全文获取类型
收费全文 | 486篇 |
免费 | 4篇 |
专业分类
电工技术 | 4篇 |
化学工业 | 41篇 |
金属工艺 | 3篇 |
机械仪表 | 12篇 |
建筑科学 | 17篇 |
能源动力 | 3篇 |
轻工业 | 29篇 |
水利工程 | 6篇 |
无线电 | 65篇 |
一般工业技术 | 67篇 |
冶金工业 | 173篇 |
原子能技术 | 15篇 |
自动化技术 | 55篇 |
出版年
2023年 | 2篇 |
2022年 | 3篇 |
2021年 | 4篇 |
2020年 | 3篇 |
2018年 | 5篇 |
2017年 | 2篇 |
2016年 | 2篇 |
2014年 | 7篇 |
2013年 | 19篇 |
2012年 | 7篇 |
2011年 | 10篇 |
2010年 | 6篇 |
2009年 | 15篇 |
2008年 | 18篇 |
2007年 | 19篇 |
2006年 | 21篇 |
2005年 | 16篇 |
2004年 | 15篇 |
2003年 | 11篇 |
2002年 | 12篇 |
2001年 | 12篇 |
2000年 | 11篇 |
1999年 | 17篇 |
1998年 | 37篇 |
1997年 | 27篇 |
1996年 | 15篇 |
1995年 | 14篇 |
1994年 | 13篇 |
1993年 | 23篇 |
1992年 | 9篇 |
1991年 | 12篇 |
1990年 | 11篇 |
1989年 | 13篇 |
1988年 | 6篇 |
1987年 | 2篇 |
1986年 | 10篇 |
1985年 | 3篇 |
1984年 | 6篇 |
1983年 | 4篇 |
1981年 | 2篇 |
1979年 | 2篇 |
1978年 | 4篇 |
1977年 | 5篇 |
1976年 | 12篇 |
1975年 | 4篇 |
1974年 | 5篇 |
1973年 | 3篇 |
1970年 | 2篇 |
1967年 | 1篇 |
1965年 | 1篇 |
排序方式: 共有490条查询结果,搜索用时 0 毫秒
71.
The authors used a path model to test the hypothesis that emotional closeness and conflict between adult–child caregivers (N?=?90) and their impaired parents mediated the impact of the parents' functional and cognitive impairment on the caregivers' subjective stress, subjective effectiveness, and depression. Closeness mediated the relationship between cognitive impairment and both stress and effectiveness, whereas conflict mediated cognitive impairment for all 3 outcomes and generally accounted for more variance. There was limited evidence that functional impairment was mediated by the quality of the relationship. Results highlight the importance of both positive and negative ties as intervening mechanisms influencing caregivers' well-being, especially in the presence of cognitive dysfunction. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
72.
Alspaugh Mary E. Liming; Stephens Mary Ann Parris; Townsend Aloen L.; Zarit Steven H.; Greene Rick 《Canadian Metallurgical Quarterly》1999,14(1):34
The present study examined how patterns of risk for depression over 1 year in 188 dementia caregivers (consistently asymptomatic, n ?=?88; consistently symptomatic, n ?=?40; changing risk, n ?=?60) could be predicted by objective (behavior problems of the relative) and subjective (role captivity and overload) primary stress. Results reveal that all primary stressors differentiated caregivers who remained at low levels of symptomatology over the course of 1 year from those who were at risk for experiencing a depressive disorder. In addition, caregivers' subjective experience of role captivity predicted the chronicity of risk. Findings extend prior caregiving research on patterns of depressive symptomatology by highlighting the relationship between subjective primary stressors and stability and change in caregivers' mental health. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
73.
Abnormal rhythms of the heart are often preceded by the occurrence of ectopic beats. These are difficult to detect as their shape is not very different from that of a normal QRS complex, the main feature in the electrocardiogram. We show how an auto-asociative multi-layer perceptron can be trained to detect normal beats only, so that the subtle abnormalities in shape of ectopic beats become clearly identifiable. This is a generic detector of abnormal beats (i.e. beats whose morphology is different from that of a normal beat) and we use ventricular ectopic beats to illustrate the performance of the algorithm. We also propose a new parameter, the variance ratio, to monitor the progress of learning in an auto-associative network. 相似文献
74.
Christian Collberg Andrew Huntwork Edward Carter Gregg Townsend Michael Stepp 《Information and Software Technology》2009,51(1):56-67
This paper presents an implementation of the watermarking method proposed by Venkatesan et al. in their paper [R. Venkatesan, V. Vazirani, S. Sinha, A graph theoretic approach to software watermarking, in: Fourth International Information Hiding Workshop, Pittsburgh, PA, 2001]. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We present two algorithms for splitting a watermark number into a redundant set of pieces and an algorithm for turning a watermark number into a control-flow graph. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks. 相似文献
75.
Structural and Multidisciplinary Optimization - Shell structures are some of the most widely used in engineering applications. Flat plates, stiffened panels, and wing ribs are each examples of... 相似文献
76.
