首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   843篇
  免费   38篇
电工技术   8篇
综合类   2篇
化学工业   162篇
金属工艺   5篇
机械仪表   11篇
建筑科学   34篇
能源动力   39篇
轻工业   59篇
水利工程   3篇
石油天然气   5篇
无线电   66篇
一般工业技术   191篇
冶金工业   157篇
原子能技术   5篇
自动化技术   134篇
  2024年   2篇
  2023年   6篇
  2022年   13篇
  2021年   19篇
  2020年   15篇
  2019年   13篇
  2018年   24篇
  2017年   34篇
  2016年   28篇
  2015年   27篇
  2014年   18篇
  2013年   55篇
  2012年   57篇
  2011年   64篇
  2010年   37篇
  2009年   34篇
  2008年   61篇
  2007年   47篇
  2006年   42篇
  2005年   27篇
  2004年   24篇
  2003年   15篇
  2002年   13篇
  2001年   5篇
  2000年   8篇
  1999年   11篇
  1998年   62篇
  1997年   18篇
  1996年   24篇
  1995年   15篇
  1994年   8篇
  1993年   18篇
  1990年   2篇
  1989年   4篇
  1985年   1篇
  1983年   2篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1977年   5篇
  1976年   6篇
  1975年   1篇
  1972年   2篇
  1971年   1篇
  1969年   1篇
  1964年   1篇
  1961年   1篇
  1941年   1篇
  1938年   1篇
  1933年   1篇
排序方式: 共有881条查询结果,搜索用时 15 毫秒
41.
Generally, an intruder must perform several actions, organized in an intrusion scenario, to achieve his or her malicious objectives. Actions are modeled by their pre and post conditions, which are a set of logical predicates or negations of predicates. Pre conditions of an action correspond to conditions the system’s state must satisfy to perform the action. Post conditions correspond to the effects of executing the action on the system’s state. When an intruder begins his intrusion, we can deduce, from the alerts generated byidss (Intrusion Detection Systems), several possible scenarios, by correlating attacks, that lead to multiple intrusion objectives. However, with no further analysis, we are not able to decide which are the most plausible ones among the possible scenarios. We propose in this paper to define an order over the possible scenarios by weighting the correlation relations between successive attacks composing the scenarios. These weights reflect to what level executing some actions are necessary to execute some action B. We will see that to be satisfactory, the comparison operator between two scenarios must satisfy some properties.  相似文献   
42.
Development of the avian lymphatic system   总被引:2,自引:0,他引:2  
Recently, highly specific markers of the lymphatic endothelium have been found enabling us to reinvestigate the embryonic origin of the lymphatics. Here we present a review of our studies on the development of the lymphatic system in chick and quail embryos. We show that the lymphatic endothelium is derived from two sources: the embryonic lymph sacs and mesenchymal lymphangioblasts. Proliferation studies reveal a BrdU-labeling index of 11.5% of lymph sac endothelial cells by day 6.25, which drops to 3.5% by day 7. Lymphangioblasts are able to integrate into the lining of lymph sacs. Lymphatic endothelial cells express the vascular endothelial growth factor (VEGF) receptors-2 and -3. Their ligand, VEGF-C, is expressed almost ubiquitously in embryonic and fetal tissues. Elevated expression levels are found in the tunica media of large blood vessels, which usually serve as major routes for growing lymphatics. The homeobox gene, Prox1, is expressed in lymphatic but not in blood vascular endothelial cells throughout all stages examined, namely, in developing lymph sacs of day 6 embryos and in lymphatics at day 16. Experimental studies show the existence of lymphangioblasts in the mesoderm, a considerable time before the development of the lymph sacs. Lymphangioblasts migrate from the somites into the somatopleure and contribute to the lymphatics of the limbs. Our studies indicate that these lymphangioblasts already express Prox1.  相似文献   
43.
Discrete geometric estimators approach geometric quantities on digitized shapes without any knowledge of the continuous shape. A classical yet difficult problem is to show that an estimator asymptotically converges toward the true geometric quantity as the resolution increases. For estimators of local geometric quantities based on Digital Straight Segment (DSS) recognition this problem is closely linked to the asymptotic growth of maximal DSS for which we show bounds both about their number and sizes on Convex Digital Polygons. These results not only give better insights about digitized curves but indicate that curvature estimators based on local DSS recognition are not likely to converge. We indeed invalidate a conjecture which was essential in the only known convergence theorem of a discrete curvature estimator. The proof involves results from arithmetic properties of digital lines, digital convexity, combinatorics and continued fractions.  相似文献   
44.
