首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3600篇
  免费   51篇
  国内免费   10篇
工业技术   3661篇
  2023年   10篇
  2022年   27篇
  2021年   51篇
  2020年   29篇
  2019年   30篇
  2018年   34篇
  2017年   38篇
  2016年   28篇
  2015年   24篇
  2014年   34篇
  2013年   66篇
  2012年   51篇
  2011年   52篇
  2010年   52篇
  2009年   49篇
  2008年   53篇
  2007年   53篇
  2006年   51篇
  2005年   40篇
  2004年   21篇
  2003年   34篇
  2002年   28篇
  2001年   21篇
  2000年   15篇
  1999年   91篇
  1998年   771篇
  1997年   426篇
  1996年   298篇
  1995年   189篇
  1994年   126篇
  1993年   180篇
  1992年   26篇
  1991年   33篇
  1990年   47篇
  1989年   41篇
  1988年   45篇
  1987年   20篇
  1986年   26篇
  1985年   21篇
  1984年   12篇
  1983年   14篇
  1982年   17篇
  1981年   23篇
  1980年   33篇
  1979年   13篇
  1978年   17篇
  1977年   84篇
  1976年   185篇
  1975年   7篇
  1973年   7篇
排序方式: 共有3661条查询结果,搜索用时 15 毫秒
91.
Sorption of elemental mercury by activated carbons   总被引:1,自引:0,他引:1  
  相似文献   
92.
A large percentage of older Americans are at risk for malnutrition. This puts them at risk for premature institutionalization, creating a financial burden. The objective of this survey was to determine the nutritional health of clients receiving home delivered meals in Lake County, Indiana and the impact that home delivered meals had on them. Nutrition Screening Initiative (NSI) Determine Your Nutritional Health Checklists were mailed to recipients of meals; 58.3% were returned. Twenty-eight percent were found to be at no nutritional risk, 39% at moderate nutritional risk and 33% at high nutritional risk. One-hundred-thirty clients that scored three or more on the "Checklist" were visited by a Registered Dietitian for further screening using the NSI Level I Screen. This screen found many nutritional problems but the fact that the clients did receive home delivered meals decreased the risk. It was determined by the author that 68% of these clients could not function in their own homes without home delivered meals.  相似文献   
93.

In General, Mobile Ad-Hoc Network (MANET) has limited energy resources, and it cannot recharge itself. This research goal focuses on building a power management scheme that saves energy in the MANET. Due to power instability, there is a chance that cluster heads fail and function incorrectly in cluster-based routing. As a result, instability occurs with the cluster heads while collecting data and communicating with others effectively. This work focuses on detecting the unstable cluster heads, which are replaced by other nodes implementing the envisaged self-configurable cluster mechanism. A self-configurable cluster mechanism with a k-means protocol approach is proposed to designate cluster heads effectively. The proposed k-means procedure is based on periodic irregular cluster head rotations or altering the number of clusters. We also propose a trust management mechanism in this research to detect and avoid MANET vulnerabilities. Because of the continuously changing topology and limited resources (power, bandwidth, computing), the trust management algorithm should only use local data. Consequently, compared to traditional protocols, the proposed approach with the k-means procedure and its experimental results show lower power usage and provide an optimal system for trust management.

  相似文献   
94.
Wireless Personal Communications - In the recent past, the Cognitive Radio Network (CRN) plays significant role in mobile technology for energy efficient wireless 5G communication. The Non...  相似文献   
95.
Authentication is important to the security of user data in a mobile cloud environment. Because of the server’s user credentials, it is subject to attacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC) by producing a secret number that isn’t stored in the phone, which protects against privileged insider attacks. The user and server generate a nonce for dynamic user identity and agree on a session secret key for safe communication. The passwords are not stored on the computer or provided in plain text, they are resistant to replay, guessing, and stolen verification attacks. The suggested protocol uses a one-way hash function and XOR operations, with the client having remote access to a large number of servers over a secure communication channel. Concentrates on HMAC and SHA3 for Collision Free Hashing and to overcome length extension attacks. HMACs are substantially less affected by collisions than their underlying hashing algorithms alone. So adding an HMAC to an MD5 or SHA hash would make it substantially more difficult to break via a rainbow table.  相似文献   
96.
