首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   328037篇
  免费   41073篇
  国内免费   28326篇
电工技术   20376篇
技术理论   12篇
综合类   35126篇
化学工业   37208篇
金属工艺   13224篇
机械仪表   19902篇
建筑科学   23930篇
矿业工程   8145篇
能源动力   10159篇
轻工业   18227篇
水利工程   12220篇
石油天然气   14126篇
武器工业   3598篇
无线电   36012篇
一般工业技术   35722篇
冶金工业   10224篇
原子能技术   4408篇
自动化技术   94817篇
  2024年   769篇
  2023年   4573篇
  2022年   8658篇
  2021年   11574篇
  2020年   10312篇
  2019年   8894篇
  2018年   8757篇
  2017年   10683篇
  2016年   13308篇
  2015年   15090篇
  2014年   20209篇
  2013年   20997篇
  2012年   21687篇
  2011年   22683篇
  2010年   18437篇
  2009年   20150篇
  2008年   20351篇
  2007年   23181篇
  2006年   20809篇
  2005年   17895篇
  2004年   14168篇
  2003年   12810篇
  2002年   10779篇
  2001年   8380篇
  2000年   7934篇
  1999年   6420篇
  1998年   5218篇
  1997年   4626篇
  1996年   4539篇
  1995年   4375篇
  1994年   3832篇
  1993年   2491篇
  1992年   2365篇
  1991年   1715篇
  1990年   1351篇
  1989年   1169篇
  1988年   967篇
  1987年   578篇
  1986年   441篇
  1985年   597篇
  1984年   627篇
  1983年   591篇
  1982年   464篇
  1981年   508篇
  1980年   377篇
  1979年   190篇
  1978年   144篇
  1977年   93篇
  1975年   68篇
  1962年   77篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
海胆酮是一种酮式类胡萝卜素,主要从海胆及藻类等海洋生物中提取。本文研究海胆酮对乙酰胆碱酯酶(acetylcholinesterase,AChE)的抑制作用,应用酶动力学、荧光光谱、圆二色光谱和分子对接技术研究海胆酮对AChE的抑制机理,并用淀粉样β蛋白片段25~35(amyloid beta-peptide 25-35,Aβ25-35)诱导大鼠肾上腺嗜铬细胞瘤细胞(PC12细胞)建立阿尔茨海默症(Alzheimer’s disease,AD)模型,研究海胆酮对AD细胞模型氧化应激损伤的作用。结果表明,海胆酮有很强的AChE抑制活性,其半抑制质量浓度为(16.29±0.97)μg/mL,抑制常数Ki为3.82 μg/mL,表现为竞争性抑制;海胆酮可诱导AChE二级结构改变,更容易与AChE活性中心氨基酸Ser200、His440、Trp84和Tyr121结合,阻碍底物碘代硫代乙酰胆碱(acetylthiocholine iodide,ATCI)与酶结合,从而引起酶活力降低。海胆酮能有效抑制Aβ25-35诱导PC12细胞的AChE活力,降低丙二醛含量,增加超氧化物歧化酶、过氧化氢酶和谷胱甘肽过氧化物酶活力,减轻Aβ25-35诱导的PC12细胞氧化应激损伤。本研究基于AChE和氧化应激阐明了海胆酮对AD的潜在作用机制,为海胆酮在功能食品、生物医药等领域的应用提供了数据支持和理论根据。  相似文献   
62.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
63.
With the emergence of large-scale knowledge base, how to use triple information to generate natural questions is a key technology in question answering systems. The traditional way of generating questions require a lot of manual intervention and produce lots of noise. To solve these problems, we propose a joint model based on semi-automated model and End-to-End neural network to automatically generate questions. The semi-automated model can generate question templates and real questions combining the knowledge base and center graph. The End-to-End neural network directly sends the knowledge base and real questions to BiLSTM network. Meanwhile, the attention mechanism is utilized in the decoding layer, which makes the triples and generated questions more relevant. Finally, the experimental results on SimpleQuestions demonstrate the effectiveness of the proposed approach.  相似文献   
64.
