首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3387篇
  免费   245篇
  国内免费   7篇
电工技术   34篇
综合类   5篇
化学工业   810篇
金属工艺   59篇
机械仪表   112篇
建筑科学   175篇
矿业工程   15篇
能源动力   136篇
轻工业   671篇
水利工程   30篇
石油天然气   10篇
无线电   200篇
一般工业技术   508篇
冶金工业   138篇
原子能技术   23篇
自动化技术   713篇
  2024年   5篇
  2023年   35篇
  2022年   34篇
  2021年   139篇
  2020年   113篇
  2019年   127篇
  2018年   155篇
  2017年   135篇
  2016年   166篇
  2015年   128篇
  2014年   172篇
  2013年   283篇
  2012年   238篇
  2011年   279篇
  2010年   194篇
  2009年   210篇
  2008年   175篇
  2007年   156篇
  2006年   134篇
  2005年   116篇
  2004年   100篇
  2003年   77篇
  2002年   69篇
  2001年   45篇
  2000年   37篇
  1999年   31篇
  1998年   41篇
  1997年   26篇
  1996年   25篇
  1995年   29篇
  1994年   14篇
  1993年   16篇
  1992年   16篇
  1991年   12篇
  1990年   9篇
  1989年   12篇
  1988年   6篇
  1987年   6篇
  1986年   9篇
  1985年   12篇
  1984年   6篇
  1983年   6篇
  1982年   7篇
  1981年   7篇
  1980年   4篇
  1979年   3篇
  1977年   7篇
  1976年   3篇
  1975年   4篇
  1974年   2篇
排序方式: 共有3639条查询结果,搜索用时 31 毫秒
31.
Intelligent multisensor surveillance systems consist of several types of sensors, which are installed on fixed and mobile devices. These components provide a huge quantity of information that has to be contrasted, correlated and integrated in order to recognize and react on special situations. These systems work in highly dynamic environments, with severe security and robustness requirements. All these characteristics imply the need for distributed solutions. In these solutions, scattered components can decide and act with some degree of autonomy (for instance, if they become isolated), or cooperate and coordinate for a complete tracking of special situations. In order to cope with these requirements and to better structure the solution, we have decided to design surveillance system control as a multiagent system. This is done by applying an agent-orientated methodology, which is assessed with concrete scenarios.  相似文献   
32.
Response of adults of the West Indian sugarcane weevil,Metamasius hemipterus sericeus, to various semiochemical treatments and physical trap designs was studied in southern Florida in field-grown banana and Canary Island date palms. Ethyl acetate released alone at 860–1007 mg/day was as effective for the capture ofM. h. sericeus as a combination of ethyl acetate (844–919 mg/day), ethyl propionate (348–362 mg/day), and ethyl butyrate (117–137 mg/day) and in one trial was more effective than fermenting sugarcane (250 g), ethyl propionate alone (353–384 mg/day), ethyl butyrate alone (123–174 mg/day), or no treatment. Ethyl acetate released alone at 675–683 mg/day was as attractive as 250 g of fermenting sugarcane or the racemic blend of the male-produced aggregation pheromones [(±)-5-methyl-nonan-4-ol and (±)-2-methyl-heptan-4-ol (8:1 ratio) “metalure”] at 3 mg/day. Weevil counts increased with binary combinations of ethyl acetate, sugarcane, and/or metalure over these treatments alone and the ternary combination was two to three times more effective than any of the binary treatments. Attraction to ethyl acetate released alone at 777 mg/day with metalure was greater than to the hydrolysis products of ethyl acetate (ethanol and/or acetic acid each released at about 6–8 mg/day) with metalure. Weevil counts from traps baited with 250 g of sugarcane and metalure increased with increasing dose of ethyl acetate to about 400 mg/day and then appeared to plateau. Ethyl acetate (about 700 mg/day) and metalure increased weevil counts in traps with increasing amounts of sugarcane (0–2 kg). Molasses (45 g) + water (158 ml) substitutes for sugarcane were about as effective for capturingM. h. sericeus as 250 g of fermenting sugarcane [all treatments with ethyl acetate (847 mg/day) and metalure]. Early experiments used a lethal pitfall trap. We demonstrated that several alternative trap designs were more effective than the lethal pitfall trap for capturing weevils. Color and height (on ground vs. 1 m on pole) did not affect trap efficacy when baited with the ternary combination of ethyl acetate (672–825 mg/day), sugarcane (250 g), and metalure.  相似文献   
33.
The architects and builders in the past lacked our knowledge concerning fluid dynamics, but they exhibited a deep rooted ability to observe and reflect - thus, different cultures have developed by trial and error. The authors have produced a stimulating analysis which couples the science of fluid dynamics and a sensitive understanding of past cultures. The paper is recommended reading.  相似文献   
34.
Precise timing and asynchronous I/O are appealing features for many applications. Unix kernels provide such features on a per‐process basis, using signals to communicate asynchronous events to applications. Per‐process signals and timers are grossly inadequate for complex multithreaded applications that require per‐thread signals and timers that operate at finer granularity. To respond to this need, we present a scheme that integrates asynchronous (Unix) signals with user‐level threads, using the ARIADNE system as a platform. This is done with a view towards support for portable, multithreaded, and multiprotocol distributed applications, namely the CLAM (connectionless, lightweight, and multiway) communications library. In the same context, we propose the use of continuations as an efficient mechanism for reducing thread context‐switching and busy‐wait overheads in multithreaded protocols. Our proposal for integrating timers and signal‐handling mechanisms not only solves problems related to race conditions, but also offers an efficient and flexible interface for timing and signalling threads. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
35.
