首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   209篇
  免费   9篇
  国内免费   1篇
电工技术   5篇
化学工业   39篇
金属工艺   1篇
机械仪表   1篇
建筑科学   6篇
能源动力   7篇
轻工业   25篇
水利工程   3篇
石油天然气   1篇
无线电   15篇
一般工业技术   28篇
冶金工业   63篇
自动化技术   25篇
  2024年   1篇
  2023年   2篇
  2022年   2篇
  2021年   11篇
  2020年   2篇
  2019年   1篇
  2018年   8篇
  2017年   8篇
  2016年   3篇
  2015年   3篇
  2014年   7篇
  2013年   14篇
  2012年   5篇
  2011年   10篇
  2010年   5篇
  2009年   9篇
  2008年   11篇
  2007年   7篇
  2006年   11篇
  2005年   8篇
  2004年   4篇
  2003年   4篇
  2002年   3篇
  2000年   2篇
  1999年   4篇
  1998年   13篇
  1997年   6篇
  1996年   10篇
  1995年   6篇
  1994年   3篇
  1993年   3篇
  1992年   2篇
  1989年   1篇
  1988年   1篇
  1987年   4篇
  1986年   1篇
  1985年   3篇
  1984年   3篇
  1983年   3篇
  1982年   1篇
  1981年   4篇
  1980年   3篇
  1979年   3篇
  1978年   1篇
  1976年   1篇
  1975年   1篇
  1934年   1篇
排序方式: 共有219条查询结果,搜索用时 15 毫秒
1.
The authenticity and traceability of meat products are issues of primary importance to ensure food safety. Unfortunately, food adulteration (e.g. the addition of inexpensive cuts to minced meat products) and mislabelling (e.g. the inclusion of meat from species other than those declared) happens frequently worldwide. The aim of this study was to apply a droplet digital PCR assay for the detection and quantification (copies μL−1) of the beef, pork, horse, sheep, chicken and turkey in meat products. The analysis conducted on commercial meat showed the presence of traces of DNA from other animal species than those declared. We show that the method is highly sensitive, specific and accurate (accuracy = 100%). This method could be adopted by competent food safety authorities to verify compliance with the labelling of meat products and to ensure quality and safety throughout the meat supply chain, from primary production to consumption.  相似文献   
2.
The present work is aimed to extend the knowledge of mechanical properties of sandwich structures used for marine applications focusing on the possibility to increase the performances of such structures by adding a bonder at the skin/core interface. Therefore, three sandwich structures that are utilised in different structural components of a yacht were realised by manual lay-up. The mechanical characterisation was performed by flatwise compressive, edgewise compressive and three point flexural tests. The tests execution has allowed both to determine the mechanical performances and to understand the fracture mechanisms that take place when the bonder is added in the stacking sequence of the samples.  相似文献   
3.
In this paper, we survey several recent results that highlight an interplay between a relatively new class of quasiseparable matrices and univariate polynomials. Quasiseparable matrices generalize two classical matrix classes, Jacobi (tridiagonal) matrices and unitary Hessenberg matrices that are known to correspond to real orthogonal polynomials and Szegö polynomials, respectively. The latter two polynomial families arise in a wide variety of applications, and their short recurrence relations are the basis for a number of efficient algorithms. For historical reasons, algorithm development is more advanced for real orthogonal polynomials. Recent variations of these algorithms tend to be valid only for the Szegö polynomials; they are analogues and not generalizations of the original algorithms.  相似文献   
4.
5.
The principle of guarantee availability for security protocol analysis   总被引:1,自引:0,他引:1  
Conformity to prudent design principles is an established approach to protocol correctness although it is not free of limitations. We term goal availability a design principle that is often implicitly followed, prescribing protocols to aim at principal-centric goals. Adherence to a design principle is normally established through protocol analysis that is an evaluation of whether a protocol achieves its goals. However, the literature shows that there exists no clear guidance on how to conduct and interpret such an analysis, a process that is only left to the analyzer’s skill and experience. Goal availability has the desirable feature that its supporting protocol analysis can be precisely guided by what becomes a principle of realistic analysis, which we call guarantee availability. It prescribes that the outcome of the analysis, which is the set of guarantees confirming the protocol goals, be practically applicable by the protocol participants. In consequence, the guarantees must be based on assumptions that the principals have the capacity to verify. Our focus then turns entirely to protocol analysis, because an analysis conforming to guarantee availability signifies that the analyzed protocol conforms to goal availability. Existing analysis of (both classical and deployed) protocols has been reconsidered with the aim of studying their conformity to guarantee availability. Some experiments clarify the relationships between goal availability and the existing design principles, with particular reference to explicitness. Other experiments demonstrate that boosting an analysis with guarantee availability generally makes it deeper, unveiling additional protocol niceties that depending on the analyzer’s skills may remain overseen otherwise. In particular, an established claim about a protocol (made using a well-known formal method) can be subverted.  相似文献   
6.
