全文获取类型
收费全文 | 128篇 |
免费 | 1篇 |
专业分类
化学工业 | 6篇 |
机械仪表 | 1篇 |
能源动力 | 1篇 |
轻工业 | 10篇 |
石油天然气 | 2篇 |
无线电 | 37篇 |
一般工业技术 | 8篇 |
冶金工业 | 56篇 |
自动化技术 | 8篇 |
出版年
2022年 | 1篇 |
2019年 | 1篇 |
2018年 | 1篇 |
2017年 | 1篇 |
2016年 | 1篇 |
2013年 | 1篇 |
2012年 | 1篇 |
2011年 | 2篇 |
2009年 | 3篇 |
2008年 | 1篇 |
2007年 | 3篇 |
2006年 | 2篇 |
2005年 | 1篇 |
2004年 | 3篇 |
2002年 | 1篇 |
2001年 | 4篇 |
2000年 | 2篇 |
1999年 | 6篇 |
1998年 | 19篇 |
1997年 | 16篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1994年 | 6篇 |
1993年 | 5篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 5篇 |
1989年 | 1篇 |
1988年 | 6篇 |
1987年 | 3篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1977年 | 1篇 |
1976年 | 3篇 |
1975年 | 1篇 |
1972年 | 1篇 |
1966年 | 1篇 |
1965年 | 2篇 |
1964年 | 4篇 |
1963年 | 2篇 |
排序方式: 共有129条查询结果,搜索用时 0 毫秒
41.
42.
43.
We examined mechanisms that protect host defense cells from their cytotoxic effector molecules. Human neutrophil peptides (HNP) 1-3 are microbicidal and cytotoxic defensins, initially synthesized as 94-amino acid preproHNP(1-94), cotranslationally proteolyzed to proHNP(20-94), then converted by removal of the anionic propiece to mature HNP(65-94)(HNP-1 and -3) and HNP(66-94) (HNP-2). We hypothesized that during synthesis and subcellular sorting the anionic propiece inhibits the cytotoxicity of the cationic defensin. We expressed preproHNP-1 cDNA in recombinant baculovirus-infected insect cells that secreted the normally transient proHNP-1(20-94) into the medium. Cyanogen bromide cleaved proHNP-1(20-94) at the fortuitously located Met64 to yield mature recombinant HNP-1(65-94) and unlinked propiece. Recombinant and native HNP-1 purified from PMN were identical as judged by mass spectrometry, retention time in reverse-phase high performance liquid chromatography, migration on acid-urea polyacrylamide gels, and reaction with a conformation-specific antibody. Recombinant and native HNP-1 had comparable microbicidal activity towards Listeria monocytogenes and were similarly potent in permeabilizing K562 leukemia cells, but proHNP-1(20-94) was virtually inactive in both assays. Addition of unlinked propiece (proHNP-1(20-64) with Met64-->homoserine) inhibited the bactericidal and cell-permeabilizing activity of mature HNP-1 in a dose-dependent manner. Linked, and to a lesser extent unlinked, propiece interfered with the binding of HNP-1 to target cells. The propiece thus acts as an efficient intramolecular inhibitor of defensin HNP-1 cytotoxicity. 相似文献
44.
Optimal binary cyclic redundancy-check codes with 16 parity bits (CRC-16 codes) are presented and compared to those in existing standards for minimum-distance, undetected-error probability on binary symmetric channels (BSCs) and properness. The codes in several cases are seen to be superior at block lengths of practical interest when they are used on low-noise BSCs. The optimum minimum distance obtainable by some CRC-16 codes is determined for all block lengths. For several typical low-noise BSCs the minimum undetected error probability achievable with some CRC-16 codes is given for all block lengths 相似文献
45.
