首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3685篇
  免费   122篇
  国内免费   8篇
电工技术   19篇
综合类   1篇
化学工业   458篇
金属工艺   29篇
机械仪表   39篇
建筑科学   146篇
矿业工程   3篇
能源动力   92篇
轻工业   134篇
水利工程   15篇
石油天然气   9篇
无线电   159篇
一般工业技术   367篇
冶金工业   1905篇
原子能技术   12篇
自动化技术   427篇
  2023年   24篇
  2022年   64篇
  2021年   85篇
  2020年   54篇
  2019年   60篇
  2018年   64篇
  2017年   55篇
  2016年   74篇
  2015年   71篇
  2014年   75篇
  2013年   142篇
  2012年   101篇
  2011年   147篇
  2010年   88篇
  2009年   86篇
  2008年   93篇
  2007年   96篇
  2006年   94篇
  2005年   78篇
  2004年   45篇
  2003年   65篇
  2002年   51篇
  2001年   23篇
  2000年   20篇
  1999年   72篇
  1998年   535篇
  1997年   298篇
  1996年   215篇
  1995年   113篇
  1994年   120篇
  1993年   123篇
  1992年   36篇
  1991年   39篇
  1990年   36篇
  1989年   41篇
  1988年   46篇
  1987年   42篇
  1986年   34篇
  1985年   41篇
  1984年   8篇
  1983年   15篇
  1982年   19篇
  1981年   16篇
  1980年   21篇
  1979年   4篇
  1978年   5篇
  1977年   52篇
  1976年   108篇
  1975年   4篇
  1969年   5篇
排序方式: 共有3815条查询结果,搜索用时 15 毫秒
81.
We report a very simple, rapid and reproducible method for the fabrication of anisotropic silver nanostars (AgNS) that can be successfully used as highly efficient SERS substrates for different bioanalytes, even in the case of a near-infra-red (NIR) excitation laser. The nanostars have been synthesized using the chemical reduction of Ag+ ions by trisodium citrate. This is the first research reporting the synthesis of AgNS using only trisodium citrate as a reducing and stabilizing agent. The key elements of this original synthesis procedure are rapid hydrothermal synthesis of silver nanostars followed by a cooling down procedure by immersion in a water bath. The synthesis was performed in a sealed bottom flask homogenously heated and brought to a boil in a microwave oven. After 60 s, the colloidal solution was cooled down to room temperature by immersion in a water bath at 35 °C. The as-synthesized AgNS were washed by centrifugation and used for SERS analysis of test molecules (methylene blue) as well as biological analytes: pharmaceutical compounds with various Raman cross sections (doxorubicin, atenolol & metoprolol), cell lysates and amino acids (methionine & cysteine). UV-Vis absorption spectroscopy, (Scanning) Transmission Electron Microscopy ((S)TEM) and Atomic Force Microscopy (AFM) have been employed for investigating nanostars’ physical properties.  相似文献   
82.
Background: Severe outcomes of COVID-19 account for up to 15% of all cases. The study aims to check if any gene variants related to cardiovascular (CVD) and pulmonary diseases (PD) are correlated with a severe outcome of COVID-19 in a Polish cohort of COVID-19 patients. Methods: In this study, a subset of 747 samples from unrelated individuals collected across Poland in 2020 and 2021 was used and whole-genome sequencing was performed. Results: The GWAS analysis of SNPs and short indels located in genes related to CVD identified one variant significant in COVID-19 severe outcome in the HADHA gene, while for the PD gene panel, we found two significant variants in the DRC1 gene. In this study, both potentially protective and risk variants were identified, of which variants in the HADHA gene deserve the most attention. Conclusions: This is the first study reporting the association between the HADHA and DRC1 genetic variants and COVID-19 severe outcome based on the cohort WGS analysis. Although all the identified variants are localised in introns, they may be correlated and therefore inherited along with other risk variants, potentially causative to severe outcome of COVID-19 but not discovered yet.  相似文献   
83.
This study focuses on the use of genetic programming to automate the design of robust analog circuits. We define two complementary types of failure modes: partial short-circuit and partial disconnect, and demonstrated novel circuits that are resilient across a spectrum of fault levels. In particular, we focus on designs that are uniformly robust, and unlike designs based on redundancy, do not have any single point of failure. We also explore the complementary problem of designing tamper-proof circuits that are highly sensitive to any change or variation in their operating conditions. We find that the number of components remains similar both for robust and standard circuits, suggesting that the robustness does not necessarily come at significant increased circuit complexity. A number of fitness criteria, including surrogate models and co-evolution were used to accelerate the evolutionary process. A variety of circuit types were tested, and the practicality of the generated solutions was verified by physically constructing the circuits and testing their physical robustness.  相似文献   
84.
