首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   534篇
  免费   23篇
电工技术   2篇
综合类   2篇
化学工业   208篇
金属工艺   7篇
机械仪表   9篇
建筑科学   44篇
矿业工程   2篇
能源动力   3篇
轻工业   93篇
水利工程   2篇
石油天然气   2篇
无线电   9篇
一般工业技术   80篇
冶金工业   29篇
原子能技术   2篇
自动化技术   63篇
  2023年   3篇
  2022年   16篇
  2021年   32篇
  2020年   12篇
  2019年   11篇
  2018年   11篇
  2017年   14篇
  2016年   16篇
  2015年   22篇
  2014年   16篇
  2013年   34篇
  2012年   37篇
  2011年   38篇
  2010年   21篇
  2009年   19篇
  2008年   26篇
  2007年   36篇
  2006年   19篇
  2005年   16篇
  2004年   14篇
  2003年   8篇
  2002年   13篇
  2001年   11篇
  2000年   8篇
  1999年   18篇
  1998年   12篇
  1997年   8篇
  1996年   10篇
  1995年   7篇
  1994年   8篇
  1993年   9篇
  1992年   5篇
  1991年   1篇
  1990年   2篇
  1989年   5篇
  1988年   2篇
  1987年   1篇
  1986年   2篇
  1984年   1篇
  1983年   1篇
  1982年   4篇
  1981年   1篇
  1980年   2篇
  1979年   2篇
  1975年   1篇
  1972年   1篇
  1971年   1篇
排序方式: 共有557条查询结果,搜索用时 375 毫秒
21.
22.
This study shows an approach to estimate odour intensity in an indoor environment with a multi-gas sensor system. The sensor system uses 38 non-specific gas sensors, each of which responds to a wide range of different volatile compounds. Due to the complexity of indoor air pollution, the study focuses on emissions of building products as one of the major contributors to indoor air quality. The system has been calibrated and tested, combining measurements from gas sensor systems and assessments of odour intensity by a human panel. To find a relation between the sensor signal and the odour intensity, a data processing model has been developed comprising a classification and a class-specific regression method. The model is able to map the odour intensity to the sensor signal pattern in order to predict the odour intensity caused by the investigated building products. Investigations with varying relative humidity have shown a significant influence by the humidity level, which will be considered for future measurements.  相似文献   
23.
Industrial production systems and industrially manufactured products are constantly evolving due to technical innovations and customers’ demands. Therefore, ensuring an optimized co-evolution of both becomes an important yet challenging task. Approaches for model-based systems engineering have been widely investigated and have already had significant impact on industrial practice. However, existing model-based approaches mostly are focusing on particular aspects of a production system and do not provide a holistic approach for optimizing automated production systems, their deployment, and their co-evolution with the product. As a first step towards this direction, this contribution proposes the combination of an engineering approach for aPS based on systems modeling language with models and techniques for deployment of software and hardware to cyber-physical system architectures, which have been investigated in the field of computer science, and motivates the possibilities of a combined approach.  相似文献   
24.
The intrinsic isotopic labelling of plants with 13CO2 is an effective method to generate highly labelled compounds using photosynthesis and avoiding labour-intensive complex organic syntheses. In this study, the intrinsic isotopic labelling of polyphenols in parsley, spinach and peppermint is shown for the first time. The plants were grown in an atmosphere where 12CO2 was replaced by 13CO2, in order to generate highly labelled compounds. The total content of 13C as well as the individual polyphenols were analysed by Isotopic Ratio-MS and HPLC–Iontrap-MSn.  相似文献   
25.
White tea (WT) is rich in flavan‐3‐ols as green tea (GT) and might provide health protective effects due to the strong antioxidant properties of flavan‐3‐ols. Since intervention studies with WT are lacking, we evaluated the effects of WT consumption on antioxidant status, antioxidant capacity and biomarkers of oxidative stress compared to water and GT. After an overnight fast, 70 healthy non‐smokers were randomized to consume 600 mL of WT, GT or water (control). Plasma (epi‐)catechin and epi(gallo)catechingallate, antioxidant capacity (Folin assay, trolox equivalent antioxidant capacity test), 8‐iso‐prostaglandin F, ascorbic acid and uric acid were determined before and several times within 8 h after consumption. DNA strand breaks were measured in vivo and ex vivo (H2O2 stimulation) in leukocytes. Plasma flavan‐3‐ols significantly increased after WT and GT ingestion. Trolox equivalent antioxidant capacity was lower after 5 h in controls versus WT (p=0.031) and GT (p=0.005). Folin‐Ciocalteu reducing capacity, ascorbic and uric acid as well as markers of oxidative stress (8‐iso‐prostaglandin‐F, DNA strand breaks) were not affected by the beverages. A short‐term increase of catechins does not change plasma antioxidant capacity in healthy subjects. Conclusions with respect to health protective effects of WT and GT on the basis of these biomarkers can, thus, not be drawn.  相似文献   
26.
Cuticular hydrocarbons were extracted from workers of 63 different nests of five species of Tetramorium ants (Hymenoptera: Formicidae) from Austria, Hungary, and Spain. The GC-MS data were classified (data mining) by self-organizing maps (SOM). SOM neurons derived from primary neuron separation were subjected to hierarchical SOM (HSOM) and were grouped to neuron areas on the basis of vicinity in the hexagonal output grid. While primary neuron separation and HSOM resulted in classifications on a level more sensitive than species differences, neuron areas resulted in chemical phenotypes apparently of the order of species. These chemical phenotypes have implications for systematics: while the chemical phenotypes for T. ferox and T. moravicum correspond to morphological determination, in T. caespitum and T. impurum a total of six chemical phenotypes is found. Three hypotheses are discussed to explain this disparity between morphological and chemical classifications, including in particular the possibility of hybridization and the existence of cryptic species. Overall, the GC-MS profiles classified by SOM prove to be a practical alternative to morphological determination (T. ferox, T. moravicum) and indicate the need to revisit systematics (T. caespitum, T. impurum).  相似文献   
27.
28.
29.
Protein similarity estimations can be achieved using reduced dimensional representations and we describe a new application for the generation of two-dimensional maps from the three-dimensional structure. The code for the dimensionality reduction is based on the concept of pseudo-random generation of two-dimensional coordinates and Monte Carlo-like acceptance criteria for the generated coordinates. A new method for calculating protein similarity is developed by introducing a distance-dependent similarity field. Similarity of two proteins is derived from similarity field indices between amino acids based on various criteria such as hydrophobicity, residue replacement factors and conformational similarity, each showing a one factor Gaussian dependence. Results on comparisons of misfolded protein models with data sets of correctly folded structures show that discrimination between correctly folded and misfolded structures is possible. Tests were carried out on five different proteins, comparing a misfolded protein structure with members of the same topology, architecture, family and domain according to the CATH classification.  相似文献   
30.
Computational probabilistic noninterference   总被引:1,自引:0,他引:1  
Information flow and noninterference are popular concepts for expressing confidentiality and integrity properties. We present the first general definition of probabilistic noninterference in reactive systems that includes a computational case. This case is essential for coping with real cryptography since noninterference properties can usually only be guaranteed if the underlying cryptographic primitives have not been broken. This might happen, but only with negligible probability. We show that our noninterference definition is maintained under simulatability, the notion of secure implementation of modern cryptography. This allows secure composition of systems and yields a general strategy for including cryptographic primitives in information-flow proofs. As an example we study a cryptographic firewall guarding two honest users from their environment.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号