全文获取类型
收费全文 | 4741篇 |
免费 | 270篇 |
国内免费 | 11篇 |
专业分类
电工技术 | 32篇 |
综合类 | 5篇 |
化学工业 | 1009篇 |
金属工艺 | 96篇 |
机械仪表 | 99篇 |
建筑科学 | 237篇 |
矿业工程 | 8篇 |
能源动力 | 150篇 |
轻工业 | 456篇 |
水利工程 | 47篇 |
石油天然气 | 18篇 |
武器工业 | 2篇 |
无线电 | 414篇 |
一般工业技术 | 879篇 |
冶金工业 | 808篇 |
原子能技术 | 28篇 |
自动化技术 | 734篇 |
出版年
2024年 | 6篇 |
2023年 | 42篇 |
2022年 | 82篇 |
2021年 | 135篇 |
2020年 | 94篇 |
2019年 | 110篇 |
2018年 | 141篇 |
2017年 | 126篇 |
2016年 | 157篇 |
2015年 | 118篇 |
2014年 | 158篇 |
2013年 | 273篇 |
2012年 | 274篇 |
2011年 | 338篇 |
2010年 | 239篇 |
2009年 | 263篇 |
2008年 | 297篇 |
2007年 | 282篇 |
2006年 | 228篇 |
2005年 | 238篇 |
2004年 | 170篇 |
2003年 | 147篇 |
2002年 | 151篇 |
2001年 | 75篇 |
2000年 | 64篇 |
1999年 | 57篇 |
1998年 | 58篇 |
1997年 | 57篇 |
1996年 | 66篇 |
1995年 | 48篇 |
1994年 | 47篇 |
1993年 | 50篇 |
1992年 | 37篇 |
1991年 | 26篇 |
1990年 | 38篇 |
1989年 | 38篇 |
1988年 | 31篇 |
1987年 | 41篇 |
1986年 | 38篇 |
1985年 | 32篇 |
1984年 | 25篇 |
1983年 | 27篇 |
1982年 | 25篇 |
1981年 | 13篇 |
1980年 | 12篇 |
1979年 | 9篇 |
1978年 | 13篇 |
1976年 | 6篇 |
1975年 | 6篇 |
1974年 | 4篇 |
排序方式: 共有5022条查询结果,搜索用时 15 毫秒
31.
Kevin Munoz Samiksha Wasnik Amir Abdipour Hongzheng Bi Sean M. Wilson Xiaolei Tang Mahdis Ghahramanpouri David J. Baylink 《International journal of molecular sciences》2021,22(10)
Acute lung injury (ALI) afflicts approximately 200,000 patients annually and has a 40% mortality rate. The COVID-19 pandemic has massively increased the rate of ALI incidence. The pathogenesis of ALI involves tissue damage from invading microbes and, in severe cases, the overexpression of inflammatory cytokines such as tumor necrosis factor-α (TNF-α) and interleukin-1β (IL-1β). This study aimed to develop a therapy to normalize the excess production of inflammatory cytokines and promote tissue repair in the lipopolysaccharide (LPS)-induced ALI. Based on our previous studies, we tested the insulin-like growth factor I (IGF-I) and BTP-2 therapies. IGF-I was selected, because we and others have shown that elevated inflammatory cytokines suppress the expression of growth hormone receptors in the liver, leading to a decrease in the circulating IGF-I. IGF-I is a growth factor that increases vascular protection, enhances tissue repair, and decreases pro-inflammatory cytokines. It is also required to produce anti-inflammatory 1,25-dihydroxyvitamin D. BTP-2, an inhibitor of cytosolic calcium, was used to suppress the LPS-induced increase in cytosolic calcium, which otherwise leads to an increase in proinflammatory cytokines. We showed that LPS increased the expression of the primary inflammatory mediators such as toll like receptor-4 (TLR-4), IL-1β, interleukin-17 (IL-17), TNF-α, and interferon-γ (IFN-γ), which were normalized by the IGF-I + BTP-2 dual therapy in the lungs, along with improved vascular gene expression markers. The histologic lung injury score was markedly elevated by LPS and reduced to normal by the combination therapy. In conclusion, the LPS-induced increases in inflammatory cytokines, vascular injuries, and lung injuries were all improved by IGF-I + BTP-2 combination therapy. 相似文献
32.
