首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   233篇
  免费   11篇
化学工业   28篇
金属工艺   4篇
机械仪表   13篇
建筑科学   4篇
矿业工程   1篇
能源动力   5篇
轻工业   50篇
水利工程   3篇
石油天然气   1篇
无线电   30篇
一般工业技术   21篇
冶金工业   29篇
自动化技术   55篇
  2024年   1篇
  2023年   3篇
  2022年   7篇
  2021年   8篇
  2020年   7篇
  2019年   8篇
  2018年   6篇
  2017年   12篇
  2016年   7篇
  2015年   6篇
  2014年   8篇
  2013年   21篇
  2012年   18篇
  2011年   10篇
  2010年   10篇
  2009年   13篇
  2008年   7篇
  2007年   13篇
  2006年   8篇
  2005年   6篇
  2004年   5篇
  2003年   7篇
  2002年   5篇
  2001年   2篇
  1999年   4篇
  1998年   9篇
  1997年   5篇
  1996年   4篇
  1995年   1篇
  1994年   4篇
  1993年   5篇
  1992年   1篇
  1989年   2篇
  1988年   3篇
  1986年   1篇
  1983年   1篇
  1978年   2篇
  1977年   2篇
  1970年   2篇
排序方式: 共有244条查询结果,搜索用时 11 毫秒
31.
32.
Enterococci account for an important fraction of the adventitious microflora of traditional cheeses manufactured in Mediterranean countries from small ruminants' raw milk and play an important role in the development of suitable organoleptic characteristics of the final product. It has been suggested that animals used for food or animals that supply edible products are a reservoir of antibiotic-resistant enterococci. The main purpose of this research effort was thus to identify, to the species level, a total of 73 enterococci with high tolerance to acidic pH and bile salts (as prevailing environmental conditions in the first portion of the gastrointestinal tract), which were previously isolated from the milk feedstock to the final product of Terrincho cheesemaking, and to determine their profiles of antibiotic susceptibility, coupled with the occurrence of specific virulence factors (especially in those that might eventually be claimed to exhibit suitable probiotic and technological performances). Isolates, identified by both API 20 STREP and PCR methods, were found to belong to the following Enterococcus species: E. casseliflavus, E. durans, E. faecalis, E. faecium, and E. gallinarum. Susceptibility of those isolates was observed to most antibiotics tested, whereas none harbored aminoglycoside resistance genes. PCR screenings for cytolysin genes (cylL(L), cylL(s), cylM, cylB, and cylA), surface adhesin genes (efaA(fs), efaA(fm), and esp), the aggregation protein gene (agg), and the extracellular metalloendopeptidase gene (gelE) were performed. All isolates proved negative for cylL(L), cylM, cylB, and agg genes. Both E. faecalis strains were positive for the cell wall-associated protein Esp and the cell wall adhesin efaA(fs), whereas the cell wall adhesin efaA(fm) was detected in 11 of the 12 E. faecium strains. Only one strain possessed the cylL(s) determinant, and another possessed the cylA gene. Incidence of virulence determinants was thus very low; hence, the enterococcal adventitious microflora tested is essentially safe.  相似文献   
33.
Social media has experienced rapid growth in recent years and has been subjected of discussions on a wide range of topics including new lifestyles and eating habits, providing a great opportunity to obtain spontaneous consumer information. In this sense, the present work aimed to understand the perception of Twitter® users about themes of veganism and plant-based diets. The social networking data mining methodology was applied to measure the relationship between both terms. The significant differences found were analysed using the global chi-square (χ2) test, and their sources of variation were investigated by the chi-square per cell. The results indicate that the vegan group's posts are more related to the categories of recipes, trends, criticism and negative comments about veganism, being more often citing sources when compared to the other group. The results of the plant-based diet group are more significantly related to the impacts of nutrition, physical activity and consumer health. In conclusion, Twitter® has proved to be an interesting tool for obtaining data on (re) produced food publications on social media and their results can guide the market and the academic environment in creating new products, services and marketing strategies to answer the needs of specific consumers.  相似文献   
34.
35.
Fermented whey dairy beverages are dairy products obtained by fermentation from a mixture of milk and whey. These beverages have important health benefits, which could be improved with the addition of probiotic cultures. This study assessed the protective effect of the cosupplementation of a probiotic culture (Lactobacillus casei 01) with a fermented whey dairy beverage against infection by Salmonella enterica ssp. enterica serovar Typhimurium in a murine model. Two fermented whey dairy beverages were prepared: conventional (FWB; starter culture) and probiotic (PFWB; starter and probiotic cultures). In the first set of experiments, Balb/C female mice were treated with FWB or PFWB, challenged with Salmonella Typhimurium, and analyzed for clinical signs, weight loss, and mortality for 20 d postinfection. In the second set of experiments, mice were treated with FWB or PFWB, challenged with Salmonella Typhimurium, and killed on d 10 postinfection. The liver, colon, and ileum were used for myeloperoxidase, eosinophil peroxidase, and histological analysis and translocation to the liver. The contents from the small intestine were used for secretory IgA determination. The FWB treatment showed a better effect on animal survival (70%), translocation of the pathogen to the liver (2 out of 10), histopathology (fewer lesions), and inflammation than PFWB, which presented 50% animal survival, translocation in 5 out of 10 animals, and higher lesions. The control group presented 40% animal survival, translocation in 6 out of 10 animals, and severe lesions. Therefore, FWB was deemed to have a greater protective effect against Salmonella Typhimurium infection in the murine model compared with PFWB.  相似文献   
36.
