首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12666篇
  免费   915篇
  国内免费   9篇
电工技术   77篇
综合类   8篇
化学工业   5066篇
金属工艺   127篇
机械仪表   296篇
建筑科学   452篇
矿业工程   17篇
能源动力   319篇
轻工业   3144篇
水利工程   109篇
石油天然气   69篇
无线电   468篇
一般工业技术   1673篇
冶金工业   530篇
原子能技术   35篇
自动化技术   1200篇
  2024年   41篇
  2023年   179篇
  2022年   901篇
  2021年   1017篇
  2020年   413篇
  2019年   422篇
  2018年   473篇
  2017年   496篇
  2016年   541篇
  2015年   440篇
  2014年   574篇
  2013年   865篇
  2012年   826篇
  2011年   935篇
  2010年   711篇
  2009年   662篇
  2008年   604篇
  2007年   571篇
  2006年   440篇
  2005年   330篇
  2004年   280篇
  2003年   251篇
  2002年   234篇
  2001年   142篇
  2000年   94篇
  1999年   127篇
  1998年   106篇
  1997年   107篇
  1996年   100篇
  1995年   70篇
  1994年   58篇
  1993年   58篇
  1992年   64篇
  1991年   46篇
  1990年   38篇
  1989年   33篇
  1988年   33篇
  1987年   31篇
  1986年   40篇
  1985年   35篇
  1984年   26篇
  1983年   22篇
  1982年   15篇
  1981年   16篇
  1980年   19篇
  1979年   19篇
  1978年   20篇
  1977年   13篇
  1976年   7篇
  1975年   11篇
排序方式: 共有10000条查询结果,搜索用时 11 毫秒
51.
Prior to fertilization, mammalian sperm must undergo the acrosome reaction, which involves modifications of the plasma and outer acrosomal membranes followed by vesiculation and release of the membranes. The membrane fraction that was released from caudal boar sperm undergoing an in vitro acrosome-like reaction was isolated and characterized with respect to density, marker enzymes and lipid composition. This membrane had a lower phospholipid/protein ratio (mg/mg) than the sperm plasma membrane, whereas both membranes had similar molar sterol/phospholipid ratios. The major phospholipid was sphingomyelin, followed by phosphatidylethanolamine and phosphatidylcholine, whereas in the plasma membrane the order was reversed; the two major phosphoglycerides contained alkylacyl and alkenylacyl species in addition to the diacyl species. The released membrane also contained lower amounts of cholesterol sulfate and unsaturated fatty acids than the plasma membranes. These results, in combination with our studies on the changes of the sperm membranes during maturation and acrosome reaction, will allow a better understanding of the mechanism of the sperm acrosome reaction.  相似文献   
52.
Pattern Analysis and Applications - Digital holography is an imaging process able to recreate three-dimensional representations of objects from recording pattern interference among distinct waves....  相似文献   
53.
54.
The valorization and promotion of worldwide Cultural Heritage by the adoption of Information and Communication Technologies represent nowadays some of the most important research issues with a large variety of potential applications. This challenge is particularly perceived in the Italian scenario, where the artistic patrimony is one of the most diverse and rich of the world, able to attract millions of visitors every year to monuments, archaeological sites and museums. In this paper, we present a general recommendation framework able to uniformly manage heterogeneous multimedia data coming from several web repositories and to provide context-aware recommendation techniques supporting intelligent multimedia services for the users—i.e. dynamic visiting paths for a given environment. Specific applications of our system within the cultural heritage domain are proposed by means of real case studies in the mobile environment related both to an outdoor and indoor scenario, together with some results on user’s satisfaction and system accuracy.  相似文献   
55.
Understanding how the search space is explored for a given constraint problem – and how it changes for different models, solvers or search strategies – is crucial for efficient solving. Yet programmers often have to rely on the crude aggregate measures of the search that are provided by solvers, or on visualisation tools that can show the search tree, but do not offer sophisticated ways to navigate and analyse it, particularly for large trees. We present an architecture for profiling a constraint programming search that is based on a lightweight instrumentation of the solver. The architecture combines a visualisation of the search tree with various tools for convenient navigation and analysis of the search. These include identifying repeated subtrees, high-level abstraction and navigation of the tree, and the comparison of two search trees. The resulting system is akin to a traditional program profiler, which helps the user to focus on the parts of the execution where an improvement to their program would have the greatest effect.  相似文献   
56.
Configuration fragments developed separately and focusing on different aspects, such as availability, security or performance of a system need to be integrated into a consistent system configuration to avoid system malfunctions. The main challenges of such integration are due to the overlapping entities and the integration relations between the entities of the different configuration fragments. In this paper we propose a model based approach for a consistent integration of configuration fragments into a system configuration. We use and extend the model weaving technique to capture the semantics of the relations between the entities of the configuration fragments. Moreover, we generate automatically the constraints corresponding to these semantic relations to complete the target system configuration profile. These constraints can be used to guard the configuration consistency during runtime modifications.  相似文献   
57.
58.
Node‐link infographics are visually very rich and can communicate messages effectively, but can be very difficult to create, often involving a painstaking and artisanal process. In this paper we present an investigation of node‐link visualizations for communication and how to better support their creation. We begin by breaking down these images into their basic elements and analyzing how they are created. We then present a set of techniques aimed at improving the creation workflow by bringing more flexibility and power to users, letting them manipulate all aspects of a node‐link diagram (layout, visual attributes, etc.) while taking into account the context in which it will appear. These techniques were implemented in a proof‐of‐concept prototype called GraphCoiffure, which was designed as an intermediary step between graph drawing/editing software and image authoring applications. We describe how GraphCoiffure improves the workflow and illustrate its benefits through practical examples.  相似文献   
59.
ABSTRACT

In this article, we explore how visitors engage with a science museum exhibit that displays controversial topics. Through a case study methodology, we focus on the Brazilian exhibit Preventing Youth Pregnancy that delves into teen pregnancy, sexual practices, and sexually transmitted diseases. Using the lens of science communication (an emergent field of research) we explore (a) communication patterns established between the exhibit and the public and (b) the dimensions of engagement that visitors experienced. Data were collected through observations and interviews with visitors, field notes, exit comment cards, and interviews with staffers. Our findings revealed the potential of articulating different models of science communication and exposed a visitor experience in which informed decision making, sharing of personal stories, co-production of knowledge, and learning how to care (and act) were at play while negotiating the complexities of the issues raised by the displays.  相似文献   
60.
Vulnerability to sudden service disruptions due to deliberate sabotage and terrorist attacks is one of the major threats of today. In this paper, we present a bilevel formulation of the r-interdiction median problem with fortification (RIMF). RIMF identifies the most cost-effective way of allocating protective resources among the facilities of an existing but vulnerable system so that the impact of the most disruptive attack to r unprotected facilities is minimized. The model is based upon the classical p-median location model and assumes that the efficiency of the system is measured in terms of accessibility or service provision costs. In the bilevel formulation, the top level problem involves the decisions about which facilities to fortify in order to minimize the worst-case efficiency reduction due to the loss of unprotected facilities. Worst-case scenario losses are modeled in the lower-level interdiction problem. We solve the bilevel problem through an implicit enumeration (IE) algorithm, which relies on the efficient solution of the lower-level interdiction problem. Extensive computational results are reported, including comparisons with earlier results obtained by a single-level approach to the problem.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号