1篇 |
建筑科学 | 1篇 |
能源动力 | 7篇 |
轻工业 | 5篇 |
水利工程 | 1篇 |
无线电 | 7篇 |
一般工业技术 | 12篇 |
冶金工业 | 11篇 |
自动化技术 | 21篇 |
出版年
2023年 | 2篇 |
2022年 | 4篇 |
2021年 | 2篇 |
2020年 | 3篇 |
2019年 | 1篇 |
2018年 | 5篇 |
2017年 | 5篇 |
2016年 | 2篇 |
2015年 | 1篇 |
2014年 | 5篇 |
2013年 | 7篇 |
2012年 | 4篇 |
2011年 | 3篇 |
2010年 | 4篇 |
2009年 | 1篇 |
2008年 | 4篇 |
2007年 | 9篇 |
2006年 | 3篇 |
2005年 | 4篇 |
2003年 | 1篇 |
2002年 | 1篇 |
2001年 | 1篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 3篇 |
1994年 | 4篇 |
1993年 | 1篇 |
1991年 | 2篇 |
1989年 | 1篇 |
1982年 | 1篇 |
排序方式: 共有88条查询结果,搜索用时 15 毫秒
41.
Sebastian Volz Remi Carminati Karl Joulain 《Nanoscale and Microscale Thermophysical Engineering》2013,17(2):155-167
We investigate the thermal response of a silicon crystal irradiated by a pico-femto heat pulse by using molecular dynamics technique and a linear response theory–based statistical analysis. The thermal susceptibility is first defined in terms of computed quantities and then convoluted with time Gaussian temperature pulses. The qualitative difference between the responses to various pulse durations is explained and the results are compared to those of classical Fourier model. Non-Fourier behaviors are emphasized and a mean phonon relaxation time is identified. 相似文献
42.
Intact washed human platelets aggregated in response to paf-acether (paf) and did not metabolize [3H]paf at concentrations up to 10 nM. However, when platelets were lysed by exposure to pH 9.5, resulting in 37.5±2.5% (mean
±SD, n=3) lactic dehydrogenase (LDH) release, 20.5±5.7% of the radioactivity was detected as labeled lyso paf and 5.7±3.1%
as labeled alkylacylglycerophosphocholine. When platelets were aggregated with 0.5 IU/mL thrombin or high concentrations of
paf (100 nM), they released a part of their acetylhydrolase without releasing LDH. In supernatants obtained from aggregated
platelets, 21±2% or 10±2% (n=3), respectively, of the total platelet acetylhydrolase activity was detectedvs. none in supernatants of resting cells. The release of acetylhydrolase was concentration-and time-dependent and paralleled
the release of PF 4, a marker for α-granules. The acetylhydrolase affinity for paf (Km) measured in sonicates of resting and thrombin-activated platelets was 8.3±1.5 μMvs. 10.6±1.5 μM, n=5, n.s. in a “Mann Whitney” test. The latter Km was slightly but significantly different (P<0.05, n=5) from that of the thrombin-released acetylhydrolase (7.9 ±1.5 μM) and that of the latter was itself different from
plasma acetylhydrolase (5.3±0.5,P<0.05, n=5). Addition of plasma (acid-treated to inactivate acetylhydrolase) decreased the Km value of supernatant acetylhydrolase to 6.1±1.4 μM. All preparations of acetylhydrolase exhibited similar pH requirements
and sensitvity to various inhibitors. Thus paf and thrombin cause release of acetylhydrolase from platelets in parallel with
release of the α-granule marker PF4. This phenomenon might represent a protective mechanism against paf-mediated effects in
thrombotic and cardiovascular diseases.
This study has been presented in part as a preliminary report at the 72nd Annual Meeting of the Federation of American Societies
for Experimental Biology, Las Vegas, NV, May 1988 (1). 相似文献
43.
Two-fluid plasma equations are derived by taking moments of Boltzmann equations. Ignoring collisions and viscous terms and assuming local thermodynamic equilibrium we get five moment equations for each species (electrons and ions), known as two-fluid plasma equations. These equations allow different temperatures and velocities for electrons and ions, unlike ideal magnetohydrodynamics equations. In this article, we present robust second order MUSCL schemes for two-fluid plasma equations based on Strang splitting of the flux and source terms. The source is treated both explicitly and implicitly. These schemes are shown to preserve positivity of the pressure and density. In the case of explicit treatment of source term, we derive explicit condition on the time step for it to be positivity preserving. The implicit treatment of the source term is shown to preserve positivity, unconditionally. Numerical experiments are presented to demonstrate the robustness and efficiency of these schemes. 相似文献
44.
Giuseppe Rossini Dario Rossi Christophe Betoule Remi Clavier Gilles Thouenon 《Computer Networks》2013,57(14):2802-2816
In this work, we propose Aplasia, an holistic architecture with a radical design. Aiming at simplifying the inner network devices (and so their cost), we tradeoff node architecture- and algorithmic-complexity for an increased (but tunable) communication cost. The main ingredients of our recipe are (i) the use of complete paths directly in the frames header, that allows core devices to perform data-plane switching functions without lookup and (ii) the use of a greedy probabilistic routing algorithm to quickly discover multiple, near optimal, paths in the control plane. We extensively simulate, analyze and implement our proposal to testify its soundness. 相似文献
45.
