首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2502篇
  免费   6篇
电工技术   2篇
化学工业   56篇
金属工艺   7篇
机械仪表   8篇
建筑科学   27篇
矿业工程   2篇
能源动力   6篇
轻工业   27篇
水利工程   9篇
无线电   26篇
一般工业技术   44篇
冶金工业   2257篇
自动化技术   37篇
  2023年   2篇
  2022年   4篇
  2021年   4篇
  2020年   3篇
  2019年   3篇
  2018年   3篇
  2016年   3篇
  2015年   2篇
  2014年   4篇
  2013年   19篇
  2012年   10篇
  2011年   11篇
  2010年   5篇
  2009年   6篇
  2008年   13篇
  2007年   18篇
  2006年   7篇
  2005年   13篇
  2004年   6篇
  2003年   16篇
  2002年   10篇
  2001年   7篇
  2000年   12篇
  1999年   106篇
  1998年   733篇
  1997年   374篇
  1996年   271篇
  1995年   141篇
  1994年   129篇
  1993年   152篇
  1992年   24篇
  1991年   29篇
  1990年   29篇
  1989年   28篇
  1988年   27篇
  1987年   13篇
  1986年   18篇
  1985年   16篇
  1984年   3篇
  1983年   9篇
  1982年   9篇
  1981年   9篇
  1980年   19篇
  1979年   3篇
  1978年   7篇
  1977年   50篇
  1976年   119篇
  1975年   4篇
  1973年   2篇
  1955年   1篇
排序方式: 共有2508条查询结果,搜索用时 15 毫秒
1.
Tlg1p and Tlg2p, members of the syntaxin family of SNAREs in yeast, have been implicated in both endocytosis and the retention of late Golgi markers. We have investigated the functions of these and the other endocytic syntaxins Pep12p and Vam3p. Remarkably, growth is possible in the absence of all four proteins. In the absence of the others, Pep12p and Tlg1p can each create endosomes accessible to the endocytic tracer dye FM4-64. However, although Pep12p is required for the ligand-induced internalization of the alpha factor receptor and its passage via Pep12p-containing membranes to the vacuole, Tlg1p is not. In contrast, Tlg1p is required for the efficient localization of the catalytic subunit of chitin synthase III (Chs3p) to the bud neck, a process that involves endocytosis and polarized delivery of Chs3p. In wild-type cells, internalized Chs3p cofractionates with Tlg1p and Tlg2p, and in a strain lacking the other endocytic syntaxins, either Tlg1p or Tlg2p is sufficient for correct localization of the enzyme. Pep12p is neither necessary nor sufficient for this process. We conclude that there are two endocytic routes in yeast that can operate independently and that Tlg1p is located at the junction of one of these with the polarized exocytic pathway.  相似文献   
2.
Despite improvement in early diagnosis, surgical techniques, and general patient care, most deaths of cancer patients result from metastases. Recent studies have revealed that cytokines produced by cancer cells or by stromal cells play an important role into development the cancer metastasis. The formation of a cancer metastasis involves several major steps: 1) extensive vascularization; 2) local invasion; 3) adherence either to capillary endothelial cells or to subendothelial basement membrane; 4) extravasation; and 5) proliferation. In colon cancer, several cytokines such as growth factors, inflammatory cytokines, and angiogenic factors have been confirmed to be involved in each step of metastasis. This paper summarizes the involvement of cytokines in the development of invasion and metastasis in colon cancer.  相似文献   
3.
In the theory of thin fluid sheets, governing equations are derived with specific reference to an assumed simple kinematic structure of the flow. There is a separate set of governing equations associated with each degree of complexity of the kinematic structure, forming a hierarchy of models (Green and Naghdi [3] and Shields and Webster [8]). If one is interested in the velocity profile across the sheet, the kinematic structure can be used again to interpret the variables in the governing equations as an approximate flow. This paper is concerned with the properties of this approximate flow.Two important consequences of the field equations (Euler's equations) in the classical, three-dimensional theory of ideal fluids are: conservation of mechanical energy, and conservation of circulation (Kelvin's theorem). The research reported herein provides a proof that mechanical energy is exactly conserved for the approximate flow in each level in this hierarchy. Two types of circulation are considered in the approximate flow: in-sheet circulation which is computed about circuits lying a fixed fractional distance between the top and bottom surfaces of the sheet, and cross-sheet circulation which is computed about circuits lying in a vertical cylindrical surface. It was found that K moments of the in-sheet circulation and K – 1 weighted moments of the cross-sheet circulation are conserved in the Kth level approximate flow.  相似文献   
4.
In Spring 2012, instruction librarians collaborated with first year composition (FYC) faculty to study students’ research habits as they related to writing. We collected process narratives from students in the introductory FYC course at the beginning and end of the fall semester, and a group of librarians and FYC faculty coded them together. Although we did not achieve one of our initial research goals, we still gained valuable insight into how our students perceive sources and the research process. We applied what we learned to create new instructional materials and developed a valuable relationship with FYC faculty.  相似文献   
5.
