首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   980篇
  免费   68篇
  国内免费   4篇
工业技术   1052篇
  2023年   9篇
  2022年   11篇
  2021年   39篇
  2020年   24篇
  2019年   21篇
  2018年   35篇
  2017年   42篇
  2016年   54篇
  2015年   20篇
  2014年   56篇
  2013年   88篇
  2012年   60篇
  2011年   56篇
  2010年   37篇
  2009年   47篇
  2008年   52篇
  2007年   43篇
  2006年   39篇
  2005年   26篇
  2004年   24篇
  2003年   20篇
  2002年   21篇
  2001年   18篇
  2000年   16篇
  1999年   17篇
  1998年   34篇
  1997年   25篇
  1996年   14篇
  1995年   16篇
  1994年   8篇
  1993年   12篇
  1992年   6篇
  1991年   3篇
  1990年   4篇
  1989年   6篇
  1988年   2篇
  1986年   4篇
  1985年   4篇
  1984年   4篇
  1982年   2篇
  1980年   3篇
  1979年   4篇
  1977年   3篇
  1976年   2篇
  1975年   4篇
  1973年   2篇
  1972年   3篇
  1970年   2篇
  1969年   3篇
  1967年   2篇
排序方式: 共有1052条查询结果,搜索用时 31 毫秒
71.
    
Ohne ZusammenfassungTeil einer Dissertationsarbeit vonR. Pires. Techn. Universität München.  相似文献   
72.
This study quantifies the surface chemical heterogeneity of bacteriogenic iron oxides (BIOS) and its end-members (2-line ferrihydrite and intermixed intact and fragmented bacteria). On a dry weight basis, BIOS consisted of 64.5 +/- 1.8% ferrihydrite and 34.5 +/- 1.8% organic matter. Enrichment of Al, Cu, Cr, Mn, Sr, and Zn was shown in the solid versus the aqueous phase (1.9 < log Kd < 4.2). Within the solid-phase Al (69.5%), Cu (78.7%), and Zn (77.9%) were associated with the bacteria, whereas Cr (59.8%), Mn (99.8%), and Sr (79.4%) preferred ferrihydrite. Acid-base titration data from the BIOS and bacteria were fitted using FOCUS pKa spectroscopy. The bacteria spectrum with pKa's of 4.18 +/- 0.37, 4.80 +/- 0.54, 6.98 +/- 0.45, and 9.75 +/- 0.68 was similar to discrete and continuous spectra for intact and fragmented bacteria. The BIOS spectrum recorded pKa's of 4.27 +/- 0.51, 6.61 +/- 0.51, 7.89 +/- 1.10, and 9.65 +/- 0.66 and was deconvoluted to remove overlapping binding site contributions from the bacteria. The resulting residual iron oxide spectrum coincided with discrete MUSIC spectra for goethite and lepidocrocite with pKa values of 4.10 +/- 0.43, 6.53 +/- 0.45, 7.81 +/- 0.76, and 9.51 +/- 0.68. Surface site density analysis showed that acidic sites (pKa < 6) were contributed by the bacteria (37%), whereas neutral sites (6 < pKa < 8) were characteristic of the iron oxide fraction (35%). Basic sites (8 < pKa) were higher in the bacteria (57%), than in the BIOS (44%) or iron oxide fractions (47%). This analysis suggested a high degree of bacterial group masking and a similarity between the BIOS and goethite surface reactivity. An understanding of the BIOS surface chemical heterogeneity and inherent proton and metal binding capacity was obtained through the use of FOCUS apparent pKa spectroscopy.  相似文献   
73.
