全文获取类型
收费全文 | 261篇 |
免费 | 9篇 |
专业分类
电工技术 | 6篇 |
化学工业 | 55篇 |
金属工艺 | 2篇 |
机械仪表 | 4篇 |
建筑科学 | 11篇 |
矿业工程 | 2篇 |
能源动力 | 8篇 |
轻工业 | 14篇 |
石油天然气 | 1篇 |
无线电 | 21篇 |
一般工业技术 | 41篇 |
冶金工业 | 46篇 |
原子能技术 | 4篇 |
自动化技术 | 55篇 |
出版年
2022年 | 4篇 |
2021年 | 2篇 |
2020年 | 1篇 |
2019年 | 3篇 |
2018年 | 3篇 |
2017年 | 1篇 |
2016年 | 2篇 |
2015年 | 3篇 |
2014年 | 8篇 |
2013年 | 8篇 |
2012年 | 19篇 |
2011年 | 15篇 |
2010年 | 7篇 |
2009年 | 6篇 |
2008年 | 11篇 |
2007年 | 9篇 |
2006年 | 16篇 |
2005年 | 9篇 |
2004年 | 5篇 |
2003年 | 15篇 |
2002年 | 8篇 |
2001年 | 8篇 |
2000年 | 1篇 |
1999年 | 5篇 |
1998年 | 12篇 |
1997年 | 4篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 3篇 |
1993年 | 4篇 |
1992年 | 4篇 |
1991年 | 2篇 |
1990年 | 9篇 |
1989年 | 8篇 |
1988年 | 2篇 |
1987年 | 4篇 |
1985年 | 5篇 |
1984年 | 5篇 |
1983年 | 6篇 |
1982年 | 4篇 |
1981年 | 5篇 |
1980年 | 3篇 |
1979年 | 4篇 |
1978年 | 5篇 |
1976年 | 2篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有270条查询结果,搜索用时 718 毫秒
111.
Donato G Bartlett MS Hager JC Ekman P Sejnowski TJ 《IEEE transactions on pattern analysis and machine intelligence》1999,21(10):974
The Facial Action Coding System (FACS) [23] is an objective method for quantifying facial movement in terms of component actions. This system is widely used in behavioral investigations of emotion, cognitive processes, and social interaction. The coding is presently performed by highly trained human experts. This paper explores and compares techniques for automatically recognizing facial actions in sequences of images. These techniques include analysis of facial motion through estimation of optical flow; holistic spatial analysis, such as principal component analysis, independent component analysis, local feature analysis, and linear discriminant analysis; and methods based on the outputs of local filters, such as Gabor wavelet representations and local principal components. Performance of these systems is compared to naive and expert human subjects. Best performances were obtained using the Gabor wavelet representation and the independent component representation, both of which achieved 96 percent accuracy for classifying 12 facial actions of the upper and lower face. The results provide converging evidence for the importance of using local filters, high spatial frequencies, and statistical independence for classifying facial actions. 相似文献
112.
Antioxidant Potential of Pea Beans (Phaseolus vulgaris L.) 总被引:1,自引:0,他引:1
ABSTRACT: Four bean varieties ( Phaseolus vulgaris L.) (white kidney, red pinto, Swedish brown, and black kidney) and their hull fractions were extracted with 80% acetone and evaluated for their phenolic contents and antiradical activities. Total phenolic content of bean hulls and whole seed extracts ranged from 6.7 to 270 and 4.9 to 93.6 mg/g extract as catechin equivalents, respectively. Trolox equivalent antioxidant capacity (TEAC) assay revealed that the antioxidant capacity of red, brown, and black whole seed extracts was in the same order of magnitude with little variation. TEAC values of red and brown whole seed extracts were superior to that of black whole seed extract. On the basis of the total phenolic content and TEAC values, it can be deduced that colored beans possess superior antioxidative activity compared with white beans. The hydrogen peroxide scavenging capacity of different bean extracts ranged from 58% to 67% at 50 ppm and 65% to 76% at 100 ppm. The corresponding superoxide radical scavenging capacity was 24% to 29% at 50 ppm and 53% to 60% at 100 ppm. The 2,2–diphenyl-1–picrylhydrazyl (DPPH) radical scavenging capacity of black bean whole seed extracts was 22% at 50 ppm, whereas the other extracts showed 100% scavenging of this radical at both 50 and 100 ppm levels. The hydroxyl radical scavenging capacities of the bean extracts at 50 and 100 ppm were 12% to 29% and 32% to 49%, respectively. All extracts used prevented human low-density lipoprotein (LDL) cholesterol oxidation by 61.4% to 99.9% at 2 to 50 ppm level as catechin equivalents. 相似文献
113.