Current wind erosion and dust emission models neglect the heterogeneous nature of surface roughness and its geometric anisotropic effect on aerodynamic resistance, and over-estimate the erodible area by assuming it is not covered by roughness elements. We address these shortfalls with a new model which estimates aerodynamic roughness length (z0) using angular reflectance of a rough surface. The new model is proportional to the frontal area index, directional, and represents the geometric anisotropy of z0. The model explained most of the variation in two sets of wind tunnel measurements of aerodynamic roughness lengths (z0). Field estimates of z0 for varying wind directions were similar to predictions made by the new model. The model was used to estimate the erodible area exposed to abrasion by saltating particles. Vertically integrated horizontal flux (Fh) was calculated using the area not covered by non-erodible hemispheres; the approach embodied in dust emission models. Under the same model conditions, Fh estimated using the new model was up to 85% smaller than that using the conventional area not covered. These Fh simulations imply that wind erosion and dust emission models without geometric anisotropic sheltering of the surface, may considerably over-estimate Fh and hence the amount of dust emission. The new model provides a straightforward method to estimate aerodynamic resistance with the potential to improve the accuracy of wind erosion and dust emission models, a measure that can be retrieved using bi-directional reflectance models from angular satellite sensors, and an alternative to notoriously unreliable field estimates of z0 and their extrapolations across landform scales.  相似文献   
85.
The synthesis of nanoparticles from noble metals has received high attention from researchers due to their unique properties and their wide range of applications. Silver nanoparticles (AgNPs), in particular, show a remarkable inhibitory effect against microorganisms and viruses. Various methods have been developed to obtain AgNPs, however the stability of such nanostructures over time is still challenging. Researchers attempt to obtain particular shapes and sizes in order to tailor AgNPs properties for specific areas, such as biochemistry, biology, agriculture, electronics, medicine, and industry. The aim of this study was to design AgNPs with improved antimicrobial characteristics and stability. Two different wet chemical routes were considered: synthesis being performed (i) reduction method at room temperatures and (ii) solvothermal method at high temperature. Here, we show that the antimicrobial properties of the obtained AgNPs, are influenced by their synthesis route, which impact on the size and shape of the structures. This work analyses and compares the antimicrobial properties of the obtained AgNPs, based on their structure, sizes and morphologies which are influenced, in turn, not only by the type or quantities of precursors used but also by the temperature of the reaction. Generally, AgNPs obtained by solvothermal, at raised temperature, registered better antimicrobial activity as compared to NPs obtained by reduction method at room temperature.  相似文献   
86.
A major issue in the design and operation of ad hoc networks is sharing the common spectrum among links in the same geographic area. Bandwidth allocation, to optimize the performance of networks in which each station can converse with at most a single neighbor at a time, has been recently studied in the context of Bluetooth Personal Area Networks. There, centralized and distributed, capacity assignment heuristics were developed, with applicability to a variety of ad hoc networks. Yet, no guarantees on the performance of these heuristics have been provided. In this paper, we extend these heuristics such that they can operate with general convex objective functions. Then, we present our analytic results regarding these heuristics. Specifically, we show that they are β-approximation (β<2) algorithms. Moreover, we show that even though the distributed and centralized algorithms allocate capacity in a different manner, both algorithms converge to the same results. Finally, we present numerical results that demonstrate the performance of the algorithms. Randeep Bhatia received the Ph.D. degree in Computer Science from University of Maryland, the M.S. degree in Mathematics and Computer Science from University of Illinois at Chicago and the B.Tech. degree in Computer Science and Engineering from Indian Institute of Technology, Delhi. He is currently with the High Speed Networks Research Department at Bell Labs, Lucent technologies, working on network design, traffic engineering and scheduling algorithms. His current research interests are in the area of QoS for multimedia services in wireless data networks. Adrian Segall received the B.Sc. and M.Sc. degrees in electrical engineering from the Technion, Israel Institute of Technology in 1965 and 1971, respectively, and the Ph.D. degree in electrical engineering with a minor in statistics from Stanford University in 1973. After serving active duty in the Israel Defense Forces, he joined in 1968 the Scientific Department of Israel’s Ministry of