首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   419篇
  免费   22篇
  国内免费   1篇
电工技术   5篇
化学工业   132篇
机械仪表   1篇
建筑科学   31篇
矿业工程   1篇
能源动力   27篇
轻工业   24篇
水利工程   4篇
无线电   35篇
一般工业技术   52篇
冶金工业   7篇
原子能技术   1篇
自动化技术   122篇
  2024年   1篇
  2023年   4篇
  2022年   17篇
  2021年   23篇
  2020年   14篇
  2019年   17篇
  2018年   10篇
  2017年   9篇
  2016年   21篇
  2015年   15篇
  2014年   11篇
  2013年   45篇
  2012年   27篇
  2011年   36篇
  2010年   27篇
  2009年   17篇
  2008年   20篇
  2007年   16篇
  2006年   16篇
  2005年   14篇
  2004年   11篇
  2003年   11篇
  2002年   3篇
  2001年   11篇
  2000年   6篇
  1999年   6篇
  1998年   2篇
  1997年   4篇
  1996年   2篇
  1995年   1篇
  1994年   3篇
  1993年   1篇
  1992年   2篇
  1991年   4篇
  1990年   1篇
  1989年   4篇
  1987年   3篇
  1985年   1篇
  1984年   4篇
  1977年   1篇
  1975年   1篇
排序方式: 共有442条查询结果,搜索用时 15 毫秒
31.
Genome mining is a routine technique in microbes for discovering biosynthetic pathways. In plants, however, genomic information is not commonly used to identify novel biosynthesis genes. Here, we present the genome of the medicinal plant and oxindole monoterpene indole alkaloid (MIA) producer Gelsemium sempervirens (Gelsemiaceae). A gene cluster from Catharanthus roseus, which is utilized at least six enzymatic steps downstream from the last common intermediate shared between the two plant alkaloid types, is found in G. sempervirens, although the corresponding enzymes act on entirely different substrates. This study provides insights into the common genomic context of MIA pathways and is an important milestone in the further elucidation of the Gelsemium oxindole alkaloid pathway.  相似文献   
32.
SU-8 is a photosensitive resist widely used for the fabrication of MEMS and lab-on-a-chip devices, as well as of model structures for testing wetting theories. In this work, superhydrophobic surfaces are fabricated on SU-8 by combining micro- and nano-sized structures formed by means of lithography and plasma etching, respectively. It is found that nanotexturing of the micropatterned SU-8 surfaces is essential in enhancing surface hydrophobicity and rendering the surfaces water repellent (i.e. minimizing contact angle hysteresis). The proposed method will be shown to be of paramount importance for the fabrication of mechanically stable and robust superhydrophobic SU-8 surfaces with low aspect ratio microstructuring.  相似文献   
33.
Results of application of pseudospectral methods, also known as spectral collocation methods, to practical particulate processes including growth, nucleation, aggregation, and breakage are presented. For growth‐dominated processes, a considerable reduction in model dimension can be achieved; for pure aggregation and breakage they form a viable option. To handle problems that include aggregation, breakage, and growth phenomena simultaneously, we introduce a hybrid algorithm combining the advantages of spectral methods and cell average or fixed pivot methods for aggregation and breakage. Results are shown for analytical examples as well as real processes taken from the fields of granulation and crystallization. © 2011 American Institute of Chemical Engineers AIChE J, 58: 2309–2319, 2012  相似文献   
34.
35.
36.
Over the past few years, a large and ever increasing number of Web sites have incorporated one or more social login platforms and have encouraged users to log in with their Facebook, Twitter, Google, or other social networking identities. Research results suggest that more than two million Web sites have already adopted Facebook’s social login platform, and the number is increasing sharply. Although one might theoretically refrain from such social login features and cross-site interactions, usage statistics show that more than 250 million people might not fully realize the privacy implications of opting-in. To make matters worse, certain Web sites do not offer even the minimum of their functionality unless users meet their demands for information and social interaction. At the same time, in a large number of cases, it is unclear why these sites require all that personal information for their purposes. In this paper, we mitigate this problem by designing and developing a framework for minimum information disclosure in social login interactions with third-party sites. Our example case is Facebook, which combines a very popular single sign-on platform with information-rich social networking profiles. Whenever users want to browse to a Web site that requires authentication or social interaction using a Facebook identity, our system employs, by default, a Facebook session that reveals the minimum amount of information necessary. Users have the option to explicitly elevate that Facebook session in a manner that reveals more or all of the information tied to their social identity. This enables users to disclose the minimum possible amount of personal information during their browsing experience on third-party Web sites.  相似文献   
37.
38.
We present a real-time relighting and shadowing method for dynamic scenes with varying lighting, view and BRDFs. Our approach is based on a compact representation of reflectance data that allows for changing the BRDF at run-time and a data-driven method for accurately synthesizing self-shadows on articulated and deformable geometries. Unlike previous self-shadowing approaches, we do not rely on local blocking heuristics. We do not fit a model to the BRDF-weighted visibility, but rather only to the visibility that changes during animation. In this manner, our model is more compact than previous techniques and requires less computation both during fitting and at run-time. Our reflectance product operators can re-integrate arbitrary low-frequency view-dependent BRDF effects on-the-fly and are compatible with all previous dynamic visibility generation techniques as well as our own data-driven visibility model. We apply our reflectance product operators to three different visibility generation models, and our data-driven model can achieve framerates well over 300Hz.  相似文献   
39.
Several studies explore information security awareness focusing on individual and/or organisational aspects. This paper argues that security awareness processes are associated with interrelated changes that occur at the organisational, the technological and the individual level. We introduce an integrated analytical framework that has been developed through action research in a public sector organisation, comprising actor-network theory (ANT), structuration theory and contextualism. We develop and use this framework to analyse and manage changes introduced by the implementation of a security awareness programme in the research setting. The paper illustrates the limitations of each theory (ANT, structuration theory and contextualism) to study multi-level changes when used individually, demonstrates the synergies of the three theories, and proposes how they can be used to study and manage awareness-related changes at the individual, organisational and technological level.  相似文献   
40.
Consider a situation where people have to choose among a sequence of n linearly ordered positions to perform some task requiring a certain amount of privacy. Which position should one choose so as to maximize one’s privacy, i.e., minimize the chances that one of your neighboring positions becomes occupied by a later arrival? In this paper, we attempt to answer this question under a variety of models for the behavior of the later arrivals. Our results suggest that for the most part one should probably choose one of the extreme positions (with some interesting exceptions). We also suggest a number of variations on the problem that lead to many open problems.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号