首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   97318篇
  免费   4834篇
  国内免费   4508篇
电工技术   4560篇
技术理论   5篇
综合类   9446篇
化学工业   13031篇
金属工艺   6250篇
机械仪表   3487篇
建筑科学   6469篇
矿业工程   1922篇
能源动力   2920篇
轻工业   6103篇
水利工程   2619篇
石油天然气   4625篇
武器工业   774篇
无线电   7290篇
一般工业技术   14411篇
冶金工业   2859篇
原子能技术   2536篇
自动化技术   17353篇
  2024年   73篇
  2023年   348篇
  2022年   580篇
  2021年   791篇
  2020年   1246篇
  2019年   1108篇
  2018年   1187篇
  2017年   1185篇
  2016年   1747篇
  2015年   2414篇
  2014年   4427篇
  2013年   5116篇
  2012年   4650篇
  2011年   5301篇
  2010年   4385篇
  2009年   5797篇
  2008年   5716篇
  2007年   6174篇
  2006年   5655篇
  2005年   4704篇
  2004年   4092篇
  2003年   3957篇
  2002年   4009篇
  2001年   3045篇
  2000年   3393篇
  1999年   3119篇
  1998年   2585篇
  1997年   2479篇
  1996年   2590篇
  1995年   2753篇
  1994年   2474篇
  1993年   1499篇
  1992年   1532篇
  1991年   1053篇
  1990年   769篇
  1989年   698篇
  1988年   653篇
  1987年   378篇
  1986年   225篇
  1985年   373篇
  1984年   417篇
  1983年   433篇
  1982年   331篇
  1981年   406篇
  1980年   275篇
  1979年   116篇
  1978年   112篇
  1977年   69篇
  1976年   42篇
  1975年   55篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
系统阐述了基准平面垂直断面法在爆破漏斗试验中测量爆破漏斗体积的基本原理,并将隧道激光断面仪应用于金厂河矿1 750 m水平15#采场底部切割巷道爆破漏斗试验爆破漏斗体积测量中。通过与传统体重法等计算法所得漏斗体积分析比较,结果表明基于隧道激光断面仪与3D Mine软件分析的基准平面垂直断面法实用性强、操作方便、结果直观可靠,达到试验预期目的。  相似文献   
2.
3.
以漳州市某超高层项目为例,针对超高层密集布筋区埋入式型钢柱脚与钢筋的深化设计、地脚螺栓的定位预埋、型钢柱脚支撑体系设计、节点钢筋穿插连接施工、埋入式型钢柱脚安装等方面,提出切实可行的施工方法,解决了埋入式型钢混凝土柱脚的地脚螺栓精准预埋、与底板密集钢筋穿插连接施工、悬空支撑稳定等一系列施工技术难题,既满足了设计方案的要求,又可为类似工程提供借鉴。  相似文献   
4.
《Ceramics International》2022,48(3):3544-3553
In this study the effects of thermal shock on the impact damage resistance, damage tolerance and flexural strength of Nextel 610/alumina silicate ceramic matrix composites were experimentally evaluated. Composite laminates with balanced and symmetric layup were gradually heated to 1200°C in an air-based furnace and held for at least 30 min before being removed and immersed in water at room temperature. The laminates were then subjected to low velocity impacts via a hemispherical steel impactor. The resultant damage was characterized non-destructively, following which the laminates were subjected to compression tests. Three-point bend tests were also performed to evaluate the effect of thermal shock on the flexural strength and related failure modes of the laminates. Thermally shocked laminates showed smaller internal damage and larger external damage areas in comparison to their pristine counterparts. For the impact energy and resultant damage size considered, the residual compressive strengths for the thermally shocked and pristine laminates were similar.  相似文献   
5.
Both fluorescent and luminescent observation are widely used to examine real-time gene expression patterns in living organisms. Several fluuorescent and luminescent proteins with specific optical properties have been developed and applied for simultaneous, multi-color observation of more than two gene expression profiles. Compared to fluorescent proteins, however, the application of multi-color luminescent imaging in living organisms is still limited. In this study, we introduced two-color luciferases into the soil nematode C. elegans and performed simultaneous analysis of two gene expression profiles. Using a green-emitting luciferase Eluc (emerald luciferase) and red-emitting luciferase SLR (stable luciferase red), the expression patterns of two genes were simultaneously observed in single animals from embryonic to adult stages over its whole life span. In addition, dual gene activities were observed at the single embryo level, with the simultaneous observation of morphological changes. These are the first application of a two-color luciferase system into a whole animal and suggest that precise relationship of expression patterns of multiple genes of interest can be analyzed over the whole life of the animal, dependent on the changes in genetic and/or environmental conditions.  相似文献   
6.
7.
Infections due to Gram-negative bacteria Helicobacter pylori may result in humans having gastritis, gastric or duodenal ulcer, and even gastric cancer. Investigation of quantitative changes of soluble biomarkers, correlating with H. pylori infection, is a promising tool for monitoring the course of infection and inflammatory response. The aim of this study was to determine, using an experimental model of H. pylori infection in guinea pigs, the specific characteristics of infrared spectra (IR) of sera from H. pylori infected (40) vs. uninfected (20) guinea pigs. The H. pylori status was confirmed by histological, molecular, and serological examination. The IR spectra were measured using a Fourier-transform (FT)-IR spectrometer Spectrum 400 (PerkinElmer) within the range of wavenumbers 3000–750 cm−1 and converted to first derivative spectra. Ten wavenumbers correlated with H. pylori infection, based on the chi-square test, were selected for a K-nearest neighbors (k-NN) algorithm. The wavenumbers correlating with infection were identified in the W2 and W3 windows associated mainly with proteins and in the W4 window related to nucleic acids and hydrocarbons. The k-NN for detection of H. pylori infection has been developed based on chemometric data. Using this model, animals were classified as infected with H. pylori with 100% specificity and 97% sensitivity. To summarize, the IR spectroscopy and k-NN algorithm are useful for monitoring experimental H. pylori infection and related inflammatory response in guinea pig model and may be considered for application in humans.  相似文献   
8.
The extracellular matrix (ECM) is important for normal development and disease states, including inflammation and fibrosis. To understand the complex regulation of ECM, we performed a suppressor screening using Caenorhabditis elegans expressing the mutant ROL-6 collagen protein. One cuticle mutant has a mutation in dpy-23 that encodes the μ2 adaptin (AP2M1) of clathrin-associated protein complex II (AP-2). The subsequent suppressor screening for dpy-23 revealed the lon-2 mutation. LON-2 functions to regulate body size through negative regulation of the tumor growth factor-beta (TGF-β) signaling pathway responsible for ECM production. RNA-seq analysis showed a dominant change in the expression of collagen genes and cuticle components. We noted an increase in the cav-1 gene encoding caveolin-1, which functions in clathrin-independent endocytosis. By knockdown of cav-1, the reduced TGF-β signal was significantly restored in the dpy-23 mutant. In conclusion, the dpy-23 mutation upregulated cav-1 expression in the hypodermis, and increased CAV-1 resulted in a decrease of TβRI. Finally, the reduction of collagen expression including rol-6 by the reduced TGF-β signal influenced the cuticle formation of the dpy-23 mutant. These findings could help us to understand the complex process of ECM regulation in organism development and disease conditions.  相似文献   
9.
10.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号