全文获取类型
收费全文 | 146篇 |
免费 | 3篇 |
专业分类
化学工业 | 23篇 |
机械仪表 | 20篇 |
建筑科学 | 3篇 |
能源动力 | 2篇 |
轻工业 | 5篇 |
石油天然气 | 1篇 |
无线电 | 5篇 |
一般工业技术 | 26篇 |
冶金工业 | 13篇 |
自动化技术 | 51篇 |
出版年
2024年 | 2篇 |
2022年 | 8篇 |
2021年 | 2篇 |
2020年 | 1篇 |
2019年 | 9篇 |
2018年 | 4篇 |
2017年 | 3篇 |
2016年 | 1篇 |
2015年 | 4篇 |
2014年 | 6篇 |
2013年 | 10篇 |
2012年 | 9篇 |
2011年 | 8篇 |
2010年 | 18篇 |
2009年 | 10篇 |
2008年 | 8篇 |
2007年 | 6篇 |
2006年 | 4篇 |
2005年 | 3篇 |
2004年 | 3篇 |
2002年 | 4篇 |
1998年 | 4篇 |
1997年 | 3篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1994年 | 4篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1969年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有149条查询结果,搜索用时 0 毫秒
1.
Lubna Sajjad Asaf Rahmatullah Jan Abdul Latif Khan Waqar Ahmad Saleem Asif Ahmed Al-Harrasi Kyung-Min Kim In-Jung Lee 《International journal of molecular sciences》2022,23(5)
The mechanism and course of Triticum plastome evolution is currently unknown; thus, it remains unclear how Triticum plastomes evolved during recent polyploidization. Here, we report the complete plastomes of two polyploid wheat species, Triticum sphaerococcum (AABBDD) and Triticum turgidum subsp. durum (AABB), and compare them with 19 available and complete Triticum plastomes to create the first map of genomic structural variation. Both T. sphaerococcum and T. turgidum subsp. durum plastomes were found to have a quadripartite structure, with plastome lengths of 134,531 bp and 134,015 bp, respectively. Furthermore, diploid (AA), tetraploid (AB, AG) and hexaploid (ABD, AGAm) Triticum species plastomes displayed a conserved gene content and commonly harbored an identical set of annotated unique genes. Overall, there was a positive correlation between the number of repeats and plastome size. In all plastomes, the number of tandem repeats was higher than the number of palindromic and forward repeats. We constructed a Triticum phylogeny based on the complete plastomes and 42 shared genes from 71 plastomes. We estimated the divergence of Hordeum vulgare from wheat around 11.04–11.9 million years ago (mya) using a well-resolved plastome tree. Similarly, Sitopsis species diverged 2.8–2.9 mya before Triticum urartu (AA) and Triticum monococcum (AA). Aegilops speltoides was shown to be the maternal donor of polyploid wheat genomes and diverged ~0.2–0.9 mya. The phylogeny and divergence time estimates presented here can act as a reference framework for future studies of Triticum evolution. 相似文献
2.
C-reactive protein (CRP) is considered a biomarker of infection/inflammation. It is a commonly used tool for early detection of infection in the emergency room or as a point-of-care test and especially for differentiating between bacterial and viral infections, affecting decisions of admission and initiation of antibiotic treatments. As C-reactive protein is part of a dynamic and continuous inflammatory process, a single CRP measurement, especially at low concentrations, may erroneously lead to a wrong classification of an infection as viral over bacterial and delay appropriate antibiotic treatment. In the present review, we introduce the concept of C-reactive protein dynamics, measuring the velocity of C-reactive protein elevation, as a tool to increase this biomarker’s diagnostic ability. We review the studies that helped define new metrics such as estimated C-reactive protein velocity (velocity of C-reactive protein elevation from symptoms’ onset to first C-reactive protein measurement) and the measured C-reactive protein velocity (velocity between sequential C-reactive protein measurements) and the use of these metrics in different clinical scenarios. We also discuss future research directions for this novel metric. 相似文献
3.
