首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3213篇
  免费   196篇
  国内免费   4篇
电工技术   62篇
综合类   1篇
化学工业   860篇
金属工艺   42篇
机械仪表   77篇
建筑科学   152篇
矿业工程   1篇
能源动力   104篇
轻工业   245篇
水利工程   10篇
石油天然气   3篇
武器工业   1篇
无线电   292篇
一般工业技术   576篇
冶金工业   140篇
原子能技术   28篇
自动化技术   819篇
  2024年   5篇
  2023年   41篇
  2022年   134篇
  2021年   149篇
  2020年   77篇
  2019年   90篇
  2018年   98篇
  2017年   92篇
  2016年   145篇
  2015年   114篇
  2014年   146篇
  2013年   219篇
  2012年   207篇
  2011年   231篇
  2010年   197篇
  2009年   192篇
  2008年   177篇
  2007年   166篇
  2006年   117篇
  2005年   94篇
  2004年   119篇
  2003年   97篇
  2002年   63篇
  2001年   50篇
  2000年   42篇
  1999年   36篇
  1998年   29篇
  1997年   22篇
  1996年   37篇
  1995年   30篇
  1994年   26篇
  1993年   19篇
  1992年   19篇
  1991年   10篇
  1990年   6篇
  1989年   11篇
  1988年   2篇
  1987年   12篇
  1986年   6篇
  1985年   15篇
  1984年   17篇
  1983年   9篇
  1982年   7篇
  1981年   7篇
  1980年   3篇
  1979年   6篇
  1978年   4篇
  1977年   6篇
  1975年   3篇
  1973年   3篇
排序方式: 共有3413条查询结果,搜索用时 0 毫秒
991.
Diabetic nephropathy (DN) develops in about 40% of insulin-dependent type 1 diabetes mellitus (T1DM) patients, and is associated not only with diabetes duration and metabolic control, but also with a genetic predisposition. Constitutive alterations of cytoskeletal proteins may play a role in the development of DN. We investigated the expression of these proteins in cultured skin fibroblasts, obtained from long-term T1DM patients with and without DN but comparable metabolic control, and from matched healthy subjects, by means of 2-DE electrophoresis and MS-MALDI analyses. In T1DM with DN, compared to the other two groups, quantitative analyses revealed an altered expression of 17 spots (p<0.05-p<0.01), corresponding to 12 unique proteins. In T1DM with DN, beta-actin and three isoforms of tubulin beta-2 chain, tropomodulin-3, and LASP-1 were decreased, whereas two tubulin beta-4 chain isoforms, one alpha actinin-4 isoform, membrane-organizing extension spike protein (MOESIN), FLJ00279 (corresponding to a fragment of myosin heavy chain, non-muscle type A), vinculin, a tropomyosin isoform, and the macrophage capping protein were increased. A shift in caldesmon isoforms was also detected. These results demonstrate an association between DN and the constitutive expression of cytoskeleton proteins in cultured skin fibroblasts from T1DM with DN, which may retain pathophysiologycal implications.  相似文献   
992.
Clustering aims to partition a data set into homogenous groups which gather similar objects. Object similarity, or more often object dissimilarity, is usually expressed in terms of some distance function. This approach, however, is not viable when dissimilarity is conceptual rather than metric. In this paper, we propose to extract the dissimilarity relation directly from the available data. To this aim, we train a feedforward neural network with some pairs of points with known dissimilarity. Then, we use the dissimilarity measure generated by the network to guide a new unsupervised fuzzy relational clustering algorithm. An artificial data set and a real data set are used to show how the clustering algorithm based on the neural dissimilarity outperforms some widely used (possibly partially supervised) clustering algorithms based on spatial dissimilarity.  相似文献   
993.
994.
