首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3204篇
  免费   283篇
  国内免费   3篇
电工技术   16篇
综合类   2篇
化学工业   1156篇
金属工艺   26篇
机械仪表   84篇
建筑科学   111篇
矿业工程   2篇
能源动力   88篇
轻工业   1013篇
水利工程   14篇
石油天然气   15篇
无线电   105篇
一般工业技术   398篇
冶金工业   107篇
原子能技术   4篇
自动化技术   349篇
  2024年   10篇
  2023年   36篇
  2022年   171篇
  2021年   254篇
  2020年   122篇
  2019年   125篇
  2018年   136篇
  2017年   147篇
  2016年   134篇
  2015年   109篇
  2014年   179篇
  2013年   271篇
  2012年   255篇
  2011年   251篇
  2010年   157篇
  2009年   172篇
  2008年   164篇
  2007年   165篇
  2006年   97篇
  2005年   96篇
  2004年   73篇
  2003年   59篇
  2002年   46篇
  2001年   32篇
  2000年   29篇
  1999年   20篇
  1998年   40篇
  1997年   31篇
  1996年   24篇
  1995年   17篇
  1994年   7篇
  1993年   7篇
  1992年   3篇
  1991年   10篇
  1990年   2篇
  1989年   5篇
  1988年   3篇
  1987年   3篇
  1985年   3篇
  1984年   5篇
  1983年   5篇
  1982年   3篇
  1981年   2篇
  1979年   1篇
  1978年   1篇
  1977年   1篇
  1976年   4篇
  1975年   1篇
  1972年   1篇
  1969年   1篇
排序方式: 共有3490条查询结果,搜索用时 218 毫秒
71.
In the study of data exchange one usually assumes an open-world semantics, making it possible to extend instances of target schemas. An alternative closed-world semantics only moves ‘as much data as needed’ from the source to the target to satisfy constraints of a schema mapping. It avoids some of the problems exhibited by the open-world semantics, but limits the expressivity of schema mappings. Here we propose a mixed approach: one can designate different attributes of target schemas as open or closed, to combine the additional expressivity of the open-world semantics with the better behavior of query answering in closed worlds. We define such schema mappings, and show that they cover a large space of data exchange solutions with two extremes being the known open and closed-world semantics. We investigate the problems of query answering and schema mapping composition, and prove two trichotomy theorems, classifying their complexity based on the number of open attributes. We find conditions under which schema mappings compose, extending known results to a wide range of closed-world mappings. We also provide results for restricted classes of queries and mappings guaranteeing lower complexity.  相似文献   
72.
If a wireless sensor network (WSN) is to be completely integrated into the Internet as part of the Internet of Things (IoT), it is necessary to consider various security challenges, such as the creation of a secure channel between an Internet host and a sensor node. In order to create such a channel, it is necessary to provide key management mechanisms that allow two remote devices to negotiate certain security credentials (e.g. secret keys) that will be used to protect the information flow. In this paper we will analyse not only the applicability of existing mechanisms such as public key cryptography and pre-shared keys for sensor nodes in the IoT context, but also the applicability of those link-layer oriented key management systems (KMS) whose original purpose is to provide shared keys for sensor nodes belonging to the same WSN.  相似文献   
73.
74.
An important aspect in the specification of conceptual schemas is the definition of general constraints that cannot be expressed by the predefined constructs provided by conceptual modeling languages. This is generally achieved by using general-purpose languages like OCL. In this paper we propose a new approach that facilitates the definition of such general constraints in UML. More precisely, we define a profile that extends the set of predefined UML constraints by adding certain types of constraints that are commonly used in conceptual schemas. We also show how our proposal facilitates reasoning about the constraints and their automatic code generation, study the application of our ideas to the specification of two real-life applications, and present a prototype tool implementation.
Ernest TenienteEmail:
  相似文献   
75.
