首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2346篇
  免费   20篇
  国内免费   1篇
电工技术   15篇
化学工业   126篇
金属工艺   17篇
机械仪表   19篇
建筑科学   45篇
矿业工程   3篇
能源动力   10篇
轻工业   69篇
水利工程   3篇
石油天然气   1篇
无线电   78篇
一般工业技术   97篇
冶金工业   1822篇
原子能技术   5篇
自动化技术   57篇
  2020年   6篇
  2019年   4篇
  2018年   7篇
  2017年   9篇
  2016年   14篇
  2015年   7篇
  2014年   9篇
  2013年   31篇
  2012年   20篇
  2011年   27篇
  2010年   20篇
  2009年   26篇
  2008年   21篇
  2007年   28篇
  2006年   16篇
  2005年   20篇
  2004年   24篇
  2003年   16篇
  2002年   17篇
  2001年   7篇
  2000年   14篇
  1999年   48篇
  1998年   500篇
  1997年   285篇
  1996年   213篇
  1995年   125篇
  1994年   105篇
  1993年   113篇
  1992年   25篇
  1991年   24篇
  1990年   21篇
  1989年   34篇
  1988年   35篇
  1987年   29篇
  1986年   26篇
  1985年   27篇
  1983年   18篇
  1982年   23篇
  1981年   17篇
  1980年   33篇
  1979年   6篇
  1978年   14篇
  1977年   68篇
  1976年   135篇
  1975年   13篇
  1973年   4篇
  1965年   5篇
  1964年   6篇
  1954年   6篇
  1941年   4篇
排序方式: 共有2367条查询结果,搜索用时 15 毫秒
61.
The design of sustainable supply chains, which recently emerged as an active area of research in process systems engineering, is vital to ensure sustainable development. Despite past and ongoing efforts, the available methods often overlook impacts beyond climate change or incorporate them via standard life cycle assessment metrics that are hard to interpret from an absolute sustainability viewpoint. We here address the design of biomass supply chains considering critical ecological limits of the Earth—planetary boundaries—which should never be surpassed by anthropogenic activities. Our method relies on a mixed-integer linear program that incorporates a planetary boundaries-based damage model to quantify absolute sustainability precisely. We apply this approach to the sugarcane-to-ethanol industry in Argentina, identifying the optimal combination of technologies and network layout that minimize the impact on these ecological boundaries. Our framework can find applications in a wide range of supply chain problems related to chemicals and fuels production, energy systems, and agriculture planning.  相似文献   
62.
Approximately 15 million cars and trucks reach the end of their useful life in the United States each year. More than 75% of the materials from end-of-life vehicles are profitably recovered and recycled by the private sector; automotive materials recycling is a success story. To achieve greater fuel efficiency and safety, today’s cars incorporate an increasing share of innovative light-weight materials. While these materials greatly enhance efficiency during vehicle use, they can present special challenges for recycling. These challenges will persist as automotive designs and the mix of materials used in vehicles continue evolving to further improve safety and performance. To meet the challenges of automotive materials recycling, the U.S. Department of Energy has recently expanded its collaborative research with industry in this area. This article discusses this collaborative government/industry approach to sustainable end-of-life vehicle recycling. For more information, contact Edward J. Daniels, Argonne National Laboratory, 9700 S. Cass Avenue, Building 362, Room C393, Argonne, IL 60439-4815; (630) 252-5279; fax (630) 252-1342; e-mail edaniels@anl.gov.  相似文献   
63.
Functional overload (FO) of a muscle by removing its synergists results in a compensatory hypertrophy of the muscle. However, the extent of the response appears to be dependent, at least in part, on the activity and/or loading levels of the muscle following surgery. Thus, differences in the inherent physical activity levels across species may be an important factor to consider. In the present study, the effects of 8 weeks of FO on the isometric mechanical properties of the plantaris of mice (highly active) were determined and the findings compared with the results from previous studies performed on the plantaris of rats (highly active) and cats (less active). FO resulted in approximately a doubling of the mass, the physiological cross-sectional area and the maximum tetanic tension per unit cross-sectional area, was similar in the plantaris of control and FO mice. Isometric twitch speed properties were unaffected, but the tension enhancement in response to an increase in the rate of stimulation showed the pattern of a "faster" muscle following FO. The fatigue resistance of the plantaris in FO mice was significantly higher than in control mice. Although the degree of hypertrophy that occurred in the mouse plantaris was similar to that observed after FO in rats and in cats that are exercised intermittently at high intensities, there were differences in the mechanical properties that may be related to the adaptability of species and/or the behavioral responses to the overload.  相似文献   
64.
