首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   252篇
  免费   18篇
电工技术   4篇
化学工业   52篇
金属工艺   2篇
机械仪表   6篇
建筑科学   8篇
矿业工程   1篇
能源动力   1篇
轻工业   33篇
水利工程   1篇
石油天然气   2篇
无线电   25篇
一般工业技术   60篇
冶金工业   21篇
原子能技术   2篇
自动化技术   52篇
  2023年   8篇
  2022年   7篇
  2021年   9篇
  2020年   8篇
  2019年   11篇
  2018年   11篇
  2017年   7篇
  2016年   8篇
  2015年   7篇
  2014年   11篇
  2013年   18篇
  2012年   26篇
  2011年   30篇
  2010年   14篇
  2009年   16篇
  2008年   8篇
  2007年   7篇
  2006年   12篇
  2005年   5篇
  2004年   6篇
  2003年   1篇
  2002年   4篇
  2001年   1篇
  1999年   3篇
  1998年   6篇
  1997年   5篇
  1996年   4篇
  1994年   1篇
  1991年   1篇
  1987年   1篇
  1986年   1篇
  1985年   2篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1977年   1篇
  1976年   2篇
  1971年   2篇
排序方式: 共有270条查询结果,搜索用时 15 毫秒
1.
Targeting the tumor cell mitochondrion could produce novel anticancer agents. We designed an aryl−urea fatty acid ( 1 g ; 16({[4-chloro-3-(trifluoromethyl)phenyl]carbamoyl}amino)hexadecanoic acid) that disrupted the mitochondrion and decreased MDA-MB-231 breast cancer cell viability. To optimize the aryl−ureas the present study evaluated mitochondrial targeting by 1 g analogues containing alkyl chains between 10–17 carbons. Using the dye JC-1, the C12−C17 analogues efficiently disrupted the mitochondrial membrane potential (IC50s 3.5±1.2 to 7.6±1.1 μM) and impaired ATP production; shorter analogues were less active. 7-Aminoactinomycin D/annexin V staining and flow cytometry showed that these agents activated the killing mechanisms of necrosis and apoptosis to varying extents (7-aminoactinomycin D/annexin V staining ratios 4.3–6.0). Indeed, 1 g and its C17 analogue preferentially activated necrosis and apoptosis, respectively (ratios 2.1 and 16). Taken together, alkyl chain length is a determinant of mitochondrial targeting by aryl−ureas and can be varied to develop analogues that activate apoptosis or necrosis in a regulated fashion.  相似文献   
2.
In a prospective study we found good results concerning postoperative complications (21%), perioperative lethality (3.2%) and lethality during hospital stay (6.5%) after implantation of dynamic hip screws (DHS) in patients with per- and subtrochanteric fractures of the femur. The ability to walk, as well as housing and social care postoperatively and follow-up for at least six months after dismissal demonstrates the importance of these fractures for the elderly. One of three patients needs professional care, 21% at home, 13% in nursing homes. Six months after operation the lethality is nearly 20%, i.e. three times higher than in hospital. These are the essential data for all techniques of osteosynthesis used in patients with these fractures, which could only be documented in prospective studies.  相似文献   
3.
In this article we overview the design and implementation of the second generation of Kansas Lava. Driven by the needs and experiences of implementing telemetry decoders and other circuits, we have made a number of improvements to both the external API and the internal representations used. We have retained our dual shallow/deep representation of signals in general, but now have a number of externally visible abstractions for combinatorial and sequential circuits, and enabled signals. We introduce these abstractions, as well as our abstractions for reading and writing memory. Internally, we found the need to represent unknown values inside our circuits, so we made aggressive use of associated type families to lift our values to allow unknowns, in a principled and regular way. We discuss this design decision, how it unfortunately complicates the internals of Kansas Lava, and how we mitigate this complexity. Finally, when connecting Kansas Lava to the real world, the standardized idiom of using named input and output ports is provided by Kansas Lava using a new monad, called Fabric. We present the design of this Fabric monad, and illustrate its use in a small but complete example.  相似文献   
4.
