首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   940篇
  免费   17篇
电工技术   19篇
综合类   3篇
化学工业   159篇
金属工艺   7篇
机械仪表   14篇
建筑科学   39篇
矿业工程   2篇
能源动力   28篇
轻工业   70篇
水利工程   1篇
石油天然气   3篇
无线电   122篇
一般工业技术   85篇
冶金工业   313篇
原子能技术   25篇
自动化技术   67篇
  2021年   16篇
  2020年   7篇
  2019年   4篇
  2018年   11篇
  2017年   14篇
  2016年   11篇
  2015年   5篇
  2014年   16篇
  2013年   23篇
  2012年   16篇
  2011年   30篇
  2010年   17篇
  2009年   29篇
  2008年   28篇
  2007年   31篇
  2006年   29篇
  2005年   24篇
  2004年   31篇
  2003年   19篇
  2002年   32篇
  2001年   20篇
  2000年   22篇
  1999年   28篇
  1998年   88篇
  1997年   72篇
  1996年   39篇
  1995年   37篇
  1994年   26篇
  1993年   19篇
  1992年   15篇
  1991年   14篇
  1990年   13篇
  1989年   15篇
  1988年   7篇
  1987年   9篇
  1986年   12篇
  1985年   15篇
  1984年   8篇
  1983年   8篇
  1982年   5篇
  1981年   9篇
  1980年   6篇
  1979年   6篇
  1978年   6篇
  1977年   10篇
  1976年   18篇
  1975年   6篇
  1974年   4篇
  1970年   6篇
  1969年   3篇
排序方式: 共有957条查询结果,搜索用时 15 毫秒
1.
In this article we survey a number of predeployed secure key distribution (PSKD) schemes proposed in the technical literature. We also propose a new time-based PSKD (TPSKD), which operates under the assumption of loose time synchronization, and discuss the performance of the scheme. Since the TPSKD scheme uses time information, which would typically already be available in sensor nodes, the cost of the scheme?s implementation is low.  相似文献   
2.
Awareness of the construction environment can be improved by automatic three-dimensional (3D) sensing and modeling of job sites in real time. Commercially available 3D modeling approaches based on range scanning techniques are capable of modeling static objects only, and thus cannot model dynamic objects in real time in an environment comprised of moving humans, equipment, and materials. Emerging prototype video range cameras offer an alternative by facilitating affordable, wide field of view, dynamic object tracking at frame rates better than 1?Hz (real time). This paper describes a methodology to model, detect, and track the position of static and moving objects in real time, based on data obtained from video range cameras. Experiments with this technology have produced results that indicate that video rate 3D data acquisition and analysis of construction environments can support effective modeling, detection, and tracking of project resources. This approach to job site awareness has inherent value and broad application. In combination with effective management practices and other sensing techniques, this technology has the potential to significantly improve safety on construction job sites.  相似文献   
3.
In this paper, we re-examine the results of prior work on methods for computing ad hoc joins. We develop a detailed cost model for predicting join algorithm performance, and we use the model to develop cost formulas for the major ad hoc join methods found in the relational database literature. We show that various pieces of “common wisdom” about join algorithm performance fail to hold up when analyzed carefully, and we use our detailed cost model to derive op timal buffer allocation schemes for each of the join methods examined here. We show that optimizing their buffer allocations can lead to large performance improvements, e.g., as much as a 400% improvement in some cases. We also validate our cost model's predictions by measuring an actual implementation of each join algorithm considered. The results of this work should be directly useful to implementors of relational query optimizers and query processing systems. Edited by M. Adiba. Received May 1993 / Accepted April 1996  相似文献   
4.
5.
In the absence of E1B, the 289-amino acid product of human adenovirus type 5 13S E1A induces p53-independent apoptosis by a mechanism that requires viral E4 gene products (Marcellus, R.C., J.C. Teodoro, T. Wu, D.E. Brough, G. Ketner, G.C. Shore, and P.E. Branton. 1996. J. Virol. 70:6207-6215) and involves a mechanism that includes activation of caspases (Boulakia, C.A., G. Chen, F.W. Ng, J. G. Teodoro, P.E. Branton, D.W. Nicholson, G.G. Poirier, and G.C. Shore. 1996. Oncogene. 12:529-535). Here, we show that one of the E4 products, E4orf4, is highly toxic upon expression in rodent cells regardless of the p53 status, and that this cytotoxicity is significantly overcome by coexpression with either Bcl-2 or Bcl-XL. Conditional expression of E4orf4 induces a cell death process that is characterized by apoptotic hallmark features, such as externalization of phosphatidylserine, loss of mitochondrial membrane potential, cytoplasmic vacuolation, condensation of chromatin, and internucleosomal DNA degradation. However, the wide-spectrum inhibitor of caspases, tetrapeptide zVAD-fmk, does not affect any of these apoptogenic manifestations, and does not alter the kinetics of E4orf4-induced cell death. Moreover, E4orf4 expression does not result in activation of the downstream effector caspase common to most apoptosis-inducing events, caspase-3 (CPP32). We conclude, therefore, that in the absence of E1A, E4orf4 is sufficient by itself to trigger a p53-independent apoptosis pathway that may operate independently of the known zVAD-inhibitable caspases, and that may involve an as yet uncharacterized mechanism.  相似文献   
6.
