首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1148篇
  免费   96篇
工业技术   1244篇
  2024年   2篇
  2023年   9篇
  2022年   15篇
  2021年   92篇
  2020年   39篇
  2019年   46篇
  2018年   43篇
  2017年   40篇
  2016年   52篇
  2015年   46篇
  2014年   52篇
  2013年   85篇
  2012年   86篇
  2011年   82篇
  2010年   71篇
  2009年   70篇
  2008年   80篇
  2007年   58篇
  2006年   46篇
  2005年   37篇
  2004年   33篇
  2003年   22篇
  2002年   21篇
  2001年   23篇
  2000年   12篇
  1999年   12篇
  1998年   3篇
  1997年   9篇
  1996年   6篇
  1995年   9篇
  1994年   6篇
  1993年   5篇
  1992年   1篇
  1991年   2篇
  1990年   6篇
  1989年   3篇
  1988年   3篇
  1987年   2篇
  1986年   1篇
  1984年   2篇
  1983年   2篇
  1982年   1篇
  1980年   2篇
  1979年   2篇
  1975年   1篇
  1974年   2篇
  1972年   2篇
排序方式: 共有1244条查询结果,搜索用时 390 毫秒
61.
Countercurrent supercritical fluid extraction of grape-spirit   总被引:1,自引:0,他引:1  
A procedure for the recovery of aromatic extracts from raw grape-spirit (alcohol strength 73 vol.%) by means of a countercurrent supercritical fluid extraction (CC-SFE) on a pilot plant scale is presented. The effect of the solvent-to-feed ratio at 7, 8, 10, and 20 kgCO2/kgFeed on the extraction of flavor compounds, operating at constant pressure of 100 bar and extraction temperature of 50 °C have been studied. Increasing the solvent-to-feed ratio from 7 to 20 kgCO2/kgFeed, the total volatile compounds yield decreases from 64 to 5% and that of ethanol from 85 to 49%. The highest concentration of volatile compounds has been obtained at 7 and 8 kgCO2/kgFeed solvent-to-feed ratio. Mixtures containing grape-spirit (alcohol strength 40 vol.%) added with 30% (v/v) of different extracts have been tested and judged by a panel. Sensory evaluation indicated as preferred the mixtures added with the extracts obtained at lowest solvent-to-feed ratio.  相似文献   
62.
Male pheromones are believed to attract females and repel male mice in open field tests but, when tested in more complex environments, they can attract male mice in usually avoided areas. Females were tested in an apparatus with one dark and one light side, in the absence or presence of male urine or the major urinary proteins (MUPs) bearing the natural ligands. Diestrous females were slower in leaving from the dark area when male urine or MUPs were present in it. Estrogen-primed females showed the opposite behavior, with an increase in the same latency. The light-avoidance behavior of prepubertal females, or females reared without males was not influenced by the presence of male chemosignals. The results show that adult female mice can react to MUP-borne volatiles as to adult male urine and use them as cues of male mice, if they were previously exposed to male cues during infancy. MUP-borne molecules are, thus, the olfactory trace of males in the environment and modulate mice exploratory behavior.  相似文献   
63.
The paper presents a real-time vision system to compute traffic parameters by analyzing monocular image sequences coming from pole-mounted video cameras at urban crossroads. The system uses a combination of segmentation and motion information to localize and track moving objects on the road plane, utilizing a robust background updating, and a feature-based tracking method. It is able to describe the path of each detected vehicle, to estimate its speed and to classify it into seven categories. The classification task relies on a model-based matching technique refined by a feature-based one for distinguishing between classes having similar models, like bicycles and motorcycles. The system is flexible with respect to the intersection geometry and the camera position. Experimental results demonstrate robust, real-time vehicle detection, tracking and classification over several hours of videos taken under different illumination conditions. The system is presently under trial in Trento, a 100,000-people town in northern Italy.  相似文献   
64.
65.
