首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   404篇
  免费   22篇
化学工业   110篇
金属工艺   3篇
机械仪表   3篇
建筑科学   31篇
能源动力   9篇
轻工业   71篇
水利工程   2篇
无线电   8篇
一般工业技术   57篇
冶金工业   62篇
自动化技术   70篇
  2023年   3篇
  2022年   9篇
  2021年   19篇
  2020年   11篇
  2019年   12篇
  2018年   8篇
  2017年   11篇
  2016年   11篇
  2015年   9篇
  2014年   19篇
  2013年   29篇
  2012年   21篇
  2011年   33篇
  2010年   17篇
  2009年   23篇
  2008年   18篇
  2007年   19篇
  2006年   15篇
  2005年   13篇
  2004年   9篇
  2003年   15篇
  2002年   6篇
  2001年   4篇
  2000年   7篇
  1999年   7篇
  1998年   8篇
  1997年   4篇
  1996年   5篇
  1995年   5篇
  1994年   5篇
  1993年   5篇
  1992年   5篇
  1990年   3篇
  1988年   5篇
  1985年   5篇
  1983年   1篇
  1982年   2篇
  1981年   1篇
  1980年   2篇
  1979年   3篇
  1978年   1篇
  1977年   3篇
  1976年   3篇
  1974年   1篇
  1970年   1篇
  1965年   2篇
  1964年   1篇
  1962年   1篇
  1960年   1篇
  1957年   1篇
排序方式: 共有426条查询结果,搜索用时 0 毫秒
1.
A standard method for the extraction of tiger nut milk has been introduced. It has been shown that, although milling duration improves the yield of tiger nut milk solids and its nutrient composition, there is a quantifiable loss of nutrient in the pressing residue during milk extraction. Milling duration improved the colloidal stability of the milk against creaming during 16 h of storage. A higher milling intensity resulted in the aggregation of biological polymers which resulted in colloidal destabilisation. Milling improved the lightness and stability and reduced browning rate of the tiger nut milk during storage. This report is important for the production of tiger nut milk of consistent and comparable characteristics. Milling has been introduced as a processing method for the qualitative and quantitative modulation of the properties of tiger nut milk. It is recommended to develop further strategies to improve the colloidal stability of tiger nut milk as a beverage.  相似文献   
2.
3.
The dehydroalkylation of toluene with ethane to the isomeric ethyltoluenes was studied on 0.4Pt/H-ZSM-5 at varying contact times (1/WHSV). At a high contact time of 1.0 h, toluene disproportionation and hydrogenolysis reactions dominate, resulting in low selectivity to the desired ethyltoluenes via the alkylation reaction. However, at a low contact time of 0.12 h side reactions are eliminated, resulting in maximum selectivities to the kinetically favored ethyltoluenes and hydrogen. Results at high selectivities to ethyltoluenes provide significant insight into reaction pathways.  相似文献   
4.
A novel, unobtrusive and wearable, multiparameter ambulatory physiologic monitoring system for space and terrestrial applications, termed LifeGuard, is presented. The core element is a wearable monitor, the crew physiologic observation device (CPOD), that provides the capability to continuously record two standard electrocardiogram leads, respiration rate via impedance plethysmography, heart rate, hemoglobin oxygen saturation, ambient or body temperature, three axes of acceleration, and blood pressure. These parameters can be digitally recorded with high fidelity over a 9-h period with precise time stamps and user-defined event markers. Data can be continuously streamed to a base station using a built-in Bluetooth RF link or stored in 32 MB of on-board flash memory and downloaded to a personal computer using a serial port. The device is powered by two AAA batteries. The design, laboratory, and field testing of the wearable monitors are described.  相似文献   
5.
The quantification of soil variability is one of the most important aspects in the geo-engineering context. The uncertainty analysis is the main part of the reliability assessment for which a quantitative evaluation was performed in this study. The Reliability Index and the Probability of Failure using the First-Order Reliability Method (FORM) represents both, an effective method which is easy to implement at the same time. This work analyzes possible effects of compaction induced into the aquifer of the Scarlino Plain, caused by the extension of the hydraulic barrier for groundwater remediation. The currently implemented vertical barrier is composed of 12 wells which reach the depth of 10 m. The improvement of the project involves the construction of a further 40 clusters, each consisting of a doublet which intercepts different depths (10 and 18 m). The models of the subsoil stratigraphy and of the groundwater were built using a numerical model. The groundwater flow and the piezometric surface in the current configuration of the barrier were studied and the project configuration was evaluated. Using the Aquitard drainage model, the land subsidence was estimated to calculate the maximum admissible displacement related to exhibited goods, the so called territorial vulnerability. The evaluation analysis was performed using a traditional deterministic approach, followed by a reliability method based on probabilistic models. Finally, the respective results were reported in a soil mapping with overlapping layers.  相似文献   
6.
