首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2213篇
  免费   14篇
  国内免费   1篇
电工技术   17篇
化学工业   40篇
金属工艺   15篇
机械仪表   14篇
建筑科学   15篇
能源动力   6篇
轻工业   46篇
水利工程   6篇
石油天然气   3篇
无线电   35篇
一般工业技术   72篇
冶金工业   1887篇
原子能技术   1篇
自动化技术   71篇
  2022年   3篇
  2021年   3篇
  2020年   8篇
  2019年   5篇
  2018年   5篇
  2017年   7篇
  2016年   6篇
  2015年   7篇
  2014年   5篇
  2013年   17篇
  2012年   26篇
  2011年   17篇
  2010年   11篇
  2009年   14篇
  2008年   18篇
  2007年   16篇
  2006年   16篇
  2005年   13篇
  2004年   18篇
  2003年   18篇
  2002年   5篇
  2001年   7篇
  2000年   7篇
  1999年   86篇
  1998年   646篇
  1997年   368篇
  1996年   222篇
  1995年   126篇
  1994年   82篇
  1993年   134篇
  1992年   11篇
  1991年   17篇
  1990年   17篇
  1989年   17篇
  1988年   16篇
  1987年   17篇
  1986年   11篇
  1985年   10篇
  1983年   6篇
  1982年   16篇
  1981年   14篇
  1980年   19篇
  1979年   4篇
  1978年   7篇
  1977年   32篇
  1976年   77篇
  1975年   7篇
  1974年   2篇
  1972年   2篇
  1966年   2篇
排序方式: 共有2228条查询结果,搜索用时 15 毫秒
41.
The successful development of complex real-time systems depends on analysis techniques that can accurately assess the timing properties of those systems. This paper describes a technique for deriving upper and lower bounds on the time that can elapse between two given events in an execution of a concurrent software system running on a single processor under arbitrary scheduling. The technique involves generating linear inequalities expressing conditions that must be satisfied by all executions of such a system and using integer programming methods to find appropriate solutions to the inequalities. The technique does not require construction of the state space of the system and its feasibility has been demonstrated by using an extended version of the constrained expression toolset to analyze the timing properties of some concurrent systems with very large state spaces  相似文献   
42.
In our previous work (Dillon and Mansour 2009), a stochastic reliability model of atomic web services was proposed. Using the well-known classic two-state bounded set technique, we developed a service-oriented model that dynamically calculates the reliability of composite web services with rollback recovery (Mansour and Dillon in IEEE Trans Serv Comput 4(4), 2011). In order to improve the Quality of Service, fault tolerance techniques have been introduced using recovery block adaptation. Our workflow was based on series-parallel structures that constitute parts of existing structures. It is worth mentioning that major service-oriented systems contain larger and more complex structures than the simple series and parallel ones. This is a limitation in our previous approach. In order to consider more realistic service-oriented systems, other main structures, such as AND, XOR and Loop, should be included into our model. In this article, our previous structures are generalized to include AND, XOR and Loops. In addition to generalized structures, we extended the existing two-state bounded set technique to include three-state systems. This extension was especially motivated by XOR-based structures. A comparative study between bounded set techniques and a new stochastic model is also presented. Our simulation results accurately reflect the performance of the new proposed model and confirm our theoretical studies. Furthermore, Monte Carlos simulations were performed and the results obtained clearly validate our stochastic model.  相似文献   
43.
The performance of spreadsheet users was compared for two modes of input to the computer, keyboard and automated speech recognition (ASR). Subjects from both an expert group and a novice group were also classified by decision style. Dependent measures were task completion time, accuracy, keystroke count, correction count, and user confidence. Results for a speaker‐dependent, discrete‐word recognizer showed that, for both simple data input and more complex analytical spreadsheet tasks, neither the experts nor the novices performed more effectively using ASR. However, both groups expressed the desirability of having speech input as an option for desktop computing.  相似文献   
44.
After the cloning of murine cytokine synthesis inhibitory factor, it was recognized that a homologous open reading frame was encoded within the Epstein-Barr virus (human herpes virus 4). This viral protein has now been termed viral interleukin 10 (vIL-10) to reflect its protein sequence homology to "cellular" IL-10 (cIL-10, either murine or human IL-10). It is now widely accepted that vIL-10 shares many functions with cIL-10, principally, the ability to enhance survival of newly infected B cells and to diminish the production of IFN-gamma and IL-2 during ongoing immune reactions. The immunomodulatory effect of locally secreted vIL-10 and murine IL-10 (mIL-10) was examined in tumor models using CL8-1 (a BL6 melanoma cell line transfected with the H-2Kb class I gene) in syngeneic animals. Although parental BL6 tumor cells grow in immunocompetent syngeneic hosts, CL8-1 are rejected. To achieve local secretion of vIL-10, we generated vIL-10 retroviral vectors. While nontransduced CL8-1 cells (1 x 10(4)) failed to grow when injected intradermally in C57BL/6 mice, CL8-1 cells (1 x 10(4)) transduced with vIL-10 formed palpable tumors and eventually killed 80% of injected animals. Suppression of tumor rejection was also noted when CL8-1 tumors with or without vIL-10 transfection were admixed with syngeneic vIL-10-transfected fibroblasts and inoculated. Since the in vitro proliferation of the tumor was not altered after transduction with the vIL-10 gene and injection of vIL-10-transduced CL8-1 does not affect the rejection of nontransduced CL8-1 inoculated at a distant site, local vIL-10 secretion appears to suppress the process of immune rejection of the target cells in a dose-dependent manner. Similar results were observed for the H-2b MCA105 sarcoma tumor model in allogeneic BALB/c mice (H-2d). Although all animals that received nontransfected MCA105 rapidly rejected these tumors, MCA105 sarcomas transfected with vIL-10 remained palpable for up to 37 d. The local immunosuppressive effect of gene-delivered vIL-10 could be neutralized by anti-human IL-10 monoclonal antibody or could be reversed by the systemic administration of IL-2 or IL-12. In marked contrast, mIL-10 transfection of CL8-1 significantly suppressed tumor growth and frequently led to the rejection of tumor. Similar results were obtained for the murine tumor cell lines MCA102.(ABSTRACT TRUNCATED AT 400 WORDS)  相似文献   
45.
