全文获取类型
收费全文 | 883篇 |
免费 | 50篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 12篇 |
综合类 | 1篇 |
化学工业 | 234篇 |
金属工艺 | 22篇 |
机械仪表 | 23篇 |
建筑科学 | 14篇 |
矿业工程 | 2篇 |
能源动力 | 73篇 |
轻工业 | 45篇 |
水利工程 | 2篇 |
石油天然气 | 1篇 |
无线电 | 79篇 |
一般工业技术 | 189篇 |
冶金工业 | 30篇 |
原子能技术 | 2篇 |
自动化技术 | 210篇 |
出版年
2024年 | 9篇 |
2023年 | 44篇 |
2022年 | 47篇 |
2021年 | 72篇 |
2020年 | 48篇 |
2019年 | 51篇 |
2018年 | 69篇 |
2017年 | 51篇 |
2016年 | 42篇 |
2015年 | 25篇 |
2014年 | 37篇 |
2013年 | 69篇 |
2012年 | 47篇 |
2011年 | 57篇 |
2010年 | 50篇 |
2009年 | 44篇 |
2008年 | 38篇 |
2007年 | 36篇 |
2006年 | 32篇 |
2005年 | 20篇 |
2004年 | 10篇 |
2003年 | 7篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1999年 | 1篇 |
1998年 | 4篇 |
1997年 | 6篇 |
1996年 | 3篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1984年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 3篇 |
排序方式: 共有939条查询结果,搜索用时 15 毫秒
31.
Rahul S. Kalhapure Pradeep Bolla Delfina C. Dominguez Amit Dahal Sai H.S. Boddu Jwala Renukuntla 《IET nanobiotechnology / IET》2018,12(6):836
Silver (Ag) complexes of drugs and their nanosystems have great potential as antibacterials. Recently, an Ag complex of furosemide (Ag–FSE) has shown to be a promising antimicrobial. However, poor solubility of Ag–FSE could hamper its introduction into clinics. Therefore, the authors developed a nanosuspension of Ag–FSE (Ag–FSE_NS) for its solubility and antibacterial activity enhancement. The aim of this study was to introduce a novel nanoantibiotic with enhanced antibacterial efficacy. Ag–FSE_NS was prepared by precipitation–ultrasonication technique. Size, polydispersity index (PI) and zeta potential (ZP) of prepared Ag–FSE_NS were measured by dynamic light scattering, whereas surface morphology was determined using scanning electron microscopy (SEM). In vitro antibacterial activity was evaluated against Staphylococcus aureus, Escherichia coli and Pseudomonas aeruginosa using broth microdilution method. Size, PI and ZP of optimised Ag–FSE_NS1 were 191.2 ± 19.34 nm, 0.465 ± 0.059 and −55.7 ± 8.18 mV, respectively. SEM revealed that Ag–FSE_NS1 particles were rod or needle‐like with smooth surfaces. Saturation solubility of Ag–FSE in NS increased eight‐fold than pure Ag–FSE. Ag–FSE_NS1 exhibited two‐fold and eight‐fold enhancements in activity against E. coli and S. aureus, respectively. The results obtained showed that developed Ag–FSE_NS1 holds a promise as a topical antibacterial.Inspec keywords: nanomedicine, nanofabrication, light scattering, surface morphology, silver, particle size, solubility, suspensions, scanning electron microscopy, electrokinetic effects, drugs, biomedical materials, antibacterial activity, microorganisms, nanoparticles, drug delivery systems, transmission electron microscopyOther keywords: saturation solubility, topical antibacterial, size 171.86 nm to 210.54 nm, voltage ‐47.52 mV to ‐63.88 mV, Ag, broth microdilution method, Pseudomonas aeruginosa, Escherichia coli, Staphylococcus aureus, SEM, scanning electron microscopy, surface morphology, dynamic light scattering, particle size, polydispersity index, precipitation–ultrasonication technique, nanoantibiotic, nanosuspension, furosemide, nanosystems, drugs, Ag–FSE_NS preparation, in vitro antibacterial activity, pure Ag–FSE, Ag–FSE_NS1 particles, optimised Ag–FSE_NS1, zeta potential, enhanced antibacterial efficacy, antibacterials 相似文献
32.
