全文获取类型
收费全文 | 1697篇 |
免费 | 18篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 10篇 |
化学工业 | 118篇 |
金属工艺 | 8篇 |
机械仪表 | 10篇 |
建筑科学 | 34篇 |
矿业工程 | 2篇 |
能源动力 | 14篇 |
轻工业 | 102篇 |
水利工程 | 10篇 |
石油天然气 | 2篇 |
无线电 | 73篇 |
一般工业技术 | 136篇 |
冶金工业 | 1095篇 |
原子能技术 | 8篇 |
自动化技术 | 94篇 |
出版年
2022年 | 11篇 |
2021年 | 16篇 |
2020年 | 15篇 |
2019年 | 20篇 |
2018年 | 7篇 |
2017年 | 15篇 |
2016年 | 13篇 |
2015年 | 19篇 |
2014年 | 14篇 |
2013年 | 45篇 |
2012年 | 24篇 |
2011年 | 23篇 |
2010年 | 26篇 |
2009年 | 17篇 |
2008年 | 28篇 |
2007年 | 26篇 |
2006年 | 19篇 |
2005年 | 24篇 |
2004年 | 16篇 |
2003年 | 19篇 |
2002年 | 23篇 |
2001年 | 15篇 |
2000年 | 15篇 |
1999年 | 50篇 |
1998年 | 281篇 |
1997年 | 187篇 |
1996年 | 121篇 |
1995年 | 76篇 |
1994年 | 80篇 |
1993年 | 70篇 |
1992年 | 24篇 |
1991年 | 24篇 |
1990年 | 25篇 |
1989年 | 32篇 |
1988年 | 25篇 |
1987年 | 24篇 |
1986年 | 24篇 |
1985年 | 14篇 |
1984年 | 9篇 |
1983年 | 7篇 |
1982年 | 11篇 |
1981年 | 13篇 |
1980年 | 11篇 |
1979年 | 7篇 |
1977年 | 31篇 |
1976年 | 51篇 |
1975年 | 6篇 |
1973年 | 8篇 |
1970年 | 8篇 |
1968年 | 6篇 |
排序方式: 共有1716条查询结果,搜索用时 15 毫秒
51.
52.
Using the Curriculum Vita to Study the Career Paths of Scientists and Engineers: An Exploratory Assessment 总被引:4,自引:3,他引:1
James S. Dietz Ivan Chompalov Barry Bozeman Eliesh O'Neil Lane Jongwon Park 《Scientometrics》2000,49(3):419-442
In this paper we assess the utility of the curriculum vita (CV) as a data source for examining the career paths of scientists and engineers. CVs were obtained in response to an email message sent to researchers working in the areas of biotechnology and microelectronics. In addition, a number of CVs were obtained "passively" from a search of the Internet. We discuss the methodological issues and problems of this data collection strategy and the results from an exploratory analysis using OLS regression and event history analysis. In sum, despite difficulties with coding and variation in CV formats, this collection strategy seems to us to hold much promise. 相似文献
53.
Mahaney and others have shown that sparse self-reducible sets have time-efficient algorithms, and have concluded that it is unlikely that NP has sparse complete sets. Mahaney's work, intuition, and a 1978 conjecture of Hartmanis notwithstanding, nothing has been known about the density of complete sets for feasible classes until now. This paper shows that sparse self-reducible sets have space-efficient algorithms, and in many cases, even have time-space-efficient algorithms. We conclude that NL, NC
k
, AC
k
, LOG(DCFL), LOG(CFL), and P lack complete (or even Turing-hard) sets of low density unless implausible complexity class inclusions hold. In particular, if NL (respectively P,
k
, or NP) has a polylog-sparse logspace-hard set, then NLSC (respectively PSC,
k
, or PHSC), and if P has subpolynomially sparse logspace-hard sets, then PPSPACE. 相似文献
54.