In this paper, we will discuss a methodology developed and applied in the European ITERATE project with the objective of designing experiments that will provide data to seed the numerical model of operator behaviour in different surface transport modes: road vehicles, rail transport and ships. The experiments aim to investigate how new technologies support different types of operators in different contexts. A structured approach was adopted. Firstly, an initial selection of the systems to be investigated was made, describing the support they provide for operators. Hypotheses were formulated on the effects of operator parameters on the interaction with the systems. A final selection of systems for the experiments was made, focusing on systems providing support for collision avoidance and speed management. The operator parameters (culture, attitude and personality, experience, driver state (such as fatigue) and the demands of the task) were operationalised and piloted. The next step was the development of scenarios to be implemented in a driving simulator. In the last step, the final experiments were designed and detailed.  相似文献   
7.
The virtue of the so-called ‘proline concept’ andthe ‘charge concept’ for stabilizing protease-susceptibleregions of a protein structure was compared on bovine pancreaticribonuclease A. Alanine 20 and serine 21, both of whichare located in a loop that is susceptible to the unspecificproteases subtilisin Carlsberg, subtilisin BPN', proteinaseK and elastase, were replaced with proline or lysine by site-directedmutagenesis. The rate constant of proteolysis was decreasedby up to three orders of magnitude for the proline mutants dependingon the site of the mutation and the protease used. In contrast,substitution by lysine increased the proteolytic resistanceby only one order of magnitude characterizing the ‘prolineconcept’ as superior to the ‘charge concept’.Although the four applied proteases are considered to be unspecific,the degree of stabilization of the ribonuclease molecule variedconsiderably, indicating the impact of individual differencesin their substrate specificity on the proteolytic resistanceand degradation pathway of the target protein. Received May 12, 2003; revised October 23, 2003; accepted October 30, 2003  相似文献   
8.
Organic solvent nanofiltration (OSN) is gradually expanding from academic research to industrial implementation. The need for membranes with low and sharp molecular weight cutoffs that are able to operate under aggressive OSN conditions is increasing. However, the lack of comparable and uniform performance data frustrates the screening and membrane selection for processes. Here, a collaboration is presented between several academic and industrial partners analyzing the separation performance of 10 different membranes using three model process mixtures. Membrane materials range from classic polymeric and thin film composites (TFCs) to hybrid ceramic types. The model solutions were chosen to mimic cases relevant to today's industrial use: relatively low molar mass solutes (330–550 Da) in n-heptane, toluene, and anisole.  相似文献   
9.
Software architecture has been established in software engineering for almost 40 years. When developing and evolving software products, architecture is expected to be even more relevant compared to contract development. However, the research results seem not to have influenced the development practice around software products very much. The architecture often only exists implicitly in discussions that accompany the development. Nonetheless many of the software products have been used for over 10, or even 20 years. How do development teams manage to accommodate changing needs and at the same time maintain the quality of the product? In order to answer this question, grounded theory study based on 15 semi-structured interviews was conducted in order to find out about the wide spectrum of architecture practices in software product developing organisations. Our results indicate that a chief architect or central developer acts as a ‘walking architecture’ devising changes and discussing local designs while at the same time updating his own knowledge about problematic aspects that need to be addressed. Architecture documentation and representations might not be used, especially if they replace the feedback from on-going developments into the ‘architecturing’ practices. Referring to results from Computer Supported Cooperative Work, we discuss how explicating the existing architecture needs to be complemented by social protocols to support the communication and knowledge sharing processes of the ‘walking architecture’.  相似文献   
10.
Various optimizations in the Canetti–Krawczyk model for secure protocol design are proven to preserve security. In particular it is shown that multiple authenticators may be safely used together; that certain message components generated by authenticators may be reordered (to be sent at a different time) or replaced with other values with certain precautions; and that protocols may be defined in the ideal world with session identifiers constructed during protocol runs. Consequently protocol designers now have a set of clear rules to optimize and customize their designs without fear of breaking the security proof. In order to obtain the required proofs, we find it necessary to slightly revise the authenticated links part of the Canetti–Krawczyk model. Research funded by Australian Research Council through Discovery Project DP0345775  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号