The results of a long-term review of 102 hips in eighty-seven patients with Perthes' disease are described, the mean follow-up interval being seventeen years. All had been treated by an extremely rigorous conservative regime in which the patients were kept in hospital for an average period of twenty-six months, during which time they were confined to bed with the legs in wide abduction, first in traction and later in "broomstick" plasters to ensure "containment" of the femoral head. The patients were assessed by the joint clincial and radiological method described by Ratliff (1956). The results were very satisfactory, with only 2 per cent poor results and 10 per cent fair. The remaining 88 per cent were good. The radiological results at the end of treatment have also been compared with control series described by Catterall (1972) and with the osteotomy series of Lloyd-Roberts, Catterall and Salamon (1976). From this it appears that the described regime offers no benefit compared with the natural history in Catterall's Groups I and II, and in Group III the results were only marginally better than those following osteotomy. In Group IV cases, however, where the femoral head was totally involved, the benefit was important, and since these are the cases which carry the worst natural prognosis it is suggested that the use of the method described in such instances must be seriously considered in spite of its social disadvantages. The theoretical implications of the findings are considered, and it is concluded that the benefits of the method cannot be ascribed wholly to the application of the "containment" principle.  相似文献   
6.
7.
Creatine phosphokinase regenerates ATP from ADP using creatine phosphate. Isoenzymes of creatine phosphokinase are bound to certain cellular structures or are compartmentalized in areas of the cell, and this has been used as a basis for defining the role of these isoenzymes in energy metabolism. The M isoenzyme of creatine phosphokinase has been morphologically associated with the M-line of striated muscle in many species. In this present study the ultrastructural distribution and the relative concentration of the M form of creatine phosphokinase in human muscle tissue was determined using immunogold and electron microscopy. The M-line of the sarcomere, comprising only 3-4% of the sarcomere area, was found to contain over 20% of the total M isoenzyme signal of the entire sarcomere. This technique represents a quantitative, ultrastructural method to study the subcellular distribution of this isoenzyme. These data suggest that localized concentrations of M-CPK may be important for normal energy metabolism, and may also serve as a foundation for a better understanding of the relationship between abnormal creatine metabolism and the pathogenesis of neuromuscular disease.  相似文献   
8.
Pulsed Nd:YAG lasers have been developed to achieve high peak power and high pulse repetition rate. These systems are being used as drivers for laser-produced plasmas which efficiently convert the 1064-nm laser output to extreme ultraviolet (EUV) light at 13.5 nm for future microlithography systems. The requirements for laser-produced plasma EUV light sources and their integration in lithography tools for high-volume manufacturing are reviewed to establish the key design issues for high-power lasers and plasma targets. Xenon has been identified as a leading target material to realize the goals of intense EUV emission and clean operation. Recent progress in high-power diode-pumped Nd:YAG lasers and xenon targets for EUV generation is reviewed, showing that laser-produced plasma sources meet the needs for current EUV lithography development tools. Future directions to meet EUV source requirements for high-volume manufacturing tools are discussed.  相似文献   
9.
Jennifer Bernhard welcomed the new AdCom members: Peter de Maagt, George Elefiheraides, Jay Kralovec, Giuliano Manara, and Prabhakar Pathak; and the new President Elect, Makoto Ando. She also thanked the out-going Past President, L. Wilson Pearson and the out-going AdComn members: Mike Jensen, Leo Kempel, Brian Kent, Eric Michielssen, and Tapan Sarkar for their four years of service. Several committee chairs have been changed: Jeff Young will be replaced as Chapter Activities Chair by Leo Kempel; Wilson Pearson will be replaced as Publications Chair by Allen Glisson; Lance Griffiths will be replaced by Ryan Adams as the GOLD representative; Magdy Iskander will be replaced by Andy Peterson as Awards Committee Chair; Dan Weile has resigned as co-Chair of the Membership Committee; and Ozlem. Kilic is replacing Jennifer Bernhard as Chair of the Constitution and Bylaws Committee.  相似文献   
10.
Authenticated routing for ad hoc networks   总被引:10,自引:0,他引:10  
Initial work in ad hoc routing has considered only the problem of providing efficient mechanisms for finding paths in very dynamic networks, without considering security. Because of this, there are a number of attacks that can be used to manipulate the routing in an ad hoc network. In this paper, we describe these threats, specifically showing their effects on ad hoc on-demand distance vector and dynamic source routing. Our protocol, named authenticated routing for ad hoc networks (ARAN), uses public-key cryptographic mechanisms to defeat all identified attacks. We detail how ARAN can secure routing in environments where nodes are authorized to participate but untrusted to cooperate, as well as environments where participants do not need to be authorized to participate. Through both simulation and experimentation with our publicly available implementation, we characterize and evaluate ARAN and show that it is able to effectively and efficiently discover secure routes within an ad hoc network.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号