NE Taylor RN Rosenthal B Chabus S Levine AS Hoffman J Reynolds L Santos I Willets P Friedman 《Canadian Metallurgical Quarterly》1993,15(1):36-40
Cryptococcal meningitis has a high mortality rate of central nervous infection. The patients usually die of the disease itself, or complications from increased intracranial pressure. Early diagnosis and treatment, including surgical drainage, will improve the results. In this series, twenty-one patients with high intracranial pressure (ICP > 300 mmH2 O) are presented. Fourteen received implantation of Ommaya reservoir to aspirate cerebrospinal fluid (CSF) for relief of symptoms of ICP. Meanwhile 4 of these 14 patients also received intraventricular injection of amphotericin B because of poor response to systemic drugs. Another seven patient received systemic drug therapy only. Survival during therapy occurred in 11 of 14 patients in the surgical group, compared with only 1 of 7 patients treated by drug therapy alone (P = 0.019). In the 14 patients who received implantation of an Ommaya reservoir, there was one complication of CSF leakage when the reservoir ruptured because of repeated aspiration. For patients with cryptococcal meningitis with high ICP, early implantation of an Ommaya reservoir will improve the survival rate. 相似文献
55.
Chung-Chieh Hung Chieh-Hsin Lin Hsien-Yuan Lane 《International journal of molecular sciences》2021,22(18)
Glutamate, a crucial excitatory neurotransmitter, plays a major role in the modulation of schizophrenia’s pathogenesis. New drug developments for schizophrenia have been prompted by the hypoglutamatergic hypothesis of schizophrenia. The cystine/glutamate antiporter system xc− is related to glutamate-release regulation. Patients with schizophrenia were recently discovered to exhibit downregulation of xc− subunits—the solute carrier (SLC) family 3 member 2 and the SLC family 7 member 11. We searched for relevant studies from 1980, when Bannai and Kitamura first identified the protein subunit system xc− in lung fibroblasts, with the aim of compiling the biological, functional, and pharmacological characteristics of antiporter xc−, which consists of several subunits. Some of them can significantly stimulate the human brain through the glutamate pathway. Initially, extracellular cysteine activates neuronal xc−, causing glutamate efflux. Next, excitatory amino acid transporters enhance the unidirectional transportation of glutamate and sodium. These two biochemical pathways are also crucial to the production of glutathione, a protective agent for neural and glial cells and astrocytes. Investigation of the expression of system xc− genes in the peripheral white blood cells of patients with schizophrenia can facilitate better understanding of the mental disorder and future development of novel biomarkers and treatments for schizophrenia. In addition, the findings further support the hypoglutamatergic hypothesis of schizophrenia. 相似文献
56.
High‐Temperature Neutron Diffraction,Raman Spectroscopy,and First‐Principles Calculations of Ti3SnC2 and Ti2SnC
下载免费PDF全文
![点击此处可从《Journal of the American Ceramic Society》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Grady W. Bentzel Michael Naguib Nina J. Lane Sven C. Vogel Volker Presser Sylvain Dubois Jun Lu Lars Hultman Michel W. Barsoum El'ad N. Caspi 《Journal of the American Ceramic Society》2016,99(7):2233-2242
Herein, we report—for the first time—on the additive‐free bulk synthesis of Ti3SnC2. A detailed experimental study of the structure of the latter together with a secondary phase, Ti2SnC, is presented through the use of X‐ray diffraction (XRD), and high‐resolution transmission microscopy (HRTEM). A previous sample of Ti3SnC2, made using Fe as an additive and Ti2SnC as a secondary phase, was studied by high‐temperature neutron diffraction (HTND) and XRD. The room‐temperature crystallographic parameters of the two MAX phases in the two samples are quite similar. Based on Rietveld analysis of the HTND data, the average linear thermal expansion coefficients of Ti3SnC2 in the a and c directions were found to be 8.5 (2)·10?6 K?1 and 8.9 (1)·10?6 K?1, respectively. The respective values for the Ti2SnC phase are 10.1 (3)·10?6 K?1 and 10.8 (6)·10?6 K?1. Unlike other MAX phases, the atomic displacement parameters of the Sn atoms in Ti3SnC2 are comparable to those of the Ti and C atoms. When the predictions of the atomic displacement parameters obtained from density functional theory are compared to the experimental results, good quantitative agreement is found for the Sn atoms. In the case of the Ti and C atoms, the agreement is more qualitative. We also used first principles to calculate the elastic properties of both Ti2SnC and Ti3SnC2 and their Raman active modes. The latter are compared to experiment and the agreement was found to be good. 相似文献
57.
