首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   651篇
  免费   30篇
工业技术   681篇
  2022年   10篇
  2021年   28篇
  2020年   18篇
  2019年   10篇
  2018年   23篇
  2017年   13篇
  2016年   11篇
  2015年   17篇
  2014年   23篇
  2013年   53篇
  2012年   40篇
  2011年   63篇
  2010年   29篇
  2009年   34篇
  2008年   43篇
  2007年   43篇
  2006年   22篇
  2005年   30篇
  2004年   22篇
  2003年   6篇
  2002年   21篇
  2001年   6篇
  2000年   2篇
  1999年   5篇
  1998年   12篇
  1997年   10篇
  1996年   9篇
  1995年   8篇
  1994年   6篇
  1993年   5篇
  1992年   5篇
  1991年   5篇
  1990年   4篇
  1989年   4篇
  1988年   3篇
  1987年   3篇
  1985年   2篇
  1984年   2篇
  1981年   3篇
  1978年   2篇
  1977年   4篇
  1976年   4篇
  1974年   3篇
  1966年   1篇
  1965年   1篇
  1963年   1篇
  1961年   1篇
  1955年   1篇
  1948年   1篇
  1945年   1篇
排序方式: 共有681条查询结果,搜索用时 640 毫秒
1.
Production and world consumption of spices are constantly increasing. Although the antimicrobial properties of some spices are well documented, their use in the agri-food industry is also responsible for microbial contamination and spoilage. Bacterial spores introduced by spices can withstand different preparation processes, particularly thermal treatments, leading to food alterations during storage. This review brings together data from the literature about the prevalence and concentrations of spore-forming bacteria in all commercially available spices. The sporeformers found in spices belong mainly to the genera Bacillus and Clostridium. Such contaminations are very common and sometimes reach high levels, as in pepper and turmeric. Bacillus licheniformis and Bacillus cereus are the most frequently detected species. Studying the harvesting, processing, and storage procedures for spices provides elements to explain why high prevalence and concentrations are observed. Spices are mostly produced in developing countries on small farms using traditional production methods. Spices become contaminated by bacterial spores in two main ways: by contact with soil during harvesting or drying, as for pepper, or by cross-contamination during the water-cooking step, as for turmeric. From these observations, we propose some recommendations. Different methods that can be used to eliminate bacterial spores from spices are presented indicating their efficiency and the limitations of their use.  相似文献   
2.
Abdominal aortic aneurysm (AAA) is an inflammatory disease associated with marked changes in the cellular composition of the aortic wall. This study aims to identify microRNA (miRNA) expression in aneurysmal inflammatory cells isolated by laser microdissection from human tissue samples. The distribution of inflammatory cells (neutrophils, B and T lymphocytes, mast cells) was evaluated in human AAA biopsies. We observed in half of the samples that adventitial tertiary lymphoid organs (ATLOs) with a thickness from 0.5 to 2 mm were located exclusively in the adventitia. Out of the 850 miRNA that were screened by microarray in isolated ATLOs (n = 2), 164 miRNAs were detected in ATLOs. The three miRNAs (miR-15a-3p, miR-30a-5p and miR-489-3p) with the highest expression levels were chosen and their expression quantified by RT-PCR in isolated ATLOs (n = 4), M1 (n = 2) and M2 macrophages (n = 2) and entire aneurysmal biopsies (n = 3). Except for the miR-30a-5p, a similar modulation was found in ATLOs and the two subtypes of macrophages. The modulated miRNAs were then evaluated in the plasma of AAA patients for their potential as AAA biomarkers. Our data emphasize the potential of miR-15a-3p and miR-30a-5p as biomarkers of AAA but also as triggers of ATLO evolution. Further investigations will be required to evaluate their targets in order to better understand AAA pathophysiology.  相似文献   
3.
Presents an overview of the recent past, the present, and anticipated future trends in the field of family psychology (i.e., the scientific study of the family in terms of its historical forms and variations; structure and functioning across time, space, culture, and generations; and idiosyncratic and systems attributes). Areas discussed include availability of graduate education in family psychology, internship availability, postgraduate training opportunities, clinical practice, research and publications, ethical and legal concerns, credentialing, and impact on other family therapy organizations. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
4.
Biosynthesis of active endothelin-1 (ET-1) implies an enzymatic processing of the inactive precursor Big ET-1 (1-39) into the mature, 21 amino acid peptide. The aim of this study was to characterize in airway and alveolar epithelial cells the enzymes responsible for this activation. BEAS-2B and A549 cells, which both produce ET-1, were studied in vitro as models for bronchiolar and alveolar cells, respectively. Both cell lines were able to convert exogenously added Big ET-1 (0.1 microM) into ET-1, suggesting a cell surface or an extracellular processing. The conversion was inhibited by phosphoramidon in both cell lines with an IC50 approximately 1 microM, but not by thiorphan, a specific inhibitor of neutral endopeptidase 24.11 (NEP). The endogenous production of serum-stimulated BEAS-2B and A549 cells was not inhibited by thiorphan, and phosphoramidon showed inhibition only at high concentration (>100 microM). Western blotting following electrophoresis in reducing conditions demonstrated a protein of MR 110 corresponding to the ECE-1 monomer in both BEAS-2B and A549 cells, as well as in whole lung extracts. By RT-PCR we revealed the mRNA encoding for the ECE-1b and/or -1c subtype, but not ECE-1a, in both cell lines. We conclude that BEAS-2B and A549 cells are able to process either endogenous or exogenous Big ET-1 by ECE-1 and that isoforms 1b and 1c could be involved in this processing with no significant role of NEP.  相似文献   
5.

