首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2006篇
  免费   106篇
  国内免费   3篇
电工技术   25篇
综合类   3篇
化学工业   506篇
金属工艺   41篇
机械仪表   48篇
建筑科学   47篇
矿业工程   4篇
能源动力   58篇
轻工业   370篇
水利工程   12篇
石油天然气   4篇
无线电   164篇
一般工业技术   312篇
冶金工业   214篇
原子能技术   14篇
自动化技术   293篇
  2023年   20篇
  2022年   59篇
  2021年   64篇
  2020年   43篇
  2019年   36篇
  2018年   62篇
  2017年   66篇
  2016年   72篇
  2015年   54篇
  2014年   74篇
  2013年   134篇
  2012年   121篇
  2011年   125篇
  2010年   94篇
  2009年   91篇
  2008年   105篇
  2007年   88篇
  2006年   78篇
  2005年   53篇
  2004年   37篇
  2003年   63篇
  2002年   54篇
  2001年   37篇
  2000年   34篇
  1999年   29篇
  1998年   73篇
  1997年   61篇
  1996年   34篇
  1995年   31篇
  1994年   17篇
  1993年   29篇
  1992年   15篇
  1991年   11篇
  1990年   20篇
  1989年   15篇
  1988年   13篇
  1987年   5篇
  1986年   10篇
  1985年   10篇
  1983年   8篇
  1982年   4篇
  1981年   10篇
  1980年   9篇
  1979年   5篇
  1978年   8篇
  1977年   4篇
  1976年   5篇
  1973年   5篇
  1971年   3篇
  1966年   4篇
排序方式: 共有2115条查询结果,搜索用时 0 毫秒
21.
Counterexamples are given which show that a linear switched system (with controlled switching) that can be stabilized by means of a suitable switching law does not necessarily admit a convex Lyapunov function. Both continuous- and discrete-time cases are considered. This fact contributes in focusing the difficulties encountered so far in the theory of stabilization of switched system. In particular the result is in contrast with the case of uncontrolled switching in which it is known that if a system is stable under arbitrary switching then admits a polyhedral norm as a Lyapunov function.  相似文献   
22.

Due to the increase and complexity of computer systems, reducing the overhead of fault tolerance techniques has become important in recent years. One technique in fault tolerance is checkpointing, which saves a snapshot with the information that has been computed up to a specific moment, suspending the execution of the application, consuming I/O resources and network bandwidth. Characterizing the files that are generated when performing the checkpoint of a parallel application is useful to determine the resources consumed and their impact on the I/O system. It is also important to characterize the application that performs checkpoints, and one of these characteristics is whether the application does I/O. In this paper, we present a model of checkpoint behavior for parallel applications that performs I/O; this depends on the application and on other factors such as the number of processes, the mapping of processes and the type of I/O used. These characteristics will also influence scalability, the resources consumed and their impact on the IO system. Our model describes the behavior of the checkpoint size based on the characteristics of the system and the type (or model) of I/O used, such as the number I/O aggregator processes, the buffering size utilized by the two-phase I/O optimization technique and components of collective file I/O operations. The BT benchmark and FLASH I/O are analyzed under different configurations of aggregator processes and buffer size to explain our approach. The model can be useful when selecting what type of checkpoint configuration is more appropriate according to the applications’ characteristics and resources available. Thus, the user will be able to know how much storage space the checkpoint consumes and how much the application consumes, in order to establish policies that help improve the distribution of resources.

  相似文献   
23.
When dissolved in ethyl oleate secondary ozonide, both C60 and C70 fullerenes undergo a series of epoxidation reactions. The pseudofirst-order kinetic rate constants of this process were determined spectrophotometrically at various temperatures and the activation energy for C60 epoxidation through ethyl oleate ozonide was found at 25.9 kcal/mol. Furthermore, C60 was found more reactive than C70 with the ozonide. The kinetics rate constants of C60 epoxidation with ethyl oleate ozonide were compared with the C60 photo-oxidation and auto-oxidation determined in pure ethyl oleate. The epoxidation of fullerenes starts from the homolysis of the peroxide group of the 1,2,4-trioxolane ring of ethyl oleate secondary ozonide. Thus, it is suggested that fullerenes have a potential as decomposition agents of secondary ozonides in some technological applications.  相似文献   
24.
Currently,sorafenib is the only systemic therapy capable of increasing overall survival of hepatocellular carcinoma patients.Unfortunately,its side effects,particularly its overall toxicity,limit the therapeutic response that can be achieved.Superparamagnetic iron oxide nanoparticles (SPIONs) are very attractive for drug delivery because they can be targeted to specific sites in the body through application of a magnetic field,thus improving intratumoral accumulation and reducing adverse effects.Here,nanoformulations based on polyethylene glycol modified phospholipid micelles,loaded with both SPIONs and sorafenib,were successfully prepared and thoroughly investigated by complementary techniques.This nanovector system provided effective drug delivery,had an average hydrodynamic diameter of about 125 nm,had good stability in aqueous medium,and allowed controlled drug loading.Magnetic analysis allowed accurate determination of the amount of SPIONs embedded in each micelle.An in vitro system was designed to test whether the SPION micelles can be efficiently held using a magnetic field under typical flow conditions found in the human liver.Human hepatocellular carcinoma (HepG2) cells were selected as an in vitro system to evaluate tumor cell targeting efficacy of the superparamagnetic micelles loaded with sorafenib.These experiments demonstrated that this delivery platform is able to enhance sorafenib's antitumor effectiveness by magnetic targeting.The magnetic nanovectors described here represent promising candidates for targeting specific hepatic tumor sites,where selective release of sorafenib can improve its efficacy and safety profile.  相似文献   
25.