Incidental Exposure,Selective Exposure,and Political Information Sharing: Integrating Online Exposure Patterns and Expression on Social Media
下载免费PDF全文
![点击此处可从《Journal of Computer-Mediated Communication》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Brian E. Weeks Daniel S. Lane Dam Hee Kim Slgi S. Lee Nojin Kwak 《Journal of Computer-Mediated Communication》2017,22(6):363-379
Political information sharing in social media offers citizens opportunities to engage with news and express their political views, but how do different patterns of online political information exposure, including both incidental and selective exposure, affect sharing? Using two‐wave panel survey data collected in the United States, we examine the relationship between incidental and selective exposure and their consequent links to political information sharing, across different levels of strength of political party affiliation. Our results demonstrate that incidental exposure to counter‐attitudinal information drives stronger partisans to more actively seek out like‐minded political content, which subsequently encourages political information sharing on social media. The results highlight the need to consider both types of political information exposure when modeling citizens' political behavior online. 相似文献
58.
AN Na?khin IM Tsaritsyna LG Syrodoeva EV Ole?nikova NE Gorev 《Canadian Metallurgical Quarterly》1983,(2):154-159
Parallel HI and virus-elution-from-erythrocytes-inhibition (a simplified method for titration of neuraminidase antibody) tests were used for examinations of 1117 blood serum specimens from 440 adults and children under study, 5250 single serum specimens from healthy subjects from birth to 65 years of age, 38 paired serum specimens from children who experienced influenza A/Texas/1/77 disease in the epidemic of 1979-1980, and 590 paired serum specimens from subjects immunized with influenza vaccines. In 7%-23% of influenza patients and immunized subjects antibody rise was observed to only one of the influenza A virus surface antigens, hemagglutinin or neuraminidase. The protective activity of antibody to influenza A virus neuraminidase was as good as that of antihemagglutinins. Both kinds of antibody interacted in protection against the disease. Antineuraminidase antibody was found to affect the decrease in severity of the infectious process in natural infection with influenza A. The formation of immunological memory in the system of synthesis of antihemagglutinins and antineuraminidase antibodies was shown to have features in common. The pattern of heterologous immune responses in immunized subjects and patients with influenza showed all antigenic varieties of neuraminidase N2 as well as neuraminidases N1 and N2 to share common cross-reacting determinants. 相似文献
59.
Lane A. Hemaspaandra Rahman Lavaee Curtis Menton 《Annals of Mathematics and Artificial Intelligence》2016,77(3-4):191-223
Schulze and ranked-pairs elections have received much attention recently, and the former has quickly become a quite widely used election system. For many cases these systems have been proven resistant to bribery, control, or manipulation, with ranked pairs being particularly praised for being NP-hard for all three of those. Nonetheless, the present paper shows that with respect to the number of candidates, Schulze and ranked-pairs elections are fixed-parameter tractable to bribe, control, and manipulate: we obtain uniform, polynomial-time algorithms whose running times’ degrees do not depend on the number of candidates. We also provide such algorithms for some weighted variants of these problems. 相似文献
60.
This paper introduces the computer security domain of anomaly detection and formulates it as a machine learning task on temporal sequence data. In this domain, the goal is to develop a model or profile of the normal working state of a system user and to detect anomalous conditions as long-term deviations from the expected behavior patterns. We introduce two approaches to this problem: one employing instance-based learning (IBL) and the other using hidden Markov models (HMMs). Though not suitable for a comprehensive security solution, both approaches achieve anomaly identification performance sufficient for a low-level focus of attention detector in a multitier security system. Further, we evaluate model scaling techniques for the two approaches: two clustering techniques for the IBL approach and variation of the number of hidden states for the HMM approach. We find that over both model classes and a wide range of model scales, there is no significant difference in performance at recognizing the profiled user. We take this invariance as evidence that, in this security domain, limited memory models (e.g., fixed-length instances or low-order Markov models) can learn only part of the user identity information in which we're interested and that substantially different models will be necessary if dramatic improvements in user-based anomaly detection are to be achieved. 相似文献