全文获取类型
收费全文 | 374篇 |
免费 | 3篇 |
专业分类
电工技术 | 4篇 |
化学工业 | 27篇 |
金属工艺 | 1篇 |
机械仪表 | 3篇 |
建筑科学 | 1篇 |
能源动力 | 3篇 |
轻工业 | 18篇 |
无线电 | 57篇 |
一般工业技术 | 44篇 |
冶金工业 | 209篇 |
原子能技术 | 2篇 |
自动化技术 | 8篇 |
出版年
2023年 | 2篇 |
2020年 | 2篇 |
2019年 | 4篇 |
2017年 | 5篇 |
2016年 | 8篇 |
2015年 | 3篇 |
2014年 | 2篇 |
2013年 | 8篇 |
2012年 | 4篇 |
2011年 | 10篇 |
2010年 | 5篇 |
2009年 | 4篇 |
2008年 | 6篇 |
2007年 | 4篇 |
2006年 | 8篇 |
2005年 | 6篇 |
2004年 | 6篇 |
2003年 | 4篇 |
2002年 | 3篇 |
2001年 | 3篇 |
2000年 | 2篇 |
1999年 | 7篇 |
1998年 | 63篇 |
1997年 | 41篇 |
1996年 | 34篇 |
1995年 | 17篇 |
1994年 | 11篇 |
1993年 | 16篇 |
1992年 | 10篇 |
1991年 | 3篇 |
1990年 | 3篇 |
1989年 | 5篇 |
1988年 | 8篇 |
1987年 | 4篇 |
1986年 | 4篇 |
1985年 | 5篇 |
1984年 | 4篇 |
1983年 | 3篇 |
1982年 | 2篇 |
1981年 | 3篇 |
1980年 | 3篇 |
1977年 | 8篇 |
1976年 | 9篇 |
1973年 | 3篇 |
1970年 | 1篇 |
1967年 | 1篇 |
1964年 | 1篇 |
1962年 | 1篇 |
1957年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有377条查询结果,搜索用时 0 毫秒
101.
Vectors derived from adeno-associated virus (AAV) have the potential to stably transduce mammalian cells by integrating into host chromosomes. Despite active research on the use of AAV vectors for gene therapy, the structure of integrated vector proviruses has not previously been analyzed at the DNA sequence level. Studies on the integration of wild-type AAV have identified a common site-specific integration locus on human chromosome 19; however, most AAV vectors do not appear to integrate at this locus. To improve our understanding of AAV vector integration, we analyzed the DNA sequences of several integrated vector proviruses. HeLa cells were transduced with an AAV shuttle vector, and integrated proviruses containing flanking human DNA were recovered as bacterial plasmids for further analysis. We found that AAV vectors integrated as single-copy proviruses at random chromosomal locations and that the flanking HeLa DNA at integration sites was not homologous to AAV or the site-specific integration locus of wild-type AAV. Recombination junctions were scattered throughout the vector terminal repeats with no apparent site specificity. None of the integrated vectors were fully intact. Vector proviruses with nearly intact terminal repeats were excised and amplified after infection with wild-type AAV and adenovirus. Our results suggest that AAV vectors integrate by nonhomologous recombination after partial degradation of entering vector genomes. These findings have important implications for the mechanism of AAV vector integration and the use of these vectors in human gene therapy. 相似文献
102.
103.
We present high resolution and high speed (5 µs) photographs of 4He drops undergoing pinch-off and sliding down a cesiated inclined plane. When a fluid drop is stretched and pulled apart by gravity, a balance of surface tension and inertia resugts in a striking icicle-shaped column of fluid which connects the two separating parts. The narrowest point of the icicle is an example of a finite-time singularity in the equations of motion. The tip radius of the icicle L obeys a power law L~τ 2/3, where τ is the time before the moment of pinch-off. We have verified this for both superfluid and normal drops. Because of the boundary condition requiring zero velocity at a solid wall, sliding and rolling motion of drops on a substrate is a subtle issue even for conventional fluids. For example, calculations of the dissipation yields nonphysical infinities. We have analyzed video images of sliding superfluid drop motion and measured the acceleration of 4He droplets on a Cesium substrate. 相似文献
104.
105.
