首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5518篇
  免费   378篇
  国内免费   9篇
电工技术   75篇
综合类   11篇
化学工业   1656篇
金属工艺   78篇
机械仪表   147篇
建筑科学   229篇
矿业工程   5篇
能源动力   210篇
轻工业   660篇
水利工程   26篇
石油天然气   5篇
武器工业   1篇
无线电   507篇
一般工业技术   1036篇
冶金工业   184篇
原子能技术   58篇
自动化技术   1017篇
  2024年   8篇
  2023年   55篇
  2022年   256篇
  2021年   414篇
  2020年   168篇
  2019年   163篇
  2018年   205篇
  2017年   197篇
  2016年   227篇
  2015年   204篇
  2014年   255篇
  2013年   392篇
  2012年   325篇
  2011年   441篇
  2010年   320篇
  2009年   302篇
  2008年   276篇
  2007年   249篇
  2006年   216篇
  2005年   164篇
  2004年   148篇
  2003年   123篇
  2002年   104篇
  2001年   69篇
  2000年   51篇
  1999年   67篇
  1998年   65篇
  1997年   61篇
  1996年   51篇
  1995年   30篇
  1994年   41篇
  1993年   22篇
  1992年   16篇
  1991年   10篇
  1990年   7篇
  1989年   17篇
  1988年   8篇
  1987年   5篇
  1986年   8篇
  1985年   17篇
  1984年   22篇
  1983年   24篇
  1982年   12篇
  1981年   14篇
  1980年   15篇
  1979年   14篇
  1978年   5篇
  1977年   13篇
  1976年   5篇
  1974年   4篇
排序方式: 共有5905条查询结果,搜索用时 31 毫秒
41.
A variable-gain up-conversion mixer for 5-GHz WLAN applications is presented, whose input stage is based on a novel variable gain transconductor. The proposed topology features reduced power consumption by exploiting dc current reuse for mixer biasing. Moreover, a new low-consumption control circuit is introduced, which achieves a temperature-stable and linear-in-dB characteristic, providing a 40-dB dynamic range within ±1 dB gain error.  相似文献   
42.
The security of a deterministic quantum scheme for communication, namely the LM05 [1], is studied in presence of a lossy channel under the assumption of imperfect generation and detection of single photons. It is shown that the scheme allows for a rate of distillable secure bits higher than that pertaining to BB84 [2]. We report on a first implementation of LM05 with weak pulses.  相似文献   
43.
Applied Intelligence - The paper reports the results of an analysis of COVID-19 diffusion in Italy. The analysis was carried out with a new method based on the combined use of a 3 Way Decisions...  相似文献   
44.
Context relevance assessment and exploitation in mobile recommender systems   总被引:2,自引:1,他引:1  
In order to generate relevant recommendations, a context-aware recommender system (CARS) not only makes use of user preferences, but also exploits information about the specific contextual situation in which the recommended item will be consumed. For instance, when recommending a holiday destination, a CARS could take into account whether the trip will happen in summer or winter. It is unclear, however, which contextual factors are important and to which degree they influence user ratings. A large amount of data and complex context-aware predictive models must be exploited to understand these relationships. In this paper, we take a new approach for assessing and modeling the relationship between contextual factors and item ratings. Rather than using the traditional approach to data collection, where recommendations are rated with respect to real situations as participants go about their lives as normal, we simulate contextual situations to more easily capture data regarding how the context influences user ratings. To this end, we have designed a methodology whereby users are asked to judge whether a contextual factor (e.g., season) influences the rating given a certain contextual condition (e.g., season is summer). Based on the analyses of these data, we built a context-aware mobile recommender system that utilizes the contextual factors shown to be important. In a subsequent user evaluation, this system was preferred to a similar variant that did not exploit contextual information.  相似文献   
45.
Network intrusion detection systems (NIDSs) are pattern recognition problems that classify network traffic patterns as either ‘normal’ or ‘abnormal’. Precisely, the main aim of intrusion detection is to identify unauthorized use, misuse, and abuse of computers by detecting malicious network activities such as port scans, denial of service or other attempts to crack computer network environments. Even though the incorporation of conventional Soft Computing techniques in NIDSs has yielded to good solutions, the strong dynamism characterizing network intrusion patterns tend to invalidate the usability of existing framework. To tackle this issue, our proposal performs an adaptive supervised learning on a collection of time series that characterizes the network behavior to create a so-called timed automata-based fuzzy controller (TAFC), i.e. an evolvable fuzzy controller whose dynamic features allow to design an advanced network intrusion detection system able to directly deal with computer network dynamism and support networks’ administrators to prevent eventual damages coming from unauthorized network intrusion. As will be shown in experiments, where our approach has been compared with a conventional Mamdani fuzzy controller, the proposed system reduces the detection error and, as consequence, improves the computer network robustness.  相似文献   
46.