Kathrin Sundberg Alan J. Townsend Albrecht Seidel Bengt Jernström 《Polycyclic Aromatic Compounds》2013,33(1-4):123-133
V79 cells and cells over-expressing glutathione transferase (GST) P1-1 have been incubated with the (+)- and (?)-anti?enantiomers of trans?7,8-dihydroxy-9,10-epoxy- 7,8,9,10-tetrahydrobenzo[a]pyrene (BPDE) and trans?9,10-dihydroxy-11,12-epoxy-9,10,11,12-tetrahydrobenzo[c]chrysene (BCDE) and the formation of glutathione (GSH) conjugates and DNA adducts monitored. With (+)-anti?BPDE and (?)-anti?BCDE, the results demonstrate a several fold increase in conjugate formation concomitant with reduced levels of DNA adducts in GST expressing cells relative to control cells. Thus, the effects were restricted to the enantiomers with R?absolute configuration at the benzylic oxirane carbon. The rate of conjugate formation of BCDE relative to BPDE is significantly lower indicating reduced accessibility of the more lipophilic BCDE for GSTP1-1. 相似文献
77.
Simon J.D. Phoenix Stephen M. Barnett Paul D. Townsend K.J. Blow 《Journal of Modern Optics》2013,60(6):1155-1163
Abstract Quantum cryptography has been shown to be an effective technology for the secure distribution of keys on point-to-point optical links. We show how the existing techniques can be extended to allow multi-user secure key distribution on optical networks. We demonstrate that using network configurations typical of those found in passive optical network architectures any of the current quantum key distribution protocols can be adapted to implement secure key distribution from any user to any other user. An important feature of these adapted protocols is that the broadcaster, or service provider on the network, does not have to be trusted by the two users who wish to establish a key. 相似文献
78.
Dosimetry and other techniques provide depth-age profiles in materials as diverse as sediments and ice. A frequent characteristic feature of these plots is a non-linear curve with a foreshortened depth scale. Whilst the age analyses from the dosimetry do not present a problem, many authors have made subsequent assumptions on the basis of the curve shape with respect to climate and environmental changes. Such claims should be strongly questioned, as by using a model which includes the effects of compaction, most of the original curves transform into linear plots corresponding to constant depositional rates. The corrections and the implications for models of climate change are discussed. 相似文献
79.
A worker noted a small wound to his thumb when leaving a work site that was undergoing decontamination because of past operations with plutonium (Pu) and americium (Am). Direct surveys of the wound site confirmed the presence of contamination. The chelating agent Ca-DTPA was administered via a nebuliser within an hour after discovery of the wound. External measurements were made of the wound site and wound dressings; 24-h urinary excretion data were collected periodically and the Pu and Am urine content was determined. Zn-DTPA was administered on three occasions. The ICRP Pu systemic model was modified to consider the enhanced urinary excretion following administration of the chelating agents. The analysis indicated that the wound resulted in an initial deposition of 400 Bq 238Pu, 2240 Bq (239/240)Pu and 1060 Bq 241Am. About 70% of the initial wound activity was removed by surgical procedures and less than 1% of the wound activity was removed by chelation therapy. This paper compares the observed urinary excretion data with that indicated by a simulation of the kinetics of the transfer from the wound site and the kinetics of the chelating agent and Pu. 相似文献
80.
Song J Dubey B Jang YC Townsend T Solo-Gabriele H 《Journal of hazardous materials》2006,128(2-3):280-288
The wood preservative chromated copper arsenate (CCA) contains hexavalent chromium [Cr(VI)] and the conversion of Cr(VI) to trivalent chromium [Cr(III)] drives fixation of the treatment chemicals to the wood fibers. Since the toxicity of Cr depends on its valence state, an assessment of the Cr species occurring in CCA-treated wood, as well as leachates and ashes from CCA-treated wood, is helpful when assessing implications for disposal. In this study, both new and weathered wood samples of CCA-treated wood and their ashes were evaluated for total Cr and Cr(VI) within the solid matrices and within leachates. Results show that for both new and weathered CCA-treated wood, Cr(VI) occurred in the range of 0.7-4% of the total Cr. Greater Cr leaching occurred at the pH extremes, with Cr(VI) only measured under alkaline pH values (pH > 9.0). Total chromium concentrations from synthetic precipitation leaching procedure (SPLP) leachates from CCA-treated wood were consistently less than 3mg/L with Cr(VI) below detection limits. The results suggest that leaching of Cr(VI) from discarded CCA-treated wood should not be a concern in most landfill environments. One exception would be disposal in landfills with alkaline leachate; Cr(VI) was observed to leach from CCA-treated wood in the presence of alkaline leachate from crushed concrete. When CCA-treated wood is combusted, chromium becomes concentrated in the ash. Cr(VI) in ash from the combustion of CCA-treated wood was found between 4 and 7% of the total chromium. In ash from the combustion of wood recovered from construction and demolition (C&D) debris (which contained some CCA-treated wood), Cr(VI) accounted for as much as 43% of the total Cr. Nearly, all of the Cr in SPLP leachates produced from the ash was in the Cr(VI) form. The degree of Cr(VI) leaching from the ash was highly dependent upon the alkalinity of the ash, with higher ash leachate pH resulting in greater concentrations of Cr(VI). 相似文献