首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   812篇
  免费   30篇
  国内免费   1篇
电工技术   9篇
综合类   3篇
化学工业   274篇
金属工艺   13篇
机械仪表   20篇
建筑科学   24篇
能源动力   27篇
轻工业   57篇
水利工程   1篇
石油天然气   1篇
武器工业   2篇
无线电   51篇
一般工业技术   130篇
冶金工业   46篇
原子能技术   2篇
自动化技术   183篇
  2024年   1篇
  2023年   7篇
  2022年   36篇
  2021年   33篇
  2020年   16篇
  2019年   14篇
  2018年   28篇
  2017年   22篇
  2016年   25篇
  2015年   27篇
  2014年   38篇
  2013年   59篇
  2012年   49篇
  2011年   56篇
  2010年   31篇
  2009年   49篇
  2008年   37篇
  2007年   48篇
  2006年   30篇
  2005年   25篇
  2004年   19篇
  2003年   19篇
  2002年   15篇
  2001年   10篇
  2000年   13篇
  1999年   6篇
  1998年   14篇
  1997年   13篇
  1996年   10篇
  1995年   1篇
  1994年   10篇
  1993年   8篇
  1992年   6篇
  1991年   6篇
  1990年   4篇
  1989年   6篇
  1988年   3篇
  1987年   4篇
  1986年   3篇
  1985年   7篇
  1983年   5篇
  1982年   5篇
  1981年   11篇
  1980年   6篇
  1978年   1篇
  1976年   3篇
  1975年   1篇
  1974年   1篇
  1970年   2篇
排序方式: 共有843条查询结果,搜索用时 15 毫秒
41.
Test data generation in program testing is the process of identifying a set of test data which satisfies a given testing criterion. Existing pathwise test data generators proceed by selecting program paths that satisfy the selected criterion and then generating program inputs for these paths. One of the problems with this approach is that unfeasible paths are often selected; as a result, significant computational effort can be wasted in analysing those paths. In this paper, an approach to test data generation, referred to as a dynamic approach for test data generation, is presented. In this approach, the path selection stage is eliminated. Test data are derived based on the actual execution of the program under test and function minimization methods. The approach starts by executing a program for an arbitrary program input. During program execution for each executed branch, a search procedure decides whether the execution should continue through the current branch or an alternative branch should be taken. If an undesirable execution flow is observed at the current branch, then a real-valued function is associated with this branch, and function minimization search algorithms are used to locate values of input variables automatically, which will change the flow of execution at this branch.  相似文献   
42.
We report novel molecules incorporating the nontoxic squalene scaffold and different carbonic anhydrase inhibitors (CAIs). Potent inhibitory action, in the low-nanomolar range, was detected against isoforms hCA II for sulfonamide derivatives, which proved to be selective against this isoform over the tumor-associate hCA IX and XII isoforms. On the other hand, coumarin derivatives showed weak potency but high selectivity against the tumor-associated isoform CA IX. These compounds are interesting candidates for preclinical evaluation in glaucoma or various tumors in which the two enzymes are involved. In addition, an in silico study of inhibitor-bound hCA II revealed extensive interactions with the hydrophobic pocket of the active site and provided molecular insights into the binding properties of these new inhibitors.  相似文献   
43.
We measured the velocity of sound in olive oil under pressure with the Brillouin light scattering technique. Using the values for the density and the thermal conductivity that have only recently been reported, we calculated the adiabatic compressibility and the isobaric specific heat up to 356 MPa and the thermal diffusivity up to 200 MPa. The specific heat displays a maximum at 124 MPa, suggesting a possible phase transition around this pressure. Apart from the theoretical and practical importance of these results for the food industry and beyond, this work shows that Brillouin light scattering and macroscopic methods are complementary and can be employed to measure thermophysical parameters of food liquids under pressure.  相似文献   
44.
Bioorthogonal chemistry can be used for the selective modification of biomolecules without interfering with any other functionality that might be present. Recent developments in the field include orthogonal bioorthogonal reactions to modify multiple biomolecules simultaneously. During our research, we observed that the reaction rates for the bioorthogonal inverse‐electron‐demand Diels–Alder (iEDDA) reactions between nonstrained vinylboronic acids (VBAs) and dipyridyl‐s‐tetrazines were exceptionally higher than those between VBAs and tetrazines bearing a methyl or phenyl substituent. As VBAs are mild Lewis acids, we hypothesised that coordination of the pyridyl nitrogen atom to the boronic acid promoted tetrazine ligation. Herein, we explore the molecular basis and scope of VBA–tetrazine ligation in more detail and benefit from its unique reactivity in the simultaneous orthogonal tetrazine labelling of two proteins modified with VBA and norbornene, a widely used strained alkene. We further show that the two orthogonal iEDDA reactions can be performed in living cells by labelling the proteasome by using a nonselective probe equipped with a VBA and a subunit‐selective VBA bearing a norbornene moiety.  相似文献   
45.
Over the last years the use of phase change slurries (PCSs) based on microencapsulated phase change material (MEPCM) increased considerably due to their capacity of adaptation to various heat storage systems. PCSs are obtained by dispersing a microencapsulated PCM (particle diameter 5-20 μm) into a heat carrier fluid (e.g. water). Heat storage systems are used in applications where the available energy supply is not synchronous with the demand, such as solar thermal and waste heat recovery systems. The theoretical study conducted here - based on heat transfer and energy conservation equations - is intended to developing a theoretical model of the heat storage properties of phase change slurries capable of predicting the transient thermal response of a thermal energy storage system (TES). Most of the research work was focused on investigating the enthalpy-temperature curves resulting from a heating-cooling cycle around the melting point of the PCM. The influence of other parameters such as mico-particles diameter was assessed.  相似文献   
46.
47.
48.
Interaction forces between a multi-walled carbon nanotube (MWCNT) and an air-bubble in pure deionized water and methyl isobutyl carbinol (MIBC) solutions were measured by atomic force microscopy (AFM). The MWCNT terminated probe was brought into contact with the bubble at controlled applied forces. The repulsive steps followed by attractive jumps recorded in the approach force curves correspond to changes in the MWCNT diameter along its length, an observation confirmed by transmission electron microscopy (TEM) data. By processing the retraction part of the force curves obtained in pure water it is possible to estimate the end diameter of the carbon nanotube with nanometer resolution using a capillary force model.  相似文献   
49.
50.
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and probability. This approach captures a strong notion of security, guaranteed against all probabilistic polynomial-time attacks. The other approach relies on a symbolic model of protocol executions in which cryptographic primitives are treated as black boxes. Since the seminal work of Dolev and Yao, it has been realized that this latter approach enables significantly simpler and often automated proofs. However, the guarantees that it offers with respect to the more detailed computational models have been quite unclear. For more than 20 years the two approaches have coexisted but evolved mostly independently. Recently, significant research efforts attempt to develop paradigms for cryptographic systems analysis that combines the best of both worlds. There are two broad directions that have been followed. Computational soundness aims to establish sufficient conditions under which results obtained using symbolic models imply security under computational models. The direct approach aims to apply the principles and the techniques developed in the context of symbolic models directly to computational ones. In this paper we survey existing results along both of these directions. Our goal is to provide a rather complete summary that could act as a quick reference for researchers who want to contribute to the field, want to make use of existing results, or just want to get a better picture of what results already exist.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号