The goal of Privacy-Preserving Data Publishing (PPDP) is to generate a sanitized (i.e. harmless) view of sensitive personal data (e.g. a health survey), to be released to some agencies or simply the public. However, traditional PPDP practices all make the assumption that the process is run on a trusted central server. In this article, we argue that the trust assumption on the central server is far too strong. We propose Met ??P, a generic fully distributed protocol, to execute various forms of PPDP algorithms on an asymmetric architecture composed of low power secure devices and a powerful but untrusted infrastructure. We show that this protocol is both correct and secure against honest-but-curious or malicious adversaries. Finally, we provide an experimental validation showing that this protocol can support PPDP processes scaling up to nation-wide surveys.  相似文献   
5.
6.
Profiling of the electrical properties of nanowires (NWs) and NW heterocontacts with high spatial resolution is a challenge for any application and advanced NW device development. For appropriate NW analysis, we have established a four-point prober, which is combined in vacuo with a state-of-the-art vapor-liquid-solid preparation, enabling contamination-free NW characterization with high spatial resolution. With this ultrahigh-vacuum-based multi-tip scanning tunneling microscopy (MT-STM), we obtained the resistance and doping profiles of freestanding NWs, along with surface-sensitive information. Our in-system 4-probe STM approach decreased the detection limit for low dopant concentrations to the depleted case in upright standing NWs, while increasing the spatial resolution and considering radial depletion regions, which may originate from surface changes. Accordingly, the surface potential of oxide-free GaAs NW {112} facets has been estimated to be lower than 20 mV, indicating a NW surface with very low surface state density.
  相似文献   
7.
The Multi-Agent Programming Contest is an annual international event on programming multi-agent systems: Teams of agents participate in a simulated cooperative scenario. It started in 2005 and is organised in 2010 for the sixth time. The contest is an attempt to stimulate research in the area of multi-agent system development and programming by (i) identifying key problems in the field and (ii) collecting suitable benchmarks that can serve as milestones for testing multi-agent programming languages, platforms and tools. This article provides a short history of the contest since it started and reports in more detail on the cows and cowboys scenario implemented for the 2008, 2009 and 2010 contest editions. We briefly discuss the underlying technological background and conclude with a critical discussion of the experiences and lessons learned.  相似文献   
8.
The shape of sedimentary particles is an important property, from which geographical hypotheses related to abrasion, distance of transport, river behavior, etc. can be formulated. In this paper, we use digital image analysis, especially discrete geometry, to automatically compute some shape parameters such as roundness, i.e. a measure of how much the corners and edges of a particle have been worn away.In contrast to previous work in which traditional digital images analysis techniques, such as Fourier transform, are used, we opted for a discrete geometry approach that allowed us to implement Wadell's original index, which is known to be more accurate, but more time consuming to implement in the field.Our implementation of Wadell's original index is highly correlated (92%) with the roundness classes of Krumbein's chart, used as a ground-truth. In addition, we show that other geometrical parameters, which are easier to compute, can be used to provide good approximations of roundness.We also used our shape parameters to study a set of pebbles digital images taken from the Progo basin river network (Indonesia). The results we obtained are in agreement with previous work and open new possibilities for geomorphologists thanks to automatic computation.  相似文献   
9.
We introduce a class of Petri nets, simple logic Petri nets (SLPN), that are based on logical expressions. We show how this type of nets can be efficiently mapped into logic programs with negation: the corresponding answer sets describe interleaved executions of the underlying nets (Theorem 1). The absence of an answer set indicates a deadlock situation. We also show how to correctly model and specify AgentSpeak agents and multi-agent systems with SLPN’s (Theorem 2). Both theorems allow us to solve the task of model checking AgentSpeak multi-agent systems by computing answer sets of the obtained logic program with any ASP system.  相似文献   
10.
We propose algorithms for the synthesis of state-feedback controllers with partial observation of infinite state discrete event systems modelled by Symbolic Transition Systems. We provide models of safe memoryless controllers both for potentially deadlocking and deadlock free controlled systems. The termination of the algorithms solving these problems is ensured using abstract interpretation techniques which provide an overapproximation of the transitions to disable. We then extend our algorithms to controllers with memory and to online controllers. We also propose improvements in the synthesis of controllers in the finite case which, to our knowledge, provide more permissive solutions than what was previously proposed in the literature. Our tool SMACS gives an empirical validation of our methods by showing their feasibility, usability and efficiency.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号