首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6233篇
  免费   574篇
  国内免费   6篇
电工技术   137篇
综合类   13篇
化学工业   1552篇
金属工艺   175篇
机械仪表   171篇
建筑科学   260篇
矿业工程   24篇
能源动力   211篇
轻工业   931篇
水利工程   51篇
石油天然气   51篇
武器工业   1篇
无线电   487篇
一般工业技术   1455篇
冶金工业   137篇
原子能技术   33篇
自动化技术   1124篇
  2024年   29篇
  2023年   71篇
  2022年   92篇
  2021年   206篇
  2020年   207篇
  2019年   167篇
  2018年   324篇
  2017年   350篇
  2016年   404篇
  2015年   233篇
  2014年   321篇
  2013年   662篇
  2012年   404篇
  2011年   461篇
  2010年   346篇
  2009年   338篇
  2008年   305篇
  2007年   294篇
  2006年   195篇
  2005年   171篇
  2004年   145篇
  2003年   133篇
  2002年   158篇
  2001年   85篇
  2000年   64篇
  1999年   45篇
  1998年   57篇
  1997年   58篇
  1996年   52篇
  1995年   41篇
  1994年   27篇
  1993年   28篇
  1992年   21篇
  1991年   23篇
  1990年   12篇
  1989年   16篇
  1988年   14篇
  1986年   11篇
  1985年   35篇
  1984年   12篇
  1983年   16篇
  1982年   20篇
  1981年   16篇
  1980年   12篇
  1979年   15篇
  1978年   12篇
  1977年   11篇
  1975年   9篇
  1974年   10篇
  1972年   12篇
排序方式: 共有6813条查询结果,搜索用时 15 毫秒
151.
Privacy and security solutions require today the protection of personal information so that it may not be disclosed to unauthorized participant for illegal purposes. It is a challenge to address these issues in networks with strong constraints such as Ad Hoc network. The security increase is often obtained with a quality of service (QoS) decrease. We propose in this paper a solution that provides at the anonymity, security to Ad Hoc network with a limited impact on QoS. This method could be efficient against some viral attacks. We also give some security proofs of our solution for Ad Hoc networks. The work of Hervé Aiache and Cédric Tavernier was supported by DISCREET, IST project no. 027679, funded in part by the European Commission’s Information Society Technology 6th Framework Programme.  相似文献   
152.
The Plasmodium falciparum food vacuole (FV) is a lysosome-like organelle where erythrocyte hemoglobin digestion occurs. It is a favorite target in the development of antimalarials. We have used a tandem mass spectrometry approach to investigate the proteome of an FV-enriched fraction and identified 116 proteins. The electron microscopy analysis and the Western blot data showed that the major component of the fraction was the FV and, as expected, the majority of previously known FV markers were recovered. Of particular interest, several proteins involved in vesicle-mediated trafficking were identified, which are likely to play a key role in FV biogenesis and/or FV protein trafficking. Recovery of parasite surface proteins lends support to the cytostomal pathway of hemoglobin ingestion as a FV trafficking route. We have identified 32 proteins described as hypothetical in the databases. This insight into FV protein content provides new clues towards understanding the biological function of this organelle in P. falciparum.  相似文献   
153.
A compact electrostatic levitator was developed for the structural analysis of high-temperature liquids by x-ray diffraction methods. The size of the levitator was 200 mm in diameter and 200 mm in height and can be set up on a two axis diffractometer with a laboratory x-ray source, which is very convenient in performing structural measurements of high-temperature liquids. In particular, since the laboratory x-ray source allows a great amount of user time, preliminary or challenging experiments can be performed with trial and error, which prepares and complements synchrotron x-ray experiments. The present small apparatus also provides the advantage of portability and facility of setting. To demonstrate the capability of this electrostatic levitator, the static structure factors of alumina and silicon samples in their liquid phases were successfully measured.  相似文献   
154.
We have developed a setup for measuring holographically formed interference patterns using an integrated sample-mask design. The direct space image of the sample is obtained via a two-dimensional Fourier transform of the X-ray diffraction pattern. We present the details of our setup, commenting on the influence of geometrical parameters on the imaging capabilities. As an example, we present and discuss the results of test experiments on a patterned Co film.  相似文献   
155.
