全文获取类型
收费全文 | 1073篇 |
免费 | 4篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 7篇 |
综合类 | 4篇 |
化学工业 | 161篇 |
金属工艺 | 279篇 |
机械仪表 | 20篇 |
建筑科学 | 11篇 |
矿业工程 | 7篇 |
能源动力 | 10篇 |
轻工业 | 96篇 |
水利工程 | 5篇 |
石油天然气 | 2篇 |
无线电 | 36篇 |
一般工业技术 | 109篇 |
冶金工业 | 74篇 |
原子能技术 | 1篇 |
自动化技术 | 256篇 |
出版年
2022年 | 8篇 |
2021年 | 12篇 |
2020年 | 3篇 |
2019年 | 4篇 |
2018年 | 68篇 |
2017年 | 66篇 |
2016年 | 67篇 |
2015年 | 78篇 |
2014年 | 19篇 |
2013年 | 33篇 |
2012年 | 39篇 |
2011年 | 590篇 |
2010年 | 30篇 |
2009年 | 27篇 |
2008年 | 22篇 |
2007年 | 3篇 |
2006年 | 2篇 |
2005年 | 1篇 |
2004年 | 2篇 |
1998年 | 1篇 |
1996年 | 1篇 |
1994年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有1078条查询结果,搜索用时 15 毫秒
1.
2.
3.
4.
A. Alp Kindiroglu H. Yalcin O. Aran M. Hr��z P. Campr L. Akarun A. Karpov 《Pattern Recognition and Image Analysis》2012,22(4):527-536
This paper presents the design and evaluation of a multi-lingual fingerspelling recognition module that is designed for an information terminal. Through the use of multimodal input and output methods, the information terminal acts as a communication medium between deaf and blind people. The system converts fingerspelled words to speech and vice versa using fingerspelling recognition, fingerspelling synthesis, speech recognition and speech synthesis in Czech, Russian, and Turkish languages. We describe an adaptive skin color based fingersign recognition system with a close to real-time performance and present recognition results on 88 different letters signed by five different signers, using above four hours of training and test videos. 相似文献
5.
Lucia Garcia-Garcia Laia Olle Margarita Martin Jordi Roca-Ferrer Rosa Muoz-Cano 《International journal of molecular sciences》2021,22(10)
Adenosine is a nucleoside involved in the pathogenesis of allergic diseases. Its effects are mediated through its binding to G protein-coupled receptors: A1, A2a, A2b and A3. The receptors differ in the type of G protein they recruit, in the effect on adenylyl cyclase (AC) activity and the downstream signaling pathway triggered. Adenosine can produce both an enhancement and an inhibition of mast cell degranulation, indicating that adenosine effects on these receptors is controversial and remains to be clarified. Depending on the study model, A1, A2b, and A3 receptors have shown anti- or pro-inflammatory activity. However, most studies reported an anti-inflammatory activity of A2a receptor. The precise knowledge of the adenosine mechanism of action may allow to develop more efficient therapies for allergic diseases by using selective agonist and antagonist against specific receptor subtypes. 相似文献
6.
Laia Lidn Laura Lla-Hierro Mario Nuvolone Adriano Aguzzi Jesús vila Isidro Ferrer Jos Antonio del Río Rosalina Gavín 《International journal of molecular sciences》2021,22(10)
Tau protein is largely responsible for tauopathies, including Alzheimer’s disease (AD), where it accumulates in the brain as insoluble aggregates. Tau mRNA is regulated by alternative splicing, and inclusion or exclusion of exon 10 gives rise to the 3R and 4R isoforms respectively, whose balance is physiologically regulated. In this sense, one of the several factors that regulate alternative splicing of tau is GSK3β, whose activity is inhibited by the cellular prion protein (PrPC), which has different physiological functions in neuroprotection and neuronal differentiation. Moreover, a relationship between PrPC and tau expression levels has been reported during AD evolution. For this reason, in this study we aimed to analyze the role of PrPC and the implication of GSK3β in the regulation of tau exon 10 alternative splicing. We used AD human samples and mouse models of PrPC ablation and tau overexpression. In addition, we used primary neuronal cultures to develop functional studies. Our results revealed a paralleled association between PrPC expression and tau 4R isoforms in all models analyzed. In this sense, reduction or ablation of PrPC levels induces an increase in tau 3R/4R balance. More relevantly, our data points to GSK3β activity downstream from PrPC in this phenomenon. Our results indicate that PrPC plays a role in tau exon 10 inclusion through the inhibitory capacity of GSK3β. 相似文献
7.