The recent research in biocompatible materials has been useful in replacing and supporting the fractured natural human bones/joints. Under some condition, negative reaction like release of ions from the bare metal toward the human body fluid leads to corrosion. In this proposed research paper, the biocompatibility of the laser surface-modified austenitic stainless steel (SS316L) and nickel-based superalloy (Inconel 718) was studied. The investigation on laser-modified surfaces is evaluated through electrochemical polarization analysis using simulated body fluid (SBF). The samples subjected to electrochemical polarization analysis were characterized by optical image analysis, SEM, EDS, and XRD analysis. It was inferred that laser surface-modified materials provided enhanced corrosion resistance and bare nickel alloy is more susceptible to corrosion by SBF.  相似文献   
97.
The inverse problem of reconstructing the location and size of defects in a coated metallic pipe from single frequency limited view electromagnetic scattered field is considered. Specifically, the paper addresses the problem of assessing shape changes in the shadow region entailed by limited view data in 2D by operating in an intermediate size parameter (ka) range. The inverse scattering problem is formulated as a non-linear optimization problem solved through genetic algorithm that seeks to minimize in the least-squared sense the difference between measured data and simulated data through iterations of the solution to a forward problem. The hybrid finite element boundary integral formulations were used to solve the forward problem of coated metallic pipe with defects. The proposed inversion methodology was applied for shadow region shape change assessment to determine whether a metal pipe is coated or not, and to reconstruct the location and size of corrosion-like defect, over a range of size parameters. The study is carried out using transverse electric and transverse magnetic polarized fields. To understand the effect of coating on backscattered fields, parametric studies are conducted using numerical data. A range for size parameter \(2.0\le ka\le 4\) was found to produce the highest contrast between defect free pipe and coated metallic pipes with defects in the deep shadow region. The experiments are carried out using vector network analyzer in an anechoic chamber. The inversion results obtained using measured data were found be in good agreement with inversion results obtained using synthetic data. Estimated extent of corrosion in deep shadow region of a coated metallic pipe was found to be within 9 % of actual extent of corrosion.  相似文献   
98.
99.
Near infrared (NIR) light utilization in a range of current technologies has gained huge significance due to its abundance in nature and nondestructive properties. NIR active lanthanide (Ln) doped upconversion nanomaterials synthesized in controlled shape, size, and surface functionality can be combined with various pertinent materials for extensive applications in diverse fields. Upconversion nanophosphors (UCNP) possess unique abilities, such as deep tissue penetration, enhanced photostability, low toxicity, sharp emission peaks, long anti‐Stokes shift, etc., which have bestowed them with prodigious advantages over other conventional luminescent materials. As new generation fluorophores, UCNP have found a wide range of applications in various fields. In this Review, a comprehensive overview of lanthanide doped NIR active UCNP is provided by discussing the fundamental concepts including the different mechanisms proposed for explaining the upconversion processes, followed by the different strategies employed for the synthesis of these materials, and finally the technological applications of UCNP, mainly in the fields of bioimaging, drug delivery, sensing, and photocatalysis by highlighting the recent works in these areas. In addition, a brief note on the applications of UCNP in other fields is also provided along with the summary and future perspectives of these materials.  相似文献   
100.
Monocytes/macrophages (M/M) and CD4+ T cells are two important targets of human immunodeficiency virus (HIV) infection. Different strains of HIV-1 vary markedly in their abilities to infect cells belonging to the M/M lineage. Macrophagetropic (M-tropic) HIV-1 strains replicate well in primary lymphocytes as well as in primary macrophages; however, they generally infect T-cell lines poorly, if at all. Although promonocytic cell lines such as U937 have been used as in vitro models of HIV-1 infection of M/M, these cell lines are susceptible to certain T-cell-tropic (T-tropic) HIV-1 strains but are resistant to M-tropic HIV-1. In this study, we demonstrate that (i) certain U937 clones ("plus" clones), which are susceptible only to T-tropic HIV-1, become highly susceptible to M-tropic HIV-1 upon differentiation with retinoic acid (RA); (ii) other U937 clones ("minus" clones), which are resistant to both T- and M-tropic HIV-1, remain resistant to both viruses; and (iii) RA treatment induces expression of CCR5, a fusion/entry cofactor for M-tropic HIV-1 in both types of U937 clones, and yet enhances the fusogenicity of the plus clones, but not the minus clones, with M-tropic Env's. These results indicate that the major restriction of M-tropic HIV-1 infection in promonocytic cells occurs at the fusion/entry level, that differentiation into macrophage-like phenotypes renders some of these cells highly susceptible to infection with M-tropic HIV-1, and that CD4 and CCR5 may not be the only determinants of fusion/entry of M-tropic HIV-1 in these cells.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号