全文获取类型
收费全文 | 1574篇 |
免费 | 97篇 |
专业分类
电工技术 | 5篇 |
化学工业 | 639篇 |
金属工艺 | 13篇 |
机械仪表 | 38篇 |
建筑科学 | 51篇 |
能源动力 | 49篇 |
轻工业 | 287篇 |
水利工程 | 13篇 |
石油天然气 | 3篇 |
无线电 | 48篇 |
一般工业技术 | 193篇 |
冶金工业 | 85篇 |
原子能技术 | 7篇 |
自动化技术 | 240篇 |
出版年
2024年 | 2篇 |
2023年 | 15篇 |
2022年 | 55篇 |
2021年 | 188篇 |
2020年 | 57篇 |
2019年 | 50篇 |
2018年 | 39篇 |
2017年 | 42篇 |
2016年 | 69篇 |
2015年 | 64篇 |
2014年 | 58篇 |
2013年 | 126篇 |
2012年 | 92篇 |
2011年 | 123篇 |
2010年 | 78篇 |
2009年 | 78篇 |
2008年 | 102篇 |
2007年 | 63篇 |
2006年 | 32篇 |
2005年 | 46篇 |
2004年 | 35篇 |
2003年 | 37篇 |
2002年 | 30篇 |
2001年 | 16篇 |
2000年 | 16篇 |
1999年 | 20篇 |
1998年 | 26篇 |
1997年 | 17篇 |
1996年 | 13篇 |
1995年 | 13篇 |
1994年 | 10篇 |
1993年 | 9篇 |
1992年 | 9篇 |
1991年 | 5篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1987年 | 2篇 |
1986年 | 3篇 |
1985年 | 4篇 |
1984年 | 3篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 4篇 |
1980年 | 2篇 |
1978年 | 1篇 |
1977年 | 3篇 |
1976年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有1671条查询结果,搜索用时 15 毫秒
41.
SNPs are positions of the DNA sequences where the differences among individuals are embedded. The knowledge of such SNPs is crucial for disease association studies, but even if the number of such positions is low (about 1% of the entire sequence), the cost to extract the complete information is actually very high. Recent studies have shown that DNA sequences are structured into blocks of positions, that are conserved during evolution, where there is strong correlation among values (alleles) of different loci. To reduce the cost of extracting SNPs information, the block structure of the DNA has suggested to limit the process to a subset of SNPs, the so-called Tag SNPs, that are able to maintain the most of the information contained in the whole sequence. In this paper, we apply a technique for feature selection based on integer programming to the problem of Tag SNP selection. Moreover, to test the quality of our approach, we consider also the problem of SNPs reconstruction, i.e. the problem of deriving unknown SNPs from the value of Tag SNPs and propose two reconstruction methods, one based on a majority vote and the other on a machine learning approach. We test our algorithm on two public data sets of different nature, providing results that are, when comparable, in line with the related literature. One of the interesting aspects of the proposed method is to be found in its capability to deal simultaneously with very large SNPs sets, and, in addition, to provide highly informative reconstruction rules in the form of logic formulas. 相似文献
42.
Donato Di Paola David Naso Biagio Turchiano Grazia Cicirelli Arcangelo Distante 《Journal of Intelligent and Robotic Systems》2009,56(5):513-541
This paper focuses on the control system for an autonomous robot for the surveillance of indoor environments. Our approach
proposes a matrix-based formalism which allows us to merge in a single framework discrete-event supervisory control, conflict
resolution and reactive control. As a consequence, the robot is able to autonomously handle high level tasks as well as low-level
behaviors, solving control and decision-making issues simultaneously. Moreover, the matrix-based controller is modular and
can be easily reconfigured if mission characteristics or robot hardware configuration change. An illustrative example and
a report on experimental investigations are provided to illustrate the main features of the proposed approach. 相似文献
43.
44.
Luciano Baresi Vahid Rafe Adel T. Rahmani Paola Spoletini 《Electronic Notes in Theoretical Computer Science》2008,213(1):3
This paper presents an efficient solution for modeling checking graph transformation systems. The approach transforms AGG specifications into Bogor models and supports both attributed typed graphs and layered transformations. Resulting models are amenable to check interesting properties expressed as combinations of LTL (Linear Temporal Logic) and graph transformation rules. The first experimental results are encouraging and show that in most cases our proposal improves existing approaches, both in terms of performance and expressiveness. 相似文献
45.
46.