Transcranial magnetic stimulation (TMS) is the most important technique currently available to study cortical excitability. Additionally, TMS can be used for therapeutic and rehabilitation purposes, replacing the more painful transcranial electric stimulation (TES). In this paper we present an innovative and easy-to-use tool that enables neuroscientists to design, carry out and analyze scientific studies based on TMS experiments for both diagnostic and research purposes, assisting them not only in the practicalities of administering the TMS but also in each step of the entire study's workflow. One important aspect of this tool is that it allows neuroscientists to specify research designs at will, enabling them to define any parameter of a TMS study starting from data acquisition and sample group definition to automated statistical data analysis and RDF data storage. It also supports the diagnosing process by using on-line support vector machines able to learn incrementally from the diseases instances that are continuously added into the system. The proposed system is a neuroscientist-centred tool where the protocols being followed in TMS studies are made explicit, leaving to the users flexibility in exploring and sharing the results, and providing assistance in managing the complexity of the final diagnosis. This type of tool can make the results of medical experiments more easily exploitable, thus accelerating scientific progress.  相似文献   
7.
Composite materials are widely employed in sailing sports, a possible application is for the mast pole or other sail poles. In the paper the attention is focused on the spinnaker poles mechanical performances; in particular the focus is on axial and ring compressive properties of three different carbon fibre/epoxy resin spinnaker poles, to investigate both the diameter and stacking sequence effect on the mechanical performance of the structure. Starting from the stacking sequence used in the production of a particular spinnaker pole, the effect of a lamina at 0° in the middle of wall thickness is investigated with the purpose to obtain a more stiff structure. Moreover to test the proposed stacking sequence on different size products, a prototype with lower diameter is realized. To properly evaluate axial and ring stiffness, axial compression test and ring stiffness one are performed. Then a numerical model is developed to support the design of the finished product: A simple and versatile numerical analysis (FEA with software ANSYS), by simulating ring stiffness and pull-direction compression tests, is carried out in elastic regime. Such model should be suitable for designing and/or verifying the mechanical performance of pole structures, even though differing from those above described, for materials, geometry and stacking sequence.  相似文献   
8.
9.
The excess biomass produced during biological treatment of municipal wastewater represents a major issue worldwide, as its disposal implies environmental, economic and social impacts. Therefore, there has been a growing interest in developing technologies to reduce sludge production. The main proposed strategies can be categorized according to the place inside the wastewater treatment plant (WWTP) where the reduction takes place. In particular, sludge minimization can be achieved in the wastewater line as well as in the sludge line. This paper presents the results of two pilot scale systems, to evaluate their feasibility for sludge reduction and to understand their effect on biomass activity: (1) a pilot plant with an ozone contactor in the return activated sludge (RAS) stream for the exposition of sludge to a low ozone dosage; and (2) an oxic-settling-anaerobic (OSA) process with high retention time in the anaerobic sludge holding tank have been studied. The results showed that both technologies enabled significant excess sludge reduction but produced a slight decrease of biomass respiratory activity.  相似文献   
10.
The Inductive Method is among the most established tools to analyse security protocols formally. It has successfully coped with large, deployed protocols, and its findings are widely published. However, perhaps due to its embedding in a theorem prover or to the lack of tutorial publications, it is at times criticised to require super-specialised skills and hence to be rather impractical. This paper aims at showing that criticism to be stereotypical. It pursues its aim by presenting the first tutorial-style paper to using the Inductive Method. This paper cannot cover every aspect of the method. It focuses on a key one, that is how the Inductive Method treats one of the main goals of security protocols: confidentiality against a threat model. The treatment of that goal, which may seem elegant in the Inductive Method, in fact forms a key aspect of all protocol analysis tools, hence the paper motivation rises still. With only standard skills as a requirement, the reader is guided step by step towards design and proof of significant confidentiality theorems. These are developed against two threat models, the standard Dolev–Yao and a more up-to-date one, the General Attacker, the latter turning out particularly useful also for didactic purposes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号