Chitosan derivatives, sulfated N-acyl-chitosan (S-Cn-chitosan) possessing various lengths of alkyl chain, were prepared, and the properties of their aqueous solutions were examined. The 1H-NMR spectrum of D2O solutions of S-C12-chitosan showed broadening of the proton signals caused by aggregation of the alkyl chain. The solubility of a hydrophobic compounds, azobenzene, was small in the aqueous solutions of S-Cn-chitosan with shorter alkyl chains, but increased with increasing length of the chains above C10, showing that micelles had been formed. The ESR spectrum of a spin probe, TEMPO, in an S-C14-chitosan solution showed the existence of a hydrophobic region in the solution, but this region did not exist in the S-C2-chitosan solution. The rigidity of this region was examined by using a spin probe, 16-doxyl-stearic acid. From these results, it was revealed that S-Cn-chitosan with longer alkyl chains formed a novel type of micelle called a "polymer micelle," which was more stable than the ordinary micelles formed from low-molecular-weight surfactants.  相似文献   
46.
Malignant mesothelioma is caused almost exclusively by occupational exposure to asbestos. During the past few years, however, increasing evidence has mounted that background exposure to asbestos could be sufficient to cause mesothelioma. Treatment of malignant mesothelioma remains a big problem. Some new approaches are on their way, and the most exciting ones are local immunotherapy in very early cases. Some success has been reported with local interferon treatment. As for treatment of metastatic pleural disease, the main purpose is symptomatic relief of dyspnea caused by fluid accumulation. The best way to achieve a lasting palliation is pleurodesis, and the most common way to do this, is by chemical means. The drug of choice in the United States has for many years been tetracycline, but since injectable tetracycline is no longer available, some substitute must be found. The substance that will "win" is not yet clear, but the two leading contestants are talc and doxycycline. Bleomycin also has its supporters, and a dark horse is quinacrine, which although not easily available in the United States, has been used in many European centers for decades.  相似文献   
47.
OBJECTIVE: With recent advances in molecular genetics, the rate-limiting step in identifying susceptibility genes for psychiatric disorders has become phenotype definition. The success of psychiatric genetics may require the development of a "genetic nosology" that can classify individuals in terms of the heritable aspects of psychopathology. The authors' aim is to begin to apply this analysis to the anxiety disorders, focusing on panic and phobic disorders. METHOD: Two parallel traditions of defining anxiety phenotypes are reviewed: the first, more closely identified with clinical psychiatry, has identified categorical diagnoses (e.g., panic disorder and social phobia). The other, more closely identified with psychological studies of personality development, has examined dimensional traits (e.g., neuroticism) and anxious temperament (e.g., behavioral inhibition). RESULTS: The authors suggest that a genetic nosology of panic and phobic disorders may incorporate features of both traditions and discuss strategies for optimizing genetic approaches to anxiety including 1) studying phenotypic extremes, 2) identifying biological trait markers, and 3) using animal models to identify candidate loci. CONCLUSIONS: An important dividend from the effort to define the boundaries of heritable phenotypes for genetic studies of anxiety may be a refinement of the nosology of anxiety disorders.  相似文献   
48.
SH Selesnick  MT Abraham  JF Carew 《Canadian Metallurgical Quarterly》1996,17(5):793-805; discussion 806-9
Anterior rerouting of the intratemporal facial nerve in the infratemporal fossa approach is employed to access to the jugular bulb, hypotympanum, and lateral skull base, whereas posterior rerouting of the facial nerve, as employed in the transcochlear craniotomy, is most frequently used for surgery of the posterior fossa, cerebellopontine angle, prepontine region, and petrous apex. Facial nerve rerouting may lead to facial paresis or paralysis. This review of the literature is intended to define the physiologic "cost" of these procedures, so that the neurotologic surgeon can determine if the morbidity incurred in these techniques is worth the resultant exposure. Inconsistencies in reporting facial function places into question the validity of some of the cumulative data reported. Postoperatively, grades I-II facial nerve function was seen in 91% of patients undergoing short anterior rerouting, 74% of patients undergoing long anterior rerouting, and 26% of patients undergoing posterior complete rerouting. Although facial nerve rerouting allows unhindered exposure to previously inaccessible regions, it is achieved at the cost of facial nerve function. Facial nerve dysfunction increases with the length of facial nerve rerouted.  相似文献   
49.
The thermal conductivity of compressed exfoliated graphite was measured in the directions parallel (K ) and normal (K ) to the rolling plane, in the temperature range of 0.2–3 K. The temperature dependence was determined in both cases. ForK=aT b in the temperature range of 0.2–0.7 K we get values forb of 0.95 forK and 1.6 forK ; in the range 0.7–2 K we get 1.6 forK and 2.1 forK ; and in the range 2–3 K we get 1.9 forK . TheK temperature dependence forT<0.7 K is smaller than what would be expected. ForK , evaluations of lattice and electronic contributions show that below 0.7 K the thermal conductivity is basically electronic. Above 2 K, where results are found in the literature, our data are in good agreement with them.  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号