Defense. From 1973 to 1974 he was a Research Engineer at System Control Inc., Palo Alto, CA and a Lecturer at Stanford University. From 1974 to 1976 he was an Assistant Professor of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology. From 1987 to 1998 he was on the faculty of the Department of Computer Science at the Technion. He is presently Benjamin Professor of Computer-Communication Networks in the Department of Electrical Engineering, Technion, Israel Institute of Technology. From 1982 to 1984 he was on leave with the IBM T.J.Watson Research Center, Yorktown Heights, NY. He held visiting positions with IBM, AT&T and Lucent Bell Labs. His current research interests are in the area of optical networks, wireless, sensor and ad-hoc networks. Dr. Segall is an IEEE Fellow and has served in the past as Editor for Computer Communication Theory of the IEEE Transactions on Communications, Editor for the IEEE Information Theory Society Newsletter and Senior Editor for the IEEE Journal on Selected Areas in Communications. He was selected as an IEEE delegate to the 1975 IEEE-USSR Information Theory Workshop, and is the recipient of the 1981 Miriam and Ray Klein Award for Outstanding Research and of the 1990 Taub Award in Computer Science. Gil Zussman received the B.Sc. degree in Industrial Engineering and Management and the B.A. degree in Economics (both summa cum laude) from the Technion—Israel Institute of Technology in 1995. He received the M.Sc. degree (summa cum laude) in Operations Research from Tel-Aviv University in 1999 and the Ph.D. degree in Electrical Engineering from the Technion—Israel Institute of Technology in 2004. Between 1995 and 1998, he served as an engineer in the Israel Defense Forces. He is currently a Postdoctoral Associate in the Laboratory for Information and Decision Systems in MIT. His current research interests are in the area of ad hoc and sensor networks. In particular, he is interested in energy efficient protocols, medium access control protocols, and personal area networks. Gil received the Knesset (Israeli Parliament) Award for distinguished students, the Best Student Paper Award at the IFIP-TC6 Networking 2002 Conference, and the IEEE Communications Magazine Best Paper Award at the OPNETWORK 2002 Conference. In 2004 he received the Marie Curie Outgoing International Fellowship and the Fulbright Fellowship.  相似文献   
87.
88.
89.
In this study, we demonstrate particle and cell clustering in distinct patterns on the free surface of microfluidic volumes. Employing ultrasonic actuation, submersed microparticles are forced to two principal positions: nodal lines (pressure minima) of a standing wave within the liquid bulk, and distinct locations on the air–liquid interface (free surface); the latter of which has not been previously demonstrated using ultrasonic standing waves. As such, we unravel the fundamental mechanisms behind such patterns, showing that the contribution of fluid particle velocity variations on the free surface (acoustic radiation force) results in patterned particle clustering. In addition, by varying the size and density of the microparticles (3.5–31 μm polystyrene and 1–5 μm silica), acoustic streaming is found to increase the tendency for a smaller and lighter particle to cluster at the air–liquid interface. This selectivity is exploited for the isolation of multiple microparticle and cell types on the free surface from their nodally aligned counterparts. Free surface clustering is demonstrated in both an open microfluidic chamber and a sessile droplet, as well as using a range of biological species Escherichia coli, blood cells, Ragweed pollen and Paper Mulberry pollen). The ability to selectively cluster submersed microparticles and cells in distinct patterns on the free surface showcases the excellent suitability of this method to lab-on-a-chip systems.  相似文献   
90.
This paper presents a protocol called Software Attestation for Key Establishment (SAKE), for establishing a shared key between any two neighboring nodes of a sensor network. SAKE guarantees the secrecy and authenticity of the key that is established, without requiring any prior authentic or secret cryptographic information in either node. In other words, the attacker can read and modify the entire memory contents of both nodes before SAKE executes. Further, to the best of our knowledge, SAKE is the only protocol that can perform key re-establishment after sensor nodes are compromised, because the presence of the attacker’s code in the memory of either protocol participant does not compromise the security of SAKE. Also, the attacker can perform any active or passive attack using an arbitrary number of malicious, colluding nodes. SAKE does not require any hardware modification to the sensor nodes, human mediation, or secure side channels. However, we do assume the setting of a computationally-limited attacker that does not introduce its own computationally-powerful nodes into the sensor network.SAKE is based on Indisputable Code Execution (ICE), a primitive we introduce in previous work to dynamically establish a trusted execution environment on a remote, untrusted sensor node.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号