Magnetic particles diluted in liquid agglomerate in rod-like particle arrays if an external homogeneous magnetic field is
applied. This work introduces a method to specifically exploit particle–particle interaction to obtain flow control of magnetic
particles without changing the motion state of the carrier liquid. Experiments show the possibility to uncouple the particle
flux from the motion state of liquid. We show how this method may be applied to design a microfluidic geometry in which the
particle flow in a specific direction is either enabled or suppressed by the relative orientation of the fluid velocity and
the external field. 相似文献
8.
Marc Karle Johannes W?hrle Junichi Miwa Nils Paust G��nter Roth Roland Zengerle Felix von Stetten 《Microfluidics and nanofluidics》2011,10(4):935-939
We demonstrate controlled transport of superparamagnetic beads in the opposite direction of a laminar flow. A permanent magnet
assembles 200 nm magnetic particles into about 200 μm long bead chains that are aligned in parallel to the magnetic field
lines. Due to a magnetic field gradient, the bead chains are attracted towards the wall of a microfluidic channel. A rotation
of the permanent magnet results in a rotation of the bead chains in the opposite direction to the magnet. Due to friction
on the surface, the bead chains roll along the channel wall, even in counter-flow direction, up to at a maximum counter-flow
velocity of 8 mm s−1. Based on this approach, magnetic beads can be accurately manoeuvred within microfluidic channels. This counter-flow motion
can be efficiently be used in Lab-on-a-Chip systems, e.g. for implementing washing steps in DNA purification. 相似文献
9.
Georg Birkenheuer Andr�� Brinkmann Mikael H?gqvist Alexander Papaspyrou Bernhard Schott Dietmar Sommerfeld Wolfgang Ziegler 《Journal of Grid Computing》2011,9(3):355-377
Infrastructure federation is becoming an increasingly important issue for modern Distributed Computing Infrastructures (DCIs):
Dynamic elasticity of quasi-static Grid environments, incorporation of special-purpose resources into commoditized Cloud infrastructures,
cross-community collaboration for increasingly diverging areas of modern e-Science, and Cloud Bursting pose major challenges
on the technical level for many resource and middleware providers. Especially with respect to increasing costs of operating
data centers, the intelligent yet automated and secure sharing of resources is a key factor for success. With the D-Grid Scheduler
Interoperability (DGSI) project within the German D-Grid Initiative, we provide a strategic technology for the automatically
negotiated, SLA-secured, dynamically provisioned federation of resources and services for Grid-and Cloud-type infrastructures.
This goal is achieved by complementing current DCI schedulers with the ability to federate infrastructure for the temporary
leasing of resources and rechanneling of workloads. In this work, we describe the overall architecture and SLA-secured negotiation
protocols within DGSI and depict an advanced mechanism for resource delegation through means of dynamically provisioned, virtualized
middleware. Through this methodology, we provide the technological foundation for intelligent capacity planning and workload
management in a cross-infrastructure fashion. 相似文献
10.
Sergio S��nchez Garc��a Ana G��mez Oliva Emilia P��rez Belleboni Iv��n Pau de la Cruz 《International Journal of Information Security》2011,10(6):351-372
At present, many countries allow citizens or entities to interact with the government outside the telematic environment through
a legal representative who is granted powers of representation. However, if the interaction takes place through the Internet,
only primitive mechanisms of representation are available, and these are mainly based on non-dynamic offline processes that
do not enable quick and easy identity delegation. This paper proposes a system of dynamic delegation of identity between two
generic entities that can solve the problem of delegated access to the telematic services provided by public authorities.
The solution herein is based on the generation of a delegation token created from a proxy certificate that allows the delegating
entity to delegate identity to another on the basis of a subset of its attributes as delegator, while also establishing in
the delegation token itself restrictions on the services accessible to the delegated entity and the validity period of delegation.
Further, the paper presents the mechanisms needed to either revoke a delegation token or to check whether a delegation token
has been revoked. Implications for theory and practice and suggestions for future research are discussed. 相似文献