首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2523篇
  免费   3篇
电工技术   3篇
综合类   1篇
化学工业   26篇
金属工艺   4篇
机械仪表   27篇
建筑科学   6篇
能源动力   2篇
轻工业   46篇
石油天然气   3篇
无线电   30篇
一般工业技术   47篇
冶金工业   2294篇
自动化技术   37篇
  2021年   3篇
  2016年   2篇
  2015年   1篇
  2014年   8篇
  2013年   18篇
  2012年   7篇
  2011年   12篇
  2010年   11篇
  2009年   7篇
  2008年   9篇
  2007年   12篇
  2006年   12篇
  2005年   12篇
  2004年   10篇
  2003年   9篇
  2002年   8篇
  2001年   7篇
  2000年   7篇
  1999年   91篇
  1998年   776篇
  1997年   400篇
  1996年   253篇
  1995年   148篇
  1994年   115篇
  1993年   147篇
  1992年   24篇
  1991年   29篇
  1990年   30篇
  1989年   25篇
  1988年   31篇
  1987年   42篇
  1986年   22篇
  1985年   13篇
  1984年   6篇
  1983年   11篇
  1982年   10篇
  1981年   8篇
  1980年   29篇
  1979年   3篇
  1978年   5篇
  1977年   29篇
  1976年   105篇
  1975年   5篇
  1973年   3篇
  1972年   1篇
  1970年   1篇
  1955年   1篇
  1944年   1篇
  1941年   2篇
  1932年   1篇
排序方式: 共有2526条查询结果,搜索用时 10 毫秒
51.
Multimedia group applications often operate in an environment where the various participants are located on systems and communication links with different capabilities. Mechanisms are required that ensure full-quality media for high-performance workstations but lower-quality media for playout at low-end systems. QoS filters have been proposed as a way to adapt QoS to the user specified level by changing the structure of a media stream in a well defined way. Resource reservation and QoS filter instantiation should be closely integrated since both represent one particular aspect of the provision of individualistic QoS for heterogeneous users in multipeer communications. The Internet reservation protocol RSVP is receiver oriented and allows each receiver to specify its resource requirements. However, no actual mechanisms are defined that adapt the data stream to the receiver specified QoS requirements.In this paper we present an enhanced version of RSVP (called RSVP++) that integrates resource reservation and QoS filter control. In order to achieve this integration we extend the RSVP functional model and define a new QoS service class. RSVP++ can coexist with common RSVP systems, thus, openness and interoperability of the system are ensured.  相似文献   
52.
We demonstrated previously that osteoclasts possess a divalent cation-sensitive "receptor", the Ca2+ receptor. Activation of the Ca2+ receptor by the surrogate cation Ni2+ was shown to elicit an increase in cytosolic [Ca2+] to a peak value followed by an exponential decline. In the present study we examined the influence of surface membrane voltage on the kinetics of Ca2+ receptor inactivation. The K+ ionophore, valinomycin was applied to intercept the declining phase of the cytosolic [Ca2+] transient elicited by application of between 50 microM- and 5 mM-[Ni2+]. This resulted in a sustained elevation of cytosolic [Ca2+] or even a 'hump' followed by a gradual decline. Such a kinetic alteration persisted in a Ca(2+)-free solution, but was abolished in high extracellular [K+] (105 mM). Thus, we demonstrate for the first time to our knowledge, a modulatory effect of membrane potential on the function of the osteoclast Ca2+ receptor.  相似文献   
53.
We describe a liquid helium cryostat, developed to cool SQUID-based receivers in low field MRI systems. The cryostat has a 4 L liquid helium capacity, a hold time of over 3 days and accommodates 10 cm diameter receiver coils. New vacuum insulation methods reduce the noise level by at least an order of magnitude compared to existing commercial designs. The minimum detectable field at 425 kHz, with a 5 cm diameter circular coil, was estimated to be 0.018 fT/Hz1/2 from Q-factor measurements and 0.035 fT/Hz1/2 by direct measurement with a SQUID amplifier. Further measurements indicated that most of this field noise probably originates with dielectric losses in the cryostat’s fibreglass shells.  相似文献   
54.
