首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1298篇
  免费   61篇
  国内免费   3篇
电工技术   12篇
化学工业   322篇
金属工艺   39篇
机械仪表   19篇
建筑科学   38篇
矿业工程   34篇
能源动力   18篇
轻工业   192篇
水利工程   5篇
石油天然气   27篇
无线电   57篇
一般工业技术   244篇
冶金工业   178篇
原子能技术   20篇
自动化技术   157篇
  2023年   11篇
  2022年   59篇
  2021年   62篇
  2020年   31篇
  2019年   37篇
  2018年   38篇
  2017年   43篇
  2016年   39篇
  2015年   37篇
  2014年   50篇
  2013年   95篇
  2012年   68篇
  2011年   75篇
  2010年   55篇
  2009年   58篇
  2008年   45篇
  2007年   38篇
  2006年   38篇
  2005年   34篇
  2004年   37篇
  2003年   42篇
  2002年   18篇
  2001年   18篇
  2000年   19篇
  1999年   15篇
  1998年   17篇
  1997年   17篇
  1996年   21篇
  1995年   19篇
  1994年   14篇
  1993年   14篇
  1991年   7篇
  1990年   13篇
  1989年   13篇
  1988年   7篇
  1987年   8篇
  1986年   6篇
  1985年   8篇
  1984年   6篇
  1983年   9篇
  1982年   10篇
  1981年   8篇
  1979年   7篇
  1977年   10篇
  1976年   8篇
  1975年   8篇
  1974年   7篇
  1973年   10篇
  1972年   7篇
  1971年   5篇
排序方式: 共有1362条查询结果,搜索用时 11 毫秒
11.
Targeting the innate immune system has attracted attention with the development of anti- CD47 antibodies. Anti-CD47 antibodies block the inhibition of the phagocytic activity of macrophages caused by the up-regulation of CD47 on tumor cells. In this study, public genomic data was used to identify genes highly expressed in breast tumors with elevated CD47 expression and analyzed the association between the presence of tumor immune infiltrates and the expression of the selected genes. We found that 142 genes positively correlated with CD47, of which 83 predicted favorable and 32 detrimental relapse-free survival (RFS). From those associated with favorable RFS, we selected the genes with immunologic biological functions and defined a CD47-immune signature composed of PTPRC, HLA-E, TGFBR2, PTGER4, ETS1, and OPTN. In the basal-like and HER2+ breast cancer subtypes, the expression of the CD47-immune signature predicted favorable outcome, correlated with the presence of tumor immune infiltrates, and with gene expression signatures of T cell activation. Moreover, CD47 up-regulated genes associated with favorable survival correlated with pro-tumoral macrophages. In summary, we described a CD47-immune gene signature composed of 6 genes associated with favorable prognosis, T cell activation, and pro-tumoral macrophages in breast cancer tumors expressing high levels of CD47.  相似文献   
12.
We currently lack effective treatments for the devastating loss of neural function associated with spinal cord injury (SCI). In this study, we evaluated a combination therapy comprising human neural stem cells derived from induced pluripotent stem cells (iPSC-NSC), human mesenchymal stem cells (MSC), and a pH-responsive polyacetal–curcumin nanoconjugate (PA-C) that allows the sustained release of curcumin. In vitro analysis demonstrated that PA-C treatment protected iPSC-NSC from oxidative damage in vitro, while MSC co-culture prevented lipopolysaccharide-induced activation of nuclear factor-κB (NF-κB) in iPSC-NSC. Then, we evaluated the combination of PA-C delivery into the intrathecal space in a rat model of contusive SCI with stem cell transplantation. While we failed to observe significant improvements in locomotor function (BBB scale) in treated animals, histological analysis revealed that PA-C-treated or PA-C and iPSC-NSC + MSC-treated animals displayed significantly smaller scars, while PA-C and iPSC-NSC + MSC treatment induced the preservation of β-III Tubulin-positive axons. iPSC-NSC + MSC transplantation fostered the preservation of motoneurons and myelinated tracts, while PA-C treatment polarized microglia into an anti-inflammatory phenotype. Overall, the combination of stem cell transplantation and PA-C treatment confers higher neuroprotective effects compared to individual treatments.  相似文献   
13.
14.
We show how to compute the smallest rectangle that can enclose any polygon, from a given set of polygons, in nearly linear time; we also present a PTAS for the problem, as well as a linear-time algorithm for the case when the polygons are rectangles themselves. We prove that finding a smallest convex polygon that encloses any of the given polygons is NP-hard, and give a PTAS for minimizing the perimeter of the convex enclosure. We also give efficient algorithms to find the smallest rectangle simultaneously enclosing a given pair of convex polygons.  相似文献   
15.
