首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1228篇
  免费   4篇
  国内免费   1篇
电工技术   3篇
综合类   1篇
化学工业   58篇
金属工艺   12篇
机械仪表   8篇
建筑科学   6篇
矿业工程   10篇
能源动力   8篇
轻工业   17篇
石油天然气   1篇
无线电   13篇
一般工业技术   45篇
冶金工业   976篇
原子能技术   6篇
自动化技术   69篇
  2023年   6篇
  2022年   9篇
  2021年   9篇
  2020年   6篇
  2019年   4篇
  2018年   4篇
  2016年   3篇
  2015年   6篇
  2014年   9篇
  2013年   9篇
  2012年   10篇
  2011年   21篇
  2010年   11篇
  2009年   15篇
  2008年   9篇
  2007年   5篇
  2006年   7篇
  2005年   10篇
  2004年   7篇
  2003年   7篇
  2002年   6篇
  2001年   5篇
  2000年   9篇
  1999年   31篇
  1998年   267篇
  1997年   147篇
  1996年   102篇
  1995年   89篇
  1994年   58篇
  1993年   51篇
  1992年   10篇
  1991年   16篇
  1990年   12篇
  1989年   11篇
  1988年   10篇
  1987年   12篇
  1986年   8篇
  1985年   19篇
  1984年   2篇
  1983年   6篇
  1982年   7篇
  1981年   8篇
  1980年   13篇
  1978年   9篇
  1977年   43篇
  1976年   92篇
  1975年   8篇
  1973年   2篇
  1972年   3篇
  1955年   4篇
排序方式: 共有1233条查询结果,搜索用时 15 毫秒
971.
Fast active appearance model search using canonical correlation analysis   总被引:1,自引:0,他引:1  
A fast AAM search algorithm based on canonical correlation analysis (CCA-AAM) is introduced. It efficiently models the dependency between texture residuals and model parameters during search. Experiments show that CCA-AAMs, while requiring similar implementation effort, consistently outperform standard search with regard to convergence speed by a factor of four.  相似文献   
972.
Client puzzles have been advocated as a promising countermeasure to denial-of-service (DoS) attacks in recent years. However, how to operationalize this idea in network protocol stacks still has not been sufficiently studied. In this paper, we describe our research on a multi-layer puzzle-based DoS defense architecture, which embeds puzzle techniques into both end-to-end and IP-layer services. Specifically, our research results in two new puzzle techniques: puzzle auctions for end-to-end protection and congestion puzzles for IP-layer protection. We present the designs of these approaches and evaluations of their efficacy. We demonstrate that our techniques effectively mitigate DoS threats to IP, TCP and application protocols; maintain full interoperability with legacy systems; and support incremental deployment. We also provide a game theoretic analysis that sheds light on the potential to use client puzzles for incentive engineering: the costs of solving puzzles on an attackers’ behalf could motivate computer owners to more aggressively cleanse their computers of malware, in turn hindering the attacker from capturing a large number of computers with which it can launch DoS attacks.  相似文献   
973.
Probabilistic Quorum Systems   总被引:1,自引:0,他引:1  
We initiate the study of probabilistic quorum systems, a technique for providing consistency of replicated data with high levels of assurance despite the failure of data servers. We show that this technique offers effective load reduction on servers and high availability. We explore probabilistic quorum systems both for services tolerant of benign server failures and for services tolerant of arbitrary (Byzantine) ones. We also prove bounds on the server load that can be achieved with these techniques.  相似文献   
974.
We summarise the progress that has been made in the analysis of active transport models, at the steady-state level. The two general classes of such model, counter-and co-transport, can be treated by a kinetic analysis which makes no assumptions as to the symmetry or asymmetry of the systems nor as to the presence of any particular rate-limiting steps. Precisely the same formalism is obeyed for primary active transport as for secondary active transport. Both are merely a generalisation of facilitated diffusion, in that they follow directly from accepted properties of carrier models. How affinities of such carriers for their substrates affect the efficiency of active transport is discussed and it is shown that in a number of cases, the affinity changes that the carrier demonstrates arise from inherent properties of the free carrier and not from any "high energy" properties of the chemical reactants. Methods of obtaining the kinetic parameters of the system from experimental data are reviewed, together with methods for testing and characterising the different transport models.  相似文献   
975.