Asaf Levin 《Information Processing Letters》2007,104(1):21-28
We study a model that incorporates a budget constraint in a decision making problem. Our goal is to maximize the expected wealth, where in each time period we can either stop the business getting our current wealth or to continue one additional time period and getting a random revenue. We show that when the wealth is scalar, the problem is NP-hard and we provide an FPTAS. However, when the wealth is vector with at least two components the problem cannot be approximated. 相似文献
4.
This paper discusses a formal and rigorous approach to the analysis of operator interaction with machines. It addresses the acute problem of detecting design errors in human-machine interaction and focuses on verifying the correctness of the interaction in complex and automated control systems. The paper describes a systematic methodology for evaluating whether the interface provides the necessary information about the machine to enable the operator to perform a specified task successfully and unambiguously. It also addresses the adequacy of information provided to the user via training material (e.g., user manual) about the machine's behavior. The essentials of the methodology, which can be automated and applied to the verification of large systems, are illustrated by several examples and through a case study of pilot interaction with an autopilot aboard a modern commercial aircraft. The expected application of this methodology is an augmentation and enhancement, by formal verification, of human-automation interfaces. 相似文献
5.
Asaf Shabtai Author Vitae Uri Kanonov Author Vitae Author Vitae 《Journal of Systems and Software》2010,83(8):1524-1537
In this paper, a new approach for detecting previously unencountered malware targeting mobile device is proposed. In the proposed approach, time-stamped security data is continuously monitored within the target mobile device (i.e., smartphones, PDAs) and then processed by the knowledge-based temporal abstraction (KBTA) methodology. Using KBTA, continuously measured data (e.g., the number of sent SMSs) and events (e.g., software installation) are integrated with a mobile device security domain knowledge-base (i.e., an ontology for abstracting meaningful patterns from raw, time-oriented security data), to create higher level, time-oriented concepts and patterns, also known as temporal abstractions. Automatically-generated temporal abstractions are then monitored to detect suspicious temporal patterns and to issue an alert. These patterns are compatible with a set of predefined classes of malware as defined by a security expert (or the owner) employing a set of time and value constraints. The goal is to identify malicious behavior that other defensive technologies (e.g., antivirus or firewall) failed to detect. Since the abstraction derivation process is complex, the KBTA method was adapted for mobile devices that are limited in resources (i.e., CPU, memory, battery). To evaluate the proposed modified KBTA method a lightweight host-based intrusion detection system (HIDS), combined with central management capabilities for Android-based mobile phones, was developed. Evaluation results demonstrated the effectiveness of the new approach in detecting malicious applications on mobile devices (detection rate above 94% in most scenarios) and the feasibility of running such a system on mobile devices (CPU consumption was 3% on average). 相似文献
6.
Shabnum Shaheen Muhammad Asaf Khan Muhammad Naveed Shahid Zeeshan Shamim Bilal Rasool Khadim Hussain Sana Khalid Nidaa Harun Riffat Siddique Romaisha Sonia Farah Khan 《Microscopy research and technique》2022,85(2):623-629
Present research work was carried out to clarify the variations among species of genus Paspalum morphologically and palynologically as this genus is taxonomically difficult due to having multiple similar morphologically overlapping characters which make it difficult to identify. Henceforth present research work was carried out to delimit taxa within the same genus by morphological and palynological tools through light microscopy (LM) and scanning electron microscopy (SEM). Both these tools are considered as the most useful taxonomic characters for taxonomically problematic genera. The results showed a lot of variations among morphological characters. In Paspalum dilatatum, the upper glume was ovate whereas in the other two species, the upper glume was elliptic. The upper glume apex found in P. dilatatum and Paspalum scrobiculatum was obtuse whereas in Paspalum distichum, upper glume apex was acute. Glume nerves showed variation in all three species. Paspalum distichum was 3 nerved, P. scrobiculatum was 5–7 nerved, and P. dilatatum was 5–9 nerved. All three species showed variation in lemma nerves. Paspalum scrobiculatum had 3 nerved lemma whereas in P. distichum 3–5 nerved and P. dilatatum 5–9 nerved lemma were present. In polar and equatorial view, pollen grains ranged from 25 (20–30) to 37.5 (30–45) μm. Paspalum distichum appeared to be the smallest in size whereas P. dilatatum was the largest. Exine thickness ranged from 0.75 (0.5–1) to 1.35 (1.2–1.5) μm. The higher value of pollen fertility was found in P. scrobiculatum as 87.69% and the lowest value was in P. distichum as 78.08%. Morphological keys were also given for correct identification. 相似文献
7.