D Ganzález Barranco V Manuel Trujillo V M Salazar Mallén O Ortega Llamas 《Canadian Metallurgical Quarterly》1976,4(2):149-152
The theory that narcotic-induced protracted biological changes are responsible for relapse of opiate-reinforced behavior was examined in the rat. Groups of rats were conditioned to prefer a distinctive environment by pairing it with morphine doses from 1-200 mg/kg, and were retested for persistence of this preference after a 3-week abstinence period. They were then observed for protracted signs such as sensitivity to naloxone, tolerance to morphine analgesia, hyperaggression, or changes in endocrine activity. Acquisition and relapse of the preference, as well as long-term tolerance, were dose related. None of the purported protracted signs showed any consistent relationship to the tendency to relapse. However, relapse correlated significantly with original acquisition scores in all relapsing groups. The results suggest that original conditioning factors, rather than protracted changes, are responsible for the observed relapse. 相似文献
46.
JM Matta KA Siebenrock E Gautier D Mehne R Ganz 《Canadian Metallurgical Quarterly》1997,(337):129-139
A new technique to achieve a reliable fusion of the hip joint through an anterior approach with use of a ventral low contact dynamic compression plate and a lateral 6.5 mm lag screw is presented in detail. The advantages of this technique are that the approach does not jeopardize the vascularity of the femoral head, that the fixation on the pelvic side uses the strong bone stock of the sciatic buttress, and that the hip abductor muscles and greater trochanter are preserved. The authors also present the indications and the results of their experience with 12 patients. The followup period averaged 24.8 months (range, 10-42 months). Ten patients (83%) achieved a solid fusion by radiologic and clinical criteria. Although a moderately symptomatic nonunion developed in 1 patient, another patient went on to a painful nonunion to whom another attempt for fusion has been recommended. According to the hip score of Merle d'Aubigné and Postel, the average figures for pain and ambulation increased from 3.2 points to 5.0 points and from 2.7 points to 4.5 points, respectively, after surgery. Six of the 12 patients regained the ability to work in their former jobs or in new occupations. Eight patients felt no or minor restrictions in doing their former sports activities. Patient satisfaction was high with a majority reporting minor discomfort mainly around the fused hip. 相似文献
47.
48.
On optimal design of multitier wireless cellular systems 总被引:2,自引:0,他引:2
We present a general cell-design methodology for the optimal design of a multitier wireless cellular network. Multitier networks are useful when there are a multitude of traffic types with drastically different parameters and/or different requirements, such as different mobility parameters or quality-of-service requirements. In such situations, it may be cost-effective to build a multitude of cellular infrastructures, each serving a particular traffic type. The network resources (e.g., the radio channels) are then partitioned among the multitude of tiers. In general terms, we are interested in quantifying the cost reduction due to the multitier network design, as opposed to a single-tier network. Our study is motivated by the expected proliferation of personal communication services, which will serve different mobility platforms and support multimedia applications through a newly deployed infrastructure based on the multitier approach 相似文献
49.
Automatic test pattern generation (ATPG) remains one of themost complex CAD tasks. Therefore, numerous methods were proposed tospeed up ATPG by using parallelism. In this paper, we focus onparallelizing ATPG for stuck-at faults in sequential circuits bycombining fault and search space parallelism. Fault parallelism isapplied to so-called easy-to-detect faults. The main task of thisapproach is to find a best-suited partitioning of the fault list,based on dependencies between faults. For hard-to-detect faultsleft by fault parallelism, search space partitioning is applied,integrating depth-first and breadth-first search. Since a smalltest set size is mandatory for a cheap test and fault parallelismincreases the number of test patterns, test set compaction is donein a post-processing phase. Results show that our approach is notonly capable of achieving potentially superlinear speedups, but alsoimproves test set quality. The parallel environment we use consistsof a network of 100 workstations connected via ethernet. 相似文献
50.
In high-speed communication networks, the ratio between the end-to-end propagation delay to packet transmission time is large, causing increased scheduling overhead in demand assignment protocols and increased collision probabilities in random access schemes. These lead to rapid degradation of the channel utilization in both channel access control approaches. In this paper, we present a "random token" oriented protocol where channel access is scheduled by random, implicit token passing leading to lower channel access control penalty. By optimally balancing the collision and scheduling penalties, the protocol allows the network to reach better performance than that obtained from random access schemes in networks with and without collision detection, without imposing additional system operational assumptions. Specifically, the random token protocol does not require knowledge of the number of stations, their identities, or synchronization in periods of silence. Therefore, the protocol is also suitable for high-speed networks with frequent reconfiguration and for mobile radio networks. 相似文献