首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   116篇
  免费   8篇
电工技术   3篇
综合类   2篇
化学工业   27篇
金属工艺   1篇
机械仪表   1篇
建筑科学   3篇
能源动力   1篇
轻工业   14篇
水利工程   1篇
无线电   13篇
一般工业技术   21篇
冶金工业   1篇
原子能技术   1篇
自动化技术   35篇
  2023年   9篇
  2022年   11篇
  2021年   7篇
  2020年   7篇
  2019年   8篇
  2018年   5篇
  2017年   7篇
  2016年   7篇
  2015年   5篇
  2014年   6篇
  2013年   5篇
  2012年   6篇
  2011年   5篇
  2010年   3篇
  2009年   6篇
  2008年   2篇
  2007年   4篇
  2006年   1篇
  2005年   3篇
  2004年   5篇
  2003年   4篇
  2002年   2篇
  1997年   1篇
  1995年   1篇
  1994年   2篇
  1991年   1篇
  1987年   1篇
排序方式: 共有124条查询结果,搜索用时 15 毫秒
61.
Octadecane was isomerized over three different Pt/H-ZSM-23 samples. The distributions of methylheptadecane and dimethylheptadecane skeletal isomers obtained on the Pt/ZSM-23 samples were very similar. Positional isomer distributions are fingerprints of the zeolite framework structure. The independence of skeletal isomer distributions from Al-gradients and particle size constitutes a strong argument in favor of pore-mouth catalysis.  相似文献   
62.
FtsH metalloproteases found in eubacteria, animals, and plants are well-known for their vital role in the maintenance and proteolysis of membrane proteins. Their location is restricted to organelles of endosymbiotic origin, the chloroplasts, and mitochondria. In the model organism Arabidopsis thaliana, there are 17 membrane-bound FtsH proteases containing an AAA+ (ATPase associated with various cellular activities) and a Zn2+ metalloprotease domain. However, in five of those, the zinc-binding motif HEXXH is either mutated (FtsHi1, 2, 4, 5) or completely missing (FtsHi3), rendering these enzymes presumably inactive in proteolysis. Still, homozygous null mutants of the pseudo-proteases FtsHi1, 2, 4, 5 are embryo-lethal. Homozygous ftshi3 or a weak point mutant in FTSHi1 are affected in overall plant growth and development. This review will focus on the findings concerning the FtsHi pseudo-proteases and their involvement in protein import, leading to consequences in embryogenesis, seed growth, chloroplast, and leaf development and oxidative stress management.  相似文献   
63.
Maternal vitamin D insufficiency is not uncommon. Infants born to mothers who are deficient in vitamin D and or calcium, usually due to cultural modifications in their diets or clothing habits, and in addition are breastfed, are at risk of developing vitamin D deficiency and hypocalcaemia. We present a case of neonatal hypocalcaemic seizures secondary to vitamin D deficiency.  相似文献   
64.
65.
Malware phylogeny generation using permutations of code   总被引:1,自引:1,他引:0  
Malicious programs, such as viruses and worms, are frequently related to previous programs through evolutionary relationships. Discovering those relationships and constructing a phylogeny model is expected to be helpful for analyzing new malware and for establishing a principled naming scheme. Matching permutations of code may help build better models in cases where malware evolution does not keep things in the same order. We describe methods for constructing phylogeny models that uses features called n-perms to match possibly permuted codes. An experiment was performed to compare the relative effectiveness of vector similarity measures using n-perms and n-grams when comparing permuted variants of programs. The similarity measures using n-perms maintained a greater separation between the similarity scores of permuted families of specimens versus unrelated specimens. A subsequent study using a tree generated through n-perms suggests that phylogeny models based on n-perms may help forensic analysts investigate new specimens, and assist in reconciling malware naming inconsistencies  相似文献   
66.
Occurrence of faults in Network on Chip (NoC) is inevitable as the feature size is continuously decreasing and processing elements are increasing in numbers.Faults can be revocable if it is transient.T...  相似文献   
67.
International Journal of Information Security - Click Hijacking (clickjacking) is emerging as a web-based threat on the Internet. The prime objective of clickjacking is stealing user clicks. An...  相似文献   
68.
Clean Technologies and Environmental Policy - Environmental impact assessment has gained equal importance with economics in process industries. Various methodologies are extensively used for impact...  相似文献   
69.
The Journal of Supercomputing - The paradigm of computing has shifted from computation-centric to communication-centric designs. Network-on-chip has emerged as an alternative interconnect mechanism...  相似文献   
70.
Multimedia Tools and Applications - In recent years, there is an exponential increase in the growth of the multimedia data, which is being generated from zettabyte to petabyte scale. At the same...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号