BACKGROUND AND PURPOSE: Cerebral emboli can be recognized by typical "high-intensity transient signals" (HITS) in the transcranial Doppler (TCD) spectral curves. Patients with potential cardiac sources of embolism are at higher risk for stroke. METHODS: We examined the frequency of HITS in the left middle cerebral artery (MCA) with TCD over periods of 30 minutes in 100 patients having potential cardiac sources of embolism, as indicated by transthoracic or transesophageal echocardiography. RESULTS: Thirty-six (36%) of the patients presented with HITS. Sex, age, sufficient anticoagulation level, antiplatelet therapy, neurological symptoms, and a history of thrombosis had no influence on the prevalence and number of HITS. The patients with a single echocardiographic diagnosis were separated into eight echocardiographically defined groups: patients with (1) atrial fibrillation, (2) coronary artery disease plus ejection fraction of more than 30% including at least three wall segments of hypokinesia/akinesia, (3) coronary artery disease with less than 30% ejection fraction, (4) dilated cardiomyopathy, (5) infectious endocarditis, (6) aortic stenosis, (7) mitral stenosis, and (8) patent foramen ovale. A significant difference in HITS occurrence could not be found in any of the defined groups. Only patients with infectious endocarditis showed a tendency for a higher HITS prevalence. CONCLUSIONS: HITS are common phenomena in patients with potential cardiac sources of embolism. The clinical relevance of these HITS remains unclear.  相似文献   
65.
OBJECTIVE: To investigate differences in second-, third-, and fourth-year medical students' knowledge of bloodborne pathogen exposure risks, as well as their attitudes toward, and intentions to comply with, Universal Precautions (UP). DESIGN: Cross-sectional survey. PARTICIPANTS AND SETTING: Surveys about students' knowledge, attitudes, and intentions to comply with UP were completed by 111 second-year (preclinical), 80 third-year, and 60 fourth-year medical students at Washington University School of Medicine in the spring of 1996. RESULTS: Preclinical students knew more than clinical students about the efficacy of hepatitis B vaccine, use of antiretroviral therapy after occupational exposure to human immunodeficiency virus, and nonvaccinated healthcare workers' risk of infection from needlestick injuries (P<.001). Students' perceived risk of occupational exposure to bloodborne pathogens and attitudes toward hepatitis B vaccine did not differ, but preclinical students agreed more strongly that they should double glove for all invasive procedures with sharps (P<.001). Clinical students agreed more strongly with reporting only high-risk needlestick injuries (P=.057) and with rationalizations against using UP (P=.008). Preclinical students more frequently reported contemplating or preparing to comply with double gloving, wearing protective eyewear, reporting all exposures, and safely disposing of sharps, whereas students with clinical experience were more likely to report compliance. Clinical students also were more likely to report having "no plans" to practice the first three of these precautions (P<.001). CONCLUSIONS: Differences in knowledge, attitudes, and intentions to comply with UP between students with and without clinical experience may have important implications for the timing and content of interventions designed to improve compliance with UP.  相似文献   
66.
An amino acid as a cofactor for a catalytic polynucleotide   总被引:3,自引:0,他引:3  
Natural ribozymes require metal ion cofactors that aid both in structural folding and in chemical catalysis. In contrast, many protein enzymes produce dramatic rate enhancements using only the chemical groups that are supplied by their constituent amino acids. This fact is widely viewed as the most important feature that makes protein a superior polymer for the construction of biological catalysts. Herein we report the in vitro selection of a catalytic DNA that uses histidine as an active component for an RNA cleavage reaction. An optimized deoxyribozyme from this selection requires L-histidine or a closely related analog to catalyze RNA phosphoester cleavage, producing a rate enhancement of approximately 1-million-fold over the rate of substrate cleavage in the absence of enzyme. Kinetic analysis indicates that a DNA-histidine complex may perform a reaction that is analogous to the first step of the proposed catalytic mechanism of RNase A, in which the imidazole group of histidine serves as a general base catalyst. Similarly, ribozymes of the "RNA world" may have used amino acids and other small organic cofactors to expand their otherwise limited catalytic potential.  相似文献   
67.
