全文获取类型
收费全文 | 116篇 |
免费 | 8篇 |
专业分类
电工技术 | 3篇 |
综合类 | 2篇 |
化学工业 | 27篇 |
金属工艺 | 1篇 |
机械仪表 | 1篇 |
建筑科学 | 3篇 |
能源动力 | 1篇 |
轻工业 | 14篇 |
水利工程 | 1篇 |
无线电 | 13篇 |
一般工业技术 | 21篇 |
冶金工业 | 1篇 |
原子能技术 | 1篇 |
自动化技术 | 35篇 |
出版年
2023年 | 9篇 |
2022年 | 11篇 |
2021年 | 7篇 |
2020年 | 7篇 |
2019年 | 8篇 |
2018年 | 5篇 |
2017年 | 7篇 |
2016年 | 7篇 |
2015年 | 5篇 |
2014年 | 6篇 |
2013年 | 5篇 |
2012年 | 6篇 |
2011年 | 5篇 |
2010年 | 3篇 |
2009年 | 6篇 |
2008年 | 2篇 |
2007年 | 4篇 |
2006年 | 1篇 |
2005年 | 3篇 |
2004年 | 5篇 |
2003年 | 4篇 |
2002年 | 2篇 |
1997年 | 1篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1991年 | 1篇 |
1987年 | 1篇 |
排序方式: 共有124条查询结果,搜索用时 15 毫秒
61.
Ward Huybrechts Gina Vanbutsele Kristof J. Houthoofd Fabrice Bertinchamps C. S. Laxmi Narasimhan Eric M. Gaigneaux Joris W. Thybaut Guy B. Marin Joeri F. M. Denayer Gino V. Baron Pierre A. Jacobs Johan A. Martens 《Catalysis Letters》2005,100(3-4):235-242
Octadecane was isomerized over three different Pt/H-ZSM-23 samples. The distributions of methylheptadecane and dimethylheptadecane skeletal isomers obtained on the Pt/ZSM-23 samples were very similar. Positional isomer distributions are fingerprints of the zeolite framework structure. The independence of skeletal isomer distributions from Al-gradients and particle size constitutes a strong argument in favor of pore-mouth catalysis. 相似文献
62.
FtsH metalloproteases found in eubacteria, animals, and plants are well-known for their vital role in the maintenance and proteolysis of membrane proteins. Their location is restricted to organelles of endosymbiotic origin, the chloroplasts, and mitochondria. In the model organism Arabidopsis thaliana, there are 17 membrane-bound FtsH proteases containing an AAA+ (ATPase associated with various cellular activities) and a Zn2+ metalloprotease domain. However, in five of those, the zinc-binding motif HEXXH is either mutated (FtsHi1, 2, 4, 5) or completely missing (FtsHi3), rendering these enzymes presumably inactive in proteolysis. Still, homozygous null mutants of the pseudo-proteases FtsHi1, 2, 4, 5 are embryo-lethal. Homozygous ftshi3 or a weak point mutant in FTSHi1 are affected in overall plant growth and development. This review will focus on the findings concerning the FtsHi pseudo-proteases and their involvement in protein import, leading to consequences in embryogenesis, seed growth, chloroplast, and leaf development and oxidative stress management. 相似文献
63.
Maternal vitamin D insufficiency is not uncommon. Infants born to mothers who are deficient in vitamin D and or calcium, usually
due to cultural modifications in their diets or clothing habits, and in addition are breastfed, are at risk of developing
vitamin D deficiency and hypocalcaemia. We present a case of neonatal hypocalcaemic seizures secondary to vitamin D deficiency. 相似文献
64.
65.
Malware phylogeny generation using permutations of code 总被引:1,自引:1,他引:0
Md. Enamul. Karim Andrew Walenstein Arun Lakhotia Laxmi Parida 《Journal in Computer Virology》2005,1(1-2):13-23
Malicious programs, such as viruses and worms, are frequently related to previous programs through evolutionary relationships. Discovering those relationships and constructing a phylogeny model is expected to be helpful for analyzing new malware and for establishing a principled naming scheme. Matching permutations of code may help build better models in cases where malware evolution does not keep things in the same order. We describe methods for constructing phylogeny models that uses features called n-perms to match possibly permuted codes. An experiment was performed to compare the relative effectiveness of vector similarity measures using n-perms and n-grams when comparing permuted variants of programs. The similarity measures using n-perms maintained a greater separation between the similarity scores of permuted families of specimens versus unrelated specimens. A subsequent study using a tree generated through n-perms suggests that phylogeny models based on n-perms may help forensic analysts investigate new specimens, and assist in reconciling malware naming inconsistencies 相似文献
66.
Occurrence of faults in Network on Chip (NoC) is inevitable as the feature size is continuously decreasing and processing elements are increasing in numbers.Faults can be revocable if it is transient.T... 相似文献
67.
Saini Anil Gaur Manoj Singh Laxmi Vijay Conti Mauro 《International Journal of Information Security》2019,18(4):481-504
International Journal of Information Security - Click Hijacking (clickjacking) is emerging as a web-based threat on the Internet. The prime objective of clickjacking is stealing user clicks. An... 相似文献
68.
Zadgaonkar Laxmi A. Mandavgane Sachin A. 《Clean Technologies and Environmental Policy》2020,22(10):2207-2221
Clean Technologies and Environmental Policy - Environmental impact assessment has gained equal importance with economics in process industries. Various methodologies are extensively used for impact... 相似文献
69.
Jain Anugrah Laxmi Vijay Tripathi Meenakshi Gaur Manoj Singh Bishnoi Rimpy 《The Journal of supercomputing》2019,75(10):6855-6881
The Journal of Supercomputing - The paradigm of computing has shifted from computation-centric to communication-centric designs. Network-on-chip has emerged as an alternative interconnect mechanism... 相似文献
70.
Pustokhina Irina V. Pustokhin Denis A. Lydia E. Laxmi Garg Puneet Kadian Amarender Shankar K. 《Multimedia Tools and Applications》2022,81(24):34951-34968
Multimedia Tools and Applications - In recent years, there is an exponential increase in the growth of the multimedia data, which is being generated from zettabyte to petabyte scale. At the same... 相似文献