首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3004篇
  免费   71篇
  国内免费   1篇
电工技术   30篇
综合类   1篇
化学工业   387篇
金属工艺   42篇
机械仪表   49篇
建筑科学   158篇
矿业工程   114篇
能源动力   70篇
轻工业   240篇
水利工程   30篇
石油天然气   9篇
无线电   232篇
一般工业技术   456篇
冶金工业   929篇
原子能技术   27篇
自动化技术   302篇
  2022年   15篇
  2021年   41篇
  2020年   35篇
  2019年   48篇
  2018年   54篇
  2017年   44篇
  2016年   45篇
  2015年   41篇
  2014年   73篇
  2013年   182篇
  2012年   84篇
  2011年   141篇
  2010年   93篇
  2009年   100篇
  2008年   103篇
  2007年   102篇
  2006年   104篇
  2005年   90篇
  2004年   87篇
  2003年   65篇
  2002年   86篇
  2001年   59篇
  2000年   47篇
  1999年   58篇
  1998年   208篇
  1997年   140篇
  1996年   97篇
  1995年   70篇
  1994年   64篇
  1993年   64篇
  1992年   39篇
  1991年   30篇
  1990年   30篇
  1989年   31篇
  1988年   32篇
  1987年   34篇
  1986年   31篇
  1985年   34篇
  1984年   27篇
  1983年   19篇
  1982年   36篇
  1981年   31篇
  1980年   29篇
  1979年   20篇
  1978年   20篇
  1977年   30篇
  1976年   48篇
  1975年   9篇
  1974年   13篇
  1972年   15篇
排序方式: 共有3076条查询结果,搜索用时 15 毫秒
31.
Panek  Edwige  Cook  George A.  Cornell  Neal W. 《Lipids》1977,12(10):814-818
Fatty acid and cholesterol synthesis in isolated rat hepatocytes were strongly inhibited by 5-(tetradecyloxy)-2-furoic acid. With either3H2O or [2-14C]acetate as the labeled precursor, the concentrations of inhibitor causing 50% decrease in fatty acid and cholesterol synthesis were, respectively, <0.005 mM and 0.020 mM. At 0.1 mM inhibitor, citrate concentration in cells from fed rats was increased by 75%; lactate and pyruvate concentrations were decreased by 30%; ethanol oxidation was decreased by 20%; with cells from starved rats, the mitochondrial [NAD+]/[NADH] was decreased. Other parameters were unaffected. Both its potency and its specificity indicate that 5-(tetradecyloxy)-2-furoic acid will be useful in studies on the regulation of lipid biosynthesis.  相似文献   
32.
We describe Social Reader, a feed-reader-plus-social-network aggregator that mines comments from social media in order to display a user’s relational neighborhood as a navigable social network. Social Reader’s network visualization enhances mutual awareness of blogger communities, facilitates their exploration and growth with a fully dragn- drop interface, and provides novel ways to filter and summarize people, groups, blogs and comments. We discuss the architecture behind the reader, highlight tasks it adds to the workflow of a typical reader, and assess their cost. We also explore the potential of mood-based features in social media applications. Mood is particularly relevant to social media, reflecting the personal nature of the medium. We explore two prototype mood-based features: colour coding the mood of recent posts according to a valence/arousal map, and a mood-based abstract of recent activity using image media. A six week study of the software involving 20 users confirmed the usefulness of the novel visual display, via a quantitative analysis of use logs, and an exit survey.  相似文献   
33.
Pick a binary string of length n and remove its first bit b. Now insert b after the first remaining 10, or insert $\overline{b}$ at the end if there is no remaining 10. Do it again. And again. Keep going! Eventually, you will cycle through all 2 n of the binary strings of length n. For example, are the binary strings of length n=4, where and . And if you only want strings with weight (number of 1s) between ? and u? Just insert b instead of $\overline{b}$ when the result would have too many 1s or too few 1s. For example, are the strings with n=4, ?=0 and u=2. This generalizes ‘cool-lex’ order by Ruskey and Williams (The coolest way to generate combinations, Discrete Mathematics) and we present two applications of our ‘cooler’ order. First, we give a loopless algorithm for generating binary strings with any weight range in which successive strings have Levenshtein distance two. Second, we construct de Bruijn sequences for (i) ?=0 and any u (maximum specified weight), (ii) any ? and u=n (minimum specified weight), and (iii) odd u?? (even size weight range). For example, all binary strings with n=6, ?=1, and u=4 appear once (cyclically) in . We also investigate the recursive structure of our order and show that it shares certain sublist properties with lexicographic order.  相似文献   
34.
The construction of dams significantly alters flow and sediment regimes with subsequent deleterious effects on the morphological and ecological character of rivers. Effective experimental floods can ameliorate the downstream geomorphic impacts of dams. The traditional view is that large floods are required to perform effective geomorphic work, and the geomorphic outcomes of small floods are often overlooked. Many river restoration frameworks do not consider small floods. Yet, there is evidence that the hydrological characteristics that ameliorate specific geomorphic impacts in a river are unique to each river, and a customised approach to setting the right mix of floods (including small experimental floods) is needed. In this study, we modify an existing flood effectiveness model developed for large floods, for determining the geomorphic effectiveness of small floods in a highly regulated Australian river. Two flood classes were added to the model (medium peak stream power and moderate total energy expenditure), and the flood power characteristics were rescaled to reflect the relative difference in the magnitude of the small floods and the magnitude of the geomorphic work performed. Using a step‐wise approach, this customised model determined the geomorphic effectiveness of small floods. The best flood for ameliorating the geomorphic impacts of flow regulation had medium to long duration (10 to 51 days), high peak unit stream power (77 to 123 Wm?2) and moderate to large total energy expenditure (78,600 to 342,320 × 103 J). This approach to determining flood effectiveness for small floods is applicable to other geomorphically impacted river channels downstream of dams and can be used to inform experimental flood releases for geomorphic outcomes.  相似文献   
35.