Terrence F. Hutt Mark E. Herrington 《Journal of the science of food and agriculture》1985,36(11):1107-1112
A method using reverse phase thin layer and high performance liquid chromatography was developed to determine the level of the bitter principle occasionally found in zucchini (Cucurbita pepo L.). The system gave excellent separation with recovery rates of about 90% from spiked fruit. The bitter principle was confirmed by C13 NMR and mass spectrometry as cucurbitacin E glycoside which was present in concentrations in the order of 600mg kg?1 in bitter fruits. Bitterness was detected by a taste panel at cucurbitacin E glycoside concentrations of 1 mg kg?1 in aqueous solutions and 2 mg kg?1 in zucchini pulp. The method described should assist the screening for bitterness in commercial and breeding populations of zucchini. 相似文献
114.
Sang Gil Lee Terrence M. Vance Tae-Gyu Nam Dae-Ok Kim Sung I. Koo Ock K. Chun 《Sensing and Instrumentation for Food Quality and Safety》2016,10(3):562-568
The present study evaluated the accuracy of pH differential (PD) method and HPLC method expressed as cyanidin-3-glucoside equivalent (CGE) for measuring total anthocyanin (TA) contents of five berries. Major anthocyanins of blueberry, blackberry, black currant, raspberry, and cranberry were analyzed with quantitative HPLC (q-HPLC) method using individual anthocyanin standards and used as a standard reference of comparison. PD method and HPLC method showed similar trend, although absolute amounts of TA differed in blueberry and cranberry. However, data showed that the TA of black currant and raspberry expressed as CGE considerably deviated from those obtained by q-HPLC. This discrepancy was due to underestimating TA of these two berries which contain disaccharides as major glycones, when expressed as CGE. On the other hand, when expressed as their major anthocyanin equivalents, TA of these two berries showed better approximate values with those by q-HPLC method. In addition, this finding was confirmed by Bland–Altman analysis. Our findings demonstrated that the type of glycone in berries is a critical factor to cause discrepancy between TA as CGE and actual TA and should be considered for measuring TA contents. 相似文献
115.
The Regenstrief medical records 总被引:3,自引:0,他引:3
116.
Seidman Edward; Golding Stephen L.; Hogan Terrence P.; LeBow Michael D. 《Canadian Metallurgical Quarterly》1974,42(1):10
Notes that despite a rapidly expanding literature on the A-B therapist-type variable, an adequate conceptual and empirical understanding has not been forthcoming. The present study endeavored to increase the limited understanding of the A-B dimension as well as to compare 3 different versions of the A-B scale. A battery of interest, personality, and aptitude tests (e.g., the SVIB) was completed by 231 undergraduate males. This battery was subjected to a 2-step principal components analysis in order to minimize the effects of method-specific sources of variance. Each of the 3 A-B scales was then regressed against component scores, followed by multiple discriminant-function analyses. Results indicate that 2 of the 3 A-B scales seem to be tapping a dimension tentatively labeled as a "social interpersonal orientation vs an impersonal cognitively complex orientation toward concepts and things." Explanations for some inconsistencies in the literature, for the nature of the Therapist * Patient Type interaction effect, and for possible strategies for future research are discussed. (42 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
117.
