首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13671篇
  免费   985篇
  国内免费   111篇
工业技术   14767篇
  2024年   64篇
  2023年   264篇
  2022年   462篇
  2021年   894篇
  2020年   761篇
  2019年   821篇
  2018年   930篇
  2017年   834篇
  2016年   826篇
  2015年   478篇
  2014年   774篇
  2013年   1409篇
  2012年   919篇
  2011年   987篇
  2010年   674篇
  2009年   607篇
  2008年   437篇
  2007年   365篇
  2006年   314篇
  2005年   197篇
  2004年   182篇
  2003年   155篇
  2002年   123篇
  2001年   95篇
  2000年   92篇
  1999年   85篇
  1998年   140篇
  1997年   115篇
  1996年   101篇
  1995年   72篇
  1994年   53篇
  1993年   61篇
  1992年   46篇
  1991年   35篇
  1990年   40篇
  1989年   31篇
  1988年   24篇
  1987年   23篇
  1986年   33篇
  1985年   26篇
  1984年   27篇
  1983年   24篇
  1982年   22篇
  1981年   19篇
  1980年   19篇
  1979年   15篇
  1978年   18篇
  1977年   18篇
  1976年   20篇
  1975年   12篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
In Rhodobacter sphaeroides, cytochrome c2 (cyt c2)-deficient mutants are photosynthetically incompetent (PS-). However, mutations which suppress the photosynthetic deficiency (spd mutations) of cyt c2 mutants increase the levels of a cyt c2 isoform, isocyt c2. To determine whether isocyt c2 was required for photosynthetic growth of Spd mutants, we used Tn5 mutagenesis to generate a PS- mutant (TP39) that lacks both cyt c2 and isocyt c2. DNA sequence analysis of wild-type DNA that restores isocyt c2 production and photosynthetic growth to TP39 indicates that it encodes the isocyt c2 structural gene, cycI. The Tn5 insertion in TP39 is approximately 1.5 kb upstream of cycI, and our results show that it is polar onto cycI. The cycI gene has been physically mapped to a region of chromosome I that is approximately 700 kb from the R. sphaeroides photosynthetic gene cluster. Construction of a defined cycI null mutant and complementation of several mutants with the cycI gene under the control of the cyt c2 promoter region indicate that an increase in the levels of isocyt c2 alone is necessary and sufficient for photosynthetic growth in the absence of cyt c2. The data are discussed in terms of the obligate role of isocyt c2 in cyt c2-independent photosynthesis of R. sphaeroides.  相似文献   
102.
This paper contributes to extend the minimax disparity to determine the ordered weighted averaging (OWA) model based on linear programming. It introduces the minimax disparity approach between any distinct pairs of the weights and uses the duality of linear programming to prove the feasibility of the extended OWA operator weights model. The paper finishes with an open problem.  相似文献   
103.
A refined study of multi-carrier code division multiple access transmission over a Nakagami fading channel is proposed. The channel power is modeled with an exponential power profile rather than the uniform profile prevalent in other papers. An expression for the bit error rate (BER) is then derived. Numerical results show that MC-CDMA performances depend on the power dispersion of interferers around the desired user power.  相似文献   
104.
Threshold cryptography based on Asmuth-Bloom secret sharing   总被引:1,自引:0,他引:1  
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present three novel function sharing schemes for RSA, ElGamal and Paillier cryptosystems. To the best of our knowledge, these are the first provably secure threshold cryptosystems realized using the Asmuth-Bloom secret sharing. Proposed schemes are comparable in performance to earlier proposals in threshold cryptography.  相似文献   
105.
A 3.3-V 16-Mb nonvolatile memory having operation virtually identical to DRAM with package pin compatibility has been developed. Read and write operations are fully DRAM compatible except for a longer RAS precharge time after write. Fast random access time of 63 ns with the NAND flash memory cell is achieved by using a hierarchical row decoder scheme and a unique folded bit-line architecture which also allows bit-by-bit program verify and inhibit operation. Fast page mode with a column address access time of 21 ns is achieved by sensing and latching 4 k cells simultaneously. To allow byte alterability, nonvolatile restore operation with self-contained erase is developed. Self-contained erase is word-line based, and increased cell disturb due to the word-line based erase is relaxed by adding a boosted bit-line scheme to a conventional self-boosting technique. The device is fabricated in a 0.5-μm triple-well, p-substrate CMOS process using two-metal and three-poly interconnect layers. A resulting die size is 86.6 mm2, and the effective cell size including the overhead of string select transistors is 2.0 μm2  相似文献   
106.
Fluid catalytic cracking (FCC) is one of the most complex processes in the petroleum industry. The large degree of uncertainty in the kinetics of the cracking reactions and catalyst deactivation by coke deposition in the riser reactor are among several factors that contribute to the process complexity. The model developed by the authors (Ali and Rohani, 1995) is used lo investigate the effect of the three-lumped kinetic scheme (Weekman and Nace, 1970) and the four-lumped scheme (Lee ct ah, 1989) on the model predictability and reliability. The effect of changes in the catalyst circulation rate, gas oil feed rate, and oxygen feed concentration on various process variables is compared. It is shown that the three-lumped kinetic scheme, despite its extensive use in the literature (McFarlane et ah, 1993; Elnashaie and Elshishini, 1993; Theologos and Markatos, 1993; Arandes and de Lasa, 1992; Lopez-lsunza and Ruiz-Martinez, 1991), leads to erroneous results and should not be used in the dynamic simulation of the FCC units,  相似文献   
107.
Hardware implementation of artificial neural networks has been attracting great attention recently. In this work, the analog VLSI implementation of artificial neural networks by using only transconductors is presented. The signal flow graph approach is used in synthesis. The neural flow graph is defined. Synthesis of various neural network configurations by means of neural flow graph is described. The approach presented in this work is technology independent. This approach can be applied to new neural network topologies to be proposed or used with transconductors designed in future technologies.  相似文献   
108.
109.
GEOTHERM is a computer program written in BASIC language to estimate geothermal reservoir temperature using the well-known chemical gèothermometers. The empirical equations used in the program were obtained from the literature. Three different chemical geothermometers are included in the program: Na-K, Na-K-Ca, and silica geothermometers; this gives the user the opportunity not only to select the most reliable geothermometer in estimating subsurface temperature, but also to select the type of geothermometer according to available data. A sample input file of geothermal waters obtained from Iceland has been tested, so as to show the applicability and usefulness of the program.  相似文献   
110.
A switching expression is readily convertible to a reliability expression if (a) all ORed terms are disjoint, and (b) all ANDed sums are statistically independent. The usual approach of system reliability analysis makes a primary use of (a) and a secondary use of (b). An alternative approach reverses the roles of (a) and (b). Symbolic reliability expressions for the source-to-terminal reliability of a generalized Indra network (GIN) with nonidentical components are derived by the two approaches. For this particular case, the second approach leads to a shorter, more elegant derivation and simpler novel results. Typical plots of the GIN reliability functions are presented and their properties are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号