全文获取类型
收费全文 | 209篇 |
免费 | 9篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 5篇 |
化学工业 | 39篇 |
金属工艺 | 1篇 |
机械仪表 | 1篇 |
建筑科学 | 6篇 |
能源动力 | 7篇 |
轻工业 | 25篇 |
水利工程 | 3篇 |
石油天然气 | 1篇 |
无线电 | 15篇 |
一般工业技术 | 28篇 |
冶金工业 | 63篇 |
自动化技术 | 25篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2022年 | 2篇 |
2021年 | 11篇 |
2020年 | 2篇 |
2019年 | 1篇 |
2018年 | 8篇 |
2017年 | 8篇 |
2016年 | 3篇 |
2015年 | 3篇 |
2014年 | 7篇 |
2013年 | 14篇 |
2012年 | 5篇 |
2011年 | 10篇 |
2010年 | 5篇 |
2009年 | 9篇 |
2008年 | 11篇 |
2007年 | 7篇 |
2006年 | 11篇 |
2005年 | 8篇 |
2004年 | 4篇 |
2003年 | 4篇 |
2002年 | 3篇 |
2000年 | 2篇 |
1999年 | 4篇 |
1998年 | 13篇 |
1997年 | 6篇 |
1996年 | 10篇 |
1995年 | 6篇 |
1994年 | 3篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 4篇 |
1986年 | 1篇 |
1985年 | 3篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1982年 | 1篇 |
1981年 | 4篇 |
1980年 | 3篇 |
1979年 | 3篇 |
1978年 | 1篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1934年 | 1篇 |
排序方式: 共有219条查询结果,搜索用时 15 毫秒
1.
Maria Grazia Basanisi Gianfranco La Bella Gaia Nobili Rosa Coppola Annita Maria Damato Maria Assunta Cafiero Giovanna La Salandra 《International Journal of Food Science & Technology》2020,55(3):1145-1150
The authenticity and traceability of meat products are issues of primary importance to ensure food safety. Unfortunately, food adulteration (e.g. the addition of inexpensive cuts to minced meat products) and mislabelling (e.g. the inclusion of meat from species other than those declared) happens frequently worldwide. The aim of this study was to apply a droplet digital PCR assay for the detection and quantification (copies μL−1) of the beef, pork, horse, sheep, chicken and turkey in meat products. The analysis conducted on commercial meat showed the presence of traces of DNA from other animal species than those declared. We show that the method is highly sensitive, specific and accurate (accuracy = 100%). This method could be adopted by competent food safety authorities to verify compliance with the labelling of meat products and to ensure quality and safety throughout the meat supply chain, from primary production to consumption. 相似文献
2.
The present work is aimed to extend the knowledge of mechanical properties of sandwich structures used for marine applications
focusing on the possibility to increase the performances of such structures by adding a bonder at the skin/core interface.
Therefore, three sandwich structures that are utilised in different structural components of a yacht were realised by manual
lay-up. The mechanical characterisation was performed by flatwise compressive, edgewise compressive and three point flexural
tests. The tests execution has allowed both to determine the mechanical performances and to understand the fracture mechanisms
that take place when the bonder is added in the stacking sequence of the samples. 相似文献
3.
In this paper, we survey several recent results that highlight an interplay between a relatively new class of quasiseparable matrices and univariate polynomials. Quasiseparable matrices generalize two classical matrix classes, Jacobi (tridiagonal) matrices and unitary Hessenberg matrices that are known to correspond to real orthogonal polynomials and Szegö polynomials, respectively. The latter two polynomial families arise in a wide variety of applications, and their short recurrence relations are the basis for a number of efficient algorithms. For historical reasons, algorithm development is more advanced for real orthogonal polynomials. Recent variations of these algorithms tend to be valid only for the Szegö polynomials; they are analogues and not generalizations of the original algorithms. 相似文献
4.
5.
Giampaolo Bella 《International Journal of Information Security》2010,9(2):83-97
Conformity to prudent design principles is an established approach to protocol correctness although it is not free of limitations.
We term goal availability a design principle that is often implicitly followed, prescribing protocols to aim at principal-centric goals. Adherence
to a design principle is normally established through protocol analysis that is an evaluation of whether a protocol achieves
its goals. However, the literature shows that there exists no clear guidance on how to conduct and interpret such an analysis,
a process that is only left to the analyzer’s skill and experience. Goal availability has the desirable feature that its supporting
protocol analysis can be precisely guided by what becomes a principle of realistic analysis, which we call guarantee availability. It prescribes that the outcome of the analysis, which is the set of guarantees confirming the protocol goals, be practically
applicable by the protocol participants. In consequence, the guarantees must be based on assumptions that the principals have
the capacity to verify. Our focus then turns entirely to protocol analysis, because an analysis conforming to guarantee availability
signifies that the analyzed protocol conforms to goal availability. Existing analysis of (both classical and deployed) protocols
has been reconsidered with the aim of studying their conformity to guarantee availability. Some experiments clarify the relationships
between goal availability and the existing design principles, with particular reference to explicitness. Other experiments
demonstrate that boosting an analysis with guarantee availability generally makes it deeper, unveiling additional protocol
niceties that depending on the analyzer’s skills may remain overseen otherwise. In particular, an established claim about
a protocol (made using a well-known formal method) can be subverted. 相似文献
6.