The verification of security protocols has attracted a lot of interest in the formal methods community, yielding two main verification approaches: i) state exploration, e.g. FDR [Gavin Lowe. Breaking and fixing the needham-schroeder public-key protocol using FDR. In TACAs'96: Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems, pages 147–166, London, UK, 1996. Springer-Verlag] and OFMC [A.D. Basin, S. Mödersheim, and L. Viganò. An on-the-fly model-checker for security protocol analysis. In D. Gollmann and E. Snekkenes, editors, ESORICS'03: 8th European Symposium on Research in Computer Security, number 2808 in Lecture Notes in Computer Science, pages 253–270, Gjøvik, Norway, 2003. Springer-Verlag]; and ii) theorem proving, e.g. the Isabelle inductive method [Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal in Computer Security, 6(1-2):85–128, 1998] and Coral [G. Steel, A. Bundy, and M. Maidl. Attacking the asokan-ginzboorg protocol for key distribution in an ad-hoc bluetooth network using coral. In H. König, M. Heiner, and A. Wolisz, editors, IFIP TC6 /WG 6.1: Proceedings of 23rd IFIP International Conference on Formal Techniques for Networked and Distributed Systems, volume 2767, pages 1–10, Berlin, Germany, 2003. FORTE 2003 (work in progress papers)]. Complementing formal methods, Abadi and Needham's principles aim to guide the design of security protocols in order to make them simple and, hopefully, correct [M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6–15, 1996]. We are interested in a problem related to verification but far less explored: the correction of faulty security protocols. Experience has shown that the analysis of counterexamples or failed proof attempts often holds the key to the completion of proofs and for the correction of a faulty model. In this paper, we introduce a method for patching faulty security protocols that are susceptible to an interleaving-replay attack. Our method makes use of Abadi and Needham's principles for the prudent engineering practice for cryptographic protocols in order to guide the location of the fault in a protocol as well as the proposition of candidate patches. We have run a test on our method with encouraging results. The test set includes 21 faulty security protocols borrowed from the Clark-Jacob library [J. Clark and J. Jacob. A survey of authentication protocol literature: Version 1.0. Technical report, Department of Computer Science, University of York, November 1997. A complete specification of the Clark-Jacob library in CAPSL is available at http://www.cs.sri.com/millen/capsl/].  相似文献   
74.
The use of ionic liquids as carriers of magnetorheological fluids is described by Schubert and co‐workers on p. 1740. Combining the properties of ionic liquids with magnetorheological technology may lead to new, “smart” fluids for application in medical therapies, engineering devices, or multiphase biological and chemical systems. In the presence of a magnetic field the fluids behave as solids owing to a stronger interaction between their suspended magnetic particles. In the absence of the magnetic field, they become liquids again in a fully reversible process.  相似文献   
75.
Riparian systems have become increasingly susceptible to both natural and human disturbances as cumulative pressures from changing land use and climate alter the hydrological regimes. This article introduces a landscape dynamics monitoring protocol that incorporates riparian structural classes into the land-cover classification scheme and examines riparian change within the context of surrounding land-cover change. We tested whether Landsat Thematic Mapper (TM) imagery could be used to document a riparian tree die-off through the classification of multi-date Landsat images using classification and regression tree (CART) models trained with physiognomic vegetation data. We developed a post-classification change map and used patch metrics to examine the magnitude and trajectories of riparian class change relative to mapped disturbance parameters. Results show that catchments where riparian change occurred can be identified from land-cover change maps; however, the main change resulting from the die-off disturbance was compositional rather than structural, making accurate post-classification change detection difficult.  相似文献   
76.
A number of methods to overcome the 2003 failure of the Landsat 7 Enhanced Thematic Mapper (ETM+) scan-line corrector (SLC) are compared in this article in a forest-monitoring application in the Yucatan Peninsula, Mexico. The objective of this comparison is to determine the best approach to accomplish SLC-off image gap-filling for the particular landscape in this region, and thereby provide continuity in the Landsat data sensor archive for forest-monitoring purposes. Four methods were tested: (1) local linear histogram matching (LLHM); (2) neighbourhood similar pixel interpolator (NSPI); (3) geostatistical neighbourhood similar pixel interpolator (GNSPI); and (4) weighted linear regression (WLR). All methods generated reasonable SLC-off gap-filling data that were visually consistent and could be employed in subsequent digital image analysis. Overall accuracy, kappa coefficients (κ), and quantity and allocation disagreement indices were used to evaluate unsupervised Iterative Self-Organizing Data Analysis (ISODATA) land-cover classification maps. In addition, Pearson correlation coefficients (r) and root mean squares of the error (RMSEs) were employed for estimates agreement with fractional land cover. The best results visually (overall accuracy > 85%, κ < 9%, quantity disagreement index < 5.5%, and allocation disagreement index < 12.5%) and statistically (r > 0.84 and RMSE < 7%) were obtained from the GNSPI method. These results suggest that the GNSPI method is suitable for routine use in reconstructing the imagery stack of Landsat ETM+ SLC-off gap-filled data for use in forest-monitoring applications in this type of heterogeneous landscape.  相似文献   
77.
