首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   226篇
  免费   16篇
  国内免费   1篇
化学工业   53篇
金属工艺   2篇
机械仪表   6篇
建筑科学   10篇
能源动力   16篇
轻工业   32篇
水利工程   6篇
石油天然气   1篇
无线电   26篇
一般工业技术   35篇
冶金工业   16篇
原子能技术   8篇
自动化技术   32篇
  2024年   1篇
  2023年   6篇
  2022年   18篇
  2021年   16篇
  2020年   14篇
  2019年   10篇
  2018年   16篇
  2017年   12篇
  2016年   17篇
  2015年   4篇
  2014年   8篇
  2013年   30篇
  2012年   12篇
  2011年   14篇
  2010年   6篇
  2009年   5篇
  2008年   8篇
  2007年   2篇
  2006年   3篇
  2005年   4篇
  2004年   7篇
  2003年   5篇
  2002年   4篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1997年   3篇
  1996年   1篇
  1995年   2篇
  1994年   1篇
  1991年   3篇
  1990年   1篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1979年   2篇
排序方式: 共有243条查询结果,搜索用时 15 毫秒
51.
Atmospheric turbidity parameters have been determined following Angstrom's method at three locations in Bangladesh namely, Dhaka city (23.7°N) and two rural locations, Haripur (26.03°N) and Sripur (24.11°N). The parameters were obtained from direct solar radiation data for specific spectral regions and for the whole spectrum as measured using a normal incidence pyrheliometer provided with cut-off glass filters. A considerable variation of Angstrom's turbidity parameters for Dhaka over the year was observed with a maximum value in March. The value for Sripur for the month of March was somewhat lower and the value for Haripur for the month of April was not much different from that of Dhaka. Linke turbidity factor TL was also determined using the new value of solar constant 1367 W/m2 for all three locations.  相似文献   
52.
53.
We investigate in this work the chemical composition by GC–EIMS, the antibacterial and the cytotoxic activities of Tunisian Nigella sativa essential oil and its bioactive compound, thymoquinone, were tested against various clinical cariogenic bacteria (n = 30). Eighty-four compounds were identified in the essential oil. The major one was p-cymene (49.48%) whereas thymoquinone represented only 0.79%. The essential oil (2.43 mg/disc) containing only 3.35 μg of thymoquinone showed pronounced dose dependant antibacterial activity against Streptococcus mitis, Streptococcus mutans, Streptococcus constellatus and Gemella haemolysans (15.5 ± 0.707 mm). However, pure thymoquinone compound (150 μg/disk) was active against all the studied strains especially S. mutans and S. mitis (24.5 ± 0.71 and 22 ± 1.41 mm inhibition zones, respectively).  相似文献   
54.
Cotton having good antibacterial activity can be obtained without the need for a binding chemical as a cross linker or the need for chemically pre-treated antibacterial agent. The procedure of synthesis consists in grafting an alkali-cellulose fibre by a quaternary ammonium salt: Epoxy propyltrimethylammonium chloride (EPTMAC). The characterization of grafted cotton (EPTMAC-Cotton) has been targeted on the nitrogen and the methyl group in the ammonium graft structure, by using some analytical techniques, such as infrared, NMR spectroscopy, and volumetric measurement. The antibacterial activity of EPTMAC-Cotton has been studied using four kinds of bacterial stains (Escherichia coli 25922, Pseudomonas aeruginosa 27853, Staphylococcus aureus 259223 and Salmonella LT2DT104 typhimirium). An optimization of conditions of culture medium has been carried out for the bacterial strain for which the modified cotton presents the best antibacterial activity. This optimization is achieved while varying the most important parameters influencing the bacterial growth. We have chosen the pH and the sodium chloride concentration as variable parameters, and we have applied an experiment plant, in order to consider all possible combinations of experiments, and therefore, to estimate the effect of each factor, as well as the effect of their interaction. It has been noticed that a quaternary ammonium salt (EPTMAC) is an efficient antibacterial agent, especially against salmonella in alkaline medium slightly concentrated in salt, and its action depends, in some manner, on the whitening procedure of cotton.  相似文献   
55.
