首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2038篇
  免费   130篇
  国内免费   3篇
电工技术   22篇
化学工业   648篇
金属工艺   28篇
机械仪表   60篇
建筑科学   93篇
矿业工程   2篇
能源动力   89篇
轻工业   207篇
水利工程   10篇
石油天然气   13篇
无线电   157篇
一般工业技术   329篇
冶金工业   124篇
原子能技术   10篇
自动化技术   379篇
  2024年   3篇
  2023年   18篇
  2022年   81篇
  2021年   106篇
  2020年   53篇
  2019年   58篇
  2018年   64篇
  2017年   74篇
  2016年   83篇
  2015年   62篇
  2014年   87篇
  2013年   131篇
  2012年   102篇
  2011年   168篇
  2010年   93篇
  2009年   107篇
  2008年   117篇
  2007年   94篇
  2006年   79篇
  2005年   57篇
  2004年   65篇
  2003年   65篇
  2002年   51篇
  2001年   26篇
  2000年   31篇
  1999年   31篇
  1998年   44篇
  1997年   23篇
  1996年   27篇
  1995年   19篇
  1994年   10篇
  1993年   17篇
  1992年   10篇
  1991年   8篇
  1990年   9篇
  1989年   11篇
  1988年   3篇
  1987年   4篇
  1986年   7篇
  1985年   11篇
  1984年   8篇
  1983年   8篇
  1982年   6篇
  1981年   7篇
  1980年   6篇
  1979年   5篇
  1977年   3篇
  1976年   5篇
  1972年   2篇
  1965年   4篇
排序方式: 共有2171条查询结果,搜索用时 15 毫秒
41.
The development of multilayer soft lithography methodology has seen polydimethysiloxane (PDMS) as the preferred material for the fabrication of microfluidic devices. However, the functionality of these PDMS microfluidic chips is often limited by the poor chemical resistance of PDMS to certain solvents. Here, we propose the use of a photocurable perfluoropolyether (PFPE), specifically FOMBLIN® MD40 PFPE, as a candidate material to provide a solvent-resistant buffer layer to make the device substantially impervious to chemically induced swelling. We first carried out a systematic study of the solvent resistance properties of FOMBLIN® MD40 PFPE as compared with PDMS. The comparison presented here demonstrates the superiority of FOMBLIN® MD40 PFPE over PDMS in this regard; moreover, the results permitted to categorize solvents in four different groups depending on their swelling ratio. We then present a step-by-step recipe for a novel fabrication process that uses multilayer lithography to construct a comprehensive solvent-resistant device with fluid and control channels integrated with a valve structure and also permitting easy establishment of outside connections.  相似文献   
42.
In this article, the design, fabrication, and on‐wafer test of X‐Band and 2–18 GHz wideband high‐power SPDT MMIC switches in AlGaN/GaN technology are presented. The switches have demonstrated state‐of‐the‐art performance and RF fabrication yield better than 65%. Linear and power measurements for different control voltages have been reported and an explanation of the dependence of the power performances on the control voltage is given. In particular, the X‐band switch exhibits a 0.4 dB compression level at 10 GHz when driven by a 38 dBm input signal. The wideband switch shows a compression level of 1 dB at an input drive higher than 38 dBm across the entire bandwidth. © 2009 Wiley Periodicals, Inc. Int J RF and Microwave CAE, 2009.  相似文献   
43.
Mobile network providers have developed a variety of location-based services (LBSs), such as friend-finder, point of interest services, emergency rescue and many other safety and security services. The protection of location-privacy has consequently become a key aspect to the success of LBSs, since users consider their own physical location and movements highly privacy-sensitive, and demand for solutions able to protect such an information in a variety of environments. The idea behind location-privacy protection is that the individual should be able to set the level at which the location information is released to avoid undesired exploitation by a potential attacker: one of the approaches to this problem is given by the application of spatial obfuscation techniques, actuated by a trusted agent, and consisting in artificial perturbations of the location information collected by sensing technologies, before its disclosure to third parties. In many situations, however, landscape/map information can help a third party to perform Bayesian inference over spatially obfuscated data and to refine the user’s location estimate up to a violation of the original user’s location-privacy requirements. The goal of this paper is to provide a map-dependent obfuscation procedure that enables the release of the maximum possible user’s location information, that does not lead to a violation of the original user’s location-privacy requirements, even when refined through map-based inference.  相似文献   
44.
Controlling aberrant protein kinase activity is a promising strategy for a variety of diseases, particularly cancer. Hence, the development of kinase inhibitors is currently a focal point for pharmaceutical research. In this study we utilize a chip-based reverse phase protein array (RPA) platform for profiling of kinase inhibitors in cell-based assays. In combination with the planar wave-guide technology the assay system has an absolute LOD down to the low zeptomole range. A431 cell lysates were analyzed for the activation state of key effectors in the epidermal growth factor (EGF) and insulin signaling pathways to validate this model for compound screening. A microtiter-plate format for growing, treating, and lysing cells was shown to be suitable for this approach, establishing the value of the technology as a screening tool for characterization of large numbers of kinase inhibitors against a wide variety of cellular signaling pathways. Moreover, the reverse array format allows rapid development of site-specific phosphorylation assays, since in contrast to ELISA type systems only a single antigen-specific antibody is required.  相似文献   
45.
