全文获取类型
收费全文 | 480篇 |
免费 | 51篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 2篇 |
化学工业 | 83篇 |
金属工艺 | 6篇 |
机械仪表 | 7篇 |
建筑科学 | 21篇 |
矿业工程 | 1篇 |
能源动力 | 7篇 |
轻工业 | 64篇 |
水利工程 | 10篇 |
无线电 | 42篇 |
一般工业技术 | 108篇 |
冶金工业 | 118篇 |
原子能技术 | 4篇 |
自动化技术 | 59篇 |
出版年
2024年 | 3篇 |
2023年 | 5篇 |
2022年 | 6篇 |
2021年 | 17篇 |
2020年 | 11篇 |
2019年 | 19篇 |
2018年 | 26篇 |
2017年 | 31篇 |
2016年 | 17篇 |
2015年 | 26篇 |
2014年 | 19篇 |
2013年 | 35篇 |
2012年 | 20篇 |
2011年 | 24篇 |
2010年 | 21篇 |
2009年 | 19篇 |
2008年 | 19篇 |
2007年 | 17篇 |
2006年 | 7篇 |
2005年 | 3篇 |
2004年 | 5篇 |
2003年 | 7篇 |
2002年 | 5篇 |
2001年 | 4篇 |
2000年 | 7篇 |
1999年 | 4篇 |
1998年 | 37篇 |
1997年 | 19篇 |
1996年 | 8篇 |
1995年 | 7篇 |
1994年 | 4篇 |
1993年 | 7篇 |
1992年 | 4篇 |
1988年 | 4篇 |
1987年 | 2篇 |
1986年 | 3篇 |
1985年 | 4篇 |
1984年 | 3篇 |
1983年 | 5篇 |
1982年 | 5篇 |
1981年 | 2篇 |
1979年 | 3篇 |
1978年 | 6篇 |
1977年 | 3篇 |
1976年 | 3篇 |
1974年 | 4篇 |
1973年 | 2篇 |
1971年 | 3篇 |
1968年 | 3篇 |
1966年 | 3篇 |
排序方式: 共有532条查询结果,搜索用时 15 毫秒
1.
2.
C. Llopis F. Revents L. Batet C. Pretel I. Sol 《Nuclear Engineering and Design》2007,237(18):2014-2023
The Technical University of Catalonia (UPC) has been jointly working with the Asociación Nuclear Ascó-Vandellòs (ANAV) for a number of years in order to establish, qualify and use best estimate (BE) models for the reactors under the control of ANAV. ANAV is the consortium that is responsible for operation of the Ascó and Vandellòs-II reactors. The reactors are Westinghouse-design three-loop PWRs with an approximate electrical power of 1000 MW. The existing integral plant models for each plant are currently used for many different purposes among which are support of plant operation and control. Quite a number of studies have been done in order to improve both safety and plant competitiveness. Most of these dynamic analyses were carried out in relation to transients starting at nominal full power or at least, very close to full power. This paper develops a specific use of the Vandellòs-II plant model for operation and control support at low power involving new ranges of system actuation parameters. It also examines scenarios that are somewhat different from those typically analysed. The study starts showing the results of an assessment case, which is a start-up test and provides some additional qualification, and subsequently attempts to establish calculations to support both an improvement in feed water controls and to set up operating recommendations for low-load manual operation of feed water turbo-pump. Both results hopefully, will produce an outcome, which leads to an improvement in safety and reduces reactor trip probability. 相似文献
3.
4.
Sol Hee Yoon 《International journal of human-computer interaction》2013,29(12):890-900
Advancements in technology have spurred the development of new in-vehicle applications. Drivers are faced with different driving contexts due to an increase in the number of devices that provide a wealth of diverse information. However, such a scenario can cause drivers to become distracted. Therefore, research on how the presentation of visual information can affect drivers’ performance is important. In this study, an analysis of quantifiable measurements that affect drivers’ perception of visual complexity and visual search performance was conducted. A questionnaire was administered to assess subjective perception of visual complexity, and a user experiment using eye tracking was designed to explore participants’ visual search performance. The results of subjective visual complexity perception and visual search performance suggested that some objective measurement variables were significantly related only to perceived visual complexity, whereas others affected both subjective and behavioral measurements. Thus it is possible to predict which quantifiable measurement variables affect subjective perception of visual complexity and which affect visual search performance. Therefore, this study allows understanding and explaining of perception of visual complexity by quantifiable measurements and the different ways by which these measurements affect visual search performance. 相似文献
5.
