全文获取类型
收费全文 | 445篇 |
免费 | 27篇 |
专业分类
电工技术 | 7篇 |
化学工业 | 73篇 |
金属工艺 | 1篇 |
机械仪表 | 6篇 |
建筑科学 | 48篇 |
能源动力 | 13篇 |
轻工业 | 58篇 |
水利工程 | 2篇 |
无线电 | 42篇 |
一般工业技术 | 48篇 |
冶金工业 | 55篇 |
原子能技术 | 1篇 |
自动化技术 | 118篇 |
出版年
2024年 | 2篇 |
2023年 | 2篇 |
2022年 | 10篇 |
2021年 | 15篇 |
2020年 | 9篇 |
2019年 | 17篇 |
2018年 | 22篇 |
2017年 | 14篇 |
2016年 | 13篇 |
2015年 | 9篇 |
2014年 | 14篇 |
2013年 | 35篇 |
2012年 | 23篇 |
2011年 | 44篇 |
2010年 | 29篇 |
2009年 | 22篇 |
2008年 | 18篇 |
2007年 | 16篇 |
2006年 | 18篇 |
2005年 | 10篇 |
2004年 | 14篇 |
2003年 | 12篇 |
2002年 | 4篇 |
2001年 | 7篇 |
2000年 | 9篇 |
1999年 | 9篇 |
1998年 | 15篇 |
1997年 | 16篇 |
1996年 | 10篇 |
1995年 | 4篇 |
1994年 | 2篇 |
1993年 | 7篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1988年 | 3篇 |
1986年 | 1篇 |
1985年 | 5篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1979年 | 1篇 |
1978年 | 2篇 |
1976年 | 2篇 |
1973年 | 1篇 |
排序方式: 共有472条查询结果,搜索用时 31 毫秒
1.
ABSTRACTGiven that online platforms disrupt established industries and challenge existing institutions, they can only be successful if their innovation becomes both legal and legitimate. This requires ‘institutional work’ that changes perceptions and regulations within society. Rather than only focussing on the online platform as the sole agent engaging in institutional work, our study analyses institutional work as a collective process. We investigate the case of home-sharing platform Airbnb and the process of institutional change its introduction prompted regarding short-term rental in Amsterdam, London and New York. We find, contrary to the popular view of online platforms as disruptive entrepreneurs, that the platform mainly focusses on creating new institutions rather than disrupting existing ones, and that users and non-users undertake most of the institutional work activities. We also show that different types of actors carry out different types of institutional work suggesting that the process of institutional work is highly distributed. 相似文献
2.
Dr. Lina Liang Tong-You Wade Wei Pei-Yu Wu Wouter Herrebout Ming-Daw Tsai Prof. Stéphane P. Vincent 《Chembiochem : a European journal of chemical biology》2020,21(20):2982-2990
d -Glycero-d -manno-heptose-1β,7-bisphosphate (HBP) and d -glycero-d -manno-heptose-1β-phosphate (H1P) are bacterial metabolites that were recently shown to stimulate inflammatory responses in host cells through the activation of the TIFA-dependent NF-κB pathway. To better understand structure-based activity in relation to this process, a family of nonhydrolyzable phosphonate analogues of HBP and H1P was synthesized. The inflammation modulation by which these molecules induce the TIFA-NF-κB signal axis was evaluated in vivo at a low-nanomolar concentration (6 nM) and compared to that of the natural metabolites. Our data showed that three phosphonate analogues had similar stimulatory activity to HBP, whereas two phosphonates antagonized HBP-induced TIFA-NF-κB signaling. These results open new horizons for the design of pro-inflammatory and innate immune modulators that could be used as vaccine adjuvant. 相似文献
3.
Wouter Bergmann Tiest Marcel Bruijn Henk Hoevers Piet de Korte Jan van der Kuur Wim Mels 《Nuclear instruments & methods in physics research. Section A, Accelerators, spectrometers, detectors and associated equipment》2004,520(1-3):329-332
We have performed numerical calculations of the noise in voltage-biased superconducting transition edge-based X-ray microcalorimeters, using a finite-element model. Details of the model are discussed, as well as results for different absorber geometries. The results are in agreement with an analytical model and show that the amount of internal thermal fluctuation noise can be reduced by using a segmented absorber. The simulation also agrees well with experimental data, which, for our detectors, contain no major unidentified noise sources. Furthermore, the discrepancy between the (small-signal) theoretical and the measured energy resolutions for 5.9 keV X-rays, for our sensors typically a factor of 2, is explained by a more accurate modelling of the sensor responsivity, taking into account the large signal behaviour. 相似文献
4.
5.
Multilingual posts can potentially affect the outcomes of content analysis on microblog platforms. To this end, language identification can provide a monolingual set of content for analysis. We find the unedited and idiomatic language of microblogs to be challenging for state-of-the-art language identification methods. To account for this, we identify five microblog characteristics that can help in language identification: the language profile of the blogger (blogger), the content of an attached hyperlink (link), the language profile of other users mentioned (mention) in the post, the language profile of a tag (tag), and the language of the original post (conversation), if the post we examine is a reply. Further, we present methods that combine these priors in a post-dependent and post-independent way. We present test results on 1,000 posts from five languages (Dutch, English, French, German, and Spanish), which show that our priors improve accuracy by 5 % over a domain specific baseline, and show that post-dependent combination of the priors achieves the best performance. When suitable training data does not exist, our methods still outperform a domain unspecific baseline. We conclude with an examination of the language distribution of a million tweets, along with temporal analysis, the usage of twitter features across languages, and a correlation study between classifications made and geo-location and language metadata fields. 相似文献
6.