This paper presents the dimensional verification of encapsulations used to package microfluidic devices manufactured using a 3D printer of photopolymerisable resin. This characterisation has been performed by computed tomography (CT) by comparing newly manufactured encapsulations and samples that have been subjected to test conditions. Thus, it has been possible to draw conclusions both on the deviations of the nominal geometry of the encapsulations and on how this might affect their performance. This paper presents a scheme of dimensional verification from the point clouds obtained by CT. Finally, a combined threshold and scale factor correction technique of the tomography images is shown. This method is based on the simultaneous measurement of objective and master parts with known geometry. The results reveal the improvements achievable in the accuracy, given a particular machine configuration. The conclusions facilitate the improvement of the geometric design of these devices regarding their behaviour under test conditions.  相似文献   
78.
The exchange of lipids with cells and other lipoproteins is a crucial process in HDL metabolism and for HDL antiatherogenic function. Here, we tested a practical method to quantify the simultaneous transfer to HDL of phospholipids, free-cholesterol, esterified cholesterol and triacylglycerols and to verify the lipid transfer in patients with coronary artery disease (CAD) or undergoing statin treatment. Twenty-eight control subjects without CAD, 27 with CAD and 25 CAD patients under simvastatin treatment were studied. Plasma samples were incubated with a donor nanoemulsion prepared by ultrasonication of the constituent lipids and labeled with radioactive lipids; % lipids transferred to HDL were quantified in the HDL-containing supernatant after chemical precipitation of non-HDL fractions and the nanoemulsion. The assay was precise and reproducible. Increase of temperature (4–37 °C), of incubation period (5 min to 2 h), of HDL-cholesterol concentration (33–244 mg/dL) and of mass of nanoemulsion lipids (0.075–0.3 mg/μL) resulted in increased lipid transfer from the nanoemulsion to HDL. In contrast, increasing pH (6.5–8.5) and albumin concentration (3.5–7.0 g/dL) did not affect lipid transfer. There was no difference between CAD and control non-CAD with regard to the lipid transfer, but statin treatment reduced the transfer to HDL of all four lipids. The test herein described is a valid and practical tool for exploring an important aspect of HDL metabolism.  相似文献   
79.
In this study, the carbon content of retained austenite in a nanostructured bainitic steel was measured by atom probe tomography and compared with data derived from the austenite lattice parameter determined by X-ray diffraction. The results provide new evidence about the heterogeneous distribution of carbon in austenite, a fundamental issue controlling ductility in this type of microstructure.  相似文献   
80.
Self-adaptive software is capable of evaluating and changing its own behavior, whenever the evaluation shows that the software is not accomplishing what it was intended to do, or when better functionality or performance may be possible. The topic of system adaptivity has been widely studied since the mid-60s and, over the past decade, several application areas and technologies relating to self-adaptivity have assumed greater importance. In all these initiatives, software has become the common element that introduces self-adaptability. Thus, the investigation of systematic software engineering approaches is necessary, in order to develop self-adaptive systems that may ideally be applied across multiple domains. The main goal of this study is to review recent progress on self-adaptivity from the standpoint of computer sciences and cybernetics, based on the analysis of state-of-the-art approaches reported in the literature. This review provides an over-arching, integrated view of computer science and software engineering foundations. Moreover, various methods and techniques currently applied in the design of self-adaptive systems are analyzed, as well as some European research initiatives and projects. Finally, the main bottlenecks for the effective application of self-adaptive technology, as well as a set of key research issues on this topic, are precisely identified, in order to overcome current constraints on the effective application of self-adaptivity in its emerging areas of application.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号