The publish/subscribe model offers a loosely-coupled communication paradigm where applications interact indirectly and asynchronously. Publishers generate events that are sent to interested applications through a network of brokers. Subscribers express their interest by specifying filters that brokers can use for routing the events. Supporting confidentiality of messages being exchanged is still challenging. First of all, it is desirable that any scheme used for protecting the confidentiality of both the events and filters should not require publishers and subscribers to share secret keys. In fact, such a restriction is against the loose-coupling of the model. Moreover, such a scheme should not restrict the expressiveness of filters and should allow the broker to perform event filtering to route the events to the interested parties. Existing solutions do not fully address these issues. In this paper, we provide a novel scheme that supports (i) confidentiality for events and filters; (ii) allows publishers to express further constraints about who can access their events; (iii) filters that can express very complex constraints on events even if brokers are not able to access any information in clear on both events and filters; (iv) and, finally, it does not require publishers and subscribers to share keys. Furthermore, we show how we applied our scheme to a real-world e-health scenario, developed together with a hospital. We also describe the implementation of our solution in Java and the integration with an existing publish/subscribe system.  相似文献   
47.
The aim of this work is to demonstrate the use of a commercial finite element package, ABAQUS EXPLICIT, to model ultrasonic guided waves in structural components. The particular application of interest is modeling the interaction of a broadband vertical bending mode with transverse-type defects in railroad tracks. This topic is part of a broader project on high-speed defect detection in rails by long-range ultrasonic inspections. Reflection coefficient spectra in the 20–45 kHz range are obtained for four different sizes and three different orientations of transverse head flaws. A preliminary study of Lamb waves in a free plate helps drawing modeling guidelines for the rail.  相似文献   
48.
There is a need to assess the relationship between improved rheological properties and the immunogenic potential of wheat proteins. The present study aimed to investigate the in vitro effects of total protein extracts from three modern and two landrace Triticum aestivum commercial flour mixes, with significant differences in gluten strength (GS), on cell lines. Cytotoxicity and innate immune responses induced by wheat proteins were investigated using Caco-2 monocultures, two dimensional (2D) Caco-2/U937 co-cultures, and three dimensional (3D) co-cultures simulating the intestinal mucosa with Caco-2 epithelial cells situated above an extra-cellular matrix containing U937 monocytes and L929 fibroblasts. Modern wheat proteins, with increased GS, significantly reduced Caco-2 cell proliferation and vitality in monoculture and 2D co-cultures than landrace proteins. Modern wheat proteins also augmented Caco-2 monolayer disruption and tight junction protein, occludin, redistribution in 3D co-cultures. Release of interleukin-8 into the cell medium and increased U937 monocyte migration in both 2D and 3D co-cultures were similarly apparent. Immuno-activation of migrating U937 cells was evidenced from cluster of differentiation 14 (CD14) staining and CD11b-related differentiation into macrophages. The modern wheat proteins, with gluten polymorphism relatedness and increased GS, were shown to be more cytotoxic and immunogenic than the landrace wheat proteins.  相似文献   
49.
Diabetes mellitus is a group of heterogeneous metabolic disorders characterized by chronic hyperglycaemia mainly due to pancreatic β cell death and/or dysfunction, caused by several types of stress such as glucotoxicity, lipotoxicity and inflammation. Different patho-physiological mechanisms driving β cell response to these stresses are tightly regulated by microRNAs (miRNAs), a class of negative regulators of gene expression, involved in pathogenic mechanisms occurring in diabetes and in its complications. In this review, we aim to shed light on the most important miRNAs regulating the maintenance and the robustness of β cell identity, as well as on those miRNAs involved in the pathogenesis of the two main forms of diabetes mellitus, i.e., type 1 and type 2 diabetes. Additionally, we acknowledge that the understanding of miRNAs-regulated molecular mechanisms is fundamental in order to develop specific and effective strategies based on miRNAs as therapeutic targets, employing innovative molecules.  相似文献   
50.
Circular RNAs (circRNAs) are a large class of RNAs with regulatory functions within cells. We recently showed that circSMARCA5 is a tumor suppressor in glioblastoma multiforme (GBM) and acts as a decoy for Serine and Arginine Rich Splicing Factor 1 (SRSF1) through six predicted binding sites (BSs). Here we characterized RNA motifs functionally involved in the interaction between circSMARCA5 and SRSF1. Three different circSMARCA5 molecules (Mut1, Mut2, Mut3), each mutated in two predicted SRSF1 BSs at once, were obtained through PCR-based replacement of wild-type (WT) BS sequences and cloned in three independent pcDNA3 vectors. Mut1 significantly decreased its capability to interact with SRSF1 as compared to WT, based on the RNA immunoprecipitation assay. In silico analysis through the “Find Individual Motif Occurrences” (FIMO) algorithm showed GAUGAA as an experimentally validated SRSF1 binding motif significantly overrepresented within both predicted SRSF1 BSs mutated in Mut1 (q-value = 0.0011). U87MG and CAS-1, transfected with Mut1, significantly increased their migration with respect to controls transfected with WT, as revealed by the cell exclusion zone assay. Immortalized human brain microvascular endothelial cells (IM-HBMEC) exposed to conditioned medium (CM) harvested from U87MG and CAS-1 transfected with Mut1 significantly sprouted more than those treated with CM harvested from U87MG and CAS-1 transfected with WT, as shown by the tube formation assay. qRT-PCR showed that the intracellular pro- to anti-angiogenic Vascular Endothelial Growth Factor A (VEGFA) mRNA isoform ratio and the amount of total VEGFA mRNA secreted in CM significantly increased in Mut1-transfected CAS-1 as compared to controls transfected with WT. Our data suggest that GAUGAA is the RNA motif responsible for the interaction between circSMARCA5 and SRSF1 as well as for the circSMARCA5-mediated control of GBM cell migration and angiogenic potential.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号