The purpose of this study was to describe the traumatology of teaching physical education (PE) and to document the causes and mechanisms of injuries in this occupation. Our sample was composed of 314 physical educators (PEs) teaching at three school levels (primary school, secondary school and college) who responded to a questionnaire survey. The results showed a 0.55 rate of recent lesion per teacher per year (0.65 for women and 0.51 for men). A total of 37.6% of subjects were affected by a lesion during the last year at work. Subjects with a higher weekly frequency of leisure physical activities or endurance activities (five times and more) were less affected by chronic lesions as well as those who frequently practiced aerobic physical activities. Prevalence of chronic injuries was higher in older teachers. Our results confirm that the rate of lesions in this group of workers is high, and that school level and respondent age may influence the rate of lesion and the characteristics of risk factors. In particular, the effect of ageing and teaching specialization on the incidence of occupational problems in PEs warrants further research. Given the relatively high rate of injuries among PE teachers, we suggest that it is necessary to further explore preventive strategies to reduce occupational risk in these workers. In particular, prophylactic physical activity outside of work may represent such a strategy since PEs more active outside their work have lower chronic injury prevalence. PEs gave long periods of standing the highest rating for movements or positions most likely to cause them occupational injuries. It can thus be suggested to find ways to reduce standing position sustained for long periods.  相似文献   
156.
Reasoning about software systems at the architectural level is key to effective software development, management, evolution and reuse. All too often, though, the lack of appropriate documentation leads to a situation where architectural design information has to be recovered directly from implemented software artifacts. This is a very demanding process, particularly when involving recovery of runtime abstractions (clients, servers, interaction protocols, etc.) that are typical to the design of distributed software systems. This paper presents an exploratory reverse engineering approach, called X-ray, to aid programmers in recovering architectural runtime information from a distributed system's existing software artifacts. X-ray comprises three domain-based static analysis techniques, namely component module classification, syntactic pattern matching, and structural reachability analysis. These complementary techniques can facilitate the task of identifying a distributed system's implemented executable components and their potential runtime interconnections. The component module classification technique automatically distinguishes source code modules according to the executables components they implement. The syntactic pattern matching technique in turn helps to recognise specific code fragments that may implement typical component interaction features. Finally, the structural reachability analysis technique aids in the association of those features to the code specific for each executable component. The paper describes and illustrates the main concepts underlying each technique, reports on their implementation as a suit of new and off-the-shelf tools, and, to give evidence of the utility of the approach, provides a detailed account of a successful application of the three techniques to help recover a static approximation of the runtime architecture for Field, a publicly-available distributed programming environment.  相似文献   
157.
The acidity constants, pK(a) values for protonation of some substituted thiazole derivatives were calculated by using AM1 and PM3 basis sets of semi-empirical methods and B3LYP/6-31G(d) basis sets of density functional theory (DFT) calculated physical and thermodynamic parameters. Correlation search among the experimental and calculated acidity constants, pK(a) values, revealed that the best correlation exist between the experimental and ab initio calculated pK(a) values with a regression of R(2)=0.98.  相似文献   
158.
In this paper, we present the ARIA media processing workflow architecture that processes, filters, and fuses sensory inputs and actuates responses in real-time. The components of the architecture are programmable and adaptable; i.e. the delay, size, and quality/precision characteristics of the individual operators can be controlled via a number of parameters. Each data object processed by qStream components is subject to transformations based on the parameter values. For instance, the quality of an output data object and the corresponding processing delay and resource usage depend on the values assigned to parameters of the operators in the object flow path. In Candan, Peng, Ryu, Chatha, Mayer (Efficient stream routing in quality- and resource-adaptive flow architectures. In: Workshop on multimedia information systems, 2004), we introduced a class of flow optimization problems that promote creation and delivery of small delay or small resource-usage objects to the actuators in single-sensor, single-actuator workflows. In this paper, we extend our attention to multi-sensor media processing workflow scenarios. The algorithms we present take into account the implicit dependencies between various system parameters, such as resource consumption and object sizes. We experimentally show the effectiveness and efficiency of the algorithms.
Kyung Dong RyuEmail:
  相似文献   
159.
This paper reports on an ergonomic study carried out during the design of a cutting machine-tool for the composite material in carbody parts casting. During this design process, the users’ needs were inferred by the designers on the basis of their own mental representations of the use of the new device. These representations of the users’ needs, correct or false, play a decisive role in the choice of a solution. The aim of the study is to identify their particularity. Analyzing the design meetings, we have highlighted that users are considered either as subsystems or basic design principles or elements of an imagined scenario. We have shown that these representations are linked to the types of meetings held during the design process. Accordingly, a diversification of the types of meetings should be promoted by the project leader, so that designers extend their points of view of the operators.  相似文献   
160.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号