首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   104篇
  免费   4篇
电工技术   1篇
化学工业   27篇
建筑科学   7篇
能源动力   1篇
轻工业   4篇
水利工程   5篇
石油天然气   1篇
无线电   9篇
一般工业技术   18篇
冶金工业   14篇
自动化技术   21篇
  2023年   1篇
  2022年   11篇
  2021年   9篇
  2020年   2篇
  2019年   3篇
  2018年   7篇
  2017年   3篇
  2016年   4篇
  2015年   1篇
  2014年   6篇
  2013年   3篇
  2012年   6篇
  2011年   6篇
  2010年   8篇
  2009年   3篇
  2008年   1篇
  2007年   2篇
  2006年   1篇
  2005年   6篇
  2000年   2篇
  1998年   6篇
  1997年   2篇
  1996年   2篇
  1995年   2篇
  1994年   1篇
  1993年   3篇
  1992年   1篇
  1991年   2篇
  1990年   1篇
  1980年   2篇
  1963年   1篇
排序方式: 共有108条查询结果,搜索用时 15 毫秒
1.
The double-reversing Z-plasty of Furlow for closure of the soft palate was used in 34 children with various types of cleft palate. Mean age at repair was 12.8 months. Intraoperative experience was favorable, with acceptable operating time and blood loss. Length of hospitalization averaged 1.9 days. Postoperatively, two children experienced temporary stridor, which resolved within 24 to 48 hours. One child had dehiscence of the hard palate (Von Lagenbeck repair) 4 weeks postoperatively, and three children developed small oronasal fistulae. Early speech evaluation demonstrated adequate soft palate mobility in 33 of 34 patients, with observable velopharyngeal function. Twelve children had mild velar compromise, with eight exhibiting slight nasal air escape.  相似文献   
2.
International Journal of Information Security - The complexity of today’s integrated circuit (IC) supply chain, organised in several tiers and including many companies located in different...  相似文献   
3.
In the last years, the interest in methods and techniques for circumventing the security of the available digital video broadcasting systems is continuously increasing. Digital TV providers are struggling to restrict access to their video contents only to authorized users, by deploying more and more sophisticated conditional access systems. At the state-of-the-art, the most significant menace is the card-sharing activity which exploits a known weakness allowing an authorized subscriber to provide access to digital contents to a potentially large group of unauthorized ones connected over a communication network. This is usually realized by using ad hoc customized devices. Detecting the presence of these illegal systems on a network, by recognizing their related traffic is an issue of primary importance. Unfortunately, to avoid the identification of such traffic, payload obfuscation strategies based on encryption are often used, hindering packet inspection techniques.This paper presents a strategy for the detection of card-sharing traffic, empowered by machine-learning-driven traffic classification techniques and based on the natural capability of wavelet analysis to decompose a traffic time series into several component series associated with particular time and frequency scales and hence allowing its observation at different frequency component levels and with different resolutions. These ideas have been used for the proof-of-concept implementation of an SVM-based binary classification scheme that relies only on time regularities of the traffic and not on the packet contents and hence is immune to payload obfuscation techniques.  相似文献   
4.
Finite element procedures for the analysis of composite structures under compressive loads (buckling and post-buckling) generally are not deployed in books because they are still considered object of research whereas they are deemed as assessed by researchers that focus their papers on restricted audience topics. Therefore, regarding these procedures, a gap exists in literature between what researchers consider as well established and what has been already published. The aim of this paper is to contribute to close this gap by providing an insight in linear and non-linear buckling analyses and in their use with composite structures. Both modelling and analysis considerations are presented and discussed, focusing on what can be considered as best practice when dealing with this kind of problems. Applications (to a stiffened panel and to a wing box) are provided for demonstrating the effectiveness of the procedures presented.  相似文献   
5.
6.
The aim of this paper is to illustrate the design of a new wave energy converter, composed of a point absorber and a hydraulic system (power take off) and sized for recovering energy in calm seas from waves near the shore. The point absorber is consisting of a rectangular shaped buoy integrating a piston pump. The set buoy‐pump oscillates under the waves action and moves natural water in a closed circuit hydraulic system (power take off) composed of a piping connecting the piston pump itself, a pressurized reservoir, a hydraulic turbine and a discharge tank. The methodology adopted for designing the main constituents involves a 1D mathematical model, settled for understanding the motion of the buoy under the hypothesis of regular waves and fully developed sea, and a sizing procedure applied for the design of all the components of the hydraulic system. The project related to the Calabrian site of Cetraro (Mediterranean Sea—south Italy) led to designing a system with a 4 m large buoy, associated with a small 13 cm diameter micro Pelton turbine, so that more than 22 000 kWh could be recovered in a year.  相似文献   
7.
8.
In this work, the particular and combined influence of nonparabolicity and phonon scattering on the device characteristics of a triple-gate silicon nanowire is investigated. In addition, different approximations of the retarded self-energy for electron-phonon scattering are analyzed in terms of the electrostatics, current and computational cost.  相似文献   
9.
10.
The skin of the South American frog Phyllomedusa sauvagei contains a new active polypeptide, sauvagine, which does not belong to any of the peptide families hitherto described in the amphibian skin. The purification procedure involved several successive steps: dialysis, precipitation with ethanol and acetone, gel filtration and ion exchange chromatography. Two forms of sauvagine were separated. The major component (sauvagine I) was submitted to acid hydrolysis. The sauvagine molecule appeared to possess clear hydrophobic characteristics and to consist of a straight chain of 40 amino acid residues, among which the glutamyl-, aspartyl- leucyl- and isoleucyl-residues were particularly well represented. The elucidation of the amino acid sequence in the sauvagine molecule is in progress.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号