首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   386篇
  免费   30篇
电工技术   2篇
综合类   1篇
化学工业   128篇
金属工艺   4篇
机械仪表   10篇
建筑科学   8篇
能源动力   4篇
轻工业   51篇
水利工程   4篇
无线电   25篇
一般工业技术   65篇
冶金工业   65篇
原子能技术   4篇
自动化技术   45篇
  2023年   5篇
  2022年   12篇
  2021年   19篇
  2020年   6篇
  2019年   11篇
  2018年   14篇
  2017年   12篇
  2016年   22篇
  2015年   16篇
  2014年   18篇
  2013年   19篇
  2012年   26篇
  2011年   19篇
  2010年   17篇
  2009年   15篇
  2008年   11篇
  2007年   14篇
  2006年   11篇
  2005年   16篇
  2004年   9篇
  2003年   6篇
  2002年   8篇
  2001年   6篇
  2000年   6篇
  1999年   6篇
  1998年   27篇
  1997年   15篇
  1996年   7篇
  1995年   3篇
  1994年   5篇
  1993年   6篇
  1992年   2篇
  1991年   1篇
  1990年   3篇
  1988年   2篇
  1987年   3篇
  1986年   1篇
  1985年   3篇
  1984年   1篇
  1983年   1篇
  1982年   2篇
  1981年   2篇
  1980年   1篇
  1979年   1篇
  1976年   2篇
  1975年   2篇
  1971年   1篇
  1970年   1篇
排序方式: 共有416条查询结果,搜索用时 0 毫秒
1.
Protozoal infections are still a global health problem, threatening the lives of millions of people around the world, mainly in impoverished tropical and sub-tropical regions. Thus, in view of the lack of efficient therapies and increasing resistances against existing drugs, this study describes the antiprotozoal potential of synthetic cinnamate ester analogues and their structure-activity relationships. In general, Leishmania donovani and Trypanosoma brucei were quite susceptible to the compounds in a structure-dependent manner. Detailed analysis revealed a key role of the substitution pattern on the aromatic ring and a marked effect of the side chain on the activity against these two parasites. The high antileishmanial potency and remarkable selectivity of the nitro-aromatic derivatives suggested them as promising candidates for further studies. On the other hand, the high in vitro potency of catechol-type compounds against T. brucei could not be extrapolated to an in vivo mouse model.  相似文献   
2.
This paper describes an experimental static memory cell in GaAs MESFET technology. The memory cell has been implemented using a mix of several techniques already published in order to overcome some of their principal drawbacks related to ground shifting, destructive readout, and leakage current effects. The cell size is 36×37 μm2 using a 0.6-μm technology. An experimental 32 word × 32 bit array has been designed. From simulation results, an address access time of 1 ns has been obtained. A small 8 word×4 bit protoype was fabricated. The cell can be operated at the single supply voltage from 1 up to 2 V. The evaluation is provided according to the functionality and power dissipation. Measured results show a total current consumption of 14 μA/cell when operated at 1 V  相似文献   
3.
The combined application of chemical techniques and HREM shows that platinum deactivation in Pt/CeO2 catalysts steadily increases with the reduction temperature (Tr: 473–1173 K). Though no suppression of the H2 adsorption was observed, the TPD-H2 traces indicate the occurrence of significant chemical changes with Tr. As revealed by HREM, the metal decoration starts at Tr: 973 K, a temperature well above those at which the chemical effects can be observed.  相似文献   
4.
Resolution of the steady-state Neutron Transport Equation in a nuclear pool reactor is usually achieved by means of two different numerical methods: Monte Carlo (stochastic) and Discrete Ordinates (deterministic). The Discrete Ordinates method solves the Neutron Transport Equation for a set of selected directions, obtaining a set of directional equations and solutions for each equation which are the angular flux. In order to deal with the energy dependence, an energy multi-group approximation is commonly performed, obtaining a set of equations depending on the number of energy groups. In addition, spatial discretization is also required and the problem is solved by sweeping the geometry mesh. However, special cross-sections are required due to the energy and directional discretization, thus a methodology based on NJOY99 code capabilities has been used. Finally, in order to demonstrate the capability of this method, the 3D discrete ordinates code TORT has been applied to resolve the IPEN/MB-01 reactor.  相似文献   
5.