Sanderson H Dyer SD Price BB Nielsen AM van Compernolle R Selby M Stanton K Evans A Ciarlo M Sedlak R 《The Science of the total environment》2006,368(2-3):695-712
Alkyl sulfates (AS), alkyl ethoxysulfates (AES) and linear alkyl benzene sulfonates (LAS) are all High Production Volume (HPV) and 'down-the-drain' chemicals used globally in detergent and personal care products, resulting in low levels ultimately released to the environment via wastewater effluent. Due to their surfactant properties, they preferentially sorb to sediments. Hence, assessment of their levels and potential perturbations on benthos are of interest. The relative levels of AS/AES decreased with distance from the wastewater treatment plant outfall. However, this was not evident for LAS. Short chained AES and especially AS dominated the homologue distribution for AES. There were no evident patterns in LAS homologue distribution. The overall mean margin of exposure (MoE) for AS/AES and LAS is approximately 40 (range: 3 to 100) suggesting no noteworthy perturbation on biota. The findings in this study are in concordance with previous preliminary hazard screening. Comparative sediment contamination analyses principally based on Chapman and Anderson [Chapman PM, Anderson, J. A decision-making framework for sediment contamination. Integr Environ Assess Mana. 2005; 1: 163-173.] and the U.S. Environmental Protection Agency RAPID assessment methods [USEPA. Rapid bioassessment protocols for use in wadeable streams and rivers: Periphyton, benthic, macroinvertebrates, and fish. 1999. Second Edition. U.S. Environmental Protection Agency Office of Water, Washington, D.C. EPA 841-B-99-002.] did not reveal significant correlations between the surfactant concentrations and ecological status of the sampling locations. Several Lines of Evidence (LoE) of the Weight-of-Evidence (WoE) lead to the conclusion of low aquatic risk associated to the monitored compounds. 相似文献
46.
Yuan Shen Cedric Archambeau Dan Cornford Manfred Opper John Shawe-Taylor Remi Barillec 《Journal of Signal Processing Systems》2010,61(1):51-59
In recent work we have developed a novel variational inference method for partially observed systems governed by stochastic
differential equations. In this paper we provide a comparison of the Variational Gaussian Process Smoother with an exact solution
computed using a Hybrid Monte Carlo approach to path sampling, applied to a stochastic double well potential model. It is
demonstrated that the variational smoother provides us a very accurate estimate of mean path while conditional variance is
slightly underestimated. We conclude with some remarks as to the advantages and disadvantages of the variational smoother. 相似文献
47.
Guillaume Brousse Gilles Arnaud‐Fassetta Frdric Libault Mlanie Bertrand Gabriel Melun Remi Loire Jean‐Ren Malavoi Guillaume Fantino Laurent Borgniet 《河流研究与利用》2020,36(6):880-893
The Saint‐Sauveur dam was built in 1992 in the middle section of the Buëch River. Downstream of the dam, a channel incision by several meters was observed. A gravel replenishment operation was planned in order to restore the active channel. An equivalent of two times the mean annual bedload‐transport capacity (43,500 m3) was replenished downstream of the dam in September 2016. The aim of this paper is to quantify morphological change associated with sediment remobilization in order to evaluate the efficiency of the restoration works. The monitoring was based on a combination of (a) change detection using sequential high‐resolution digital elevation models (from airborne LiDAR data), (b) bedload tracing using active ultrahigh‐frequency radio‐frequency identification technology, and (c) complementary field surveys of channel grain‐size distribution and morphology for bedload‐transport computation. Field monitoring allows us to capture a net aggradation along a 2‐km reach after the first post‐replenishment flood. A sediment balance analysis was performed to back‐calculate bedload supply coming from the sluicing operation during the flood. Although the sediment replenishment operation clearly had a positive impact on the morphological conditions of the starved river reach, the effective bedload supply from artificial berms (22,650 m3) was insufficient to initiate substantial channel shifting along the restored reach and a subsequent amplification of the sediment recharge. The combination of high‐resolution topographic resurveys and sediment tracing was successful to evaluate the downstream propagation of sediment replenishment effects. 相似文献
48.
Chakma Remi Ullah Hayat Sonprom Jutarat Biswas Arindam Himanshu Sushil K. Datta Avishek 《SILICON》2023,15(2):763-774
Silicon - Mitigation of deleterious effects of drought stress on the growth and productivity of agronomic and horticultural crops warrants urgent and sustainable actions. Soil application of... 相似文献
49.
Oussema Dabbebi Remi Badonnel Olivier Festor 《International Journal of Network Management》2014,24(1):70-84
The emergence of cloud computing is contributing to the integration of multiple services, in particular VoIP services. While the cloud has recently been used for performing security attacks targeting IP telephony, it also provides new opportunities for supporting the security of this service. In that context, we propose a risk management strategy for VoIP cloud based on security countermeasures that may be outsourced as services. We present the architecture of our solution and its components in the context of services implementing the SIP protocol. We describe the mathematical modelling supporting our approach and detail different treatment strategies for the application of countermeasures. Finally, we quantify the benefits and limits of these strategies based on extensive simulation results. When a countermeasure fails, these strategies allow us to maintain the risk level low at an additional cost of up to 7%, or to accept an additional risk of up to 12%. They can also be combined to obtain a trade‐off between cost and performance. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献