全文获取类型
收费全文 | 5636篇 |
免费 | 88篇 |
专业分类
电工技术 | 71篇 |
综合类 | 1篇 |
化学工业 | 658篇 |
金属工艺 | 83篇 |
机械仪表 | 91篇 |
建筑科学 | 167篇 |
矿业工程 | 17篇 |
能源动力 | 83篇 |
轻工业 | 469篇 |
水利工程 | 53篇 |
石油天然气 | 16篇 |
无线电 | 605篇 |
一般工业技术 | 748篇 |
冶金工业 | 1965篇 |
原子能技术 | 39篇 |
自动化技术 | 658篇 |
出版年
2021年 | 43篇 |
2020年 | 30篇 |
2019年 | 65篇 |
2018年 | 68篇 |
2017年 | 50篇 |
2016年 | 51篇 |
2015年 | 41篇 |
2014年 | 69篇 |
2013年 | 211篇 |
2012年 | 119篇 |
2011年 | 172篇 |
2010年 | 126篇 |
2009年 | 123篇 |
2008年 | 178篇 |
2007年 | 178篇 |
2006年 | 160篇 |
2005年 | 142篇 |
2004年 | 118篇 |
2003年 | 106篇 |
2002年 | 112篇 |
2001年 | 117篇 |
2000年 | 97篇 |
1999年 | 128篇 |
1998年 | 486篇 |
1997年 | 319篇 |
1996年 | 211篇 |
1995年 | 186篇 |
1994年 | 171篇 |
1993年 | 167篇 |
1992年 | 96篇 |
1991年 | 70篇 |
1990年 | 95篇 |
1989年 | 97篇 |
1988年 | 74篇 |
1987年 | 76篇 |
1986年 | 68篇 |
1985年 | 86篇 |
1984年 | 75篇 |
1983年 | 61篇 |
1982年 | 52篇 |
1981年 | 48篇 |
1980年 | 53篇 |
1979年 | 61篇 |
1978年 | 54篇 |
1977年 | 76篇 |
1976年 | 158篇 |
1975年 | 51篇 |
1974年 | 37篇 |
1973年 | 37篇 |
1972年 | 36篇 |
排序方式: 共有5724条查询结果,搜索用时 15 毫秒
991.
992.
JA Chinn JA Sauter RE Phillips WJ Kao JM Anderson SR Hanson TR Ashton 《Canadian Metallurgical Quarterly》1998,39(1):130-140
OBJECTIVE: The effects of BRL-32872, azimilide and a selective blocker of the delayed rectifier potassium current, E-4031, were measured at two different basic cycle lengths (BCL), 300 and 1000 ms. Calcium channel antagonists of sarcolemmal (verapamil and nitrendipine) and sarcoplasmic reticulum (ryanodine) membranes were used to investigate whether the inhibition of the calcium current or the calcium release from the sarcoplasmic reticulum could alter the reverse-rate dependence of E-4031 on action potential duration (APD). METHODS: Guinea pig isolated papillary muscles were superfused with a Tyrode solution maintained at 37 degrees C and stimulated at a BCL of 300 or 1000 ms. The standard microelectrode technique was used to record action potential parameters and to study the effects of azimilide, BRL-32872 and E-4031. E-4031 was superfused at increasing concentrations (0.01, 0.03, 0.1 and 0.3 microM) in the absence or in the presence of verapamil (0.3 microM), nitrendipine (0.03 microM) or ryanodine (0.1 microM). RESULTS: BRL-32872 and azimilide induced a self-limited concentration-dependent increase in APD. The effect of BRL-32872 was not dependent on the stimulation frequency whereas the effect of azimilide was significantly reduced at the shorter BCL. E-4031 induced a concentration-dependent increase in APD at both stimulation BCL. The increase in APD was significantly more pronounced in fibres stimulated at a BCL of 1000 ms than in fibres stimulated at a BCL of 300 ms, characterising the reverse-frequency dependent effect of class III antiarrhythmic agents. The reverse-frequency dependence in action potential prolongation induced by E-4031 was significantly reduced in the presence of a low concentration of verapamil (0.3 microM), nitrendipine (0.03 microM), or ryanodine (0.1 microM. CONCLUSION: The results show that BRL-32872, in contrast to azimilide, does not induce the reverse-rate dependency of action potential prolongation typically produced by class III antiarrhythmic agents such as E-4031. Our results also show that reverse-rate dependency induced by E-4031 can be reduced by the simultaneous administration of a low concentration of a calcium channel antagonist or an inhibitor of the release of calcium from the sarcoplasmic reticulum. It is thus suggested that compounds with a suitable balance of potassium and calcium antagonistic activities may have less adverse effects than purely selective potassium channel blockers. 相似文献
993.
