全文获取类型
收费全文 | 342篇 |
免费 | 11篇 |
专业分类
化学工业 | 49篇 |
机械仪表 | 10篇 |
建筑科学 | 13篇 |
矿业工程 | 1篇 |
能源动力 | 13篇 |
轻工业 | 25篇 |
水利工程 | 5篇 |
石油天然气 | 4篇 |
无线电 | 33篇 |
一般工业技术 | 68篇 |
冶金工业 | 27篇 |
原子能技术 | 12篇 |
自动化技术 | 93篇 |
出版年
2023年 | 5篇 |
2022年 | 10篇 |
2021年 | 11篇 |
2020年 | 6篇 |
2019年 | 11篇 |
2018年 | 14篇 |
2017年 | 4篇 |
2016年 | 10篇 |
2015年 | 10篇 |
2014年 | 7篇 |
2013年 | 28篇 |
2012年 | 18篇 |
2011年 | 17篇 |
2010年 | 18篇 |
2009年 | 22篇 |
2008年 | 16篇 |
2007年 | 17篇 |
2006年 | 17篇 |
2005年 | 6篇 |
2004年 | 6篇 |
2003年 | 7篇 |
2002年 | 2篇 |
2001年 | 5篇 |
2000年 | 3篇 |
1999年 | 9篇 |
1998年 | 10篇 |
1997年 | 9篇 |
1996年 | 6篇 |
1995年 | 3篇 |
1994年 | 3篇 |
1993年 | 4篇 |
1992年 | 1篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1989年 | 2篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1981年 | 4篇 |
1980年 | 2篇 |
1978年 | 3篇 |
1977年 | 5篇 |
1975年 | 3篇 |
1969年 | 1篇 |
排序方式: 共有353条查询结果,搜索用时 156 毫秒
1.
2.
M. Ronen 《Journal of Computer Assisted Learning》1995,11(3):141-156
Abstract This article presents a study of a large scale incorporation of one data acquisitionsystem into physics teaching in Israel. By 1994 about 30% of the schools throughout the country used the V-scope, a 3-D multibody motion tracing system, in their lab programme. The views and reactions of post-training teachers, experienced teachers and students on various aspects of using the system are described, analysed and compared. 相似文献
3.
Converting cysteine 543 to tyrosine in the influenza virus hemagglutinin (HA) introduces both a basolateral sorting signal and an internalization signal into the HA cytoplasmic domain. Another HA mutant, HA+8, contains eight additional amino acids at the end of the cytoplasmic domain that include a powerful internalization signal. HA+8 was also sorted efficiently to the basolateral surface of Madin-Darby canine kidney cells. The simplest explanation for the observation that multiple sorting phenotypes depend upon the same small amino acid sequence is that certain tyrosine-based internalization signals might also function as basolateral sorting signals. To test this hypothesis, second-site mutations were introduced into HA C543Y or HA+8 to determine if the internalization and basolateral sorting functions can be separated. For HA C543Y, the same sequence positions were important for both basolateral sorting and internalization, but the two functions responded differently to individual amino acid replacements, indicating that they were distinct. For HA+8, the basolateral sorting signal required the same tyrosine as the internalization signal, but did not share any other characteristics. Thus, even when basolateral sorting signals that depend on tyrosine overlap or are co-linear with internalizations signals, the two sorting processes are sensitive to different characteristics of the sequence. 相似文献
4.
5.
Optimal Locations of Groundwater Extractions in Coastal Aquifers 总被引:1,自引:0,他引:1
A regional water supply management model for coastal aquifers was developed. One of its outcomes is the definition of the
optimized locations for groundwater withdrawal. Such a tool permits the analysis of alternative plans for groundwater extraction
and the sustainable use of water resources in a coastal aquifer subject to saltwater intrusion. The principal components are
the evolutionary optimization and the analytical/numerical simulation models. The optimization technique looks for the best
well locations taking into consideration the economic results and the satisfaction of the societal water demand. However these
two concerns are conditioned by trying to control the saltwater intrusion, i.e., preserving the environmental equilibrium.
The simulation model uses the governing mathematical equations for groundwater movement to find the interface between freshwater
and saltwater. Because of the non-linearity in the system and the possibility of a jumping interface, a security distance
was defined. This is a controlling variable which can be set by the decision makers. The model was applied to a typical case
with interesting results. For example, diagrams showing the relationship between the location of the wells and the security
distance(s) are of importance to the managers. It was also crucial to have an understanding of the tradeoffs between groundwater
withdrawals, positions of the wells from the coast line, and the security distance. The model was also applied to a real case
in order to relate the extractions, distances and artificial recharge (not presented in this paper). 相似文献
6.