Pere Barlet-Ros Gianluca Iannaccone Josep Sanjuàs-Cuxart Josep Solé-Pareta 《Computer Networks》2009,53(3):310-321
We present the design of a predictive load shedding scheme for a network monitoring platform that supports multiple and competing traffic queries. The proposed scheme can anticipate overload situations and minimize their impact on the accuracy of the traffic queries. The main novelty of our approach is that it considers queries as black boxes, with arbitrary (and highly variable) input traffic and processing cost. Our system only requires a high-level specification of the accuracy requirements of each query to guide the load shedding procedure and assures a fair allocation of computing resources to queries in a non-cooperative environment. We present an implementation of our load shedding scheme in an existing network monitoring system and evaluate it with a diverse set of traffic queries. Our results show that, with the load shedding mechanism in place, the monitoring system can preserve the accuracy of the queries within predefined error bounds even during extreme overload conditions. 相似文献
6.
Several results in coding theory (e.g. the Carlitz-Uchiyama bound) show that the weight distributions of certain algebraic codes of lengthn are concentrated aroundn/2 within a range of width n. It is proved in this article that the extreme weights of a linear binary code of sufficiently high dual distance cannot be too close ton/2, the gap being of order n. The tools used involve the Pless identities and the orthogonality properties of Krawtchouk polynomials, as well as estimates on their zeroes. As a by-product upper bounds on the minimum distance of self-dual binary codes are derived. 相似文献
7.
Emanuele Maiorana Jordi Solé-Casals Patrizio Campisi 《Machine Vision and Applications》2016,27(8):1351-1360
Electroencephalography (EEG) has been recently investigated as a biometric modality for automatic people recognition purposes. Several studies have shown that brain signals possess subject-specific traits that allow distinguishing people. Nonetheless, extracting discriminative characteristics from EEG recordings may be a challenging task, due to the significant presence of artifacts in the acquired data. In order to cope with such issue, in this paper we evaluate the effectiveness of some preprocessing techniques in automatically removing undesired EEG contributions, with the aim of improving the achievable recognition rates. Specifically, methods based on blind source separation and sample entropy estimation are here investigated. An extensive set of experimental tests, performed over a large database comprising recordings taken from 50 healthy subjects during three distinct sessions spanning a period of about one month, in both eyes-closed and eyes-open conditions, is carried out to analyze the performance of the proposed approaches. 相似文献
8.
Over the last two decades, considerable research has been done in distributed operating systems, which can be attributed to faster processors and better communication technologies. A distributed operating system requires distributed algorithms to provide basic operating system functionality like mutual exclusion, deadlock detection, etc. A number of such algorithms have been proposed in the literature. Traditionally, these distributed algorithms have been presented in a theoretical way, with limited attempts to simulate actual working models. This paper discusses our experience in simulating distributed algorithms with the aid of some existing tools, including OPNET and Xplot. We discuss our efforts to define a basic model‐based framework for rapid simulation and visualization, and illustrate how we used this framework to evaluate some classic algorithms. We have also shown how the performance of different algorithms can be compared based on some collected statistics. To keep the focus of this paper on the approach itself, and our experience with tool integration, we only discuss some relatively simple models. Yet, the approach can be applied to more complex algorithm specifications. Copyright © 2001 John Wiley & Sons, Ltd. 相似文献
9.
María del Sol Arenas-De Larriva Alejandro Fernndez-Vega Bernabe Jurado-Gamez Ignacio Ortea 《International journal of molecular sciences》2022,23(15)
The high mortality, the presence of an initial asymptomatic stage and the fact that diagnosis in early stages reduces mortality justify the implementation of screening programs in the populations at risk of lung cancer. It is imperative to develop less aggressive methods that can complement existing diagnosis technologies. In this study, we aimed to identify lung cancer protein biomarkers and pathways affected in sputum samples, using the recently developed diaPASEF mass spectrometry (MS) acquisition mode. The sputum proteome of lung cancer cases and controls was analyzed through nano-HPLC–MS using the diaPASEF mode. For functional analysis, the results from differential expression analysis were further analyzed in the STRING platform, and feature selection was performed using sparse partial least squares discriminant analysis (sPLS-DA). Our results showed an activation of inflammation, with an alteration of pathways and processes related to acute-phase, complement, and immune responses. The resulting sPLS-DA model separated between case and control groups with high levels of sensitivity and specificity. In conclusion, we showed how new-generation proteomics can be used to detect potential biomarkers in sputum samples, and ultimately to discriminate patients from controls and even to help to differentiate between different cancer subtypes. 相似文献
10.
Error-correcting codes are used to correct errors when messages are transmitted through a noisy communication channel. Bounded distance decoding (i.e. decoding up to the error-correcting capacity) is a method of correcting errors that guarantees unique decoding. Secret sharing is a cryptographic protocol that allows a secret known from a person called the dealer to be distributed to n participants. No single participant knows the secret but some special subsets of participants called coalitions can. In this paper, we present a multisecret-sharing scheme based on an error-correcting code where secret reconstruction is made by using bounded distance decoding of the code. This scheme is ideal in the sense that the size of each secret equals the size of any share. Its security improves on that of multisecret-sharing schemes. 相似文献