We recently reported that in vivo phosphorylation of urokinase-type plasminogen activator on Ser138/303 prevents its catalytic-independent ability to promote myelomonocytic cell adherence and motility. We now show that Ca2+ activated, phospholipid-dependent protein kinase C from rat brain phosphorylates in vitro a peptide corresponding to prourokinase residues 133-143 (DGKKPSSPPEE) and the full-length molecule on Ser138/139. The in vivo involvement of the protein kinase C isoenzyme family is supported by the finding that inhibition of kinase C activity prevents prourokinase phosphorylation on Ser138/303 in A431 human carcinoma cells. Conversely, a short treatment of A431 cells with phorbol myristate acetate increases the extent of phosphorylated prourokinase and, concomitantly, affects its function; under these conditions, the capability of prourokinase to up-regulate U937 monocyte-like cell adherence is severely impaired, although receptor binding is unaltered. By the aid of a "phosphorylation-like" variant (Ser138 to Glu) we show that modification of Ser138 is sufficient to confer to prourokinase the antagonistic properties observed following in vivo stimulation of protein kinase C activity. These observations provide the first evidence that protein kinase C directs the formation of a receptor competitive antagonist by regulating the in vivo phosphorylation state of prourokinase.  相似文献   
26.
RePast is a popular agent toolkit with proven capabilities to fulfil the modelling challenges of large multi-agent systems (MASs). The toolkit, though, is normally used on a standalone workstation and therefore its practical use can be constrained (in space and time) by the limited available computing resources. This paper proposes an original approach – HLA_ACTOR_REPAST – aimed to distributing RePast models for high-performance simulation of complex scalable models. Novel in HLA_ACTOR_REPAST is an exploitation of a lean actor infrastructure implemented in Java. Actors bring to RePast agents such features as migration, location-transparent naming, efficient communications, and a control-centric framework. Actors can be orchestrated by an in-the-large custom control structure which is in charge of ensuring the necessary message causality constraints. Distribution and time management concerns depend on the IEEE standard HLA middleware. The paper first discusses details of the software engineering process underlying the development of HLA_ACTOR_REPAST. The mapping techniques, assisted by Java text annotations and aspect-oriented programming, try to minimize “code intrusions” in the original model and favour model transparency. The paper then furnishes some experimental data which witness the good performance results achieved by applying HLA_ACTOR_REPAST to a distributed version of a classic MAS benchmark model.  相似文献   
27.
This article reports the findings of a user study conducted in the context of the TELplus project to gain insights about user needs and preferences for the digital library services offered by The European Library Web portal. The user requirements collection for the Web portal was designed by adopting a comprehensive survey approach. This combined explicit user feedback with implicit usage data so as to provide a more in-depth analysis of user experience with the portal. The analysis conducted shed light on likely motivations for both participant usage and reluctance to use the services provided, leading to more informed decisions on how to refine, improve, and present Web portal services to their future users. The lessons learnt from this case study also contributed to the development of an integrated methodological framework which provided insights for the future design and evaluation of digital library Web portals and services.  相似文献   
28.
The need for REM: For many years now the market felt the need for a registered and reliable e-mail, suitable to provide evidence just like the paper registered mail. Several implementations have been set up to this purpose: Incamail (Switzerland), Posta Elettronica Certificata — PEC (Italy), Euronot@ries’ MAILWITNESS, De-Mail (Germany), etc. Within the EU project “Pan-European Public Procurement Online” — PEPPOL — its Work Project (WP8) is developing a “secure and reliable transport of electronic business documents”.  相似文献   
29.
This paper provides an overview of the current state-of-the-art on using constraints in knowledge discovery and data mining. The use of constraints in a data mining task requires specific definition and satisfaction tools during knowledge extraction. This survey proposes three groups of studies based on classification, clustering and pattern mining, whether the constraints are on the data, the models or the measures, respectively. We consider the distinctions between hard and soft constraint satisfaction, and between the knowledge extraction phases where constraints are considered. In addition to discussing how constraints can be used in data mining, we show how constraint-based languages can be used throughout the data mining process.  相似文献   
30.
Mobile Agent Coordination for Distributed Network Management   总被引:4,自引:0,他引:4  
Mobile agents are a promising technology to face the problems raised by the increasing complexity and size of today's networks. In particular, in the area of network management, mobile agents can lead to a fully distributed paradigm to overcome the limits of traditional centralized approaches. A basic requirement for the management of a complex network is the definition of high-level and flexible models to coordinate the accesses to the resources—data and services—provided by the network nodes. On this basis, this paper describes the MARS coordination architecture for mobile agents. MARS is based on the definition of programmable tuple spaces associated with the network nodes: mobile agents can access the local resources and services via the tuple space, thus adopting a standard and high-level interface. The network administrator—via mobile agents—can dynamically program the behavior of the tuple space in reaction to the agents' access to the tuple space, thus leading to a flexible network model. Several examples show the effectiveness of the MARS approach in supporting network management activities.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号