Yiling Chen Stanko Dimitrov Rahul Sami Daniel M. Reeves David M. Pennock Robin D. Hanson Lance Fortnow Rica Gonen 《Algorithmica》2010,58(4):930-969
We study the equilibrium behavior of informed traders interacting with market scoring rule (MSR) market makers. One attractive feature of MSR is that it is myopically incentive compatible: it is optimal for traders to report their true beliefs about the likelihood of an event outcome provided that they ignore
the impact of their reports on the profit they might garner from future trades. In this paper, we analyze non-myopic strategies
and examine what information structures lead to truthful betting by traders. Specifically, we analyze the behavior of risk-neutral
traders with incomplete information playing in a dynamic game. We consider finite-stage and infinite-stage game models. For
each model, we study the logarithmic market scoring rule (LMSR) with two different information structures: conditionally independent
signals and (unconditionally) independent signals. In the finite-stage model, when signals of traders are independent conditional
on the state of the world, truthful betting is a Perfect Bayesian Equilibrium (PBE). Moreover, it is the unique Weak Perfect
Bayesian Equilibrium (WPBE) of the game. In contrast, when signals of traders are unconditionally independent, truthful betting
is not a WPBE. In the infinite-stage model with unconditionally independent signals, there does not exist an equilibrium in which
all information is revealed in a finite amount of time. We propose a simple discounted market scoring rule that reduces the
opportunity for bluffing strategies. We show that in any WPBE for the infinite-stage market with discounting, the market price
converges to the fully-revealing price, and the rate of convergence can be bounded in terms of the discounting parameter.
When signals are conditionally independent, truthful betting is the unique WPBE for the infinite-stage market with and without
discounting. 相似文献
33.
Fusion of probabilistic A* algorithm and fuzzy inference system for robotic path planning 总被引:1,自引:0,他引:1
Robotic Path planning is one of the most studied problems in the field of robotics. The problem has been solved using numerous
statistical, soft computing and other approaches. In this paper we solve the problem of robotic path planning using a combination
of A* algorithm and Fuzzy Inference. The A* algorithm does the higher level planning by working on a lower detail map. The
algorithm finds the shortest path at the same time generating the result in a finite time. The A* algorithm is used on a probability
based map. The lower level planning is done by the Fuzzy Inference System (FIS). The FIS works on the detailed graph where
the occurrence of obstacles is precisely known. The FIS generates smoother paths catering to the non-holonomic constraints.
The results of A* algorithm serve as a guide for FIS planner. The FIS system was initially generated using heuristic rules.
Once this model was ready, the fuzzy parameters were optimized using a Genetic Algorithm. Three sample problems were created
and the quality of solutions generated by FIS was used as the fitness function of the GA. The GA tried to optimize the distance
from the closest obstacle, total path length and the sharpest turn at any time in the journey of the robot. The resulting
FIS was easily able to plan the path of the robot. We tested the algorithm on various complex and simple paths. All paths
generated were optimal in terms of path length and smoothness. The robot was easily able to escape a variety of obstacles
and reach the goal in an optimal manner. 相似文献
34.
Knowledge of the information goal of users is critical in website design, analyzing the efficacy of such designs, and in ensuring effective user-access to
desired information. Determining the information goal is complex due to the subjective and latent nature of user information
needs. This challenge is further exacerbated in media-rich websites since the semantics of media-based information is context-based
and emergent. A critical step in determining information goals lies in the identification of content pages. These are the pages which contain the information the user seeks. We propose a method to automatically determine the content
pages by taking into account the organization of the web site, the media-based information content, as well as the influence
of a specific user browsing pattern. Given a specific browsing pattern, in our method, putative content pages are identified
as the pages corresponding to the local minima of page-content entropy values. For an (unknown) user information goal this
intuitively corresponds to modeling the progressive transition of the user from pages with generic information to those with
specific information. Experimental investigations on media rich sites demonstrate the effectiveness of the technique and underline
its potential in modeling user information needs and actions in a media-rich web. 相似文献
35.
We introduce the concert (or cafeteria) queueing problem: A finite but large number of customers arrive into a queueing system
that starts service at a specified opening time. Each customer is free to choose her arrival time (before or after opening
time), and is interested in early service completion with minimal wait. These goals are captured by a cost function which
is additive and linear in the waiting time and service completion time, with coefficients that may be class dependent. We
consider a fluid model of this system, which is motivated as the fluid-scale limit of the stochastic system. In the fluid
setting, we explicitly identify the unique Nash-equilibrium arrival profile for each class of customers. Our structural results
imply that, in equilibrium, the arrival rate is increasing up until the closing time where all customers are served. Furthermore,
the waiting queue is maximal at the opening time, and monotonically decreases thereafter. In the simple single class setting,
we show that the price of anarchy (PoA, the efficiency loss relative to the socially optimal solution) is exactly two, while
in the multi-class setting we develop tight upper and lower bounds on the PoA. In addition, we consider several mechanisms
that may be used to reduce the PoA. The proposed model may explain queueing phenomena in diverse settings that involve a pre-assigned
opening time. 相似文献
36.