Giordano D Kavasidis I Spampinato C Bella R Pennisi G Pennisi M 《Computer methods and programs in biomedicine》2012,107(1):4-15
Transcranial magnetic stimulation (TMS) is the most important technique currently available to study cortical excitability. Additionally, TMS can be used for therapeutic and rehabilitation purposes, replacing the more painful transcranial electric stimulation (TES). In this paper we present an innovative and easy-to-use tool that enables neuroscientists to design, carry out and analyze scientific studies based on TMS experiments for both diagnostic and research purposes, assisting them not only in the practicalities of administering the TMS but also in each step of the entire study's workflow. One important aspect of this tool is that it allows neuroscientists to specify research designs at will, enabling them to define any parameter of a TMS study starting from data acquisition and sample group definition to automated statistical data analysis and RDF data storage. It also supports the diagnosing process by using on-line support vector machines able to learn incrementally from the diseases instances that are continuously added into the system. The proposed system is a neuroscientist-centred tool where the protocols being followed in TMS studies are made explicit, leaving to the users flexibility in exploring and sharing the results, and providing assistance in managing the complexity of the final diagnosis. This type of tool can make the results of medical experiments more easily exploitable, thus accelerating scientific progress. 相似文献
7.
Antonino Valenza Chiara Borsellino Luigi Calabrese Guido Di Bella 《Applied Composite Materials》2006,13(4):217-235
Composite materials are widely employed in sailing sports, a possible application is for the mast pole or other sail poles. In the paper the attention is focused on the spinnaker poles mechanical performances; in particular the focus is on axial and ring compressive properties of three different carbon fibre/epoxy resin spinnaker poles, to investigate both the diameter and stacking sequence effect on the mechanical performance of the structure. Starting from the stacking sequence used in the production of a particular spinnaker pole, the effect of a lamina at 0° in the middle of wall thickness is investigated with the purpose to obtain a more stiff structure. Moreover to test the proposed stacking sequence on different size products, a prototype with lower diameter is realized. To properly evaluate axial and ring stiffness, axial compression test and ring stiffness one are performed. Then a numerical model is developed to support the design of the finished product: A simple and versatile numerical analysis (FEA with software ANSYS), by simulating ring stiffness and pull-direction compression tests, is carried out in elastic regime. Such model should be suitable for designing and/or verifying the mechanical performance of pole structures, even though differing from those above described, for materials, geometry and stacking sequence. 相似文献
8.
9.
The excess biomass produced during biological treatment of municipal wastewater represents a major issue worldwide, as its disposal implies environmental, economic and social impacts. Therefore, there has been a growing interest in developing technologies to reduce sludge production. The main proposed strategies can be categorized according to the place inside the wastewater treatment plant (WWTP) where the reduction takes place. In particular, sludge minimization can be achieved in the wastewater line as well as in the sludge line. This paper presents the results of two pilot scale systems, to evaluate their feasibility for sludge reduction and to understand their effect on biomass activity: (1) a pilot plant with an ozone contactor in the return activated sludge (RAS) stream for the exposition of sludge to a low ozone dosage; and (2) an oxic-settling-anaerobic (OSA) process with high retention time in the anaerobic sludge holding tank have been studied. The results showed that both technologies enabled significant excess sludge reduction but produced a slight decrease of biomass respiratory activity. 相似文献
10.
Giampaolo Bella 《Formal Aspects of Computing》2014,26(1):3-36
The Inductive Method is among the most established tools to analyse security protocols formally. It has successfully coped with large, deployed protocols, and its findings are widely published. However, perhaps due to its embedding in a theorem prover or to the lack of tutorial publications, it is at times criticised to require super-specialised skills and hence to be rather impractical. This paper aims at showing that criticism to be stereotypical. It pursues its aim by presenting the first tutorial-style paper to using the Inductive Method. This paper cannot cover every aspect of the method. It focuses on a key one, that is how the Inductive Method treats one of the main goals of security protocols: confidentiality against a threat model. The treatment of that goal, which may seem elegant in the Inductive Method, in fact forms a key aspect of all protocol analysis tools, hence the paper motivation rises still. With only standard skills as a requirement, the reader is guided step by step towards design and proof of significant confidentiality theorems. These are developed against two threat models, the standard Dolev–Yao and a more up-to-date one, the General Attacker, the latter turning out particularly useful also for didactic purposes. 相似文献