J Anderson L Phan R Cuesta BA Carlson M Pak K Asano GR Bj?rk M Tamame AG Hinnebusch 《Canadian Metallurgical Quarterly》1998,12(23):3650-3662
Gcd10p and Gcd14p are essential proteins required for the initiation of protein synthesis and translational repression of GCN4 mRNA. The phenotypes of gcd10 mutants were suppressed by high-copy-number IMT genes, encoding initiator methionyl tRNA (tRNAiMet), or LHP1, encoding the yeast homolog of the human La autoantigen. The gcd10-504 mutation led to a reduction in steady-state levels of mature tRNAiMet, attributable to increased turnover rather than decreased synthesis of pre-tRNAiMet. Remarkably, the lethality of a GCD10 deletion was suppressed by high-copy-number IMT4, indicating that its role in expression of mature tRNAiMet is the essential function of Gcd10p. A gcd14-2 mutant also showed reduced amounts of mature tRNAiMet, but in addition, displayed a defect in pre-tRNAiMet processing. Gcd10p and Gcd14p were found to be subunits of a protein complex with prominent nuclear localization, suggesting a direct role in tRNAiMet maturation. The chromatographic behavior of elongator and initiator tRNAMet on a RPC-5 column indicated that both species are altered structurally in gcd10Delta cells, and analysis of base modifications revealed that 1-methyladenosine (m1A) is undetectable in gcd10Delta tRNA. Interestingly, gcd10 and gcd14 mutations had no effect on processing or accumulation of elongator tRNAMet, which also contains m1A at position 58, suggesting a unique requirement for this base modification in initiator maturation. 相似文献
994.
Adrian N. Bishop Mohammad Deghat Brian D. O. Anderson Yiguang Hong 《国际强度与非线性控制杂志
》2015,25(17):3210-3230
》2015,25(17):3210-3230
Heterogeneous formation shape control with interagent bearing and distance constraints involves the design of a distributed control law that ensures the formation moves such that these interagent constraints are achieved and maintained. This paper looks at the design of a distributed control scheme to solve different formation shape control problems in an ambient two‐dimensional space with bearing, distance and mixed bearing and distance constraints. The proposed control law allows the agents in the formation to move in any direction on a half‐plane and guarantees that despite this freedom, the proposed shape control algorithm ensures convergence to a formation shape meeting the prescribed constraints. This work provides an interesting and novel contrast to much of the existing work in formation control where distance‐only constraints are typically maintained and where each agent's motion is typically restricted to follow a very particular path. A stability analysis is sketched, and a number of illustrative examples are also given. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
995.
K-winner networks. 总被引:2,自引:0,他引:2
W J Wolfe D Mathis C Anderson J Rothman M Gottler G Brady R Walker G Duane G Alaghband 《Neural Networks, IEEE Transactions on》1991,2(2):310-315
A special class of mutually inhibitory networks is analyzed, and parameters for reliable K-winner performance are presented. The network dynamics are modeled using interactive activation, and results are compared with the sigmoid model. For equal external inputs, network parameters that select the units with the larger initial activations (the network converges to the nearest stable state) are derived. Conversely, for equal initial activations, networks that select the units with larger external inputs (the network converges to the lowest energy stable state) are derived. When initial activations are mixed with external inputs, anomalous behavior results. These discrepancies are analyzed with several examples. Restrictions on initial states are derived which ensure accurate K-winner performance when unequal external inputs are used. 相似文献
996.
Ladislav J. Kohout Isabel Stabile Hasan Kalantar F. San-Andres John Anderson 《Reliable Computing》1995,1(2):109-140
The paper continues a series of papers and a monograph [33], where we have described the conceptual structures as well as the basic architecture of a knowledge-based systemCunaid. 相似文献
997.
998.
Bonnie Brinton Anderson Anthony Vance C Brock Kirwan David Eargle Jeffrey L Jenkins 《欧洲信息系统杂志》2016,25(4):364-390
Users are vital to the information security of organizations. In spite of technical safeguards, users make many critical security decisions. An example is users’ responses to security messages – discrete communication designed to persuade users to either impair or improve their security status. Research shows that although users are highly susceptible to malicious messages (e.g., phishing attacks), they are highly resistant to protective messages such as security warnings. Research is therefore needed to better understand how users perceive and respond to security messages. In this article, we argue for the potential of NeuroIS – cognitive neuroscience applied to Information Systems – to shed new light on users’ reception of security messages in the areas of (1) habituation, (2) stress, (3) fear, and (4) dual-task interference. We present an illustrative study that shows the value of using NeuroIS to investigate one of our research questions. This example uses eye tracking to gain unique insight into how habituation occurs when people repeatedly view security messages, allowing us to design more effective security messages. Our results indicate that the eye movement-based memory (EMM) effect is a cause of habituation to security messages – a phenomenon in which people unconsciously scrutinize stimuli that they have previously seen less than other stimuli. We show that after only a few exposures to a warning, this neural aspect of habituation sets in rapidly, and continues with further repetitions. We also created a polymorphic warning that continually updates its appearance and found that it is effective in substantially reducing the rate of habituation as measured by the EMM effect. Our research agenda and empirical example demonstrate the promise of using NeuroIS to gain novel insight into users’ responses to security messages that will encourage more secure user behaviors and facilitate more effective security message designs. 相似文献
999.
Daniel McDonald Randall Boyle John Anderson 《Journal of Computer Information Systems》2016,56(4):331-340
The amount of deception taking place via electronic text-based communication is increasing. Research has sought to automatically detect deception by analyzing the text from the communicator. However, the deceptive intent of the communication partner is being ignored. We compare the text from subjects who are trying to deceive each other, subjects trying to deceive truth tellers, subjects telling the truth to truth tellers, and subjects telling the truth to deceivers. We hypothesize that despite the intent of the partner, deceitful text will cluster closest to deceitful text. We cluster each of the four conditions using the text content. The cluster algorithm placed subjects trying to deceive each other closest to subjects telling the truth to each other. In this analysis, the language that led subjects to choose the same outcomes had a stronger effect than the language tied to being deceitful or truthful. 相似文献
1000.