首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   229篇
  免费   3篇
电工技术   1篇
化学工业   43篇
机械仪表   2篇
建筑科学   10篇
能源动力   1篇
轻工业   11篇
水利工程   3篇
石油天然气   1篇
无线电   37篇
一般工业技术   36篇
冶金工业   53篇
原子能技术   1篇
自动化技术   33篇
  2023年   1篇
  2022年   10篇
  2021年   10篇
  2020年   3篇
  2019年   3篇
  2018年   9篇
  2017年   4篇
  2016年   5篇
  2015年   2篇
  2014年   14篇
  2013年   12篇
  2012年   16篇
  2011年   12篇
  2010年   12篇
  2009年   7篇
  2008年   8篇
  2007年   8篇
  2006年   7篇
  2005年   8篇
  2004年   4篇
  2003年   2篇
  2002年   4篇
  2001年   1篇
  2000年   2篇
  1999年   5篇
  1998年   11篇
  1997年   9篇
  1996年   3篇
  1995年   3篇
  1994年   6篇
  1992年   3篇
  1991年   1篇
  1990年   1篇
  1989年   2篇
  1988年   1篇
  1987年   3篇
  1986年   1篇
  1984年   1篇
  1983年   2篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1976年   3篇
  1975年   2篇
  1974年   1篇
  1973年   1篇
  1972年   2篇
  1970年   2篇
  1969年   2篇
排序方式: 共有232条查询结果,搜索用时 62 毫秒
1.
The effects of the cuticle and epicuticular waxes of grapefruit, strawberry and apple on the photodegradation and penetration of chlorpyrifos-methyl were studied. Photodegradation experiments were conducted by exposing the insecticide to the light of a xenon lamp in the presence of a film of wax extracted from the fruit surface. The half-life of chlorpyrifos-methyl irradiated in absence of waxes was 9.6 min. The half-lives of pesticide irradiated in the presence of wax extracts of apple, grapefruit and strawberry were 83, 34 and 26 min, respectively. In penetration studies, fruit with and without wax layers were treated with an aqueous suspension of pesticide. The penetration of the pesticide from the cuticle to the pulp was measured after 24 h. Samples without wax contained a higher total amount of insecticide than those with wax. No pesticide was detected in samples of apple and grapefruit pulp. Residues were detected in all fractions of strawberry. The waxes and cuticle appear to have some effect on the photodegradation and penetration of chlorpyrifos-methyl in fruit samples.  相似文献   
2.
The hybrid stripmap/spotlight mode for a synthetic aperture radar (SAR) system is able to generate microwave images with an azimuth resolution better than the one achieved in the stripmap mode and a ground coverage better than the one of the spotlight mode. In this paper, time- and frequency-domain-based procedures to simulate the raw signal in the hybrid stripmap/spotlight mode are presented and compared. We show that a two-dimensional Fourier domain approach, although highly desirable for its efficiency, is not viable. Accordingly, we propose a one-dimensional (1-D) range Fourier domain approach, followed by 1-D azimuth time-domain integration. This method is much more efficient than the time-domain one, so that extended scenes can be considered. In addition, it involves approximations usually acceptable in actual cases. Effectiveness of the simulation scheme is assessed by using numerical examples.  相似文献   
3.
As widely acknowledged, 40–50% of all melanoma patients harbour an activating BRAF mutation (mostly BRAF V600E). The identification of the RAS–RAF–MEK–ERK (MAP kinase) signalling pathway and its targeting has represented a valuable milestone for the advanced and, more recently, for the completely resected stage III and IV melanoma therapy management. However, despite progress in BRAF-mutant melanoma treatment, the two different approaches approved so far for metastatic disease, immunotherapy and BRAF+MEK inhibitors, allow a 5-year survival of no more than 60%, and most patients relapse during treatment due to acquired mechanisms of resistance. Deep insight into BRAF gene biology is fundamental to describe the acquired resistance mechanisms (primary and secondary) and to understand the molecular pathways that are now being investigated in preclinical and clinical studies with the aim of improving outcomes in BRAF-mutant patients.  相似文献   
4.
International Journal of Information Security - The complexity of today’s integrated circuit (IC) supply chain, organised in several tiers and including many companies located in different...  相似文献   
5.