In an organization operating in the bancassurance sector we identified a low-risk IT subportfolio of 84 IT projects comprising together 16,500 function points, each project varying in size and duration, for which we were able to quantify its requirements volatility. This representative portfolio stems from a much larger portfolio of IT projects. We calculated the volatility from the function point countings that were available to us. These figures were aggregated into a requirements volatility benchmark. We found that maximum requirements volatility rates depend on size and duration, which refutes currently known industrial averages. For instance, a monthly growth rate of 5% is considered a critical failure factor, but in our low-risk portfolio we found more than 21% of successful projects with a volatility larger than 5%. We proposed a mathematical model taking size and duration into account that provides a maximum healthy volatility rate that is more in line with the reality of low-risk IT portfolios. Based on the model, we proposed a tolerance factor expressing the maximal volatility tolerance for a project or portfolio. For a low-risk portfolio its empirically found tolerance is apparently acceptable, and values exceeding this tolerance are used to trigger IT decision makers. We derived two volatility ratios from this model, the π-ratio and the ρ-ratio. These ratios express how close the volatility of a project has approached the danger zone when requirements volatility reaches a critical failure rate. The volatility data of a governmental IT portfolio were juxtaposed to our bancassurance benchmark, immediately exposing a problematic project, which was corroborated by its actual failure. When function points are less common, e.g. in the embedded industry, we used daily source code size measures and illustrated how to govern the volatility of a software product line of a hardware manufacturer. With the three real-world portfolios we illustrated that our results serve the purpose of an early warning system for projects that are bound to fail due to excessive volatility. Moreover, we developed essential requirements volatility metrics that belong on an IT governance dashboard and presented such a volatility dashboard. 相似文献
7.
Syed Waqar Haider Wouter C. Brink Neeraj Buch 《International Journal of Pavement Engineering》2017,18(7):645-657
The performance prediction models in the Pavement-ME design software are nationally calibrated using in-service pavement material properties, pavement structure, climate and truck loadings, and performance data obtained from the Long-Term Pavement Performance programme. The nationally calibrated models may not perform well if the inputs and performance data used to calibrate those do not represent the local design and construction practices. Therefore, before implementing the new M-E design procedure, each state highway agency (SHA) should evaluate how well the nationally calibrated performance models predict the measured field performance. The local calibrations of the Pavement-ME performance models are recommended to improve the performance prediction capabilities to reflect the unique conditions and design practices. During the local calibration process, the traditional calibration techniques (split sampling) may not necessarily provide adequate results when limited number of pavement sections are available. Consequently, there is a need to employ statistical and resampling methodologies that are more efficient and robust for model calibrations given the data related challenges encountered by SHAs. The main objectives of the paper are to demonstrate the local calibration of rigid pavement performance models and compare the calibration results based on different resampling techniques. The bootstrap is a non-parametric and robust resampling technique for estimating standard errors and confidence intervals of a statistic. The main advantage of bootstrapping is that model parameters estimation is possible without making distribution assumptions. This paper presents the use of bootstrapping and jackknifing to locally calibrate the transverse cracking and IRI performance models for newly constructed and rehabilitated rigid pavements. The results of the calibration show that the standard error of estimate and bias are lower compared to the traditional sampling methods. In addition, the validation statistics are similar to that of the locally calibrated model, especially for the IRI model, which indicates robustness of the local model coefficients. 相似文献
8.
Ron Koster Albert C. Van der Woerd Wouter A. Serdijn Jan Davidse Arthur H. M. Van Roermund 《Analog Integrated Circuits and Signal Processing》1996,9(3):207-214
In this paper design rules for a circuit topology in which there is an inseparable combination of an amplifier and a filter characteristic, are presented. By intentionally using the capacitance of an already present input sensor for the filtering, the total required integrated capacitance is much less than that in circuits, which have a separately designed amplifier and filter function. Consequently, it is possible to have the advantage of a better integratability. Moreover, less complexity in the design is achieved. The presented circuit shows a current-to-voltage conversion and an inherently controllable second-order low-pass filter characteristic. A discrete realization has been designed to test the circuit. This circuit operates down to a 1 V supply voltage and the transfer shows a 1.8 M currentto-voltage conversion with a bandwidth of 6 kHz. Measurement results of this circuit show that a 63 dB dynamic range can be achieved with a total required integrated capacitance of only 31 pF. 相似文献
9.
Yves Younan Pieter Philippaerts Frank Piessens Wouter Joosen Sven Lachmund Thomas Walter 《Journal in Computer Virology》2011,7(3):173-188
Code injection attacks are one of the most powerful and important classes of attacks on software. In these attacks, the attacker sends malicious input to a software application, where it is stored in memory. The malicious input is chosen in such a way that its representation in memory is also a valid representation of a machine code program that performs actions chosen by the attacker. The attacker then triggers a bug in the application to divert the control flow to this injected machine code. A typical action of the injected code is to launch a command interpreter shell, and hence the malicious input is often called shellcode. Attacks are usually performed against network facing applications, and such applications often perform validations or encodings on input. Hence, a typical hurdle for attackers, is that the shellcode has to pass one or more filtering methods before it is stored in the vulnerable application??s memory space. Clearly, for a code injection attack to succeed, the malicious input must survive such validations and transformations. Alphanumeric input (consisting only of letters and digits) is typically very robust for this purpose: it passes most filters and is untouched by most transformations. This paper studies the power of alphanumeric shellcode on the ARM architecture. It shows that the subset of ARM machine code programs that (when interpreted as data) consist only of alphanumerical characters is a Turing complete subset. This is a non-trivial result, as the number of instructions that consist only of alphanumeric characters is very limited. To craft useful exploit code (and to achieve Turing completeness), several tricks are needed, including the use of self-modifying code. 相似文献
10.