全文获取类型
收费全文 | 157篇 |
免费 | 6篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 11篇 |
金属工艺 | 2篇 |
机械仪表 | 1篇 |
建筑科学 | 4篇 |
能源动力 | 1篇 |
轻工业 | 4篇 |
水利工程 | 2篇 |
无线电 | 31篇 |
一般工业技术 | 32篇 |
冶金工业 | 21篇 |
自动化技术 | 56篇 |
出版年
2023年 | 1篇 |
2022年 | 3篇 |
2020年 | 7篇 |
2019年 | 2篇 |
2018年 | 2篇 |
2017年 | 4篇 |
2016年 | 5篇 |
2015年 | 5篇 |
2014年 | 3篇 |
2013年 | 7篇 |
2012年 | 11篇 |
2011年 | 12篇 |
2010年 | 10篇 |
2009年 | 7篇 |
2008年 | 10篇 |
2007年 | 15篇 |
2006年 | 6篇 |
2005年 | 1篇 |
2004年 | 9篇 |
2003年 | 2篇 |
2002年 | 4篇 |
2001年 | 5篇 |
2000年 | 1篇 |
1999年 | 2篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1973年 | 2篇 |
1970年 | 1篇 |
排序方式: 共有166条查询结果,搜索用时 15 毫秒
91.
92.
Meghan K. Murphy Boaz Arzi Shannon M. Prouty Jerry C. Hu Kyriacos A. Athanasiou 《Journal of the Royal Society Interface》2015,12(103)
Integration of engineered musculoskeletal tissues with adjacent native tissues presents a significant challenge to the field. Specifically, the avascularity and low cellularity of cartilage elicit the need for additional efforts in improving integration of neocartilage within native cartilage. Self-assembled neocartilage holds significant potential in replacing degenerated cartilage, though its stabilization and integration in native cartilage require further efforts. Physical and enzymatic stabilization methods were investigated in an in vitro model for temporomandibular joint (TMJ) disc degeneration. First, in phase 1, suture, glue and press-fit constructs were compared in TMJ disc intermediate zone defects. In phase 1, suturing enhanced interfacial shear stiffness and strength immediately; after four weeks, a 15-fold increase in stiffness and a ninefold increase in strength persisted over press-fit. Neither suture nor glue significantly altered neocartilage properties. In phase 2, the effects of the enzymatic stabilization regimen composed of lysyl oxidase, CuSO4 and hydroxylysine were investigated. A full factorial design was employed, carrying forward the best physical method from phase 1, suturing. Enzymatic stabilization significantly increased interfacial shear stiffness after eight weeks. Combined enzymatic stabilization and suturing led to a fourfold increase in shear stiffness and threefold increase in strength over press-fit. Histological analysis confirmed the presence of a collagen-rich interface. Enzymatic treatment additionally enhanced neocartilage mechanical properties, yielding a tensile modulus over 6 MPa and compressive instantaneous modulus over 1200 kPa at eight weeks. Suturing enhances stabilization of neocartilage, and enzymatic treatment enhances functional properties and integration of neocartilage in the TMJ disc. Methods developed here are applicable to other orthopaedic soft tissues, including knee meniscus and hyaline articular cartilage. 相似文献
93.
We consider the following model of cellular networks. Each base station has a given finite capacity, and each client has some demand and profit. A client can be covered by a specific subset of the base stations, and its profit is obtained only if its demand is provided in full. The goal is to assign clients to base stations, so that the overall profit is maximized subject to base station capacity constraints. 相似文献
94.
95.
Yi-Qing Wang Alain Trouvé Yali Amit Boaz Nadler 《Journal of Mathematical Imaging and Vision》2017,59(3):373-393
Detecting edges in noisy images is a fundamental task in image processing. Motivated, in part, by various real-time applications that involve large and noisy images, in this paper we consider the problem of detecting long curved edges under extreme computational constraints, that allow processing of only a fraction of all image pixels. We present a sublinear algorithm for this task, which runs in two stages: (1) a multiscale scheme to detect curved edges inside a few image strips; and (2) a tracking procedure to estimate their extent beyond these strips. We theoretically analyze the runtime and detection performance of our algorithm and empirically illustrate its competitive results on both simulated and real images. 相似文献
96.
97.
The calcium ion response of a quartz nanopipette was enhanced by immobilization of calmodulin to the nanopore surface. Binding to the analyte is rapidly reversible in neutral buffer and requires no change in media or conditions to regenerate the receptor. The signal remained reproducible over numerous measurements. The modified nanopipette was used to measure binding affinity to calcium ions, with a K(d) of 6.3 ± 0.8 × 10(-5) M. This affinity is in good agreement with reported values of the solution-state protein. The behavior of such reversible nanopore-based sensors can be used to study proteins in a confined environment and may lead to new devices for continuous monitoring. 相似文献
98.
Simulated reconstruction of a three-dimensional (3D) object in 360° from cylindrical hologram is proposed. The simulation is done using a fast calculation method, where wave propagation in spectral domain and in cylindrical coordinates is used to generate the cylindrical hologram of a 3D object. The same procedure is followed to reconstruct the object back. The reconstructions resembled the original object and could be seen from all 360°. The whole simulation process is done using open-source software. 相似文献
99.
100.
Boaz Barak Ran Canetti Yehuda Lindell Rafael Pass Tal Rabin 《Journal of Cryptology》2011,24(4):720-760
Research on secure multiparty computation has mainly concentrated on the case where the parties can authenticate each other
and the communication between them. This work addresses the question of what security can be guaranteed when authentication
is not available. We consider a completely unauthenticated setting, where all messages sent by the parties may be tampered with and modified by the adversary without the uncorrupted parties being able
to detect this fact. In this model, it is not possible to achieve the same level of security as in the authenticated-channel
setting. Nevertheless, we show that meaningful security guarantees can be provided: Essentially, all the adversary can do is to partition the network into disjoint sets, where in each set the
computation is secure in of itself, and also independent of the computation in the other sets. In this setting we provide, for the first time, nontrivial security guarantees in a
model with no setup assumptions whatsoever. We also obtain similar results while guaranteeing universal composability, in some variants of the common reference string
model. Finally, our protocols can be used to provide conceptually simple and unified solutions to a number of problems that
were studied separately in the past, including password-based authenticated key exchange and nonmalleable commitments. As an application of our results, we study the question of constructing secure protocols in partially authenticated networks,
where some of the links are authenticated, and some are not (as is the case in most networks today). 相似文献