全文获取类型
收费全文 | 299篇 |
免费 | 10篇 |
专业分类
电工技术 | 2篇 |
化学工业 | 49篇 |
金属工艺 | 1篇 |
机械仪表 | 6篇 |
建筑科学 | 10篇 |
矿业工程 | 1篇 |
能源动力 | 4篇 |
轻工业 | 18篇 |
水利工程 | 2篇 |
石油天然气 | 1篇 |
无线电 | 50篇 |
一般工业技术 | 55篇 |
冶金工业 | 27篇 |
自动化技术 | 83篇 |
出版年
2024年 | 1篇 |
2023年 | 3篇 |
2022年 | 13篇 |
2021年 | 10篇 |
2020年 | 11篇 |
2019年 | 10篇 |
2018年 | 9篇 |
2017年 | 6篇 |
2016年 | 11篇 |
2015年 | 1篇 |
2014年 | 11篇 |
2013年 | 25篇 |
2012年 | 15篇 |
2011年 | 26篇 |
2010年 | 21篇 |
2009年 | 14篇 |
2008年 | 14篇 |
2007年 | 10篇 |
2006年 | 16篇 |
2005年 | 11篇 |
2004年 | 8篇 |
2003年 | 3篇 |
2002年 | 2篇 |
2001年 | 2篇 |
2000年 | 4篇 |
1999年 | 4篇 |
1998年 | 6篇 |
1997年 | 8篇 |
1996年 | 6篇 |
1995年 | 4篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1975年 | 3篇 |
1973年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有309条查询结果,搜索用时 15 毫秒
31.
Murphy K van Ginneken B Reinhardt JM Kabus S Ding K Deng X Cao K Du K Christensen GE Garcia V Vercauteren T Ayache N Commowick O Malandain G Glocker B Paragios N Navab N Gorbunova V Sporring J de Bruijne M Han X Heinrich MP Schnabel JA Jenkinson M Lorenz C Modat M McClelland JR Ourselin S Muenzing SE Viergever MA De Nigris D Collins DL Arbel T Peroni M Li R Sharp GC Schmidt-Richberg A Ehrhardt J Werner R Smeets D Loeckx D Song G Tustison N Avants B Gee JC Staring M Klein S Stoel BC Urschler M 《IEEE transactions on medical imaging》2011,30(11):1901-1920
EMPIRE10 (Evaluation of Methods for Pulmonary Image REgistration 2010) is a public platform for fair and meaningful comparison of registration algorithms which are applied to a database of intrapatient thoracic CT image pairs. Evaluation of nonrigid registration techniques is a nontrivial task. This is compounded by the fact that researchers typically test only on their own data, which varies widely. For this reason, reliable assessment and comparison of different registration algorithms has been virtually impossible in the past. In this work we present the results of the launch phase of EMPIRE10, which comprised the comprehensive evaluation and comparison of 20 individual algorithms from leading academic and industrial research groups. All algorithms are applied to the same set of 30 thoracic CT pairs. Algorithm settings and parameters are chosen by researchers expert in the configuration of their own method and the evaluation is independent, using the same criteria for all participants. All results are published on the EMPIRE10 website (http://empire10.isi.uu.nl). The challenge remains ongoing and open to new participants. Full results from 24 algorithms have been published at the time of writing. This paper details the organization of the challenge, the data and evaluation methods and the outcome of the initial launch with 20 algorithms. The gain in knowledge and future work are discussed. 相似文献
32.
33.
This study was undertaken to evaluate clinically and histologically root resorption in extracted human second molars in close proximity to non-erupted third molars. The control group consisted of extracted second molars that were proximal to fully erupted third molars. Eight out of the 11 teeth in the study group presented different degrees of radiographic root resorption, nine presented clinical resorption, and all 11 had histologic evidence of root resorption. In the control group, no signs of root resorption were seen radiographically or clinically. Histologically, limited sites of resorption were identified in all teeth, which were partially repaired by cellular cementum. Histologic observation of study specimens revealed root surface resorption in 10 out of the 11 teeth, one showing replacement resorption as well. Inflammatory resorption was observed in the three most advanced cases in the study group. Reparative cementum partially lining resorbed areas was evident in all teeth with surface resorption. Within the limits of this study, radiographic identification of distal root resorption of second molars in close proximity to non-erupted third molars appears reliable. The findings may support the hypothesis that the presence of a non-erupted third molar in close proximity to the distal root of the second results in root resorption. 相似文献
34.
We describe the fabrication of a broad stripe optical wave-guide in z-cut lithium niobate by electric-field-assisted thermal proton exchange in a benzoic acid melt. Electric fields of 5 × 104V/m to 105V/m were laterally applied by means of in-contact gold thin-film electrodes 1 mm apart, producing an asymmetric depth across the width of the stripe. Similar vertical fields, applied across the thickness of the wafer, increased the stripe depth in the region of applied field. Refractive index profiles are given for both cases. 相似文献
35.
Previous research conducted on a Western sample has shown that people are less apt to exhibit in-group favoritism when they perform well individually while their in-group performs poorly. The authors evaluated whether this finding would be moderated by the cultural dimension of individual–collective primacy, which refers to whether people give more weight to their personal interests rather than their in-group's interests when forced to choose between the two. The authors hypothesized that relative to their counterparts from the United States, participants from the People's Republic of China would have more of a collective-primacy orientation and therefore would exhibit more in-group favoritism when they performed well individually while their in-group performed poorly. The results supported the hypothesis. Implications for the literatures on in-group favoritism and cross-cultural differences are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
36.
A Distributed Key Generation (DKG) protocol is an essential component of threshold cryptosystems required to initialize the
cryptosystem securely and generate its private and public keys. In the case of discrete-log-based (dlog-based) threshold signature
schemes (ElGamal and its derivatives), the DKG protocol is further used in the distributed signature generation phase to generate
one-time signature randomizers (r = gk). In this paper we show that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random
distribution of generated keys: we describe an efficient active attacker controlling a small number of parties which successfully
biases the values of the generated keys away from uniform. We then present a new DKG protocol for the setting of dlog-based
cryptosystems which we prove to satisfy the security requirements from DKG protocols and, in particular, it ensures a uniform
distribution of the generated keys. The new protocol can be used as a secure replacement for the many applications of Pedersen's
protocol. Motivated by the fact that the new DKG protocol incurs additional communication cost relative to Pedersen's original
protocol, we investigate whether the latter can be used in specific applications which require relaxed security properties
from the DKG protocol. We answer this question affirmatively by showing that Pedersen's protocol suffices for the secure implementation
of certain threshold cryptosystems whose security can be reduced to the hardness of the discrete logarithm problem. In particular,
we show Pedersen's DKG to be sufficient for the construction of a threshold Schnorr signature scheme. Finally, we observe
an interesting trade-off between security (reductions), computation, and communication that arises when comparing Pedersen's
DKG protocol with ours. 相似文献
37.
38.
Measurements of particle deposition and mobilization in water-saturated porous columns were performed using nuclear magnetic resonance imaging (MRI). The use of MRI enabled the acquisition of detailed, noninvasive measurements that quantify spatial and temporal evolution of particle transport patterns and porosity changes due to particle deposition. Measurements indicate that for the considered particle sizes and flow conditions significant particle deposition occurs at some distance into the column. Because identification of unique parametrizations for processes of particle straining, deposition, and detachment is complex and nonunique, a simple phenomenological model of particle deposition and porosity reduction is suggested. This model captures the essential features of the experimental measurements on spatial and temporal flow and deposition patterns. 相似文献
39.
40.