Neural Computing and Applications - Grapes reception is a key process in wine production. The harvest days are extremely challenging days in managing the reception of the grapes, as the winery...  相似文献   
36.
The inversion of schema mappings has been identified as one of the fundamental operators for the development of a general framework for metadata management. During the last few years, three alternative notions of inversion for schema mappings have been proposed (Fagin-inverse (Fagin, TODS 32(4), 25:1–25:53, 2007), quasi-inverse (Fagin et?al., TODS 33(2), 11:1–11:52, 2008), and maximum recovery (Arenas et?al., TODS 34(4), 22:1–22:48, 2009)). However, these notions lack some fundamental properties that limit their practical applicability: most of them are expressed in languages including features that are difficult to use in practice, some of these inverses are not guaranteed to exist for mappings specified with source-to-target tuple-generating dependencies (st-tgds), and it has been futile to search for a meaningful mapping language that is closed under any of these notions of inverse. In this paper, we develop a framework for the inversion of schema mappings that fulfills all of the above requirements. It is based on the notion of ${\mathcal{C}}$ -maximum recovery, for a query language ${\mathcal{C}}$ , a notion designed to generate inverse mappings that recover back only the information that can be retrieved with queries in ${\mathcal{C}}$ . By focusing on the language of conjunctive queries (CQ), we are able to find a mapping language that contains the class of st-tgds, is closed under CQ-maximum recovery, and for which the chase procedure can be used to exchange data efficiently. Furthermore, we show that our choices of inverse notion and mapping language are optimal, in the sense that choosing a more expressive inverse operator or mapping language causes the loss of these properties.  相似文献   
37.
Steganographic techniques allow users to covertly transmit information, hiding the existence of the communication itself. These can be used in several scenarios ranging from evading censorship to discreetly extracting sensitive information from an organization. In this paper, we consider the problem of using steganography through a widely used network protocol (i.e. HTTP). We analyze the steganographic possibilities of HTTP, and propose an active warden model to hinder the usage of covert communication channels. Our framework is meant to be useful in many scenarios. It could be employed to ensure that malicious insiders are not able to use steganography to leak information outside an organization. Furthermore, our model could be used by web servers administrators to ensure that their services are not being abused, for example, as anonymous steganographic mailboxes. Our experiments show that steganographic contents can be successfully eliminated, but that dealing with high payload carriers such as large images may introduce notable delays in the communication process.  相似文献   
38.
Methamphetamine is, worldwide, one of the most consumed drugs of abuse. One important side effect is neurodegeneration leading to a decrease in life expectancy. The aim of this paper was to check whether the drug affects one of the receptors involved in neurodegeneration/neuroprotection events, namely the adenosine A2A receptor (A2AR). First, we noticed that methamphetamine does not affect A2A functionality if the receptor is expressed in a heterologous system. However, A2AR becomes sensitive to the drug upon complexes formation with the cannabinoid CB1 receptor (CB1R) and the sigma 1 receptor (σ1R). Signaling via both adenosine A2AR and cannabinoid CB1R was affected by methamphetamine in cells co-expressing the two receptors. In striatal primary cultures, the A2AR–CB1R heteromer complex was detected and methamphetamine not only altered its expression but completely blocked the A2AR- and the CB1R-mediated activation of the mitogen activated protein kinase (MAPK) pathway. In conclusion, methamphetamine, with the participation of σ1R, alters the expression and function of two interacting receptors, A2AR, which is a therapeutic target for neuroprotection, and CB1R, which is the most abundant G protein-coupled receptor (GPCR) in the brain.  相似文献   
39.
Leucine-rich repeats containing G protein-coupled receptor 4 (LGR4) is a receptor that belongs to the superfamily of G protein-coupled receptors that can be activated by R-spondins (RSPOs), Norrin, circLGR4, and the ligand of the receptor activator of nuclear factor kappa-B (RANKL) ligands to regulate signaling pathways in normal and pathological processes. LGR4 is widely expressed in different tissues where it has multiple functions such as tissue development and maintenance. LGR4 mainly acts through the Wnt/β-catenin pathway to regulate proliferation, survival, and differentiation. In cancer, LGR4 participates in tumor progression, invasion, and metastasis. Furthermore, recent evidence reveals that LGR4 is essential for the regulation of the cancer stem cell population by controlling self-renewal and regulating stem cell properties. This review summarizes the function of LGR4 and its ligands in normal and malignant processes.  相似文献   
40.
For a given $\theta \in (a,b)$ , we investigate the question whether there exists a positive quadrature formula with maximal degree of precision which has the prescribed abscissa $\theta $ plus possibly $a$ and/or $b$ , the endpoints of the interval of integration. This study relies on recent results on the location of roots of quasi-orthogonal polynomials. The above positive quadrature formulae are useful in studying problems in one-sided polynomial $L_1$ approximation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号