Inherent in project management is the risk that a project fails to meet planned completion deadlines due to delays experienced in individual tasks. As such, certain critical tasks may be candidates for risk management (e.g., the allocation of additional resources such as labor, materials, and equipment) to prevent delays. A common means to identify such critical tasks is with the critical path method (CPM), which identifies a path of tasks in a project network that, when delayed, result in project delays. This work offers a complementary, stochastic approach to CPM that ranks tasks according to their effect on the project completion time distribution, when the distributions of task completion time are delayed. The new hybrid approach is based on the use of a Monte Carlo simulation and a multi-criteria decision analysis technique. Monte Carlo simulation allows for approximating the cumulative distribution function of the total duration of the project, while the multi-criteria decision analysis technique is used to compare and rank the tasks across percentiles of the resulting project completion time distributions. Doing so allows for different percentile weighting schemes to represent decision maker risk preferences. The suggested approach is applied to two project network examples. The examples illustrate that the proposed approach highlights some tasks as risky, which may not always lie on the critical path as identified by CPM. This is valuable for practicing managers as it allows them to properly consider their risk preferences when determining task criticality based on the distribution of project completion time (e.g., emphasizing median vs. upper tail completion time).  相似文献   
46.
The current frontiers in the investigation of high-energy particles demand for new detection methods. Higher sensitivity to low-energy deposition, high-energy resolution to identify events and improve the background rejection, and large detector masses have to be developed to detect even an individual particle that weakly interacts with ordinary matter. Here, we will describe the concept and the layout of a novel superconducting proximity array which show dynamic vortex Mott insulator to metal transitions, as an ultra-sensitive compact radiation-particle detector.  相似文献   
47.
Textile Reinforced Mortar (TRM), also known as Fabric Reinforced Mortar or Fabric Reinforced Cementitious Matrix, composites are an emerging technology for the external repair and strengthening of existing structures. For most applications, the effectiveness of the TRM reinforcement relies on its bond performance. This recommendation identifies the best practice to characterize the bond behaviour of TRM. A shear bond test method is proposed to determine the peak axial stress (associated with the maximum load that can be transferred from the structural member to the externally bonded TRM reinforcement), the stress–slip relationship and the failure mode that controls the TRM-to-substrate load transfer capacity. Guidelines on specimen manufacturing, experimental setup, test execution, and determination of test results are provided.  相似文献   
48.
We present a categorical logic formulation of induction and coinduction principles for reasoning about inductively and coinductively defined types. Our main results provide sufficient criteria for the validity of such principles: in the presence of comprehension, the induction principle for initial algebras is admissible, and dually, in the presence of quotient types, the coinduction principle for terminal coalgebras is admissible. After giving an alternative formulation of induction in terms of binary relations, we combine both principles and obtain a mixed induction/coinduction principle which allows us to reason about minimal solutionsXσ(X) whereXmay occur both positively and negatively in the type constructor σ. We further strengthen these logical principles to deal with contexts and prove that such strengthening is valid when the (abstract) logic we consider is contextually/functionally complete. All the main results follow from a basic result about adjunctions between “categories of algebras” (inserters).  相似文献   
49.
Human activity recognition is a challenging problem for context-aware systems and applications. Research in this field has mainly adopted techniques based on supervised learning algorithms, but these systems suffer from scalability issues with respect to the number of considered activities and contextual data. In this paper, we propose a solution based on the use of ontologies and ontological reasoning combined with statistical inferencing. Structured symbolic knowledge about the environment surrounding the user allows the recognition system to infer which activities among the candidates identified by statistical methods are more likely to be the actual activity that the user is performing. Ontological reasoning is also integrated with statistical methods to recognize complex activities that cannot be derived by statistical methods alone. The effectiveness of the proposed technique is supported by experiments with a complete implementation of the system using commercially available sensors and an Android-based handheld device as the host for the main activity recognition module.  相似文献   
50.
A major feature of the emerging geo-social networks is the ability to notify a user when any of his friends (also called buddies) happens to be geographically in proximity. This proximity service is usually offered by the network itself or by a third party service provider (SP) using location data acquired from the users. This paper provides a rigorous theoretical and experimental analysis of the existing solutions for the location privacy problem in proximity services. This is a serious problem for users who do not trust the SP to handle their location data and would only like to release their location information in a generalized form to participating buddies. The paper presents two new protocols providing complete privacy with respect to the SP and controllable privacy with respect to the buddies. The analytical and experimental analysis of the protocols takes into account privacy, service precision, and computation and communication costs, showing the superiority of the new protocols compared to those appeared in the literature to date. The proposed protocols have also been tested in a full system implementation of the proximity service.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号