首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2457篇
  免费   71篇
  国内免费   3篇
电工技术   27篇
综合类   1篇
化学工业   399篇
金属工艺   54篇
机械仪表   32篇
建筑科学   83篇
矿业工程   6篇
能源动力   51篇
轻工业   208篇
水利工程   47篇
石油天然气   28篇
无线电   205篇
一般工业技术   360篇
冶金工业   741篇
原子能技术   27篇
自动化技术   262篇
  2021年   23篇
  2020年   17篇
  2019年   22篇
  2018年   29篇
  2017年   40篇
  2016年   40篇
  2015年   26篇
  2014年   38篇
  2013年   123篇
  2012年   71篇
  2011年   112篇
  2010年   74篇
  2009年   69篇
  2008年   97篇
  2007年   82篇
  2006年   74篇
  2005年   81篇
  2004年   73篇
  2003年   67篇
  2002年   53篇
  2001年   41篇
  2000年   49篇
  1999年   43篇
  1998年   131篇
  1997年   104篇
  1996年   75篇
  1995年   65篇
  1994年   61篇
  1993年   53篇
  1992年   42篇
  1991年   33篇
  1990年   43篇
  1989年   38篇
  1988年   48篇
  1987年   34篇
  1986年   38篇
  1985年   29篇
  1984年   35篇
  1983年   29篇
  1982年   29篇
  1981年   30篇
  1980年   23篇
  1979年   20篇
  1978年   21篇
  1977年   23篇
  1976年   28篇
  1975年   19篇
  1973年   20篇
  1972年   12篇
  1970年   15篇
排序方式: 共有2531条查询结果,搜索用时 0 毫秒
1.
This Concept article describes the latest developments in the emerging area of late-stage biocatalytic alkylation. Central to these developments is the ability to efficiently prepare S-adenosyl methionine (SAM) cofactor analogues and couple this with enzymatic alkyl transfer. Recent developments in the enzymatic synthesis of SAM cofactor analogues are summarized first, followed by their application as alkyl transfer agents catalyzed by methyltransferases (MTases). Second, innovative methods to regenerate SAM cofactors by enzymatic cascades is reported. Finally, future opportunities towards establishing a generalized platform for late-stage alkylation are described.  相似文献   
2.
Risk allocation decisions are of critical importance in project management. The present study proposes an explanation for how risk allocation in a contract motivates a contractor to cooperate with a project owner. Theories of risk allocation and trust were used to motivate the research. Using a survey methodology, we collected data concerning 124 construction projects in China. We found that risk allocation influenced the contractor’s role behavior through the contractor’s feeling of being trusted but not the contractor’s trust in the owner. Feeling of being trusted partially mediated the effect of risk allocation on the contractor’s in-role (i.e., contractual) behavior and fully mediated the effect on extra-role behavior. The study introduces a social and psychological view of the impacts of risk allocation to the project and engineering management literature. We contribute to theory by arguing and demonstrating the mediating effect of trust on the relationship between risk allocation and contractor behavior. From a practical standpoint, we conclude that contractual risk allocation has a significant impact on building a trusting relationship between owners and contractors and that contractors who feel trusted perform both contractually mandated actions and actions external to the contract more diligently, resulting in the likelihood of improved outcomes for both parties.  相似文献   
3.
An efficient algorithm is presented for numerically evaluating a self-consistent field theoretic (SCFT) model of block copolymer structure. This algorithm is implemented on a distributed memory parallel cluster in order to solve the SCFT equations on large computational grids. Simulation results are presented for a two-component molten mixture of a symmetric ABA triblock copolymer with an A homopolymer. These results illustrate a case in which simulating a large system is required to resolve features with a wide range of length scales.  相似文献   
4.
Steroidal glycoalkaloids, found in species of the Solanaceae, elicit bursting activity in galeal and tarsal chemosensilla of adult Colorado potato beetles. The effect has an average latency of 6–12 sec, depending on the sensillum/alkaloid combination. A 20-sec alkaloid treatment is often suffficient to render galeal sensilla unresponsive to gamma-aminobutyric acid, normally an effective stimulant. The alkaloids have similar effects on galeal sensilla of larval Colorado potato beetles and on labellar chemosensilla of the blowfly. It is concluded that these compounds act independently of any specialized chemoreceptor in the Colorado potato beetle, and that association of the Colorado potato beetle with solanaceous plants has not led to evolution of a specific receptor forSolanum glycoalkaloids.  相似文献   
5.
Utilizing data from the Riggs-Yale Project, 45 male and 45 female 18-29-year-old treatment-resistant inpatients undergoing intensive psychoanalytically oriented treatment were studied. Twenty-seven mixed-type anaclitic-introjective inpatients were compared with 29 "pure" anaclitic and 34 "pure" introjective inpatients. At intake, mixed-type inpatients were more clinically impaired (i.e., were more symptomatic, cognitively impaired, and thought disordered) and more vulnerable (i.e., less accurate object representations and more frequently used maladaptive defense mechanisms) in comparison with clearly defined anaclitic and introjective patients. Mixed-type patients, however, improved significantly more in the course of psychoanalytically oriented treatment, in terms of clinical functioning (i.e., symptoms, cognitive functioning) and psychological vulnerability (i.e., utilization of more adaptive defense mechanisms). (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
6.
Multichannel security protocols transmit messages over multiple communication channels, taking into account each channel's security properties. Our first intentional use of these protocols goes back to a 1999 article that proposed physical contact for imprinting as opposed to the wireless channel used in subsequent operations. Only later did we understand three key points. First, explicit use of multiple channels in the same protocol can offer significant advantages for both security and usability. Second, explicitly stating the properties of the channel on which each protocol message is transmitted is useful for understanding one's own protocol in greater depth and therefore for addressing subtle vulnerabilities early on. Third, multichannel protocols existed long before we recognized them as such - think of the courier handcuffed to the briefcase carrying the code book that will later protect postal or telegraphic traffic. The paper presents a security protocol that exploit additional transmissions over lower-capacity channels, typically found in ubicomp environments, that offer a different combination of security properties.  相似文献   
7.
The MSMIE protocol [SBC89] allows processors in a distributed system to communicate via shared memory. It was designed to meet the reliability and efficiency needs of applications such as nuclear safety systems. We present a formal model of the MSMIE protocol expressed in the notation CCS. Desirable properties of the protocol are expressed in the modal mu-calculus, an expressive modal logic. We show that the protocol lacks an important liveness property. In actual operation, additional operating constraints are checked to avoid potential problems. We present a modified protocol and show that it possesses the liveness property even without checking operating constraints. We also show how parts of the analysis were automated with the Concurrency Workbench.  相似文献   
8.
9.
10.
xtreme ltra iolet ithography (EUVL) seeks to apply radiation in a wavelength region centered near 13 nm to produce microcircuits having feature sizes 0.1 micron or less. A critical requirement for the commercial application of this technology is the development of an economical, compact source of this radiation which is suitable for lithographic applications. A good candidate is a laser-plasma source, which is generated by the interaction of an intermediate intensity laser pulse (up to 1012 W/cm2) with a metallic target. While such a source has radiative characteristics which satisfy the needs of an EUVL source, the debris generated during the laser-target interaction strikes at the economy of the source. Here, we review the use of concepts and computer modeling, originally developed for hypervelocity impact analysis, to study this problem.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号