全文获取类型
收费全文 | 338篇 |
免费 | 22篇 |
专业分类
电工技术 | 5篇 |
化学工业 | 71篇 |
金属工艺 | 4篇 |
机械仪表 | 5篇 |
建筑科学 | 13篇 |
能源动力 | 16篇 |
轻工业 | 82篇 |
水利工程 | 2篇 |
无线电 | 22篇 |
一般工业技术 | 60篇 |
冶金工业 | 26篇 |
原子能技术 | 1篇 |
自动化技术 | 53篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 7篇 |
2021年 | 12篇 |
2020年 | 8篇 |
2019年 | 9篇 |
2018年 | 9篇 |
2017年 | 9篇 |
2016年 | 14篇 |
2015年 | 12篇 |
2014年 | 12篇 |
2013年 | 25篇 |
2012年 | 28篇 |
2011年 | 30篇 |
2010年 | 22篇 |
2009年 | 18篇 |
2008年 | 16篇 |
2007年 | 20篇 |
2006年 | 8篇 |
2005年 | 8篇 |
2004年 | 6篇 |
2003年 | 7篇 |
2002年 | 4篇 |
2001年 | 8篇 |
2000年 | 5篇 |
1999年 | 3篇 |
1998年 | 10篇 |
1997年 | 4篇 |
1996年 | 9篇 |
1995年 | 5篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 3篇 |
1991年 | 5篇 |
1990年 | 3篇 |
1989年 | 8篇 |
1988年 | 4篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
排序方式: 共有360条查询结果,搜索用时 62 毫秒
81.
82.
83.
84.
The effect of curing salt on the activity of porcine muscle proteases was evaluated, within the salt concentration range found in the manufacturing process of Spanish cured ham. Salt (NaCl) acts as a strong inhibitor of proteolytic activity; sodium nitrate and potassium nitrate do not affect cathepsin D activity; cathepsin L is inhibited at levels of the salts not found in cured ham, and Ca-dependent proteolytic activity is enhanced by nitrate concentrations below 800 ppm.
The appearance of phosphate precipitates in several areas of ham has led to the study of phosphate effect on enzymatic activity. Results show that phosphate is an inhibitor of proteolytic activity. 相似文献
85.
Gema del Prado Francisco-Javier Pascual Pere Castell Diana Molina-Manso Ignacio Mahillo 《国际聚合物材料杂志》2018,67(16):934-941
Because of their intrinsic properties, carbon nanotubes (CNTs) have been suggested for biomedical applications. We studied the anti-adherent performance of two ultra-high-molecular-weight polyethylene (UHMWPE) surfaces which contains 3% multi-wall CNT variant (MWCNT): Nanocyl/UHMWPE and Arc/UHMWPE. These surfaces were obtained by hot pressure forming after mechanical mixture. Additional nanoindentation studies were performed and hardness and stiffness were determined. Mechanical properties of the MWCNT/UHMWPE composites were also compared to raw UHMWPE and correlated with their anti-adherent performance. Comparing with UHMWPE, Nanocyl/UHMWPE was the least adherent surface. Bacterial adherence was also significantly reduced in Arc/UHMWPE for four strains. 相似文献
86.
This paper presents experimental results using a newly developed 3D underwater laser scanner mounted on an autonomous underwater vehicle (AUV) for real‐time simultaneous localization and mapping (SLAM). The algorithm consists of registering point clouds using a dual step procedure. First, a feature‐based coarse alignment is performed, which is then refined using iterative closest point. The robot position is estimated using an extended Kalman filter (EKF) that fuses the data coming from navigation sensors of the AUV. Moreover, the pose from where each point cloud was collected is also stored in the pose‐based EKF‐SLAM state vector. The results of the registration algorithm are used as constraint observations among the different poses within the state vector, solving the full‐SLAM problem. The method is demonstrated using the Girona 500 AUV, equipped with a laser scanner and inspecting a 3D sub‐sea infrastructure inside a water tank. Our results prove that it is possible to limit the navigation drift and deliver a consistent high‐accuracy 3D map of the inspected object. 相似文献
87.