The Lovász ?-function (Lovász in IEEE Trans. Inf. Theory, 25:1–7, 1979) of a graph G=(V,E) can be defined as the maximum of the sum of the entries of a positive semidefinite matrix X, whose trace Tr(X) equals 1, and X ij =0 whenever {i,j}∈E. This function appears as a subroutine for many algorithms for graph problems such as maximum independent set and maximum clique. We apply Arora and Kale’s primal-dual method for SDP to design an algorithm to approximate the ?-function within an additive error of δ>0, which runs in time $O(\frac{\vartheta ^{2} n^{2}}{\delta^{2}} \log n \cdot M_{e})$ , where ?=?(G) and M e =O(n 3) is the time for a matrix exponentiation operation. It follows that for perfect graphs G, our primal-dual method computes ?(G) exactly in time O(? 2 n 5logn). Moreover, our techniques generalize to the weighted Lovász ?-function, and both the maximum independent set weight and the maximum clique weight for vertex weighted perfect graphs can be approximated within a factor of (1+?) in time O(? ?2 n 5logn). 相似文献
33.
Robert A. Moreau David B. Johnston Kevin B. Hicks 《Journal of the American Oil Chemists' Society》2007,84(11):1039-1044
All commercial corn oil is obtained by pressing corn germ and/or extracting the germ with hexane. In the current study, six
types of corn oil were prepared by extracting corn germ, corn fiber and ground corn, each with hexane or with ethanol. The
levels of lutein, zeaxanthin and other carotenoids were quantitatively analyzed in the six corn oils. The levels of lutein + zeaxanthin
in the oil ranged from 2.3 μg/g for hexane-extracted corn germ oil to 220.9 μg/g for ethanol-extracted ground corn oil. These
results indicate that a diet that includes 30 g (~2 tbsp) per day of the unrefined corn oil obtained by extracting ground
corn with ethanol would provide ~6 mg of lutein + zeaxanthin, the daily dosage that is currently considered to be necessary
to slow the progression of age-related macular degeneration.
Mention of trade names or commercial products in this publication is solely for the purpose of providing specific information
and does not imply recommendation or endorsement by the U.S. Department of Agriculture. 相似文献
34.
Lianhang Ma Hao Huang Qinming He Kevin Chiew Zhenguang Liu 《Journal of Intelligent Information Systems》2014,43(1):183-203
Local community detection aims at finding a community structure starting from a seed which is a given vertex in a network without global information, such as online social networks that are too large and dynamic to ever be known fully. Nonetheless, the existing approaches to local community detection are usually sensitive to seeds, i.e., some seeds may lead to missing of some true communities. In this paper, we present a seed-insensitive method called GMAC and its variation iGMAC for local community detection. They estimate the similarity among vertices by investigating vertices’ neighborhoods, and reveal a local community by maximizing its internal similarity and minimizing its external similarity simultaneously. Extensive experimental results on both synthetic and real-world data sets verify the effectiveness of our algorithms. 相似文献
35.
We present several novel techniques to summarize the high-level behavior in surveillance video. Our proposed methods can employ either optical flow or trajectories as input, and incorporate spatial and temporal information together, which improve upon existing approaches for summarization. To begin, we extract common pathway regions by performing graph-based clustering on similarity matrices describing the relationships between location/orientation states. We then employ the activities along the pathway regions to extract the aggregate behavioral patterns throughout scenes. We show how our summarization methods can be applied to detect anomalies, retrieve video clips of interest, and generate adaptive-speed summary videos. We examine our approaches on multiple complex urban scenes and present experimental results. 相似文献
36.