37.
38.
The objective of this study was to monitor the stability of anthocyanin and phenolic compounds contained in two formulations of blackberry jam (traditional and low-sugar) during storage. For that purpose, jams were prepared with varying amounts of hydrocolloids and investigated as to pH, total soluble solids, water activity, total acidity, total anthocyanins and total polyphenols. In order to accompany and assess the levels of phenolic compounds and colour (L*, a* and b*) changes, the samples were stored for 180 days at two different temperatures (10 and 25 °C). The Arrhenius model was used to determine the relationship between the reaction rate (k) at the different storage temperatures, yielding activation energy values of 19 and 12 kcal/mol and Q 10 values of 3.0 and 2.0 for traditional and low-sugar jams, respectively. The results show that by the end of the storage time investigated, the anthocyanin compounds had been partially degraded, with the greatest loss being observed in traditional jam stored at 25 °C. Colour stability was also lower in traditional jam as compared to the low-sugar product.  相似文献   
39.
The effects of different concentrations of soil cadmium (0, 1, 3, 5, 10, and 20mgkg(-1)) on growth, structural changes and cadmium cellular localization in leaves of maize plants (Zea mays L.) were investigated in a pot experiment. The results showed that the structural changes observed in maize leaves were not only a response to the Cd-induced stress but also a cellular mechanism to reduce the free Cd(+2) in the cytoplasm. However, this mechanism seems to be efficient only up to a Cd concentration in leaves between 27 and 35mgkg(-1) for soils without and with liming, respectively. The cellular response varied with both the Cd concentration in soil and liming. For limed soil, Cd was preferentially accumulated in the apoplast while for unlimed soils Cd was more evenly distributed into the cells. The ability of Cd accumulation depended on the leaf tissue considered. The apoplast collenchyma presented the highest Cd concentration followed by the endodermis, perycicle, xylem, and epidermis. On the other hand, symplast Cd accumulated mainly in the endodermis, bundle sheath cells, parenchyma, and phloem. Based on the structural changes and growth reduction, the critical toxic concentration of soil Cd to maize plants is between 5 and 10mgkg(-1).  相似文献   
40.
The verification of security protocols has attracted a lot of interest in the formal methods community, yielding two main verification approaches: i) state exploration, e.g. FDR [Gavin Lowe. Breaking and fixing the needham-schroeder public-key protocol using FDR. In TACAs'96: Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems, pages 147–166, London, UK, 1996. Springer-Verlag] and OFMC [A.D. Basin, S. Mödersheim, and L. Viganò. An on-the-fly model-checker for security protocol analysis. In D. Gollmann and E. Snekkenes, editors, ESORICS'03: 8th European Symposium on Research in Computer Security, number 2808 in Lecture Notes in Computer Science, pages 253–270, Gjøvik, Norway, 2003. Springer-Verlag]; and ii) theorem proving, e.g. the Isabelle inductive method [Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal in Computer Security, 6(1-2):85–128, 1998] and Coral [G. Steel, A. Bundy, and M. Maidl. Attacking the asokan-ginzboorg protocol for key distribution in an ad-hoc bluetooth network using coral. In H. König, M. Heiner, and A. Wolisz, editors, IFIP TC6 /WG 6.1: Proceedings of 23rd IFIP International Conference on Formal Techniques for Networked and Distributed Systems, volume 2767, pages 1–10, Berlin, Germany, 2003. FORTE 2003 (work in progress papers)]. Complementing formal methods, Abadi and Needham's principles aim to guide the design of security protocols in order to make them simple and, hopefully, correct [M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6–15, 1996]. We are interested in a problem related to verification but far less explored: the correction of faulty security protocols. Experience has shown that the analysis of counterexamples or failed proof attempts often holds the key to the completion of proofs and for the correction of a faulty model. In this paper, we introduce a method for patching faulty security protocols that are susceptible to an interleaving-replay attack. Our method makes use of Abadi and Needham's principles for the prudent engineering practice for cryptographic protocols in order to guide the location of the fault in a protocol as well as the proposition of candidate patches. We have run a test on our method with encouraging results. The test set includes 21 faulty security protocols borrowed from the Clark-Jacob library [J. Clark and J. Jacob. A survey of authentication protocol literature: Version 1.0. Technical report, Department of Computer Science, University of York, November 1997. A complete specification of the Clark-Jacob library in CAPSL is available at http://www.cs.sri.com/millen/capsl/].  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号