首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   985篇
  免费   73篇
  国内免费   12篇
电工技术   25篇
化学工业   295篇
金属工艺   28篇
机械仪表   47篇
建筑科学   38篇
矿业工程   5篇
能源动力   63篇
轻工业   64篇
水利工程   28篇
石油天然气   20篇
无线电   74篇
一般工业技术   171篇
冶金工业   37篇
原子能技术   7篇
自动化技术   168篇
  2024年   2篇
  2023年   15篇
  2022年   28篇
  2021年   63篇
  2020年   66篇
  2019年   83篇
  2018年   110篇
  2017年   90篇
  2016年   85篇
  2015年   43篇
  2014年   53篇
  2013年   110篇
  2012年   66篇
  2011年   85篇
  2010年   48篇
  2009年   33篇
  2008年   14篇
  2007年   17篇
  2006年   18篇
  2005年   11篇
  2004年   5篇
  2003年   5篇
  2002年   4篇
  2001年   2篇
  2000年   4篇
  1999年   1篇
  1998年   4篇
  1995年   1篇
  1993年   1篇
  1989年   1篇
  1986年   1篇
  1982年   1篇
排序方式: 共有1070条查询结果,搜索用时 25 毫秒
1.
For the first time in this study, Zinc oxide nanoparticles were biosynthesized by the eco-friendly and cost-effective procedure using Amygdalus scoparia stem bark extract then used as antibacterial, antifungal, anticancer, and anti-diabetic agents. The characterization techniques confirmed the biosynthesis, crystalline nature, structure, size, elemental composition of ZnO NPs and bioactive compounds that exist in A. scoparia extract accounting for Zn2+ ion reduction, capping and stabilization of ZnO NPs. The ZnO NPs displayed remarkable inhibitory activity against E. coli, E. aerigenes, S. aureus, P. oryzae, F. thapsinum, and F. semitectum compared to antibiotic standards. The ZnO NPs showed significant inhibitory effects on cancer cell lines, while it had no toxic effect on Vero normal cell line. The ZnO NPs (30 mg/kg)-treated diabetic rats showed significantly higher levels of insulin and lower AST, ALT and blood glucose compared with the STZ induced diabetic group and other treated groups (P < 0.05). The ZnO NPs- and extract-treated rats showed significantly higher levels of IR, GluT2, and GCK expression and lower TNFα expression compared with the STZ induced diabetic rats. Our findings showed that ZnO NPs represented an outstanding performance for biological applications.  相似文献   
2.
Cerebral microbleeds (CMBs) are small hemosiderin deposits indicative of prior cerebral microscopic hemorrhage and previously thought to be clinically silent. Recent population‐based cross‐sectional studies and prospective longitudinal cohort studies have revealed association between CMB and cognitive dysfunction. In the general population, CMBs are associated with age, hypertension, and cerebral amyloid angiopathy. In the chronic kidney disease (CKD) population, diminished estimated glomerular filtration rate has been found to be an independent risk factor for CMB, raising the possibility that a uremic milieu may predispose to microbleeds. In the end‐stage renal disease (ESRD) population on hemodialysis, the incidence of microbleeds is significantly higher compared with a control group without history of CKD or stroke. We present an ESRD patient on chronic hemodialysis with a history of gradual cognitive decline and progressive CMBs. Through this case and literature review, we illustrate the need to develop detection and prediction models to treat this frequent development in ESRD patients.  相似文献   
3.
This paper presents an energy-efficient switching scheme for successive approximation register (SAR) analogue-to-digital converter (ADC). The proposed scheme employs charge recycling method to keep the capacitor arrays free of transitional energy between bit generations except reset phase. In comparison with the conventional switching scheme, the proposed one achieves 100% transitional energy saving without considering reset phase. In addition, configuration of a 10-bit SAR ADC shows that the proposed switching scheme reduces the capacitor area by 25% compared with the conventional switching scheme.  相似文献   
4.
The objective of this paper is to review and document the mine fleet management systems’ models and algorithms. The purpose is to understand the algorithms behind the fleet management systems and the proposed academic solutions in this area to identify any gaps in the current literature and to open up opportunities to establish research questions that need to be addressed in an integrated simulation and optimisation operational planning research framework. In this paper, we review industrial fleet management systems and the main academic algorithms behind such systems. The fleet management systems are divided into three subsequently related problems to review: shortest path, production optimisation and real-time dispatching. Finally, the limitations of current algorithms for fleet management systems are documented in terms of mining practice feasibility and optimality of the solution on large-scale problems. The results of this literature review enable us to evaluate the logical links between major components of an integrated simulation and optimisation operational planning framework with current theory of fleet management systems.  相似文献   
5.
6.
Structural equation modeling was used to test theoretically based models in which psychological separation and attachment security variables were related to career indecision and those relations were mediated through vocational self-concept crystallization. In contrast to previous studies, which have found either weak or no support for a relation between separation or attachment security variables and career indecision, results based on a sample of 350 college students indicated that some components of separation and attachment security did relate to career indecision in a theoretically supportable direction. Results also revealed that regardless of whether global or component career indecision measures were used, separation and attachment security effects on indecision were at least partially mediated through vocational self-concept crystallization. The strongest mediated relations were observed for the effects of attachment anxiety and maternal separation. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
7.
This paper deals with a new boundary element method for analysis of the quasistatic problems in coupled thermoelasticity. Through some mathematical manipulation of the Navier equation in elasticity, the heat conduction equation is transformed into a simpler form, similar to the uncoupled-type equation with the modified thermal conductivity which shows the coupling effects. This procedure enables us to treat the coupled thermoelastic problems as an uncoupled one, A few examples are computed by the proposed BEM, and the results obtained are compared with the analytical ones available in the literature, whereby the accuracy and versatility of the proposed method are demonstrated.  相似文献   
8.
9.
On the basis of the energy supply and demand, this paper assesses the environmental damage from air pollution in Iran using the Extern-E study that has extended over 10 years and is still in progress in the European Union (EU) commission. Damage costs were transferred from Western European practice to the conditions of Iran by scaling according to GDP per capital measured in PPP terms.  相似文献   
10.
Vicious codes, especially viruses, as a kind of impressive malware have caused many disasters and continue to exploit more vulnerabilities. These codes are injected inside benign programs in order to abuse their hosts and ease their propagation. The offsets of injected virus codes are unknown and their targets usually are latent until they are executed and activated, what in turn makes viruses very hard to detect. In this paper enriched control flow graph miner, ECFGM in short, is presented to detect infected files corrupted by unknown viruses. ECFGM uses enriched control flow graph model to represent the benign and vicious codes. This model has more information than traditional control flow graph (CFG) by utilizing statistical information of dependent assembly instructions and API calls. To the best of our knowledge, the presented approach in this paper, for the first time, can recognize the offset of infected code of unknown viruses in the victim files. The main contributions of this paper are two folds: first, the presented model is able to detect unknown vicious code using ECFG model with reasonable complexity and desirable accuracy. Second, our approach is resistant against metamorphic viruses which utilize dead code insertion, variable renaming and instruction reordering methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号