全文获取类型
收费全文 | 257篇 |
免费 | 6篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 62篇 |
金属工艺 | 6篇 |
机械仪表 | 8篇 |
建筑科学 | 17篇 |
能源动力 | 6篇 |
轻工业 | 20篇 |
石油天然气 | 1篇 |
无线电 | 42篇 |
一般工业技术 | 33篇 |
冶金工业 | 9篇 |
原子能技术 | 1篇 |
自动化技术 | 58篇 |
出版年
2023年 | 2篇 |
2022年 | 4篇 |
2021年 | 5篇 |
2020年 | 4篇 |
2019年 | 3篇 |
2018年 | 6篇 |
2017年 | 3篇 |
2016年 | 9篇 |
2015年 | 3篇 |
2014年 | 15篇 |
2013年 | 14篇 |
2012年 | 23篇 |
2011年 | 17篇 |
2010年 | 16篇 |
2009年 | 25篇 |
2008年 | 23篇 |
2007年 | 6篇 |
2006年 | 11篇 |
2005年 | 13篇 |
2004年 | 8篇 |
2003年 | 4篇 |
2002年 | 8篇 |
2001年 | 1篇 |
2000年 | 7篇 |
1999年 | 5篇 |
1998年 | 2篇 |
1997年 | 6篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1988年 | 1篇 |
1984年 | 1篇 |
1983年 | 3篇 |
1982年 | 1篇 |
1979年 | 2篇 |
1978年 | 2篇 |
1976年 | 1篇 |
排序方式: 共有264条查询结果,搜索用时 31 毫秒
11.
Dr. Luca Gobbi Dr. Joël Mercier Dr. Benny Bang-Andersen Dr. Jean-Marie Nicolas Dr. John Reilly Björn Wagner Dr. David Whitehead Dr. Emmanuelle Briard Dr. R. Paul Maguire Dr. Edilio Borroni Dr. Yves P. Auberson 《ChemMedChem》2020,15(7):560-560
Nonspecific binding (NSB) is a key parameter in optimizing PET imaging tracers. We compared the ability to predict NSB of three available methods: LIMBA, rat fu,brain, and CHI(IAM). Even though NSB is often associated with lipophilicity, we observed that logD does not correlate with any of these assays, clearly indicating that lipophilicity, while influencing NSB, is insufficient to predict it. A cross-comparison of the methods showed that all three correlate and are useful predictors of NSB. The three assays, however, rank the molecules slightly differently, illustrating the challenge of comparing molecules within a narrow chemical space. We also noted that CHI(IAM) values more effectively predict VNS, a measure of in vivo NSB in the human brain. CHI(IAM) measurements might be a closer model of the actual physicochemical interaction between PET tracer candidates and cell membranes, and seems to be the method of choice for the optimization of in vivo NSB. 相似文献
12.
Christina Borch-Jensen Benny Jensen Kim Mathiasen Jørgen Mollerup 《Journal of the American Oil Chemists' Society》1997,74(3):277-284
The seed oils from Dimorphoteca pluvialis and Ricinus communis contain hydroxy fatty acids. Dimorphoteca pluvialis contains Δ-9-hydroxy-10t, 12t-octadecadienoic acid (dimorphecolic acid) and R. communis contains Δ-12-hydroxy-9c-octadecenoic acid (ricinoleic acid). The oils were derivatized and analyzed to determine the content of hydroxy fatty acids.
The trimethylsilyl fatty acid methyl ester (TMS-FAME) derivatives were analyzed by capillary gas chromatography (GC), and
the free fatty acid (FFA) derivatives and the oils were analyzed by capillary supercritical fluid chromatography (SFC). Further,
mass spectroscopy of the TMS-FAME derivatives was performed to check the purity of the derivatives. The results from the GC
analyses of TMS-FAME corresponded to the results found by SFC analysis of the FFA. The content of ricinoleic acid in the glycerolipids
of R. communis was 87.7 wt%, and the content of dimorphecolic acid in D. pluvialis was 54.0 wt%. The methods were evaluated with respect to the cost, ease, and time needed for sample preparation and analysis. 相似文献
13.
In this paper, we show the tracking performance of a rotary piezoelectric motor based hard disk drive actuator. The actuator is built and modeled for positioning servo in disk drive systems. The Piezo motor replaces the voice-coil-motor based primary actuation. Simulation and experimental results for its servo system proves that it can help to achieve track density of more than 1000?KTPI. 相似文献
14.
Akesson Benny Nasri Mitra Nelissen Geoffrey Altmeyer Sebastian Davis Robert I. 《Real-Time Systems》2022,58(3):358-398
Real-Time Systems - This paper presents results and observations from a survey of 120 industry practitioners in the field of real-time embedded systems. The survey provides insights into the... 相似文献
15.