The lack of privacy is one of the main reasons that limits trust in e-commerce. Current e-commerce practice enforces a customer to disclose her identity to the e-shop and the use of credit cards makes it straightforward for an e-shop to know the real identity of its customers. Although there are some payment systems based on untraceable tokens, they are not as widely used as credit cards. Furthermore, even without buying anything, a customer is already disclosing some information about who or where she may be by just connecting to the e-shop's web server and leaving behind an IP-address. In this paper, we present novel components that enable secure pseudonymous e-commerce. On the one hand, these components allow a customer to browse through an e-shop, select goods, and pay the goods with her credit card such that neither the e-shop operator nor the credit card issuer nor an eavesdropper is able to get any information about the customer's identity. On the other hand, it is guaranteed that none of the involved parties is able to act dishonestly during the credit card payment. Such a system could greatly enhance trust in e-commerce since it overcomes the customers' privacy concerns.  相似文献   
55.
Hypothesized top-down and bottom-up mechanisms of control within conflict-rich environments were examined by presenting participants with a Stroop task in which specific words were usually presented in either congruent or incongruent colors. Incongruent colors were either frequently (high contingency) or infrequently (low contingency) paired with the word. These items were embedded within lists consisting of either 100% congruent or 100% incongruent filler items to create mostly congruent or mostly incongruent lists. Results indicated a significant item-specific congruency effect, which was largest for high contingency responses and within mostly congruent lists. In addition, a significant listwide congruency effect was obtained, and this interacted with working memory capacity (WMC). There were larger listwide congruency effects for low WMC individuals. Finally, the pattern of Stroop interference across lists for low WMC individuals was dependent upon the congruency of the preceding trial. These results support multiple forms of cognitive control, as well as contingency learning, as mechanisms underlying proportion congruence effects in Stroop and other conflict tasks. These findings are interpreted within Braver, Gray, and Burgess's (2007) dual mechanisms of control theory. (PsycINFO Database Record (c) 2011 APA, all rights reserved)  相似文献   
56.
Water vapor profiling algorithms that treat liquid clouds explicitly yield a cloud base height as a byproduct. A single case of a water vapor profile retrieval using a combination of the SSM/T-2 on the DMSP satellite and cloud parameters from the AVHRR on the NOAA satellite retrieved a reasonable cloud base. While hardly definitive, this case is suggestive. The authors examine the cloud base signal in a combination of the SSM/1 and SSM/T-2 on the DMSP satellite from a theoretical point of view. It is shown that the signal is strong enough for a useful retrieval only over the ocean. For low altitudes, a cloud top temperature (CTT) constraint, as could be provided from an infrared radiometer, is required. While difficult with the DMSP-NOAA satellite combination, this has become much easier with the recent launch of NOAA-K with the AMSU-B and AVHRR. It is shown that the signal is acceptable over the relevant range of cloud liquid water content values. To achieve useful results, some local tuning of the algorithm will be necessary. This tuning could take the form of water vapor profile covariance matrices, climatological estimates of the cloud liquid water density, or purely empirical methods. Broken and multilayer clouds provide additional complications to the problem  相似文献   
57.
Future requirements for a broadband multimedia network are likely to be very different from those today. Three key changes are identified — rapid introduction of new services, dynamic customisation of services by clients, and minimal management overhead. Application-layer active networking, perhaps the most pragmatic and immediately realisable active network proposal, is a potential solution to all three. In the 'Management of Multiservice Networks' project, BT and its academic partners are developing key middleware components required to support application-layer active networking.  相似文献   
58.
59.
60.
We calculated the electrostatic force between a planar interface, such as a planar-supported lipid bilayer membrane, and the tip of a stylus on which another lipid bilayer or some other biomacromolecular system might be deposited. We considered styli with rounded tips as well as conical tips. To take into account the effect of dynamical hydrogen-bonded structures in the aqueous phase, we used a theory of nonlocal electrostatics. We used the Derjaguin approximation and identified the systems for which its use is valid. We pointed out where our approach differs from previous calculations and to what extent the latter are inadequate. We found that 1) the nonlocal interactions have significant effects over distances of 10-15 A from the polar zone and that, at the surface of this zone, the effect on the calculated force can be some orders of magnitude; 2) the lipid dipoles and charges are located a distance L from the hydrophobic layer in the aqueous medium and this can have consequences that may not be appreciated if it is ignored; 3) dipoles, located in the aqueous region, can give rise to forces even though the polar layer is unchanged, and if this is ignored the interpretation of force data can be erroneous if an attempt is made to rationalize an observed force with a knowledge of an uncharged surface; 4) the shape of the stylus tip can be very important, and a failure to take this into account can result in incorrect conclusions, a point made by other workers; and 5) when L is nonzero, the presence of charges and dipoles can yield a force that can be nonmonotonic as a function of ionic concentration.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号