Nakanishi M Ménoret A Belinsky GS Giardina C Godman CA Vella AT Rosenberg DW 《Proteomics. Clinical applications》2007,1(12):1660-1666
Cancer chemoprevention approaches use either pharmacological or dietary agents to impede, arrest or reverse the carcinogenic process. Although several agents have shown effectiveness against colon cancer, present intervention strategies provide only partial reduction. In this study, we utilized high-resolution endoscopy to obtain colon tumor biopsy specimens from Apc mutant mice before and after 2-wk sulindac intervention. To acquire information beyond genomics, proteome analysis using the ProteomeLab PF2D platform was implemented to generate 2-D protein expression maps from biopsies. Chromatograms produced common signature profiles between sulindac and nonsulindac treated samples, and contrasting profiles termed "fingerprints". We selected a double peak that appeared in tumor biopsies from sulindac-treated mice. Further analyses using MS sequencing identified this protein as histone H2B. The location of H2B in the 1(st) dimension strongly suggested PTM, consistent with identification of two oxidized methionines. While further studies on sulindac proteomic fingerprints are underway, this study demonstrates the feasibility and advantages of "real-time" proteomic analysis for obtaining information on biomarker discovery and drug activity that would not be revealed by a genetic assay. This approach should be broadly applicable for assessing lesion responsiveness in a wide range of translational and human clinical studies. 相似文献
47.
Roberto Sabella Paola Iovanna 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》2006,36(6):1218-1229
Next-generation network infrastructure should support different services and several levels of quality of service (QoS) and resilience. The main requirements for such multiservice networks are flexibility, effective utilization of network resources, and ability to react to traffic demand changes with time. These requisites lead to the fact that next-generation networks should, to some extend, be "self-adapting," to cope with the need of promptly reacting to traffic demand changes, in an effective way, while taking into account the different requirements in terms of QoS. This paper sketches the reference network scenario and discusses the subject of self-adapting networks, attempting to focus on the key issues that need to be solved to realize future infrastructures. As a relevant example, this paper briefly reports a system developed by the authors' laboratory that implements a traffic engineering solution able to fulfill the mentioned requirements. This system could be regarded as a first concrete step toward the realization of self-adapting networks. In addition, some relevant results that were obtained either by simulation or by experiments on a real test bed are reported to discuss the main characteristics of such a system and assess the feasibility of the concept. Finally, the paper reviews the main hot issues that need to be addressed, in the authors' opinion, by the international research community. 相似文献
48.
Claudia Tarantola Paola Vicard Ioannis Ntzoufras 《Expert systems with applications》2012,39(11):10103-10111
Mystery shopping is a well known marketing technique used by companies and marketing analysts to measure quality of service, and gather information about products and services. In this article, we analyse data from mystery shopping surveys via Bayesian Networks in order to examine and evaluate the quality of service offered by the loan departments of Greek Banks. We use mystery shopping visits to collect information about loan products and services and, by this way, evaluate the customer satisfaction and plan improvement strategies that will assist banks to reach their internal standards. Bayesian Networks not only provide a pictorial representation of the dependence structure between the characteristics of interest but also allow to evaluate, interpret and understand the effects of possible improvement strategies. 相似文献
49.
Anna Ciampolini Evelina Lamma Paola Mello Francesca Toni Paolo Torroni 《Annals of Mathematics and Artificial Intelligence》2003,37(1-2):65-91
This paper presents ALIAS, an agent architecture based on intelligent logic agents, where the main form of agent reasoning is abduction. The system is particularly suited for solving problems where knowledge is incomplete, where agents may need to make reasonable hypotheses about the problem domain and other agents, and where the raised hypotheses have to be consistent for the overall set of agents. ALIAS agents are pro-active, exhibiting a goal-directed behavior, and autonomous, since each one can solve problems using its own private knowledge base. ALIAS agents are also social, because they are able to interact with other agents, in order to cooperatively solve problems. The coordination mechanisms are modeled by means of LAILA, a logic-based language which allows to express intra-agent reasoning and inter-agent coordination. As an application, we show how LAILA can be used to implement inter-agent dialogues, e.g., for negotiation. In particular, LAILA is well-suited to coordinate the process of negotiation aimed at exchanging resources between agents, thus allowing them to execute the plans to achieve their goals. 相似文献
50.
Marco Alberti Marco Gavanelli Evelina Lamma Paola Mello Paolo Torroni 《Electronic Notes in Theoretical Computer Science》2004,85(2):94
In this paper we propose a logic-based social approach to the specification and verification of agent interaction. We firstly introduce integrity constraints about social acts (called Social Integrity Constraints) as a formalism to express interaction protocols and to give a social semantics to the behavior of agents, focusing on communicative acts. Then, we discuss several possible kinds of verification of agent interaction, and we show how social integrity constraints can be used to verify some properties in this respect. We focus our attention on static verification of compliance of agent specifications to interaction protocols, and on run-time verification, based on agents' observable behavior. We adopt as a running example the NetBill security transaction protocol for the selling and delivery of information goods. 相似文献