Two Likert-type scales for measuring parents' and caretakers' level of satisfaction with the food and nutrition services offered at childcare multi-centers in a peri-urban community in Caracas, were developed and validated. An intentional sample of 20 parents and caretakers were interviewed within the naturalistic-constructivist perspective, to capture their perceptions of distinct aspects of the food and nutrition components of the program. Categories emerged from the interviews that served to construct the items for two scales that measure level of satisfaction of parents and caretakers with the food and nutrition aspects of the program. To validate the scales, they were applied to 73 parents and 32 caretakers. Factor and multiple components analysis showed that overall, the scales explained 61% and 69% of the variation in level of satisfaction of parents and caretakers respectively. Confiability measured with Alpha Cronbach coefficient was 0.74 and 0.77 for parents' and caretakers' scales respectively. These results reveal scales that have content validity and good reliability. Besides, the scales detect specific aspects of the food and nutrition service that should be reinforced or modified, to make the Child-care Centers program more effective and efficient. External validation of the scales is recommended, since they provide an instrument capable of capturing useful information for monitoring and evaluating the Child-care Centers program nation-wide, from the perspective of program managers and parents of program users.  相似文献   
6.
In this paper, we present a solution that reduces the time spent on providing network access in multi-domain mobile networks where the authentication process is based on the Extensible Authentication Protocol (EAP). The goal is to achieve fast and smooth handoffs by reducing the latency added by the authentication process. This process is typically required when a mobile user moves from one authenticator to another regardless of whether the new authenticator is in the same domain (intra-domain) or different domain (inter-domain). To achieve an efficient solution to this problem, it has been generally recognized that a fast and secure key distribution process is required. We propose a new fast re-authentication architecture that employs a secure three-party key distribution protocol which reduces the number of message exchanges during the network access control process. Our approach is proved to preserve security and verified by means of a formal tool. The resulting performance benefits are shown through our extensive simulations.  相似文献   
7.
There are a few issues that still need to be covered regarding security in the Grid area. One of them is authorization where there exist good solutions to define, manage and enforce authorization policies in Grid scenarios. However, these solutions usually do not provide Grid administrators with semantic-aware components closer to the particular Grid domain and easing different administration tasks such as conflict detection or resolution. This paper defines a proposal based on Semantic Web to define, manage and enforce security policies in a Grid scenario. These policies are defined by means of semantic-aware rules which help the administrator to create higher-level definitions with more expressiveness. These rules also permit performing added-value tasks such as conflict detection and resolution, which can be of interest in medium and large scale scenarios where different administrators define the authorization rules that should be followed before accessing a resource in the Grid. The proposed solution has been also tested providing some reasonable response times in the authorization decision process.  相似文献   
8.
A homogeneous set is a non-trivial module of a graph, i.e. a non-empty, non-unitary, proper subset of a graph's vertices such that all its elements present exactly the same outer neighborhood. Given two graphs the Homogeneous Set Sandwich Problem (HSSP) asks whether there exists a sandwich graph which has a homogeneous set. In 2001 Tang et al. published an all-fast algorithm which was recently proven wrong, so that the HSSP's known upper bound would have been reset thereafter at the former determined by Cerioli et al. in 1998. We present, notwithstanding, new deterministic algorithms which have it established at We give as well two even faster randomized algorithms, whose simplicity might lend them didactic usefulness. We believe that, besides providing efficient easy-to-implement procedures to solve it, the study of these new approaches allows a fairly thorough understanding of the problem.  相似文献   
9.
An estimation about Cuban scientific productivity based on output indicators during the period 1985–1989 is provided. Nine international bibliographic databases and three Cuban repertories have been used. Except for journal articles, no other type of Cuban document gets worldwide recognition as they are not generally included in the international databases. The greater effort in research is made in Agriculture, Biomedicine, Chemistry and Engineering, but this last topic does not reach international visibility, since the majority of its results are published in local journals. The Cuban contribution to the mainstream of world science is increasing annually. Collaboration in high level research projects existed mainly between Cuba and either USSR, German Democratic Republic and Italy. The most productive Cuban institutions in collaborative programs are the Havana University and the Academy of Sciences.  相似文献   
10.
When two closely spaced eigenvalues merge the associated eigenvectors can either (1) form a subspace where every vector in the span is an eigenvector or (2) coalesce into a single eigenvector. In the second alternative the repeated eigenvalue is associated with a bifurcation point in the eigenvector space and the system is said to be defective. In defective systems a set of coordinates that uncouple the dynamics does not exist and the closest thing possible is the basis of eigenvectors and generalized eigenvectors (sometimes called power vectors) that lead to the Jordan form. Although true defectiveness does not occur in practice, because eigenvalues are never exactly repeated, one anticipates that the features associated with defective conditions will have a bearing on the behavior of systems that are perturbed versions of defective ones. In viscously damped second order systems with symmetric matrices the potential for defectiveness is determined by the structure of the damping. This paper focuses on identification of conditions connecting the damping matrix with defectiveness. A numerical example of a two degree-of-freedom system that varies from being classically damped, to nonclassical, to defective, depending on the position of a dashpot, is used to illustrate the features of the eigensolution as defectiveness is approached.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号