The investigation of the mechanical response of fibre-reinforced composite laminates under impact loads can be very difficult due to the occurrence of simultaneous failure phenomena. Indeed, as a consequence of low velocity impacts, intra-laminar damages, like fibre and matrix cracking, and inter-laminar damages, such as delaminations, can take place simultaneously. These damage mechanisms can lead to significant reductions in strength and stability of the composite structure. In this paper a joint numerical-experimental study is proposed which, by means of non-destructive testing techniques (Ultra-sound and thermography) and non-linear explicit FEM analyses, aims to completely characterise the impact induced damage in composite laminates under low velocity impacts. Indeed the proposed numerical tool has been used to improve the understanding of the experimental data obtained by Non-Destructive Techniques. Applications on samples tested according to the AECMA (European Association of Aerospace Manufacturers) prEn6038 standard at three different impact energies are presented. The interaction between numerical and experimental investigation allowed to obtain an exhaustive insight on the different phases of the impact event considering the inter-laminar damage formation and evolution.  相似文献   
6.
The Farwell and Donchin P300 speller interface is one of the most widely used brain-computer interface (BCI) paradigms for writing text. Recent studies have shown that the recognition accuracy of the P300 speller decreases significantly when eye movement is impaired. This report introduces the GeoSpell interface (Geometric Speller), which implements a stimulation framework for a P300-based BCI that has been optimised for operation in covert visual attention. We compared the Geospell with the P300 speller interface under overt attention conditions with regard to effectiveness, efficiency and user satisfaction. Ten healthy subjects participated in the study. The performance of the GeoSpell interface in covert attention was comparable with that of the P300 speller in overt attention. As expected, the effectiveness of the spelling decreased with the new interface in covert attention. The NASA task load index (TLX) for workload assessment did not differ significantly between the two modalities. PRACTITIONER SUMMARY: This study introduces and evaluates a gaze-independent, P300-based brain-computer interface, the efficacy and user satisfaction of which were comparable with those off the classical P300 speller. Despite a decrease in effectiveness due to the use of covert attention, the performance of the GeoSpell far exceeded the threshold of accuracy with regard to effective spelling.  相似文献   
7.
This series of experiments sought to clarify the role of retrieval failure in forgetting that results from a change in context between training and testing (the context shift effect [CSE]). Because spontaneous forgetting (SF) is generally considered to reflect a retrieval failure, the effects of three manipulations known to alleviate SF were examined on forgetting due to an explicit shift in context at a short delay (24 hr). Pretest exposure to a reminder treatment involving the reinforcer from training (Experiment 1), pretest amphetamine administration (Experiment 2), and overtraining (Experiment 3) alleviated both SF and the CSE, supporting the view that the CSE reflects a retrieval deficit. Implications for the context change account of SF are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
8.
In the last years, the interest in methods and techniques for circumventing the security of the available digital video broadcasting systems is continuously increasing. Digital TV providers are struggling to restrict access to their video contents only to authorized users, by deploying more and more sophisticated conditional access systems. At the state-of-the-art, the most significant menace is the card-sharing activity which exploits a known weakness allowing an authorized subscriber to provide access to digital contents to a potentially large group of unauthorized ones connected over a communication network. This is usually realized by using ad hoc customized devices. Detecting the presence of these illegal systems on a network, by recognizing their related traffic is an issue of primary importance. Unfortunately, to avoid the identification of such traffic, payload obfuscation strategies based on encryption are often used, hindering packet inspection techniques.This paper presents a strategy for the detection of card-sharing traffic, empowered by machine-learning-driven traffic classification techniques and based on the natural capability of wavelet analysis to decompose a traffic time series into several component series associated with particular time and frequency scales and hence allowing its observation at different frequency component levels and with different resolutions. These ideas have been used for the proof-of-concept implementation of an SVM-based binary classification scheme that relies only on time regularities of the traffic and not on the packet contents and hence is immune to payload obfuscation techniques.  相似文献   
9.
Finite element procedures for the analysis of composite structures under compressive loads (buckling and post-buckling) generally are not deployed in books because they are still considered object of research whereas they are deemed as assessed by researchers that focus their papers on restricted audience topics. Therefore, regarding these procedures, a gap exists in literature between what researchers consider as well established and what has been already published. The aim of this paper is to contribute to close this gap by providing an insight in linear and non-linear buckling analyses and in their use with composite structures. Both modelling and analysis considerations are presented and discussed, focusing on what can be considered as best practice when dealing with this kind of problems. Applications (to a stiffened panel and to a wing box) are provided for demonstrating the effectiveness of the procedures presented.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号