OBJECTIVES: Cycle 5 of the National Survey of Family Growth (NSFG) was conducted by the National Center for Health Statistics (NCHS) in 1995. The NSFG collects data on pregnancy, childbearing, and women's health from a national sample of women 15-44 years of age. This report describes how the sample was designed, shows response rates for various subgroups of women, describes how the sampling weights were computed to make national estimates possible, shows how missing data were imputed for a limited set of key variables, and describes the proper ways to estimate sampling errors from the NSFG. The report includes both nontechnical summaries for readers who need only general information and more technical detail for readers who need an in-depth understanding of these topics. METHODS: The 1995 NSFG was based on a national probability sample of women 15-44 years of age in the United States and was drawn from 14,000 households interviewed in the 1993 National Health Interview Survey (NHIS). Of the 13,795 women eligible for the NSFG, 10,847 (79 percent) gave complete interviews. RESULTS: This report recommends using weighted data for analysis and a software package that will estimate sampling errors from complex samples (for example, SUDAAN or comparable software). The rate of missing data in the 1995 NSFG was very low. However, missing data were imputed for 315 key variables, called "recodes." Of the 315 recodes defined for Cycle 5, 271 variables had missing data on less than 1 percent of the cases; only 44 had 1 percent or more with missing data. These missing values were imputed for all of these 315 variables. The imputation procedures are described in this report.  相似文献   
976.
Drug users can be highly motivated to obtain negative results on urine drug tests and may attempt to subvert the process by in vivo adulteration. The use of herbal products for "flushing" and "detoxification" is frequently advertised as an effective means of passing drug tests. Accordingly, a study was designed to determine the effects of ingestion of two herbal products, Naturally Klean Herbal Tea and Golden Seal root, and a diuretic medication, hydrochlorothiazide. The herbal tea was prepared in 1 gal of water as specified by the manufacturer. All other products were consumed with 1 gal of water. Two control conditions in which the subject consumed only water (1 gal; 12 oz) were included. The 1-gal liquid treatments were divided into 4-qt aliquots, and 1-qt was consumed each hour for 4 h. All treatments were begun approximately 22 h after smoking of a marijuana cigarette (3.58% THC) and 22 h after intranasal administration of cocaine hydrochloride. Following all treatments with excess fluid, creatinine and specific gravity dropped in 1.5-2.0 h to levels indicative of diluted specimens (<20 mg/dL creatinine, <1.003 specific gravity). Marijuana and cocaine metabolite concentrations by immunoassay (EMIT and TDx) also dropped rapidly, and the results frequently switched from positive to negative. By the time subjects had consumed 2 qt of any fluid, they were generally producing false-negative results. For example, ingestion of excess water produced dilute specimens (<20 mg/dL creatinine; <1.003 specific gravity) in an average time plus or minus the standard error of the mean of 1.47 +/- 0.17 h (N = 5) and 1.45 +/- 0.2 h (N = 5) following smoked marijuana and intranasal cocaine, respectively. In comparison, ingestion of Klean Tea produced dilute specimens in 1.36 +/- 0.07 h (N = 4) and 1.39 +/- 0.11 h (N = 4) following marijuana and cocaine administration. Recovery of urine test measures to pre-treatment levels occurred over a period of 8-10 h. Average detection times for marijuana metabolite appeared to be slightly shorter following ingestion of 1 gal of fluids compared with ingestion of 12 oz of water as a result of the time of testing being near the end of the cannabinoid metabolite excretion phase. Consequently, negative cannabinoid results induced by fluid ingestion rarely returned to positive after excess water was eliminated. In contrast, negative cocaine results reverted to positive quickly after the dilution effects disappeared. It was concluded that excess water ingestion can produce false-negative test results, but the claims of herbal products to be an aid in passing a urine test appear to be unfounded.  相似文献   
977.