Recent progress in road and lane detection: a survey 总被引:2,自引:0,他引:2
The problem of road or lane perception is a crucial enabler for advanced driver assistance systems. As such, it has been an active field of research for the past two decades with considerable progress made in the past few years. The problem was confronted under various scenarios, with different task definitions, leading to usage of diverse sensing modalities and approaches. In this paper we survey the approaches and the algorithmic techniques devised for the various modalities over the last 5 years. We present a generic break down of the problem into its functional building blocks and elaborate the wide range of proposed methods within this scheme. For each functional block, we describe the possible implementations suggested and analyze their underlying assumptions. While impressive advancements were demonstrated at limited scenarios, inspection into the needs of next generation systems reveals significant gaps. We identify these gaps and suggest research directions that may bridge them. 相似文献
7.
8.
Ronen Gradwohl Moni Naor Benny Pinkas Guy N. Rothblum 《Theory of Computing Systems》2009,44(2):245-268
We consider cryptographic and physical zero-knowledge proof schemes for Sudoku, a popular combinatorial puzzle. We discuss
methods that allow one party, the prover, to convince another party, the verifier, that the prover has solved a Sudoku puzzle,
without revealing the solution to the verifier. The question of interest is how a prover can show: (i) that there is a solution
to the given puzzle, and (ii) that he knows the solution, while not giving away any information about the solution to the
verifier.
In this paper we consider several protocols that achieve these goals. Broadly speaking, the protocols are either cryptographic
or physical. By a cryptographic protocol we mean one in the usual model found in the foundations of cryptography literature.
In this model, two machines exchange messages, and the security of the protocol relies on computational hardness. By a physical
protocol we mean one that is implementable by humans using common objects, and preferably without the aid of computers. In
particular, our physical protocols utilize items such as scratch-off cards, similar to those used in lotteries, or even just
simple playing cards.
The cryptographic protocols are direct and efficient, and do not involve a reduction to other problems. The physical protocols
are meant to be understood by “lay-people” and implementable without the use of computers.
Research of R. Gradwohl was supported by US-Israel Binational Science Foundation Grant 2002246.
Research of M. Naor was supported in part by a grant from the Israel Science Foundation.
Research of B. Pinkas was supported in part by the Israel Science Foundation (grant number 860/06).
Research of G.N. Rothblum was supported by NSF grant CNS-0430450 and NSF grant CFF-0635297. 相似文献
9.
This article examines some techno-political aspects of the early years of electrification in British-ruled 1920s Palestine. It emphasizes the importance of local technical, topographical and hydrological forms of knowledge for understanding the dynamics of electrification. Situating the analysis in a general colonial context of electrification, the study shows that British colonial rulers lagged behind both German firms and local entrepreneurs in understanding the specific conditions pertaining to electrification in Palestine. Subsequently, the study shows that the British had limited control of the actual electrification process and its declared/professed developmental purposes, thereby complicating assumptions about electrification as a tool of the Empire/tool of empire. Finding some similarities between the cases of electrifying Palestine and India, the article’s findings may shed further light on the importance of micro-politics of knowledge for understanding the trajectory of electrification in the colonies. 相似文献
10.
Lerner R Rivlin E Rotstein HP 《IEEE transactions on pattern analysis and machine intelligence》2006,28(9):1404-1417
A novel algorithm for pose and motion estimation using corresponding features and a digital terrain map is proposed. Using a digital terrain (or digital elevation) map (DTM/DEM) as a global reference enables the elimination of the ambiguity present in vision-based algorithms for motion recovery. As a consequence, the absolute position and orientation of a camera can be recovered with respect to the external reference frame. In order to do this, the DTM is used to formulate a constraint between corresponding features in two consecutive frames. Explicit reconstruction of the 3D world is not required. When considering a number of feature points, the resulting constraints can be solved using nonlinear optimization in terms of position, orientation, and motion. Such a procedure requires an initial guess of these parameters, which can be obtained from dead-reckoning or any other source. The feasibility of the algorithm is established through extensive experimentation. Performance is compared with a state-of-the-art alternative algorithm, which intermediately reconstructs the 3D structure and then registers it to the DTM. A clear advantage for the novel algorithm is demonstrated in variety of scenarios. 相似文献