韩海坤  孙钢柱 《建筑经济》2020,41(1):104-109
构建工程咨询机构BIM技术应用能力评价的指标体系,提出改进的熵权TOPSIS评价模型,以4个典型的工程咨询单位为例,进行BIM技术运用能力评价。研究表明,BIM行业的整体水平已经有了明显的提升,但是区域间的发展还存在一定差距。  相似文献   
65.
为了建立适用于书画打印宣纸印刷质量的预测模型,本研究测量了14种书画打印宣纸的粗糙度、白度、不透明度、定量、光泽度和针对宣纸特别设定的帘纹深浅以及帘纹疏密度等表面物理参量,并在相同条件下,使用喷墨打印设备输出并测量印品色度值,利用总变差模型构建去除帘纹色差的测定方法,得到与人眼视觉特征相符的色差。运用GRNN广义回归神经网络结合书画打印宣纸表面物理参量与宣纸去帘纹后的色差值,建立预测模型。结果表明,该模型能够在仅测量书画打印宣纸表面物理参量的情况下,便能较为准确地预测书画打印宣纸印刷质量,为书画打印宣纸印刷前的选纸工作提供指导依据。  相似文献   
66.
One specific class of non-linear evolution equations, known as the Tzitzéica-type equations, has received great attention from a group of researchers involved in non-linear science. In this article, new exact solutions of the Tzitzéica-type equations arising in non-linear optics, including the Tzitzéica, Dodd–Bullough–Mikhailov and Tzitzéica–Dodd–Bullough equations, are obtained using the expa function method. The integration technique actually suggests a useful and reliable method to extract new exact solutions of a wide range of non-linear evolution equations.  相似文献   
67.
68.
Prostephanus truncatus is a notorious pest of stored-maize grain and its spread throughout sub-Saharan Africa has led to increased levels of grain storage losses. The current study developed models to predict the level of P. truncatus infestation and associated damage of maize grain in smallholder farmer stores. Data were gathered from grain storage trials conducted in Hwedza and Mbire districts of Zimbabwe and correlated with weather data for each site. Insect counts of P. truncatus and other common stored grain insect pests had a strong correlation with time of year with highest recorded numbers from January to May. Correlation analysis showed insect-generated grain dust from boring and feeding activity to be the best indicator of P. truncatus presence in stores (r = 0.70), while a moderate correlation (r = 0.48) was found between P. truncatus numbers and storage insect parasitic wasps, and grain damage levels significantly correlated with the presence of Tribolium castaneum (r = 0.60). Models were developed for predicting P. truncatus infestation and grain damage using parameter selection algorithms and decision-tree machine learning algorithms with 10-fold cross-validation. The P. truncatus population size prediction model performance was weak (r = 0.43) due to the complicated sampling and detection of the pest and eight-week long period between sampling events. The grain damage prediction model had a stronger correlation coefficient (r = 0.93) and is a good estimator for in situ stored grain insect damage. The models were developed for use under southern African climatic conditions and can be improved with more input data to create more precise models for building decision-support tools for smallholder maize-based production systems.  相似文献   
69.
70.
In this work, the longitudinal permeability of squarely packed dual-scale fiber preforms is studied theoretically. These fiber preforms are composed of aligned porous tows and the tows are tightly packed. The effective permeability is calculated as a parallel-like network of intra-tow permeability and inter-tow permeability, which are quantified by Darcy’s law and the inscribed radius between tows, respectively. The jump velocity at the interface between inter-tow fluids and porous tows is considered, as derived by substituting Beavers and Joseph’s correlation into Brinkman’s equation. We further examine the effects of intra-tow permeability on the effective permeability of the fibrous system with three interface conditions: (1) interface velocity = 0, (2) interface velocity = mean intra-tow velocity, and (3) interface velocity = jump velocity. The jump-velocity-based model is found to be closest to numerical data. The influence of the fiber volume fraction of tows on the effective permeability is also analyzed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号