Shabnum Shaheen Muhammad Asaf Khan Muhammad Afzal Naeem Muhammad Naveed Shahid Mehwish Jaffer Hanan Mukhtar 《Microscopy research and technique》2022,85(3):1194-1198
The anatomical variations of two plants from the Nyctaginaceae family, Bougainvillea spectabilis and Bougainvillea glabra, were studied using light and scanning electron microscopy methods in this work. Bougainvillea is a dicotyledonous with defensive traits that can withstand extreme (hot and dry) settings; according to the findings, crystal inclusions in cells, woody spines, and an abnormal development pattern are all features that help them survive against predators and are unique to this species. The Bougainvillea plant's leaves are arranged in simple pattern, alternate to each other along stem having an undulate leaves edge and an oval form. The xylem and phloem, palisade, parenchyma midrib, spongy mesophyll, raphide crystal bundles, and trichomes were all visible when bracts and leaves were transversally sectioned and dyed with toluidine blue O (TBO). The presence of crystals was confirmed by a detailed examination of the transverse leaves by using bright-field and cross-polarizing microscopy. Dissecting microscopic examination showed that all the leaves revealed leaves venation pattern that had midvein, lateral veins areoles, and trichomes. Although trichomes have been identified on both sides, a closer look at a cleaned leaf dyed with TBO showed multicellular abundant trichomes on adaxial surface. Stomata complexes were typically found on the abaxial surface of the leaf according to epidermal peels. Present studies also showed that on adaxial side, stomata were lesser in number or were absent and also showed that the morphologies of the pavement cells on the adaxial and abaxial sides of the leaf differed. 相似文献
8.
9.
In the robotics community, there exist implicit assumptions concerning the computational capabilities of robots. Two computational classes of robots emerge as focal points of recent research: robot ants and robot elephants. Ants have poor memory and communication capabilities, but are able to communicate using pheromones, in effect, turning their work area into a shared memory. By comparison, elephants are computationally stronger, have large memory, and are equipped with strong sensing and communication capabilities. Unfortunately, not much is known about the relation between the capabilities of these models in terms of the tasks they can address. In this paper, we present formal models of both ants and elephants, and investigate if one dominates the other. We present two algorithms: AntEater, which allows elephant robots to execute ant algorithms and ElephantGun, which converts elephant algorithms-specified as Turing machines-into ant algorithms. By exploring the computational capabilities of these algorithms, we reach interesting conclusions regarding the computational power of both models. 相似文献
10.
Let $G=(V,E)$ be an undirected multigraph with a special vertex
${\it root} \in V$, and where each edge $e \in E$ is endowed with a
length $l(e) \geq 0$ and a capacity $c(e) > 0$. For a path $P$
that connects $u$ and $v$, the {\it transmission time} of $P$ is
defined as $t(P)=\mbox{\large$\Sigma$}_{e \in P} l(e) + \max_{e \in P}\!{(1 /
c(e))}$. For a spanning tree $T$, let $P_{u,v}^T$ be the unique $u$--$v$
path in $T$. The {\sc quickest radius spanning tree problem} is to find
a spanning tree $T$ of $G$ such that $\max _{v \in V} t(P^T_{root,v})$ is
minimized. In this paper we present a 2-approximation algorithm for
this problem, and show that unless $P =NP$, there is no approximation
algorithm with a performance guarantee of $2 - \epsilon$ for any
$\epsilon >0$. The {\sc quickest diameter spanning tree problem} is
to find a spanning tree $T$ of $G$ such that $\max_{u,v \in V}
t(P^T_{u,v})$ is minimized. We present a ${3 \over 2}$-approximation
to this problem, and prove that unless $P=NP$
there is no approximation algorithm with a performance guarantee of
${3 \over 2}-\epsilon$ for any $\epsilon >0$. 相似文献