首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   577篇
  免费   47篇
电工技术   10篇
综合类   12篇
化学工业   161篇
金属工艺   11篇
机械仪表   11篇
建筑科学   30篇
能源动力   15篇
轻工业   86篇
水利工程   8篇
石油天然气   1篇
无线电   17篇
一般工业技术   87篇
冶金工业   69篇
自动化技术   106篇
  2023年   6篇
  2022年   19篇
  2021年   27篇
  2020年   10篇
  2019年   13篇
  2018年   23篇
  2017年   19篇
  2016年   23篇
  2015年   20篇
  2014年   23篇
  2013年   28篇
  2012年   28篇
  2011年   50篇
  2010年   32篇
  2009年   32篇
  2008年   30篇
  2007年   15篇
  2006年   16篇
  2005年   15篇
  2004年   18篇
  2003年   23篇
  2002年   17篇
  2001年   10篇
  2000年   8篇
  1999年   9篇
  1998年   11篇
  1997年   12篇
  1996年   13篇
  1995年   8篇
  1994年   12篇
  1993年   6篇
  1992年   4篇
  1991年   2篇
  1990年   3篇
  1989年   2篇
  1987年   2篇
  1986年   3篇
  1985年   7篇
  1981年   2篇
  1980年   4篇
  1979年   2篇
  1977年   3篇
  1974年   1篇
  1972年   2篇
  1971年   2篇
  1970年   1篇
  1969年   1篇
  1967年   1篇
  1966年   1篇
  1956年   1篇
排序方式: 共有624条查询结果,搜索用时 15 毫秒
1.
2.
This paper examines the relationship between self-efficacy and social power (expert and referent) and how the application of this relationship, leads to client adherence and compliance. Referent power is defined, including methods that health care professionals may use to develop and apply referent power. Expert power is defined and addressed in the context of referent power, self-esteem and self-efficacy as a means of promoting adherence. Self-efficacy as a concept is defined and explored in the context of social power. The relationships between self-efficacy and social power (expert and referent) are shown as important determinants of adherence and compliance. The theory of the application of referent and expert power in relationship with self-efficacy has been compared with an effective programme, yielding high compliance, at Western Psychiatric Institute and Clinic, showing the theory's relevance and applicability in determining compliance. Explored are the reasons for non-compliance in the elderly population and how the theory model can remedy these detriments for compliance. The empowerment of elderly patients through the application of this theory to medication compliance is examined. The determination of adherence and compliance is shown by the application of the relationship between self-efficacy and both expert and referent power.  相似文献   
3.
The neuronal cytoskeleton is one of the most profoundly altered organelles in late life neuro-degenerative disorders that are characterized by progressive impairments in cognitive abilities. The elucidation of the protein building blocks of these organelles as well as advances in understanding how these proteins become altered in Alzheimer's disease (AD) and other less common dementing illnesses, i.e., diffuse Lewy body disease (DLBD) or the Lewy body variant of AD (LBVAD), will provide insights into the molecular basis of these disorders. Within, we review evidence that normal adult human tau is abnormally phosphorylated and converted into the subunits of AD paired helical filaments (PHFs), and that Lewy bodies (LBs) represent accumulation of altered neurofilament (NF) triplet subunits. Although the precise biological consequences of PHF and LB formation in neurons is unknown, growing evidence suggests that the formation of PHFs and LBs from normal neuronal cytoskeletal proteins could have deleterious effects on neuronal function and survival. Finally, insights into the composition of PHFs and LBs could lead to the development of novel strategies for the timely and accurate diagnosis of AD, DLBD and the LBVAD.  相似文献   
4.
We describe a novel microfluidic perfusion system for high-resolution microscopes. Its modular design allows pre-coating of the coverslip surface with reagents, biomolecules, or cells. A poly(dimethylsiloxane) (PDMS) layer is cast in a special molding station, using masters made by photolithography and dry etching of silicon or by photoresist patterning on glass or silicon. This channel system can be reused while the coverslip is exchanged between experiments. As normal fluidic connectors are used, the link to external, computer-programmable syringe pumps is standardized and various fluidic channel networks can be used in the same setup. The system can house hydrogel microvalves and microelectrodes close to the imaging area to control the influx of reaction partners. We present a range of applications, including single-molecule analysis by fluorescence correlation spectroscopy (FCS), manipulation of single molecules for nanostructuring by hydrodynamic flow fields or the action of motor proteins, generation of concentration gradients, trapping and stretching of live cells using optical fibers precisely mounted in the PDMS layer, and the integration of microelectrodes for actuation and sensing.  相似文献   
5.
BACKGROUND: Although gastric bypass is an effective treatment for morbid obesity, the postoperative results are unsatisfactory in 10% of all patients. Therapeutic failures after an operation performed with the sole purpose of reducing the risk of obesity-associated diseases have to be taken seriously. The goal of this study was to investigate the causes of these failures. METHOD: From 1979 to 1993, 165 gastric bypass operations (technique: Mason-Griffen) were performed. Long-term results were obtained in 60 patients after an average of 6.6 years (range 3-13). On follow-up all patients were examined and asked about their level of satisfaction with the weight loss achieved and changes in eating habits. RESULTS: In 6 patients the weight reduction was regarded as insufficient (BMI > 35 and reduction of BMI < 10). The causes of these failures were technical in 3 cases (gastric pouch to 0 large in 1, dilatation of gastrojejunostomy in 2). Three patients had a high calorie intake through an intact gastric bypass by snacking. Three patients regarded the operation as a failure although they had achieved significant weight loss, because they could no longer eat the usual amounts of food. CONCLUSION: Correct surgical technique and preoperative information on the changes in eating habits after a gastric bypass operation are the most important steps in preventing therapeutic failures.  相似文献   
6.