The sensing context plays an important role in many pervasive and mobile computing applications. Continuing from previous work [D. Phung, B. Adams, S. Venkatesh, Computable social patterns from sparse sensor data, in: Proceedings of First International Workshop on Location Web, World Wide Web Conference (WWW), New York, NY, USA, 2008, ACM 69–72.], we present an unsupervised framework for extracting user context in indoor environments with existing wireless infrastructures. Our novel approach casts context detection into an incremental, unsupervised clustering setting. Using WiFi observations consisting of access point identification and signal strengths freely available in office or public spaces, we adapt a density-based clustering technique to recover basic forms of user contexts that include user motion state and significant places the user visits from time to time. High-level user context, termed rhythms, comprising sequences of significant places are derived from the above low-level context by employing probabilistic clustering techniques, latent Dirichlet allocation and its n-gram temporal extension. These user contexts can enable a wide range of context-ware application services. Experimental results with real data in comparison with existing methods are presented to validate the proposed approach. Our motion classification algorithm operates in real-time, and achieves a 10% improvement over an existing method; significant locations are detected with over 90% accuracy and near perfect cluster purity. Richer indoor context and meaningful rhythms, such as typical daily routines or meeting patterns, are also inferred automatically from collected raw WiFi signals.  相似文献   
36.
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while incurring a computational workload that is proportional to the block size. Our method uses the round function of an existing block cipher as a black box and inserts it into a substitution- permutation network. Our method is designed to enable us to form a reduction between the elastic and the original versions of the cipher. Using this reduction, we prove that the elastic version of a cipher is secure against key-recovery attacks if the original cipher is secure against such attacks. We note that while reduction-based proofs of security are a cornerstone of cryptographic analysis, they are typical when complete components are used as sub-components in a larger design. We are not aware of the use of such techniques in the case of concrete block cipher designs. We demonstrate the general applicability of the elastic block cipher method by constructing examples from existing block ciphers: AES, Camellia, MISTY1, and RC6. We compare the performance of the elastic versions to that of the original versions and evaluate the elastic versions using statistical tests measuring the randomness of the ciphertext. We also use our examples to demonstrate the concept of a generic key schedule for block ciphers.
Angelos D. KeromytisEmail:
  相似文献   
37.
The paper discusses a series of driving trials that were conducted to investigate postural stability of disabled drivers and to assess the effectiveness of a representative sample of support aids. Twenty-three disabled drivers with varying levels of physical disability and seven non disabled drivers participated in the study. The test car was equipped with transducers to measure vehicle velocity and acceleration (longitudinal and lateral), steering wheel movement and torque, and the bracing forces exerted by the driver on the steering wheel. Video cameras were installed to record postural support strategies and displacement of the driver and to record deviation of the car from the specified path. Subjective data regarding driver attitudes and acceptance were also collected through the administration of questionnaires. Findings from the study showed that support aids significantly improved driving performance and reduced physical exertion to maintain an upright driving position for disabled drivers. However, ergonomics design aspects regarding the ease of use and acceptance of the support aids by the end users were identified as obstacles to their sustained use in everyday driving.  相似文献   
38.
39.
The melting and vaporization of the 1223 [(Tl,Pb):(Ba,Sr):Ca:Cu] oxide phase in the system (Tl-Pb-Ba-Sr-Ca-Cu-O) have been investigated using a combination of dynamic methods (differential thermal analysis, thermogravimetry, effusion) and post-quenching characterization techniques (powder x-ray diffraction, scanning electron microscopy, energy dispersive x-ray spectrometry). Vaporization rates, thermal events, and melt compositions were followed as a function of thallia loss from a 1223 stoichiometry. Melting and vaporization equilibria of the 1223 phase are complex, with as many as seven phases participating simultaneously. At a total pressure of 0.1 MPa the 1223 phase was found to melt completely at (980 ± 5) °C in oxygen, at a thallia partial pressure (pTl2O) of (4.6 ± 0.5) kPa, where the quoted uncertainties are standard uncertainties, i.e., 1 estimated standard deviation. The melting reaction involves five other solids and a liquid, nominally as follows: 12231212+(Ca,Sr)2CuO3+(Sr,Ca)CuO2+BaPbO3+(Ca,Sr)O+LiquidStoichiometries of the participating phases have been determined from microchemical analysis, and substantial elemental substitution on the 1212 and 1223 crystallographic sites is indicated. The 1223 phase occurs in equilibrium with liquids from its melting point down to at least 935 °C. The composition of the lowest melting liquid detected for the bulk compositions of this study has been measured using microchemical analysis. Applications to the processing of superconducting wires and tapes are discussed.  相似文献   
40.
Erik Hollnagel’s body of work in the past three decades has molded much of the current research approach to system safety, particularly notions of “error”. Hollnagel regards “error” as a dead-end and avoids using the term. This position is consistent with Rasmussen’s claim that there is no scientifically stable category of human performance that can be described as “error”. While this systems view is undoubtedly correct, “error” persists. Organizations, especially formal business, political, and regulatory structures, use “error” as if it were a stable category of human performance. They apply the term to performances associated with undesired outcomes, tabulate occurrences of “error”, and justify control and sanctions through “error”. Although a compelling argument can be made for Hollnagel’s view, it is clear that notions of “error” are socially and organizationally productive. The persistence of “error” in management and regulatory circles reflects its value as a means for social control.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号