Chemical signals modulate aggressive behavior in mice. For example, male urinary cues enhance aggression against other adults: a resident mouse attacks a male but not a castrated intruder, unless it is anointed with male urine. Our purpose was to understand whether molecules excreted with urine also act as aggression triggers in a different context. Therefore, the effect of urine, or molecules purified from urine, voided by different animals (males or females), was tested on the aggression of male mice against pups. Latency to the first attack, percentage of pups receiving the first attack, and percentage of attacked pups after 5 and 15 min were recorded. At variance with intermale aggression, male urinary chemosignals sprayed on pups reduced infanticide, while female urine did not. Male urine also delayed infanticide when compared to female urine. Pups anointed with low molecular weight dialyzed urine and with the high molecular weight protein fraction were attacked later than controls. Pups anointed with Major Urinary Proteins (MUPs) also were attacked later. The volatiles retained by MUPs act in the same way as adult male urine. MUPs and their ligands did not modify biting of food items. The results show that mice do not perceive male chemosignals as compulsory aggression triggers but rather can consistently and differentially shape their behavior in response to the same molecules according to different contextual events.  相似文献   
66.
Identification of potent human anti-IL-1RI antagonist antibodies   总被引:4,自引:0,他引:4  
Interleukin-1 (IL-1) blockade by IL-1 receptor antagonist benefits some arthritis patients by reducing joint damage. This fact inspired us to develop antagonist human therapeutic antibodies against IL-1R(I) using phage libraries that display single-chain variable fragment (scFv) antibody fragments. Panning libraries against human IL-1R(I) generated 39 unique scFv-phage whose binding to IL-1R(I) was competed by IL-1 ligands. Fifteen of these scFv-phage, identified using IL-1R(I)-binding assays and dissociation rate ranking, were reformatted as scFv-Fc and IgG(4) molecules. The ease of producing antibodies in the scFv-Fc format permitted rapid identification of four lead clones (C10, C13, C14, C15) that inhibit NF-kappaB nuclear translocation induced by IL-1. Reformatting these clones as IgG(4) molecules increased their inhibition potency by 相似文献   
67.
We present C2 quasi-interpolating schemes with tension properties. The B-splines like functions used in the quasi-interpolanting schemes are parametric cubic curves and their shape can be easily controlled via tension parameters which have an immediate geometric interpretation. Applications to the problem of approximation of curves with shape-constraints are discussed.  相似文献   
68.
Poly(ethylene terephthalate) (PET) is one of the most commonly employed polymers in the textile industry. Its relevance as a source of evidence in the reconstruction of criminal cases is nevertheless very limited because the properties and morphologies of fibers from different producers tend to be very similar. By integrating bands, obtained on single fibers by infrared (IR) microscopy, associated with trans and gauche conformation and to the O-H end-groups of the molecules, a method is proposed that can discriminate otherwise similar PET fibers. The absorbancies at 1370 and at 846 cm(-1) relative, respectively, to the gauche and trans conformation, were measured and ratioed. The end-group content was evaluated by ratioing the absorbancies of the signals at 3440 and at 874 cm(-1). Relative standard deviation (R. S. D.) was 1% for repetitive analyses on the same location of the same single fiber. Precision was reduced if the ratios were measured along the length of a single fiber (R. S. D. = 3%) and even further when different fibers of the same sample were examined (R. S. D. varied from 2 to 10%). This simple method can greatly enhance the evidential value of PET fibers by subclassifying them, thus helping the Court to better assess their significance.  相似文献   
69.
Lane  Terran  Brodley  Carla E. 《Machine Learning》2003,51(1):73-107
This paper introduces the computer security domain of anomaly detection and formulates it as a machine learning task on temporal sequence data. In this domain, the goal is to develop a model or profile of the normal working state of a system user and to detect anomalous conditions as long-term deviations from the expected behavior patterns. We introduce two approaches to this problem: one employing instance-based learning (IBL) and the other using hidden Markov models (HMMs). Though not suitable for a comprehensive security solution, both approaches achieve anomaly identification performance sufficient for a low-level focus of attention detector in a multitier security system. Further, we evaluate model scaling techniques for the two approaches: two clustering techniques for the IBL approach and variation of the number of hidden states for the HMM approach. We find that over both model classes and a wide range of model scales, there is no significant difference in performance at recognizing the profiled user. We take this invariance as evidence that, in this security domain, limited memory models (e.g., fixed-length instances or low-order Markov models) can learn only part of the user identity information in which we're interested and that substantially different models will be necessary if dramatic improvements in user-based anomaly detection are to be achieved.  相似文献   
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号