Semantic Web Mining: State of the art and future directions   总被引:2,自引:0,他引:2  
Semantic Web Mining aims at combining the two fast-developing research areas Semantic Web and Web Mining. This survey analyzes the convergence of trends from both areas: More and more researchers are working on improving the results of Web Mining by exploiting semantic structures in the Web, and they make use of Web Mining techniques for building the Semantic Web. Last but not least, these techniques can be used for mining the Semantic Web itself.The Semantic Web is the second-generation WWW, enriched by machine-processable information which supports the user in his tasks. Given the enormous size even of today’s Web, it is impossible to manually enrich all of these resources. Therefore, automated schemes for learning the relevant information are increasingly being used. Web Mining aims at discovering insights about the meaning of Web resources and their usage. Given the primarily syntactical nature of the data being mined, the discovery of meaning is impossible based on these data only. Therefore, formalizations of the semantics of Web sites and navigation behavior are becoming more and more common. Furthermore, mining the Semantic Web itself is another upcoming application. We argue that the two areas Web Mining and Semantic Web need each other to fulfill their goals, but that the full potential of this convergence is not yet realized. This paper gives an overview of where the two areas meet today, and sketches ways of how a closer integration could be profitable.  相似文献   
7.
Three-dimensional, turbulent fluid flow analysis with computational methods has emerged as a viable tool in the design process of engine components for passenger cars. If applied in the early stages of the component development such analysis can help reduce the product development time drastically, and may support the design engineer to evaluate several competing design aspects before product completion. However the grid generation for complex geometries still poses a difficult and time consuming taks which strongly influences the accuracy of the numerical solution. The present paper studies the numerical solution of the flow in an inlet-manifold of a five-cylinder engine with two intake-ports for each cylinder. A fast and reliable grid generation technique is discussed in detail. The finite volume based Navier-Stokes solver with schemes of first and second order accuracy for the convective terms is used. Numerical results at several mass flow rates and different boundary conditions at the intake ports are compared with measurements. Finally, the computational results are discussed with respect to their applicability to support the design process of an inlet-manifold.  相似文献   
8.
Over the last decade, privacy has been widely recognised as one of the major problems of data collections in general and the Web in particular. This concerns specifically data arising from Web usage (such as querying or transacting) and social networking (characterised by rich self-profiling including relational information) and the inferences drawn from them. The data mining community has been very conscious of these issues and has addressed in particular the inference problems through various methods for “privacy-preserving data mining” and “privacy-preserving data publishing”. However, it appears that these approaches by themselves cannot effectively solve the privacy problems posed by mining. We argue that this is due to the underlying notions of privacy and of data mining, both of which are too narrow. Drawing on notions of privacy not only as hiding, but as control and negotiation, as well as on data mining not only as modelling, but as the whole cycle of knowledge discovery, we offer an alternative view. This is intended to be a comprehensive view of the privacy challenges as well as solution approaches along all phases of the knowledge discovery cycle. The paper thus combines a survey with an outline of an agenda for a comprehensive, interdisciplinary view of Web mining and privacy.  相似文献   
9.
Obesity is a globally increasing health problem, entailing diverse comorbidities such as infectious diseases. An obese weight status has marked effects on lung function that can be attributed to mechanical dysfunctions. Moreover, the alterations of adipocyte-derived signal mediators strongly influence the regulation of inflammation, resulting in chronic low-grade inflammation. Our review summarizes the known effects regarding pulmonary bacterial and viral infections. For this, we discuss model systems that allow mechanistic investigation of the interplay between obesity and lung infections. Overall, obesity gives rise to a higher susceptibility to infectious pathogens, but the pathogenetic process is not clearly defined. Whereas, viral infections often show a more severe course in obese patients, the same patients seem to have a survival benefit during bacterial infections. In particular, we summarize the main mechanical impairments in the pulmonary tract caused by obesity. Moreover, we outline the main secretory changes within the expanded adipose tissue mass, resulting in chronic low-grade inflammation. Finally, we connect these altered host factors to the influence of obesity on the development of lung infection by summarizing observations from clinical and experimental data.  相似文献   
10.
Systems should not only be correct but also robust in the sense that they behave reasonably in unexpected situations. This article addresses synthesis of robust reactive systems from temporal specifications. Existing methods allow arbitrary behavior if assumptions in the specification are violated. To overcome this, we define two robustness notions, combine them, and show how to enforce them in synthesis. The first notion applies to safety properties: If safety assumptions are violated temporarily, we require that the system recovers to normal operation with as few errors as possible. The second notion requires that, if liveness assumptions are violated, as many guarantees as possible should be fulfilled nevertheless. We present a synthesis procedure achieving this for the important class of GR(1) specifications, and establish complexity bounds. We also present an implementation of a special case of robustness, and show experimental results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号