IN 2008, a nuclear event occurred at Kr?ko nuclear power plant in Slovenia. Even though it was classified as level 0 on International Nuclear Event Scale, the transparency policy of the Slovenian nuclear safety authorities prompted it to notify the international community. This was the first time that the European Community Urgent Radiological Information Exchange (ECURIE) notification system was used outside the exercise framework. The event was reported in all major European. In this contribution, we report on a content analysis of media articles related to this event. The main research question was if a nuclear emergency generates significant media coverage, even in the case of a minor event and a transparent communication policy. The analysis included more than 200 articles from printed and spoken media in Slovenia and other countries. The analysis revealed a high‐intensity media coverage, emotional reactions and heated political discussion. The main media sources in countries with open political discussions on nuclear energy end up being the politicians, rather than resident experts. 相似文献
16.
17.
Ronen Gradwohl Moni Naor Benny Pinkas Guy N. Rothblum 《Theory of Computing Systems》2009,44(2):245-268
We consider cryptographic and physical zero-knowledge proof schemes for Sudoku, a popular combinatorial puzzle. We discuss
methods that allow one party, the prover, to convince another party, the verifier, that the prover has solved a Sudoku puzzle,
without revealing the solution to the verifier. The question of interest is how a prover can show: (i) that there is a solution
to the given puzzle, and (ii) that he knows the solution, while not giving away any information about the solution to the
verifier.
In this paper we consider several protocols that achieve these goals. Broadly speaking, the protocols are either cryptographic
or physical. By a cryptographic protocol we mean one in the usual model found in the foundations of cryptography literature.
In this model, two machines exchange messages, and the security of the protocol relies on computational hardness. By a physical
protocol we mean one that is implementable by humans using common objects, and preferably without the aid of computers. In
particular, our physical protocols utilize items such as scratch-off cards, similar to those used in lotteries, or even just
simple playing cards.
The cryptographic protocols are direct and efficient, and do not involve a reduction to other problems. The physical protocols
are meant to be understood by “lay-people” and implementable without the use of computers.
Research of R. Gradwohl was supported by US-Israel Binational Science Foundation Grant 2002246.
Research of M. Naor was supported in part by a grant from the Israel Science Foundation.
Research of B. Pinkas was supported in part by the Israel Science Foundation (grant number 860/06).
Research of G.N. Rothblum was supported by NSF grant CNS-0430450 and NSF grant CFF-0635297. 相似文献
18.
Computing occluding and transparent motions 总被引:7,自引:6,他引:7
Computing the motions of several moving objects in image sequences involves simultaneous motion analysis and segmentation. This task can become complicated when image motion changes significantly between frames, as with camera vibrations. Such vibrations make tracking in longer sequences harder, as temporal motion constancy cannot be assumed. The problem becomes even more difficult in the case of transparent motions.A method is presented for detecting and tracking occluding and transparent moving objects, which uses temporal integration without assuming motion constancy. Each new frame in the sequence is compared to a dynamic internal representation image of the tracked object. The internal representation image is constructed by temporally integrating frames after registration based on the motion computation. The temporal integration maintains sharpness of the tracked object, while blurring objects that have other motions. Comparing new frames to the internal representation image causes the motion analysis algorithm to continue tracking the same object in subsequent frames, and to improve the segmentation. 相似文献
19.
20.
Tight lower bounds for certain parameterized NP-hard problems 总被引:1,自引:0,他引:1
Jianer Chen Benny Chor Mike Fellows Xiuzhen Huang David Juedes Iyad A. Kanj Ge Xia 《Information and Computation》2005,201(2):216-231
Based on the framework of parameterized complexity theory, we derive tight lower bounds on the computational complexity for a number of well-known NP-hard problems. We start by proving a general result, namely that the parameterized weighted satisfiability problem on depth-t circuits cannot be solved in time no(k)mO(1), where n is the circuit input length, m is the circuit size, and k is the parameter, unless the (t − 1)-st level W[t − 1] of the W-hierarchy collapses to FPT. By refining this technique, we prove that a group of parameterized NP-hard problems, including weighted sat, hitting set, set cover, and feature set, cannot be solved in time no(k)mO(1), where n is the size of the universal set from which the k elements are to be selected and m is the instance size, unless the first level W[1] of the W-hierarchy collapses to FPT. We also prove that another group of parameterized problems which includes weighted q-sat (for any fixed q 2), clique, independent set, and dominating set, cannot be solved in time no(k) unless all search problems in the syntactic class SNP, introduced by Papadimitriou and Yannakakis, are solvable in subexponential time. Note that all these parameterized problems have trivial algorithms of running time either nkmO(1) or O(nk). 相似文献