Comparator is an essential building block in many digital circuits such as biometric authentication, data sorting, and exponents comparison in floating-point architectures among others. Quantum-dot Cellular Automata (QCA) is a latest nanotechnology that overcomes the drawbacks of Complementary Metal Oxide Semiconductor (CMOS) technology. In this paper, novel area optimized 2n-bit comparator architecture is proposed. To achieve the objective, 1-bit stack-type and 4-bit tree-based stack-type (TB-ST) comparators are proposed using QCA. Then, two tree-based architectures of 4-bit comparators are arranged in two layers to optimize the number of quantum cells and area of an 8-bit comparator. Thus, this design can be extended to any 2n-bit comparator. Simulation results of 4-bit and 8-bit comparators using QCADesigner 2.0.3 show that there is a significant improvement in the number of quantum cells and area occupancy. The proposed TB-ST 8-bit comparator uses 2.5 clock cycles and 622 quantum cells with area occupancy of 0.49 µm2 which is an improvement by 10.5% and 38%, respectively, compared to existing designs. Scaling it to a 32-bit comparator, the proposed architecture requires only 2675 quantum cells in an area of 2.05 µm2 with a delay of 3.5 clock cycles, indicating 9.35% and 28.8% improvements, respectively, demonstrating the merit of the proposed architecture. Besides, energy dissipation analysis of the proposed TB-ST 8-bit comparator is simulated on QCADesigner-E tool, indicating average energy dissipation reduction of 17.3% compared to existing works.

  相似文献   
6.
The multistep development of cancer involves the cooperation between multiple molecular lesions, as well as complex interactions between cancer cells and the surrounding tumour microenvironment. The search for these synergistic interactions using experimental models made tremendous contributions to our understanding of oncogenesis. Yet, these approaches remain labour-intensive and challenging. To tackle such a hurdle, an integrative, multidisciplinary effort is required. In this article, we highlight the use of logical computational models, combined with experimental validations, as an effective approach to identify cooperative mechanisms and therapeutic strategies in the context of cancer biology. In silico models overcome limitations of reductionist approaches by capturing tumour complexity and by generating powerful testable hypotheses. We review representative examples of logical models reported in the literature and their validation. We then provide further analyses of our logical model of Epithelium to Mesenchymal Transition (EMT), searching for additional cooperative interactions involving inputs from the tumour microenvironment and gain of function mutations in NOTCH.  相似文献   
7.
Sea lampreys,Mordacia mordax, were collected in spring from the Yarra River, Victoria, during their upstream spawning migration, to study the lipid composition in their tissues and plasma and their lipid transport system. Plasma lipoproteins were isolated by preparative ultracentrifugation and their chemical compositions were analyzed. The major classes of lipoproteins were found to be similar to those of man and higher animals. Lipids from the muscle and liver were analyzed for fatty acids. The striking feature of the lipids in the migrating lamprey is the presence of very high levels of cholesterol in both plasma and muscle. The possible metabolic roles of cholesterol have been discussed.  相似文献   
8.
Crystallization of the poorly durable Na2MoO4 phase able to incorporate radioactive cesium must be avoided in SiO2–Al2O3–B2O3–Na2O–CaO glasses developed for the immobilization of Mo-rich nuclear wastes. Increasing amounts of B2O3 and MoO3 were added to a SiO2–Na2O–CaO glass, and crystallization tendency was studied. Na2MoO4 crystallization tendency decreased with the increase of B2O3 concentration whereas the tendency of CaMoO4 to crystallize increased due to preferential charge compensation of BO4 entities by Na+ ions. 29Si MAS NMR showed that molybdenum acts as a reticulating agent in glass structure. Trivalent actinides surrogate (Nd3+) were shown to enter into CaMoO4 crystals formed in glasses.  相似文献   
9.
Proteomes are intricate. Typically, thousands of proteins interact through physical association and post-translational modifications (PTMs) to give rise to the emergent functions of cells. Understanding these functions requires one to study proteomes as "systems" rather than collections of individual protein molecules. The abstraction of the interacting proteome to "protein networks" has recently gained much attention, as networks are effective representations, that lose specific molecular details, but provide the ability to see the proteome as a whole. Mostly two aspects of the proteome have been represented by network models: proteome-wide physical protein-protein-binding interactions organized into Protein Interaction Networks (PINs), and proteome-wide PTM relations organized into Protein Signaling Networks (PSNs). Mass spectrometry (MS) techniques have been shown to be essential to reveal both of these aspects on a proteome-wide scale. Techniques such as affinity purification followed by MS have been used to elucidate protein-protein interactions, and MS-based quantitative phosphoproteomics is critical to understand the structure and dynamics of signaling through the proteome. We here review the current state-of-the-art MS-based analytical pipelines for the purpose to characterize proteome-scale networks.  相似文献   
10.
Encryption is one of the fundamental technologies that is used in the security of multimedia data. Unlike ordinary computer applications, multimedia applications generate large amount of data that has to be processed in real time. This work investigates the problem of efficient multimedia data encryption. A scheme known as the Randomized Huffman Table scheme was recently proposed to achieve encryption along with compression. Though this scheme has several advantages it cannot overcome the chosen plaintext attack. An enhancement of this Huffman scheme is proposed in this work which essentially overcomes the attack and improves the security. The proposed encryption approach consists of two modules. The first module is the Randomized Huffman Table module, the output of which is fed to the second XOR module to enhance the performance. Security analysis shows that the proposed scheme can withstand the chosen plaintext attack. The efficiency and security of the proposed scheme makes it an ideal choice for real time secure multimedia applications.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号