Graph transformation is being increasingly used to express the semantics of domain-specific visual languages since its graphical nature makes rules intuitive. However, many application domains require an explicit handling of time to accurately represent the behaviour of a real system and to obtain useful simulation metrics to measure throughputs, utilization times and average delays. Inspired by the vast knowledge and experience accumulated by the discrete event simulation community, we propose a novel way of adding explicit time to graph transformation rules. In particular, we take the event scheduling discrete simulation world view and provide rules with the ability to schedule the occurrence of other rules in the future. Hence, our work combines standard, efficient techniques for discrete event simulation (based on the handling of a future event set) and the intuitive, visual nature of graph transformation. Moreover, we show how our formalism can be used to give semantics to other timed approaches and provide an implementation on top of the rewriting logic system Maude.  相似文献   
16.
Decision support in equipment condition monitoring systems with image processing is analyzed. Long-run accumulation of information about earlier made decisions is used to realize the adaptiveness of the proposed approach. It is shown that unlike conventional classification problems, the recognition of abnormalities uses training samples supplemented with reward estimates of earlier decisions and can be tackled using reinforcement learning algorithms. We consider the basic stages of contextual multi-armed bandit algorithms during which the probabilistic distributions of each state are evaluated to evaluate the current knowledge of the states, and the decision space is explored to increase the decision-making efficiency. We propose a new decision-making method, which uses the probabilistic neural network to classify abnormal situation and the softmax rule to explore the decision space. A modelling experiment in image processing was carried out to show that our approach allows a higher accuracy of abnormality detection than other known methods, especially for small-size initial training samples.  相似文献   
17.
Finding dense subgraphs is an important problem in graph mining and has many practical applications. At the same time, while large real-world networks are known to have many communities that are not well-separated, the majority of the existing work focuses on the problem of finding a single densest subgraph. Hence, it is natural to consider the question of finding the top-k densest subgraphs. One major challenge in addressing this question is how to handle overlaps: eliminating overlaps completely is one option, but this may lead to extracting subgraphs not as dense as it would be possible by allowing a limited amount of overlap. Furthermore, overlaps are desirable as in most real-world graphs there are vertices that belong to more than one community, and thus, to more than one densest subgraph. In this paper we study the problem of finding top-k overlapping densest subgraphs, and we present a new approach that improves over the existing techniques, both in theory and practice. First, we reformulate the problem definition in a way that we are able to obtain an algorithm with constant-factor approximation guarantee. Our approach relies on using techniques for solving the max-sum diversification problem, which however, we need to extend in order to make them applicable to our setting. Second, we evaluate our algorithm on a collection of benchmark datasets and show that it convincingly outperforms the previous methods, both in terms of quality and efficiency.  相似文献   
18.
The Internet community all over the world is showing growing interest in a subject of information security and anonymity on the Internet, especially after revelations of Edward Snowden, when it became known about mass spying by certain organizations (such as the US National Security Agency) on Internet users, companies, political organizations, etc. This led to the active development of various anonymous networks, VPN services, proxies, etc. The aim of this article is to review popular methods of providing Internet anonymity, compare them, and discover their benefits and disadvantages.  相似文献   
19.
Testing model transformations poses several challenges, among them the automatic generation of appropriate input test models and the specification of oracle functions. Most approaches for the generation of input models ensure a certain coverage of the source meta-model or the transformation implementation code, whereas oracle functions are frequently defined using query or graph languages. However, these two tasks are usually performed independently regardless of their common purpose, and sometimes, there is a gap between the properties exhibited by the generated input models and those considered by the transformations. Recently, we proposed a formal specification language for the declarative formulation of transformation properties (by means of invariants, pre-, and postconditions) from which we generated partial oracle functions used for transformation testing. Here, we extend the usage of our specification language for the automated generation of input test models by SAT solving. The testing process becomes more intentional because the generated models ensure a certain coverage of the transformation requirements. Moreover, we use the same specification to consistently derive both the input test models and the oracle functions. A set of experiments is presented, aimed at measuring the efficacy of our technique.  相似文献   
20.
We give a simple O(nlogn) algorithm to compute the convex hull of the (possibly Θ(n2)) intersection points in an arrangement of n line segments in the plane. We also show an arrangement of dn hyperplanes in d-dimensions whose arrangement has Θ(nd−1) intersection points on the convex hull.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号