This paper describes the development of a simple system for measurement of net water movement through biological membrane barriers. The system is based on the detection of a water meniscus inside a polyethylene tube, which reflects the water movement inside one hemichamber of a modified Ussing chamber containing a membrane barrier. The detection device consists of a commercial computer-controlled flat bed scanner and specifically developed software. This system allows one to perform a relatively high number of individual experiments per physical unit. It is a flexible and affordable device, which allows comparatively more information per unit to be obtained than previously described methods.  相似文献   
76.
This paper presents a new proposal for positioning and guiding mobile robots in indoor environments. The proposal is based on the information provided by static cameras located in the movement environment. This proposal falls within the scope of what are known as intelligent environments; in this case, the environment is provided with cameras that, once calibrated, allow the position of the robots to be obtained. Based on this information, control orders for the robots can be generated using a radio frequency link. In order to facilitate identification of the robots, even under extremely adverse ambient lighting conditions, a beacon consisting of four circular elements constructed from infrared diodes is mounted on board the robots. In order to identify the beacon, an edge detection process is carried out. This is followed by a process that, based on the algebraic distance, obtains the estimated ellipses associated with each element of the beacon. Once the beacon has been identified, the coordinates of the centroids for the elements that make up the beacon are obtained on the various image planes. Based on these coordinates, an algorithm is proposed that takes into account the standard deviation of the error produced in the various cameras in ascertaining the coordinates of the beacon’s elements. An odometric system is also used in guidance that, in conjunction with a Kalman Filter, allows the position of the robot to be estimated during the time intervals required to process the visual information provided by the cameras.
Cristina LosadaEmail:
  相似文献   
77.
We study the problem of decomposing the vertex set VV of a graph into two nonempty parts V1,V2V1,V2 which induce subgraphs where each vertex v∈V1vV1 has degree at least a(v)a(v) inside V1V1 and each v∈V2vV2 has degree at least b(v)b(v) inside V2V2. We give a polynomial-time algorithm for graphs with bounded treewidth which decides if a graph admits a decomposition, and gives such a decomposition if it exists. This result and its variants are then applied to designing polynomial-time approximation schemes for planar graphs where a decomposition does not necessarily exist but the local degree conditions should be met for as many vertices as possible.  相似文献   
78.
79.
Ticks are ectoparasites of great medical and veterinary importance around the world and synthetic chemicals such as permethrin have been used for their control. This study provides a cytochemistry analysis of both degenerative and cell death processes in salivary glands of the brown dog tick Rhipicephalus sanguineus semi-engorged females exposed to 206, 1,031, and 2,062 ppm of permethrin. The results presented herein demonstrate that permethrin is a potent chemical acaricide that would act on the glandular tissue's morphophysiology in this tick species by eliciting severe changes in the acinus shape, intense vacuolation of the acinar cells' cytoplasm, marked glandular tissue disorganization, culminating in an advanced degenerative stage with consequent formation of many apoptotic bodies (cell death). In addition, permethrin induced major changes in the acinar cells' nucleus, such as a change both in its shape and size, chromatin marginalization, nuclear fragmentation, and appearance of picnotic nuclei, especially when the highest concentrations of the product were used. Thus, permethrin induced early degeneration of this tissue characterized by significant changes in the structure of acinar cells and production of enzymes related to the cell death process, in addition to interfering directly in the genetic material of these cells.  相似文献   
80.
The aim of this study was to evaluate the presence of porosities inside the glass ionomer cement (GIC) after different techniques of material insertion. MATERIAL AND METHOD: Specimens were prepared with high‐viscosity GIC Ketac Molar Easymix and divided into three groups according to the insertion method: spatula (PI), Centrix injector (CI), and low‐cost syringe (LCS). The specimens were fractured and observed with scanning electronic microscopy to quantitatively evaluate porosity inside the material using Image J Software. RESULTS: Statistical analysis, ANOVA application, and Tukey test to significance level of 5%, revealed that there was no statistical difference between the groups. CONCLUSION: Although the use of LCS has not decreased the porosity of the material, this insertion method is easy, accessible, and low cost, which makes it a viable alternative of use in the ART technique and in others bucal health programs. Microsc. Res. Tech., 2012. © 2012 Wiley Periodicals, Inc.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号