Experiments were performed on male rats. The responses of dorsal horn convergent neurons in spinal cord (T12-L1) to noxious stimulation of hind paw were recorded extracellularly with glass microelectrode. When low intensity (2 V) electroacupuncture (EA) was used, the nociceptive responses of convergent neurons were inhibited by EA at "Zusanli" near noxious stimulation area, but not at "Xiaguan" far from the area. When intensity (18 V) high than the threshold of C fibers EA was applied at the far acupoint "Xiaguan", obvious analgesic effects on convergent neurons were also produced, showing an extensive analgesic effect of strong EA at acupoint. This extensive analgesic effect was abdicated by lesion of nucleus raphe magnus (NRM), but still persisted to some extent by EA at the same segment acupoint "Zusanli" with 18 V or 2 V intensity. The results suggest that, the extensive analgesia of strong EA at far segment acupoint may be mainly mediated by noxious stimulation through NRM, a negative feedback mechanism modulating pain of supraspinal cord. The analgesia due to 2 V EA at the same segment acupoint may be mainly produced by gate control in spinal cord, but also to some extend by supraspinal cord mechanism.  相似文献   
978.
Newton's method for finding complex solutions of the equationz –1=0 is investigated for real values of . The bifurcations that occur, as the power varies are illuminated with computer graphics. In particular, the appearance of an attracting 2-cycle just below even powers is investigated.  相似文献   
979.
In stroke patients, multitracer positron emission tomography (PET) permits the assessment of acute changes in regional cerebral blood flow (rCBF), blood volume (rCBV), oxygen consumption (rCMRO2) and glucose metabolism (rCMRgl), which are the initial steps in the complex molecular and biochemical process leading to ischaemic cell damage. While early infarcts exhibit low flow and oxygen consumption, increased oxygen extraction fraction (OEF) due to preserved metabolism at reduced flow suggests viability of tissue. However, most initially "viable" tissue will be metabolically deranged and will become necrotic in the further course; only in a few instances do these tissue compartments recover to normal function. Increased glucose uptake at reduced oxygen supply induces non-oxidative glycolysis with noxious lactacidosis, whereas hyperperfusion beyond the metabolic demand is of controversial effect. In subacute or chronic states after ischaemia reduced flow can be compensated by increased blood volume; when perfusional reserve is exhausted, oxygen extraction increases. Such findings may guide therapeutic decisions and predict the severity of permanent deficits. Functional deactivation of tissue remote from the lesion is found regularly as a sign of damaged connecting pathways. Flow and metabolic studies during the performance of specific tasks help to detect alternative functional loops and may yield prognostic information. Repeat studies in the course of stroke are employed for the evaluation of therapeutic strategies targeted to improve reperfusion or to effect metabolic or biochemical alterations. In the future PET may gain additional clinical importance when patients are selected for elective treatment according to the prevailing pathophysiological pattern.  相似文献   
980.
Uncultivated bacterial symbionts from the candidate genus “Entotheonella” have been shown to produce diverse natural products previously attributed to their sponge hosts. In addition to these known compounds, “Entotheonella” genomes contain rich sets of biosynthetic gene clusters that lack identified natural products. Among these is a small type III polyketide synthase (PKS) cluster, one of only three clusters present in all known “Entotheonella” genomes. This conserved “Entotheonella” PKS (cep) cluster encodes the type III PKS CepA and the putative methyltransferase CepB. Herein, the characterization of CepA as an enzyme involved in phenolic lipid biosynthesis is reported. In vitro analysis showed a specificity for alkyl starter substrates and the production of tri- and tetraketide pyrones and tetraketide resorcinols. The conserved distribution of the cep cluster suggests an important role for the phenolic lipid polyketides produced in “Entotheonella” variants.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号