Christopher B. DiAntonio Kevin G. Ewsuk Denise Bencoe 《Journal of the American Ceramic Society》2005,88(10):2722-2728
The ability to predict and control organic decomposition of a material under arbitrary thermal treatments is one of the main objectives of thermogravimetric studies. The development of this ability provides significant potential to ensure reliability and reproducibility for a given processing method and can be used in planning optimized thermal treatment strategies. Based on this report, the master sintering curve theory has been successfully extended to similar kinetically controlled phenomena. The theory has been applied to organic decomposition reaction kinetics to develop a master organic decomposition curve. The fundamental kinetics are assumed to be governed by an Arrhenius-type reaction rate, making master sintering and decomposition curves analogous to one another. The formulation and construction of a master decomposition curve are given in this paper. Simultaneous thermogravimetric and differential thermal analysis of a low-temperature co-fire glass/ceramic dielectric tape (Dupont 951 Green TapeTM ) is analyzed and used to demonstrate this new concept. The results reveal two independent organic decomposition reactions, the first occurring at ≈245°C and the second at ≈365°C. The analysis is used to produce a master decomposition curve and to calculate the activation energy for these reactions, at 86±6 and 142±4 kJ/mol, respectively. In addition, the weight loss of product and the rate of decomposition can be predicted under varying thermal paths (time–temperature trajectories) following a minimal set of preliminary experiments. 相似文献
37.
Sykes EC Han P Kandel SA Kelly KF McCarty GS Weiss PS 《Accounts of chemical research》2003,36(12):945-953
Adsorbate interactions and reactions on metal surfaces have been investigated using scanning tunneling microscopy. The manners in which adsorbates perturb the surface electronic structure in their vicinity are discussed. The effects these perturbations have on other molecules are shown to be important in overlayer growth. Interactions of molecules with surface steps are addressed, and each molecule's electron affinity is shown to dictate its adsorption sites at step edges. Standing waves emanating from steps are demonstrated to effect transient molecular adsorption up to 40 A away from the step edge. Halobenzene derivatives are used to demonstrate how the surface is important in aligning reactive intermediates. 相似文献
38.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent. 相似文献
39.
The ACM Code of Ethics asserts that computing professionals have an ethical responsibility to minimize the negative consequences of information and communication technologies (ICT). Negative consequences are rarely intended, but they can often be foreseen with careful sociotechnical analysis in advance of system building. Motivated by an interest in extremely complex sociotechnical contexts (e.g., mortgage lending and automated trading) where ICT appears to be having negative consequences in addition to many benefits, this paper identifies and evaluates future-oriented problem analysis and solution design tools in three potentially relevant literatures: 1) ICT ethics, 2) environmental sustainability, and 3) technology hazards. Several promising future-oriented technology analysis techniques (e.g., anticipatory technology ethics, technology roadmapping, morphological analysis, and control structure analysis) were found and are discussed in this paper, but much work remains to be done to customize them, integrate them, and codify them for use in education and high-quality IS research on very complex sociotechnical contexts like the global financial network. 相似文献
40.
Adam Bates Benjamin Mood Joe Pletcher Hannah Pruse Masoud Valafar Kevin Butler 《International Journal of Information Security》2014,13(2):171-189
Virtualization is the cornerstone of the developing third-party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. Customers utilize cloud resources alongside unknown and untrusted parties, creating the co-resident threat—unless perfect isolation is provided by the virtual hypervisor, there exists the possibility for unauthorized access to sensitive customer information through the exploitation of covert side channels. This paper presents co-resident watermarking, a traffic analysis attack that allows a malicious co-resident VM to inject a watermark signature into the network flow of a target instance. This watermark can be used to exfiltrate and broadcast co-residency data from the physical machine, compromising isolation without reliance on internal side channels. As a result, our approach is difficult to defend against without costly underutilization of the physical machine. We evaluate co-resident watermarkingunder a large variety of conditions, system loads and hardware configurations, from a local laboratory environment to production cloud environments (Futuregrid and the University of Oregon’s ACISS). We demonstrate the ability to initiate a covert channel of 4 bits per second, and we can confirm co-residency with a target VM instance in $<$ 10 s. We also show that passive load measurement of the target and subsequent behavior profiling is possible with this attack. We go on to consider the detectability of co-resident watermarking, extending our scheme to create a subtler watermarking attack by imitating legitimate cloud customer behavior. Our investigation demonstrates the need for the careful design of hardware to be used in the cloud. 相似文献