Computer networks have the ability to bring the power of large machines to work on a single problem and to provide reliable computer services to large populations. They also may become an unmanageable structure that can cripple itself in a fashion akin to the great Northeast power failure in 1965. Imagine the following sequence: computer X does not have the sine subprogram but relies on computer Y for it; computer Y on the other hand solves the sine subprogram using the cosine subprogram which it doesn't have; computer Y therefore calls X for a cosine; X solves for cosine using sine which it asks Y for.& Of course, you say, no computer network would be so simplistic. But would you guarantee it could never happen for any set of computer resources among N computers-and that the network might not head for the buried recursive disaster like a lemming for a cliff? 相似文献
106.
Moonil Kim Sovero E.A. Hacker J.B. De Lisio P. Rosenberg J.J. Rutledge D.B. 《Microwave Theory and Techniques》1993,41(10):1772-1774
The authors have constructed and tested an oscillator using a grid amplifier with external feedback from a twist reflector. The twist reflector serves two functions; it changes the output polarization to match the input, and its position sets the feedback phase. This permits a wider tuning range than has been possible with previous grid oscillators. The source could be continuously tuned from 8.2 GHz to 11.0 GHz by moving the twist reflector. By moving the polarizer and mirror in the twist reflector independently, a 1.8-to-1 frequency range from 6.5 GHz to 11.5 GHz was achieved. The peak effective radiated power was 6.3 W at 9.9 GHz 相似文献
107.
108.
"On the basis of an analysis of 47 studies involving measures of the job proficiency of 2,462 workers employed in 39 different occupations, the average correlation between seniority and job proficiency is .17 with a standard error of correlation of .02. The type of measure of job success influences the relation between seniority and job success… [and]… the influence of seniority increases with the skill level of the occupations sampled… with skilled occupation the influence appears to be large relative to the magnitude of validity coefficients commonly obtained and should be taken into account and controlled whenever possible." (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
109.
Ambrose JD Drost M Monson RL Rutledge JJ Leibfried-Rutledge ML Thatcher MJ Kassa T Binelli M Hansen PJ Chenoweth PJ Thatcher WW 《Journal of dairy science》1999,82(11):2369-2376
Our objective was to determine whether pregnancy rates in heat-stressed dairy cattle could be enhanced by timed embryo transfer of fresh (nonfrozen) or frozen-thawed in vitro-derived embryos compared to timed insemination. Ovulation in Holstein cows was synchronized by a GnRH injection followed 7 d later by PGF2 alpha and a second treatment with GnRH 48 h later. Control cows (n = 129) were inseminated 16 h (d 0) after the second GnRH injection. On d 7, a fresh (n = 133) or frozen-thawed (n = 142) in vitro-derived embryo was transferred to cows assigned for timed embryo transfer after categorizing the corpus luteum by palpation per rectum as 3 (excellent), 2 (good or fair), 1 (poor), and 0 (nonpalpable). Response to the synchronization treatment, determined by plasma progesterone concentration (ng/ml) < or = 1.5 on d 0 and > or = 2.0 on d 7, was 76.2%. Mean plasma progesterone concentration on d 7 increased as the quality of corpus luteum improved from category 0 to 3. Concentrations of progesterone in plasma were elevated (> or = 2.0 ng/ml) at 21 d in 64.7 (fresh embryo), 40.3 (frozen embryo), and 41.4 +/- 0.1% (timed insemination) of cows, respectively. Cows that received a fresh embryo had a greater pregnancy rate at 45 to 52 d than did cows that received a frozen-thawed embryo or timed insemination (14.3 > 4.8, 4.9 +/- 2.3%). Body condition (d 0) of cows influenced the pregnancy rate and plasma progesterone concentrations. In summary, timed embryo transfer with fresh in vitro-produced embryos in heat-stressed dairy cattle improved pregnancy rate relative to timed insemination. 相似文献
110.
Linda S. Rutledge 《Computers & Security》1986,5(4):296-308
Computer networks are proliferating rapidly for a number of reasons discussed in this paper. During this boom, relatively little attention has been paid to computer network security. This paper describes problems posed by network security and presents a survey of methods and technologies available today to enhance network security. Current methods are discussed, including information security strategy, computer security and its relation to network security, data communications security, and data encryption. Ideas from promising areas of research close the paper. 相似文献