OBJECTIVE: Functional electrical stimulation (FES) is a technology that may allow some patients with spinal cord injury (SCI) to integrate standing and upright mobility with wheelchair mobility. The purpose of this study was to document the patterns of home and community use of a FES system for standing and mobility. DESIGN: A telephone questionnaire was administered every 1 to 4 weeks for a minimum of 1 year. An interview was given at the end of the study to probe the motivators and barriers to home use. SETTING: Training for use of the FES system was performed in an inpatient pediatric rehabilitation setting. Data collection began after the subjects were discharged to home. PARTICIPANTS: Five adolescents with complete, thoracic-level SCI. INTERVENTION: Subjects participated in a program of FES exercise followed by training in basic mobility skills such as standing transfers, maneuvering, level ambulation, one-handed and reaching activities, and stair ascent/descent. MAIN OUTCOME MEASURE: The frequency with which the FES system was used at home and the activities for which it was utilized were documented. Motivators and barriers to FES home use were examined. RESULTS: Subjects donned the FES system on the average once every 3 to 4 days. Between 51% and 84% of the times donned, the system was used for exercise. The remaining times it was used for standing activities, most commonly reaching, one-handed tasks, and standing for exercise. "Motivators" included being able to do things that would otherwise be difficult, perceiving a healthful benefit or a sense of well-being from standing and exercise, and feeling an obligation to stand as a participant in a research study. "Barriers" to FES use included not finding time to use the system, having difficulty seeing opportunities to stand, and being reluctant to wear the FES system all day.  相似文献   
68.
In this paper, we consider Centroidal Voronoi Tessellations (CVTs) and study their regularity. CVTs are geometric structures that enable regular tessellations of geometric objects and are widely used in shape modelling and analysis. While several efficient iterative schemes, with defined local convergence properties, have been proposed to compute CVTs, little attention has been paid to the evaluation of the resulting cell decompositions. In this paper, we propose a regularity criterion that allows us to evaluate and compare CVTs independently of their sizes and of their cell numbers. This criterion allows us to compare CVTs on a common basis. It builds on earlier theoretical work showing that second moments of cells converge to a lower bound when optimizing CVTs. In addition to proposing a regularity criterion, this paper also considers computational strategies to determine regular CVTs. We introduce a hierarchical framework that propagates regularity over decomposition levels and hence provides CVTs with provably better regularities than existing methods. We illustrate these principles with a wide range of experiments on synthetic and real models.  相似文献   
69.
We used 2‐D DIGE to analyze the early response of NB‐4 cells, a human promyelotic leukemia cell line, exposed to lethal toxin from Bacillus anthracis at the proteome level. After a 2 h exposure, cells were still viable and 43% of spots (n = 1042) showed a significant change in protein level. We identified 59 spots whose expression had changed significantly, and these reflected cytoskeleton damage, mitochondrial lysis and endoplasmic reticulum stress. Actin filament assembly was disrupted as evidenced by an increase in both actin subunits and phosphorylated cofilin, whilst levels of tropomyosin, tropomodulin and actin related protein 2/3 complex subunit decreased. Lower levels of ATP synthase subunits and mitochondrial inner membrane protein were identified as markers of mitochondrial lysis. Levels of various stress response proteins rose and, uniquely, levels of Ca2+ binding proteins such as translationally controlled tumor protein rose and hippocalcin‐like protein 1 decreased. This response may have mitigated effects brought about by mitochondrial lysis and endoplasmic reticulum stress, and delayed or prevented apoptosis in NB‐4 cells. These results resemble findings of similar proteomics studies in murine macrophages, although quantitative differences were observed.  相似文献   
70.
Denial-of-service (DoS) attacks have been around for a long time. In the computer network arena, DoS attacks usually take one of two forms: 1) exploiting bugs in network clients or server applications, in an attempt to crash the application (and possibly the host on which it is running) or 2) flooding a network server with fake traffic, making it difficult or impossible for the server to receive and process legitimate traffic. The former are typically carried out by using ‘buffer overrun attacks’ in which a network application is sent a large amount of data which it fails to handle properly, instead overwriting critical information with the excess data.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号