Crescentic glomerulonephritis in interferon-gamma receptor deficient mice   总被引:1,自引:0,他引:1  
Activation of macrophages by T cells is considered an initiating event in glomerular crescent formation. Since interferon-gamma (INF gamma) is a key mediator in T-cell-mediated activation of macrophages, we decided to test its role in a model of crescentic glomerulonephritis. An anti-glomerular basement membrane (GBM) serum was injected intravenously in presensitized wild-type or IFN gamma receptor deficient (IFN gamma(R)-/-) mice. Glomerulonephritis with glomerular crescents and tubulointerstitial inflammation developed in both strains, even though most evaluated morphological parameters and proteinuria indicated a less severe pathology in the mutant mice compared to the wild type. Thus, IFN gamma is not essential either for glomerular crescent formation or for tubulointerstitial involvement in anti-GBM glomerulonephritis in mice. In conclusion, the role of macrophages in this model might have been overestimated, or other cytokines may compensate for deficient IFN gamma signaling in the activation of macrophages.  相似文献   
7.
Examined social skills and social perception of 48 schizophrenia/schizoaffective disorder patients (aged 18–55 yrs) in response to negative affect as a function of family expressed emotion (EE). Ss participated in a role-play test, a social perception test, and a problem-solving discussion with a family member and were assessed on several measures of symptomatology. EE of family members was evaluated with the Camberwell Family Interview. On the role-play test, Ss with less critical relatives became more assertive in response to increased negative affect from a confederate portraying either a family member or friend, but Ss with highly critical relatives did not. Ss with highly critical relatives were also less assertive when confronted with negative affect from a confederate portraying a family member rather than a friend. The behaviors of both relatives and Ss during a family problem-solving interaction were related to the EE dimensions of criticism, emotional overinvolvement, and warmth. Patient gender was also related to family problem solving but was independent of EE. S's ratings of affect on a videotaped social perception task were not related to family EE, and there were few differences in psychopathology between Ss with high and low EE relatives.… (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
8.
It is demonstrated that glassy carbon powder can be thermochemically activated. During activation, a film with open pores is created on the glassy carbon particles. This film has a large internal surface area, which is accessible to liquids and gases. A simple model for the evolution of the internal surface area in glassy carbon powder during thermochemical gas-phase oxidation is also presented and compared with experimental data. Experimental results are in qualitative agreement with the model. We found that a sharp particle size distribution is desirable with regard to potential technical applications.  相似文献   
9.
Pollini  G.P. Haas  Z.J. 《IEEE network》1994,8(2):18-25
The article presents a performance comparison of two random access protocols for wireless mobile signaling in which a single channel is dedicated to the signaling function, enhanced beacon assisted multiple access (E-BAMA) and resource auction multiple access (RAMA). Data traffic is transported separately on a set of orthogonal channels. The beacon assisted multiple access (BAMA) protocol was first presented as a method of providing mobility management functions, e.g., handover, while minimizing the processing burden placed on the mobile. In BAMA, throughout the duration of its call, an active user repeatedly and quasi-periodically broadcasts a beacon containing its ID using the Aloha protocol. Quasi-periodicity prevents a pair of users from repeatedly colliding with each other. When a base successfully receives the beacon and assigns a channel, it uses a separate downstream channel to send to the mobile an acknowledgement that contains the number of the assigned channel. The BAMA protocol includes a scheme to maintain lists of active mobiles in nearby cells and to exchange periodically these lists among the base-stations. The authors evaluate the capacity and delay performance of E-BAMA and RAMA. Then, they present a numerical comparison of the parameters. Finally, the results are summarized qualitatively. Some additional derivation is included in the appendix  相似文献   
10.
In this article we present five case studies of advanced networking functions that detail how a network processor (NP) can provide high performance and also the necessary flexibility compared with ASIC. We first review the basic NP system architectures, and describe the IBM PowerNP architecture from the data plane as well as the control plane point of view. We introduce models for the programmer's views of NP that facilitate a global understanding of NP software programming. Then, for each case study, we present results from prototypes as well as general considerations that apply to a wider range of system architectures. Specifically, we investigate the suitability of NP for QoS (active queue management and traffic engineering), header processing (GPRS tunneling protocol), intelligent forwarding (load balancing without flow disruption), payload processing (code interpretation and just-in-time compilation in active networks), and protocol stack termination (SCTP). Finally, we summarize the key features as revealed by each case study, and conclude with remarks on the future of NP.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号