Summary Small-angle synchrotron experiments have been performed in two samples of poly[oxybis(trimethylene) p,p-bibenzoate], PDTMB. Owing to the very slow transformation of the mesophase of this polymer into the crystal, only the liquid crystalline phase is present in a PDTMB sample quenched from the melt, while about 30% crystallinity is found in the annealed specimen. The results indicate that the layer spacing peak for the mesophase is very close to a crystal diffraction. This seems to be a general fact in thermotropic polybibenzoates. Moreover, no long spacing has been detected in the quenched sample. On the contrary, the annealed specimen exhibits a long spacing centered at about 16 nm, corresponding to a rather small crystal thickness. 相似文献
88.
Eloy Roura Arnau Oliver Mariano Cabezas Joan C. Vilanova Àlex Rovira Lluís Ramió-Torrentà Xavier Lladó 《Computer methods and programs in biomedicine》2014
Brain extraction, also known as skull stripping, is one of the most important preprocessing steps for many automatic brain image analysis. In this paper we present a new approach called Multispectral Adaptive Region Growing Algorithm (MARGA) to perform the skull stripping process. MARGA is based on a region growing (RG) algorithm which uses the complementary information provided by conventional magnetic resonance images (MRI) such as T1-weighted and T2-weighted to perform the brain segmentation. MARGA can be seen as an extension of the skull stripping method proposed by Park and Lee (2009) [1], enabling their use in both axial views and low quality images. Following the same idea, we first obtain seed regions that are then spread using a 2D RG algorithm which behaves differently in specific zones of the brain. This adaptation allows to deal with the fact that middle MRI slices have better image contrast between the brain and non-brain regions than superior and inferior brain slices where the contrast is smaller. MARGA is validated using three different databases: 10 simulated brains from the BrainWeb database; 2 data sets from the National Alliance for Medical Image Computing (NAMIC) database, the first one consisting in 10 normal brains and 10 brains of schizophrenic patients acquired with a 3 T GE scanner, and the second one consisting in 5 brains from lupus patients acquired with a 3 T Siemens scanner; and 10 brains of multiple sclerosis patients acquired with a 1.5 T scanner. We have qualitatively and quantitatively compared MARGA with the well-known Brain Extraction Tool (BET), Brain Surface Extractor (BSE) and Statistical Parametric Mapping (SPM) approaches. The obtained results demonstrate the validity of MARGA, outperforming the results of those standard techniques. 相似文献
89.
Ignasi Paredes-Oliva Pere Barlet-Ros Xenofontas Dimitropoulos 《Computer Networks》2013,57(18):3897-3913
Extracting knowledge from big network traffic data is a matter of foremost importance for multiple purposes including trend analysis, network troubleshooting, capacity planning, network forensics, and traffic classification. An extremely useful approach to profile traffic is to extract and display to a network administrator the multi-dimensional hierarchical heavy hitters (HHHs) of a dataset. However, existing schemes for computing HHHs have several limitations: (1) they require significant computational resources; (2) they do not scale to high dimensional data; and (3) they are not easily extensible. In this paper, we introduce a fundamentally new approach for extracting HHHs based on generalized frequent item-set mining (FIM), which allows to process traffic data much more efficiently and scales to much higher dimensional data than present schemes. Based on generalized FIM, we build and thoroughly evaluate a traffic profiling system we call FaRNet. Our comparison with AutoFocus, which is the most related tool of similar nature, shows that FaRNet is up to three orders of magnitude faster. Finally, we describe experiences on how generalized FIM is useful in practice after using FaRNet operationally for several months in the NOC of GÉANT, the European backbone network. 相似文献
90.
F. Pereñíguez-García R. Marín-López G. Kambourakis A. Ruiz-Martínez S. Gritzalis A. F. Skarmeta-Gómez 《International Journal of Information Security》2013,12(6):505-525
In Next Generation Networks, Kerberos is becoming a key component to support authentication and key distribution for Internet application services. However, for this purpose, Kerberos needs to rectify certain deficiencies, especially in the area of privacy, which allow an eavesdropper to obtain information of the services users are accessing. This paper presents a comprehensive privacy framework that guarantees user anonymity, service access unlinkability and message exchange unlinkability in Kerberos both in single-domain and multi-domain scenarios. This proposal is based on different extensibility mechanisms already defined for Kerberos, which facilitate its adoption in already deployed systems. Apart from evaluating our proposal in terms of performance to prove its lightweight nature, we demonstrate its capability to work in perfect harmony with a widely used anonymous communication system like Tor. 相似文献