全文获取类型
收费全文 | 164篇 |
免费 | 8篇 |
专业分类
电工技术 | 3篇 |
化学工业 | 12篇 |
机械仪表 | 1篇 |
建筑科学 | 6篇 |
矿业工程 | 1篇 |
能源动力 | 15篇 |
轻工业 | 9篇 |
无线电 | 17篇 |
一般工业技术 | 22篇 |
冶金工业 | 34篇 |
自动化技术 | 52篇 |
出版年
2023年 | 3篇 |
2022年 | 1篇 |
2021年 | 5篇 |
2020年 | 5篇 |
2019年 | 3篇 |
2018年 | 4篇 |
2017年 | 5篇 |
2016年 | 2篇 |
2015年 | 4篇 |
2014年 | 6篇 |
2013年 | 9篇 |
2012年 | 12篇 |
2011年 | 11篇 |
2010年 | 10篇 |
2009年 | 4篇 |
2008年 | 17篇 |
2007年 | 3篇 |
2006年 | 5篇 |
2005年 | 2篇 |
2004年 | 7篇 |
2003年 | 8篇 |
2002年 | 3篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 12篇 |
1997年 | 8篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1993年 | 4篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1985年 | 1篇 |
1981年 | 1篇 |
1978年 | 1篇 |
1976年 | 1篇 |
排序方式: 共有172条查询结果,搜索用时 46 毫秒
1.
LG Westergaard PE Rasmussen S Maigaard HJ Ingerslev AN Andersen JF Larsen J Starup PJ Hornnes CY Andersen 《Canadian Metallurgical Quarterly》1993,155(33):2511-2514
Medical indications for in vitro fertilization and embryo transfer (IVF-ET) internationally and in Denmark are reviewed. Reports from large international centres document that tubal infertility, unexplained infertility, endometriosis and male infertility are equally good indications for IVF. Traditionally, tubal infertility has been the only medical indication qualifying for IVF treatment within the National Health Service in Denmark. Thus, in this country, couples with unexplained and male infertility and with endometriosis have to pay up to 25,000 D.Kr. per IVF-ET treatment in private fertility clinics. Since there is no scientific basis for this discrimination, it is urged that the present rules are changed, so that couples with unexplained and male infertility and endometriosis are also allowed IVF treatment free of charge in the public fertility clinics. 相似文献
2.
Kasper P. Lundquist Dr. Vipul Panchal Prof. Charlotte H. Gotfredsen Prof. Ruth Brenk Prof. Mads H. Clausen 《ChemMedChem》2021,16(17):2588-2603
Rapid development within the fields of both fragment-based drug discovery (FBDD) and medicinal targeting of RNA provides possibilities for combining technologies and methods in novel ways. This review provides an overview of fragment-based screening (FBS) against RNA targets, including a discussion of the most recently used screening and hit validation methods such as NMR spectroscopy, X-ray crystallography, and virtual screening methods. A discussion of fragment library design based on research from small-molecule RNA binders provides an overview on both the currently limited guidelines within RNA-targeting fragment library design, and future possibilities. Finally, future perspectives are provided on screening and hit validation methods not yet used in combination with both fragment screening and RNA targets. 相似文献
3.
Runtime monitoring is an established technique to enforce a wide range of program safety and security properties. We present a formalization of monitoring and monitor inlining, for the Java Virtual Machine. Monitors are security automata given in a special-purpose monitor specification language, ConSpec. The automata operate on finite or infinite strings of calls to a fixed API, allowing local dependencies on parameter values and heap content. We use a two-level class file annotation scheme to characterize two key properties: (i) that the program is correct with respect to the monitor as a constraint on allowed program behavior, and (ii) that the program has a copy of the given monitor embedded into it. As the main application of these results we sketch a simple inlining algorithm and show how the two-level annotations can be completed to produce a fully annotated program which is valid in the standard sense of Floyd/Hoare logic. This establishes the mediation property that inlined programs are guaranteed to adhere to the intended policy. Furthermore, validity can be checked efficiently using a weakest precondition based annotation checker, thus preparing the ground for on-device checking of policy adherence in a proof-carrying code setting. 相似文献
4.
Simon Richard Proud Mads Olander Rasmussen Inge Sandholt Wycliffe Mutero Assaf Anyamba 《Remote sensing of environment》2010,114(8):1687-1698
In order to obtain high quality data, the correction of atmospheric perturbations acting upon land surface reflectance measurements recorded by a space-based sensor is an important topic within remote sensing. For many years the Second Simulation of the Satellite Signal in the Solar Spectrum (6S) radiative transfer model and the Simplified Method for Atmospheric Correction (SMAC) codes have been used for this atmospheric correction, but previous studies have shown that in a number of situations the quality of correction provided by the SMAC is low. This paper describes a method designed to improve the quality of the SMAC atmospheric correction algorithm through a slight increase in its computational complexity. Data gathered from the SEVIRI aboard Meteosat Second Generation (MSG) is used to validate the additions to SMAC, both by comparison to simulated data corrected using the highly accurate 6S method and by comparison to in-situ and 6S corrected SEVIRI data gathered for two field sites in Africa. The additions to the SMAC are found to greatly increase the quality of atmospheric correction performed, as well as broaden the range of atmospheric conditions under which the SMAC can be applied. When examining the Normalised Difference Vegetation Index (NDVI), the relative difference between SMAC and in-situ values decreases by 1.5% with the improvements in place. Similarly, the mean relative difference between SMAC and 6S reflectance values decreases by a mean of 13, 14.5 and 8.5% for Channels 1, 2 and 3 respectively. Furthermore, the processing speed of the SMAC is found to remain largely unaffected, with only a small increase in the time taken to process a full SEVIRI scene. Whilst the method described within this paper is only applicable to SEVIRI data, a similar approach can be applied to other data sources than SEVIRI, and should result in a similar accuracy improvement no matter which instrument supplies the original data. 相似文献
5.