The aim of the present work was to evaluate the contamination of some samples, taken from Moroccan wheat grains, by ochratoxin A (OTA), deoxynivalenol (DON) and the associated toxigenic fungi. Moreover, we focused on the influence of environmental factors on both the growth and OTA production by three strains of Aspergillus. The results showed that only few samples were contaminated by the two mycotoxins (2 samples for OTA and 7 for DON). The main isolated fungi belong to the Aspergillus, Penicillium and Fusarium genus; 74 Aspergillus and 28 Penicillium isolates were tested for their ability to produce OTA. Only 2 A. alliaceus and 14 A. niger were able to synthesize OTA. However, none of Penicillium isolates can produce this toxin under the conditions mentioned. In respect of the effects of the temperature and water activity (aw), the optimal conditions for the growth and OTA production were different. While the optimal conditions of growth for A. alliaceus and A. terreus are 30 degrees C and 0.98 aw, A. niger preferred 0.93-0.95 aw at 25 degrees C, whereas the optimal production of OTA was observed at 30 degrees C for both A. alliaceus and A. niger at 0.93 and 0.99 aw, respectively.  相似文献   
56.
Two activated carbons were obtained from pistachio shells by impregnation with H3PO4 under standard conditions of acid concentration (50 wt%) and heat treatment at 773 K for 2 h. The soaking time was 24 and 72 h for the two samples before thermal pyrolysis. Analysis of the N2/77 K adsorption isotherms proved that both were highly adsorbing carbons with considerable microporosity, and that the prolonged contact with activant enhanced total porosity (surface area and pore volume) and increased the amount of mesoporosity. Adsorption isotherms of probe molecules, viz methylene blue (MB), rhodamine B (RB), phenol (P) and p‐nitrophenol (PNP), were determined at room temperature, from aqueous solutions. Both the Langmuir and Freundlich model adsorption equations show satisfactory fit to experimental data. Both carbons exhibit similar adsorption parameters irrespective of their porosity characteristics. The sequence of uptake per unit weight was: PNP > MB > RB > P. Low affinity towards phenol may be associated with its competition with water molecules which are more favourably attracted to the acid surface which has a high oxygen functionality. Preferred adsorption in the order PNP > MB > RB is proposed to be a function of carbon porosity, related to the increased molecular dimensions of the solutes. Adsorption from a binary mixture of equal concentrations of MB and RB showed reduced uptake for both sorbates in comparison to the single component experiments. RB removal surpasses that of MB in the binary test and may be attributed to lower water solubility and higher molecular dimensions. Copyright © 2003 Society of Chemical Industry  相似文献   
57.
Psychotherapists were surveyed regarding clients' memories of childhood sexual abuse (CSA). The 3 samples were highly similar on the vast majority of measures. Respondents listed a wide variety of behavioral symptoms as potential indicators of CSA, and 71% indicated that they had used various techniques (e.g., hypnosis, interpretation of dreams) to help clients recover suspected memories of CSA . Across samples, 25% of the respondents reported a constellation of beliefs and practices suggestive of a focus on memory recovery, and these psychologists reported relatively high rates of memory recovery in their clients. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
58.
This paper studies the fault tolerant control, adaptive approach, for linear time-invariant two-time-scale and three-time-scale singularly perturbed systems in presence of actuator faults and external disturbances. First, the full order system will be controlled using ε-dependent control law. The corresponding Lyapunov equation is ill-conditioned due to the presence of slow and fast phenomena. Secondly, a time-scale decomposition of the Lyapunov equation is carried out using singular perturbation method to avoid the numerical stiffness. A composite control law based on local controllers of the slow and fast subsystems is also used to make the control law ε-independent. The designed fault tolerant control guarantees the robust stability of the global closed-loop singularly perturbed system despite loss of effectiveness of actuators. The stability is proved based on the Lyapunov stability theory in the case where the singular perturbation parameter is sufficiently small. A numerical example is provided to illustrate the proposed method.  相似文献   
59.
Security is a concern that must be taken into consideration starting from the early stages of system development. Over the last two decades, researchers and engineers have developed a considerable number of methods for security requirements engineering. Some of them rely on the (re)use of security knowledge. Despite some existing surveys about security requirements engineering, there is not yet any reference for researchers and practitioners that presents in a systematic way the existing proposals, techniques, and tools related to security knowledge reuse in security requirements engineering. The aim of this paper is to fill this gap by looking into drawing a picture of the literature on knowledge and reuse in security requirements engineering. The questions we address are related to methods, techniques, modeling frameworks, and tools for and by reuse in security requirements engineering. We address these questions through a systematic mapping study. The mapping study was a literature review conducted with the goal of identifying, analyzing, and categorizing state-of-the-art research on our topic. This mapping study analyzes more than thirty approaches, covering 20 years of research in security requirements engineering. The contributions can be summarized as follows: (1) A framework was defined for analyzing and comparing the different proposals as well as categorizing future contributions related to knowledge reuse and security requirements engineering; (2) the different forms of knowledge representation and reuse were identified; and (3) previous surveys were updated. We conclude that most methods should introduce more reusable knowledge to manage security requirements.  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号