首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1269篇
  免费   50篇
  国内免费   1篇
电工技术   13篇
综合类   6篇
化学工业   245篇
金属工艺   28篇
机械仪表   37篇
建筑科学   38篇
矿业工程   1篇
能源动力   14篇
轻工业   285篇
水利工程   3篇
无线电   67篇
一般工业技术   222篇
冶金工业   239篇
原子能技术   17篇
自动化技术   105篇
  2021年   21篇
  2020年   15篇
  2018年   26篇
  2017年   23篇
  2016年   20篇
  2015年   26篇
  2014年   12篇
  2013年   68篇
  2012年   36篇
  2011年   40篇
  2010年   39篇
  2009年   36篇
  2008年   25篇
  2007年   40篇
  2006年   36篇
  2005年   19篇
  2004年   26篇
  2003年   20篇
  2002年   24篇
  2001年   18篇
  2000年   14篇
  1999年   16篇
  1998年   77篇
  1997年   49篇
  1996年   35篇
  1995年   34篇
  1994年   34篇
  1993年   17篇
  1992年   16篇
  1990年   15篇
  1989年   16篇
  1988年   18篇
  1987年   18篇
  1986年   14篇
  1985年   15篇
  1984年   15篇
  1983年   15篇
  1982年   17篇
  1981年   17篇
  1980年   17篇
  1979年   17篇
  1978年   28篇
  1977年   26篇
  1976年   31篇
  1975年   19篇
  1974年   18篇
  1973年   21篇
  1972年   12篇
  1971年   17篇
  1970年   11篇
排序方式: 共有1320条查询结果,搜索用时 343 毫秒
61.
新型交流耦合结构使低功耗近眼微显示器使用3.3V供电的CMOS电路成为可能。  相似文献   
62.
Economic globalization leads to complex decentralized company structures calling for the extensive use of distributed IT-systems. The business processes of a company have to reflect these changes of infrastructure. In particular, due to new electronic applications and the inclusion of a higher number of—potentially unknown—persons, the business processes are more vulnerable against malicious attacks than traditional processes. Thus, a business should undergo a security analysis. Here, the vulnerabilities of the business process are recognized, the risks resulting from the vulnerabilities are calculated, and suitable safeguards reducing the vulnerabilities are selected. Unfortunately, a security analysis tends to be complex and affords expensive security expert support. In order to reduce the expense and to enable domain experts with in-depth insight in business processes but with limited knowledge about security to develop secure business processes, we developed the framework MoSSBP facilitating the handling of business process security requirements from their specification to their realization. In particular, MoSS BP provides graphical concepts to specify security requirements, repositories of various mechanisms enforcing the security requirements, and a collection of reference models and case studies enabling the modification of the business processes. In this paper, the MoSS BP -framework is presented. Additionally, we introduce a tool supporting the MoSSBP-related security analysis of business processes and the incorporation of safeguards. This tool is based on object-oriented process models and acts with graph rewrite systems. Finally, we clarify the application of the MoSSBP-framework by means of a business process for tender-handling which is provided by anonymity-preserving safeguards. Peter Herrmann studied computer science at the University of Karlsruhe, Germany (diploma in 1990). Afterwards, he worked as a Ph.D. student (doctorate in 1997) and postdoctoral researcher in the Computer Networks and Distributed Systems Group of the Computer Science Department at the University of Dortmund, Germany. Since 2005 he is a full professor for formal methods at the Department for Telematics of the Norwegian University of Science and Technology (NTNU) in Trondheim, Norway. His research interests include the formal-based development of networked systems and the engineering of distributed services. Moreover, he is interested in security and trust aspects of component structured distributed software. Gaby Herrmann studied computer science at the University of Karlsruhe, Germany (diploma in 1991). Afterwards, she worked as a researcher in the Communication Group and the Information Systems Group at University of Duisburg-Essen (Doctorate in 2001, topic: security of business processes). Since 2000 she works as executive secretary at the Department of Economics, Business Studies and Computer Sciences at the same university.  相似文献   
63.
We present measurements of the spatial response of infrared dipole and bow-tie lithographic antennas. Focused 10.6-mum radiation was scanned in two dimensions across the receiving area of each antenna. Deconvolution of the beam profile allowed the spatial response to be measured. The in-plane width of the antenna's spatial response extends approximately one dielectric wavelength beyond the metallic structure. Determination of an antenna's spatial response is important for several reasons. The power collected by the antenna can be calculated, if the collection area and the input irradiance (watts per square centimeter) are known. The actual power collected by the antenna is required for computation of responsivity and noise-equivalent power. In addition, the spatial response provides insight into the current-wave modes that propagate on an antenna and the nature of the fringe fields that exist in the adjacent dielectric.  相似文献   
64.
Titin is a giant elastic protein in vertebrate striated muscles with an unprecedented molecular mass of 3-4 megadaltons. Single molecules of titin extend from the Z-line to the M-line. Here, we define the molecular layout of titin within the Z-line; the most NH2-terminal 30 kD of titin is located at the periphery of the Z-line at the border of the adjacent sarcomere, whereas the subsequent 60 kD of titin spans the entire width of the Z-line. In vitro binding studies reveal that mammalian titins have at least four potential binding sites for alpha-actinin within their Z-line spanning region. Titin filaments may specify Z-line width and internal structure by varying the length of their NH2-terminal overlap and number of alpha-actinin binding sites that serve to cross-link the titin and thin filaments. Furthermore, we demonstrate that the NH2-terminal titin Ig repeats Z1 and Z2 in the periphery of the Z-line bind to a novel 19-kD protein, referred to as titin-cap. Using dominant-negative approaches in cardiac myocytes, both the titin Z1-Z2 domains and titin-cap are shown to be required for the structural integrity of sarcomeres, suggesting that their interaction is critical in titin filament-regulated sarcomeric assembly.  相似文献   
65.
66.
67.
68.
69.
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号