Service Composition Issues in Pervasive Computing 总被引:2,自引:0,他引:2
Providing new services by combining existing ones—or service composition—is an idea pervading pervasive computing. Pervasive computing technologies seek to concurrently exhibit context awareness, manage contingencies, leverage device heterogeneity, and empower users. These four goals prompt service-composition-mechanism design requirements that are unique to pervasive computing. This article catalogs service composition mechanisms and describes their variation points, which indicate how well the resulting compositions meet the four goals. 相似文献
6.
Ivan Damgård Mads Jurik Jesper Buus Nielsen 《International Journal of Information Security》2010,9(6):371-385
We propose a generalization of Paillier’s probabilistic public-key system, in which the expansion factor is reduced and which
allows to adjust the block length of the scheme even after the public key has been fixed, without losing the homomorphic property.
We show that the generalization is as secure as Paillier’s original system and propose several ways to optimize implementations
of both the generalized and the original scheme. We construct a threshold variant of the generalized scheme as well as zero-knowledge
protocols to show that a given ciphertext encrypts one of a set of given plaintexts, and protocols to verify multiplicative
relations on plaintexts. We then show how these building blocks can be used for applying the scheme to efficient electronic
voting. This reduces dramatically the work needed to compute the final result of an election, compared to the previously best
known schemes. We show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical
assumptions. The scheme for 1 out of L elections can be optimized such that for a certain range of the other parameter values, the ballot size is logarithmic in
L. 相似文献
7.
Model selection for convolutive ICA with an application to spatiotemporal analysis of EEG 总被引:2,自引:0,他引:2
We present a new algorithm for maximum likelihood convolutive independent component analysis (ICA) in which components are unmixed using stable autoregressive filters determined implicitly by estimating a convolutive model of the mixing process. By introducing a convolutive mixing model for the components, we show how the order of the filters in the model can be correctly detected using Bayesian model selection. We demonstrate a framework for deconvolving a subspace of independent components in electroencephalography (EEG). Initial results suggest that in some cases, convolutive mixing may be a more realistic model for EEG signals than the instantaneous ICA model. 相似文献
8.
Evans Theodore Avery; Howell Sue; Westergaard Gregory Charles 《Canadian Metallurgical Quarterly》2005,31(4):399
Research on cross-modal performance in nonhuman primates is limited to a small number of sensory modalities and testing methods. To broaden the scope of this research, the authors tested capuchin monkeys (Cebus apella) for a seldom-studied cross-modal capacity in nonhuman primates, auditory-visual recognition. Monkeys were simultaneously played 2 video recordings of a face producing different vocalizations and a sound recording of 1 of the vocalizations. Stimulus sets varied from naturally occurring conspecific vocalizations to experimentally controlled human speech stimuli. The authors found that monkeys preferred to view face recordings that matched presented vocal stimuli. Their preference did not differ significantly across stimulus species or other stimulus features. However, the reliability of the latter set of results may have been limited by sample size. From these results, the authors concluded that capuchin monkeys exhibit auditory-visual cross-modal perception of conspecific vocalizations. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
9.
Region-Based Memory Management 总被引:1,自引:0,他引:1
This paper describes a memory management discipline for programs that perform dynamic memory allocation and de-allocation. At runtime, all values are put intoregions. The store consists of a stack of regions. All points of region allocation and de-allocation are inferred automatically, using a type and effect based program analysis. The scheme does not assume the presence of a garbage collector. The scheme was first presented in 1994 (M. Tofte and J.-P. Talpin,in“Proceedings of the 21st ACM SIGPLAN–SIGACT Symposium on Principles of Programming Languages,” pp. 188–201); subsequently, it has been tested in The ML Kit with Regions, a region-based, garbage-collection free implementation of the Standard ML Core language, which includes recursive datatypes, higher-order functions and updatable references L. Birkedal, M. Tofte, and M. Vejlstrup, (1996),in“Proceedings of the 23 rd ACM SIGPLAN–SIGACT Symposium on Principles of Programming Languages,” pp. 171–183. This paper defines a region-based dynamic semantics for a skeletal programming language extracted from Standard ML. We present the inference system which specifies where regions can be allocated and de-allocated and a detailed proof that the system is sound with respect to a standard semantics. We conclude by giving some advice on how to write programs that run well on a stack of regions, based on practical experience with the ML Kit. 相似文献
10.
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the context of an API that provides standard cryptography and communication services. Given a dependency specification, stating how API methods can produce and consume secret information, we propose an information flow property based on the idea of invariance under perturbation, relating observable changes in output to corresponding changes in input. Besides the information flow condition itself, the main contributions of the paper are results relating the admissibility property to a direct flow property in the special case of programs which branch on secrets only in cases permitted by the dependency rules. These results are used to derive an unwinding theorem, reducing a behavioural correctness check (strong bisimulation) to an invariant. 相似文献