Nowadays, Grid has become a leading technology in distributed computing. Grid poses a seamless sharing of heterogeneous computational resources belonging to different domains and conducts efficient collaborations between Grid users. The core Grid functionality defines computational services which allocate computational resources and execute applications submitted by Grid users. The vast models of collaborations and openness of Grid system require a secure, scalable, flexible and expressive authorization model to protect these computational services and Grid resources. Most of the existing authorization models for Grid have granularity to manage access to service invocations while behavioral monitoring of applications executed by these services remains a responsibility of a resource provider. The resource provider executes an application under a local account, and acknowledges all permissions granted to this account to the application. Such approach poses serious security threats to breach system functionality since applications submitted by users could be malicious. We propose a flexible and expressive policy-driven credential-based authorization system to protect Grid computational services against a malicious behavior of applications submitted for the execution. We split an authorization process into two levels: a coarse-grained level that manages access to a computational service; and a fine-grained level that monitors the behavior of applications executed by the computational service. Our framework guarantees that users authorized on a coarse-grained level behave as expected on the fine-grained level. Credentials obtained on the coarse-grained level reflect on fine-grained access decisions. The framework defines trust negotiations on coarse-grained level to overcome scalability problem, and preserves privacy of credentials and security policies of, both, Grid users and providers. Our authorization system was implemented to control access to the Globus Computational GRAM service. A comprehensive performance evaluation shows the practical scope of the proposed system.
Paolo MoriEmail:
  相似文献   
995.
This paper deals with the optimization of a passive vibration damping system of innovative type. A bladed rotor composed of equally spaced flexible blades mounted on a flexible ring is considered. The blades are equipped with piezoelectric devices that convert vibrational energy into electrical energy, which is in turn dissipated by suitable electric shunts comprising resistive components. The optimization of these shunts, aimed at maximizing the vibration damping, is achieved by employing a simple and accurate dynamical model, derived via a homogenization procedure.  相似文献   
996.
Interactive Case-Based Planning for Forest Fire Management   总被引:4,自引:1,他引:3  
This paper describes an AI system for planning the first attack on a forest fire. This planning system is based on two major techniques, case-based reasoning, and constraint reasoning, and is part of a decision support system called CHARADE. CHARADE is aimed at supporting the user in the whole process of forest fire management. The novelty of the proposed approach is mainly due to the use of a local similarity metric for case-based reasoning and the integration with a constraint solver in charge of temporal reasoning.  相似文献   
997.
This paper describes some of the main technology areas that have been actually used in the development of cleaning robots. The approach taken in this survey is to examine the characteristics of cleaning robots that have made successful laboratory demonstration or have become commercial products. We then identify the technology approach followed by the authors, and group their contributions in a few general areas. The result is a summary of used approaches to thesolution of difficult, albeit very practical, problems in the area of autonomous execution of cleaning tasks.  相似文献   
998.
N-(5-Bromo-1,3-thiazol-2-yl)butanamide (compound 1) was found active (IC50=808 nM) in a high throughput screening (HTS) for CDK2 inhibitors. By exploiting crystal structures of several complexes between CDK2 and inhibitors and applying structure-based drug design (SBDD), we rapidly discovered a very potent and selective CDK2 inhibitor 4-[(5-isopropyl-1,3-thiazol-2-yl)amino] benzenesulfonamide (compound 4, IC50=20 nM). The syntheses, structure-based analog design, kinases inhibition data and X-ray crystallographic structures of CDK2/inhibitor complexes are reported.  相似文献   
999.
3-d.o.f. Wire Driven Planar Haptic Interface   总被引:1,自引:0,他引:1  
A 4-wire driven 3-d.o.f. planar haptic device, called the Feriba-3, is described. The particular geometric configuration of the end-effector ensures a closed form kinematic pose solution and good manipulability. Moreover, the structural arrangement adopted makes the Feriba-3 a well-performing haptic device, whose major features are low inertia, low friction, and full dexterity in a large workspace. The manipulability analysis has been performed by introducing a complete set of manipulability indices.  相似文献   
1000.
We present part of an industrial project where mechanized theorem proving is used for the validation of a translator which generates safety critical software. In this project, the mechanized proof is decomposed in two parts: one is done “online”, at each run of the translator, by a custom prover which checks automatically that the result of each translation meets some verification conditions; the other is done “offline”, once for all, interactively with a general purpose prover; the offline proof shows that the verification conditions checked by the online prover are sufficient to guarantee the correctness of each translation. The provably correct verification conditions can thus be seen as specifications for the online prover. This approach is called mechanized result verification. This paper describes the project requirements and explains the motivations to formal validation by mechanized result verification, provides an overview of the formalization of the specifications for the online prover and discusses in detail some issues we have addressed in the mechanized offline proof.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号