As the number of transistors and metal layers increases, traditional fault isolation techniques are less successful in exactly isolating the failing net or transistor to allow physical failure analysis. One tool to minimize the gap between global fault isolation – by means of emission microscopy or laser based techniques (TIVA, OBIRCH) – and physical root cause analysis is Time Resolved Emission (TRE). This paper presents two case studies illustrating the application of TRE within the failure analysis flow to generate a reasonable physical failure hypothesis.  相似文献   
45.
46.
47.
Academics and practitioners have a common interest in the continuing development of methods and computer applications that support or perform knowledge-intensive engineering tasks. Operations management dysfunctions and lost production time are problems of enormous magnitude that impact the performance and quality of industrial systems as well as their cost of production. Association rule mining is a data mining technique used to find out useful and invaluable information from huge databases. This work develops a better conceptual base for improving the application of association rule mining methods to extract knowledge on operations and information management. The emphasis of the paper is on the improvement of the operations processes. The application example details an industrial experiment in which association rule mining is used to analyze the manufacturing process of a fully integrated provider of drilling products. The study reports some new interesting results with data mining and knowledge discovery techniques applied to a drill production process. Experiment’s results on real-life data sets show that the proposed approach is useful in finding effective knowledge associated to dysfunctions causes.  相似文献   
48.
We describe a momentum resolving time-of-flight ion mass spectrometer that combines a high mass resolution, a velocity focusing condition for improved momentum resolution, and field-free conditions in the source region for high resolution electron detection. It is used in electron-ion coincidence experiments to record multiple ionic fragments produced in breakup reactions of small to medium sized molecules, such as F(3)SiCH(2)CH(2)Si(CH(3))(3). These breakup reactions are caused by soft x rays or intense laser fields. The ion spectrometer uses pulsed extraction fields, an electrostatic lens, and a delay line detector to resolve the position. Additionally, we describe a simple analytical method for calculating the momentum from the measured hit position and the time of flight of the ions.  相似文献   
49.
Inspired by the Multiplicative Exponential fragment of Linear Logic, we define a framework called the prismoid of resources where each vertex is a language which refines the λ-calculus by using a different choice to make explicit or implicit (meta-level) the definition of the contraction, weakening, and substitution operations. For all the calculi in the prismoid we show simulation of β-reduction, confluence, preservation of β-strong normalisation and strong normalisation for typed terms. Full composition also holds for all the calculi of the prismoid handling explicit substitutions. The whole development of the prismoid is done by making the set of resources a parameter of the formalism, so that all the properties for each vertex are obtained as a particular case of the general abstract proofs.  相似文献   
50.
Myocardial injury after ischemia (I) and reperfusion (R) is related to leukocyte activation with subsequent release of cytokines and oxygen-derived free radicals as well as complement activation. In our study, the cardioprotective effects of exogenous C1 esterase inhibitor (C1 INH) were examined in a rat model of myocardial I + R (i.e., 20 min + 24 hr or 48 hr). The C1 INH (10, 50 and 100 U/kg) administered 2 min before reperfusion significantly attenuated myocardial injury after 24 hr of R compared to vehicle treated rats (P < .001). Further, cardiac myeloperoxidase activity (i.e., a marker of PMN [polymorphonuclear leukocyte] accumulation) in the ischemic area was significantly reduced after C1 INH treatment compared to vehicle treated animals (0.81 +/- 0.1, 0.34 +/- 0.13, 0.13 +/- 0.1 vs. 1.44 +/- 0.3 U/100 mg tissue, P < .001). In addition, C1 INH (100 U/kg) significantly attenuated myocardial injury and neutrophil infiltration even after 48 hr of reperfusion compared to vehicle treatment. Immunohistochemical analysis of ischemic-reperfused myocardial tissue demonstrated activation of classical complement pathway by deposition of C1q on cardiac myocytes and cardiac vessels. In addition, expression of the endothelial adhesion molecules P-selectin and intercellular adhesion molecule 1 (ICAM-1) was observed after reperfusion of the ischemic myocardium. In this regard, C1 INH administration abolished expression of P-selectin and ICAM-1 on the cardiac vasculature after myocardial ischemia and reperfusion. Blocking the classical complement pathway by exogenous C1 INH appears to be an effective means to preserve ischemic myocardium from injury after 24 and 48 hr of reperfusion. The mechanisms of this cardioprotective effect appears to be due to blocking of complement activation and reduced endothelial adhesion molecule expression with subsequent reduced PMN-endothelium interaction, resulting in diminished cardiac necrosis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号