Dagenbach Dale; Carr Thomas H.; Barnhardt Terrence M. 《Canadian Metallurgical Quarterly》1990,16(2):328
Semantic priming effects from newly learned vocabulary words are examined in a lexical decision task. At low levels of learning, those primes whose meanings are recognizable but not recallable can inhibit responses to well-known, semantically related target words, whereas those whose meaning are recallable produce either no effect or facilitation, depending on instructions concerning how to use the prime information. These results are consistent with the notion that semantic priming effects are determined at least in part by the nature of the retrieval operations performed on the prime and target, over and above influences due to spreading activation and confirmed or violated expectations. Specifically, they indicate a need to include mechanisms other than violated expectations that can produce inhibition of retrieval. Candidate mechanisms are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
118.
The entire ★★ data base for the dependence of the nonstoichiometry, , on temperature and chemical potential of oxygen (oxygen potential) was retrieved from the literature and represented. This data base was interpreted by least-squares analysis using equations derived from the classical thermodynamic theory for the solid solution of a solute in a solvent. For hyperstoichiometric oxide at oxygen potentials more positive than , the data were best represented by a solution. For O/U ratios above 2 and oxygen potentials below this boundary, a solution represented the data. The data were represented by a solution. The resulting equations represent the experimental behavior and can be used in thermodynamic calculations to predict phase boundary compositions consistent with the literature. Collectively, the present analysis permits, for the first time, a mathematical representation of the behavior of the total data base. 相似文献
119.
Neurons in sensory systems convey information about physical stimuli in their spike trains. In vitro, single neurons respond precisely and reliably to the repeated injection of the same fluctuating current, producing regions of elevated firing rate, termed events. Analysis of these spike trains reveals that multiple distinct spike patterns can be identified as trial-to-trial correlations between spike times (Fellous, Tiesinga, Thomas, & Sejnowski, 2004 ). Finding events in data with realistic spiking statistics is challenging because events belonging to different spike patterns may overlap. We propose a method for finding spiking events that uses contextual information to disambiguate which pattern a trial belongs to. The procedure can be applied to spike trains of the same neuron across multiple trials to detect and separate responses obtained during different brain states. The procedure can also be applied to spike trains from multiple simultaneously recorded neurons in order to identify volleys of near-synchronous activity or to distinguish between excitatory and inhibitory neurons. The procedure was tested using artificial data as well as recordings in vitro in response to fluctuating current waveforms. 相似文献
120.
Communication and Information Systems (CIS) now form the primary information store, exchange and data analysis for all modern military and are crucial to command and control. The ubiquitousness of CIS within the military not only means that there is a complete reliance on CIS, but also presents new avenues of attack by malicious insiders. Military sources say that the insider threat is their number one security concern. This paper presents a case study of the technical counter measures and processes used to deter, detect and mitigate malicious insider threats that the author has researched, using non-classified anonymous interview and the analysis of anonymised qualitative field data, within a specific military organisation. It is not the intention of the author that this paper be viewed as an analysis of the “current state of play” of threats and countermeasures that generically exist across all military and defence organisations – rather it presents the technological and organisational processes utilised and challenges encountered at one organisation. A short discussion of the Computer Security Incident Response Team (CSIRT) structure adopted to successfully manage insider and other CIS security threats is presented, followed by a more detailed overview of existing and emerging technical efforts to deter, detect and mitigate such malicious insider threats within the military environment under study. Emphasis will be on the emerging technologies such as anomaly detection using real-time e-discovery, enterprise forensics and profiling users “cyber” behaviour and how these integrate into CSIRT technologies and processes. The technical advantages and challenges that such technologies present within a military alliance will be discussed. The success of such technologies in combating current malicious insider threat environment will be briefly compared with those put forward as challenges in the “Research on mitigating the insider threat to information systems #2” workgroup which took place in 2000 (Anderson et al., 2000.). In closing the author introduce the concept of Stateful Object Use Consequence Analysis as a way of managing the insider threat. 相似文献