Integrated circuits (ICs) are often produced in foundries that lack effective security controls. In these foundries, sophisticated attackers are able to insert malicious Trojan circuits that are easily hidden in the large, complex circuitry that comprises modern ICs. These so-called Trojan circuits are capable of launching attacks directly in hardware, or, more deviously, can facilitate software attacks. Current defense against Trojan circuits consists of statistical detection techniques to find such circuits before product deployment. The fact that statistical detection can result in false negatives raises the obvious questions: can attacks be detected post-deployment, and is secure execution nonetheless possible using chips with undetected Trojan circuits? In this paper we present the Secure Heartbeat And Dual-Encryption (SHADE) architecture, a compiler–hardware solution for detecting and preventing a subset of Trojan circuit attacks in deployed systems. Two layers of hardware encryption are combined with a heartbeat of off-chip accesses to provide a secure execution environment using untrusted hardware. The SHADE system is designed to complement pre-deployment detection techniques and to add a final, last-chance layer of security. 相似文献
37.
Information Systems and e-Business Management - Collaborative filtering (CF) is a popular and widely accepted recommendation technique. CF is an automated form of word-of-mouth communication... 相似文献
38.
Rahul Nagpal Y.N. Srikant 《Parallel Computing》2011,37(1):42-59
Clustered VLIW architectures solve the scalability problem associated with flat VLIW architectures by partitioning the register file and connecting only a subset of the functional units to a register file. However, inter-cluster communication in clustered architectures leads to increased leakage in functional components and a high number of register accesses. In this paper, we propose compiler scheduling algorithms targeting two previously ignored power-hungry components in clustered VLIW architectures, viz., instruction decoder and register file.We consider a split decoder design and propose a new energy-aware instruction scheduling algorithm that provides 14.5% and 17.3% benefit in the decoder power consumption on an average over a purely hardware based scheme in the context of 2-clustered and 4-clustered VLIW machines. In the case of register files, we propose two new scheduling algorithms that exploit limited register snooping capability to reduce extra register file accesses. The proposed algorithms reduce register file power consumption on an average by 6.85% and 11.90% (10.39% and 17.78%), respectively, along with performance improvement of 4.81% and 5.34% (9.39% and 11.16%) over a traditional greedy algorithm for 2-clustered (4-clustered) VLIW machine. 相似文献
39.
Rahul Shringarpure Sameer Venugopal Korhan Kaftanoglu Lawrence T. Clark David R. Allee Edward Bawolek 《Journal of the Society for Information Display》2008,16(11):1147-1155
Abstract— A novel approach of modeling a‐Si:H TFTs with the industry‐standard BSIM3 compact model is presented. The described approach defines the a‐Si:H TFT drain current and terminal charges as explicit functions of terminal voltages using a minimum set of BSIM3 parameters. The set of BSIM3 parameters is chosen based on the electrical and physical characteristics of the a‐Si:H TFT and their values extracted from measured data. By using the selected BSIM3 model parameters, the a‐Si:H TFT is simulated inside SPICE to fit the simulated I‐V and C‐V curves with the measured results. Finally, the extracted BSIM3 model is validated by simulating the kickback voltage effect in an AMLCD pixel array. 相似文献
40.
Rahul Singh Richard M. Voyles David Littau Nikolaos P. Papanikolopoulos 《Autonomous Robots》2001,10(3):317-338
We present an approach for controlling robotic interactions with objects, using synthetic images generated by morphing shapes. In particular, we attempt the problem of positioning an eye-in-hand robotic system with respect to objects in the workspace for grasping and manipulation. In our formulation, the grasp position (and consequently the approach trajectory of the manipulator), varies with each object. The proposed solution to the problem consists of two parts. First, based on a model-based object recognition framework, images of the objects taken at the desired grasp pose are stored in a database. The recognition and identification of the grasp position for an unknown input object (selected from the family of recognizable objects) occurs by morphing its contour to the templates in the database and using the virtual energy spent during the morph as a dissimilarity measure. In the second step, the images synthesized during the morph are used to guide the eye-in-hand system and execute the grasp. The proposed method requires minimal calibration of the system. Furthermore, it conjoins techniques from shape recognition, computer graphics, and vision-based robot control in a unified engineering amework. Potential applications range from recognition and positioning with respect to partially-occluded or deformable objects to planning robotic grasping based on human demonstration. 相似文献