首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   407篇
  免费   33篇
工业技术   440篇
  2023年   11篇
  2022年   4篇
  2021年   28篇
  2020年   15篇
  2019年   17篇
  2018年   15篇
  2017年   11篇
  2016年   23篇
  2015年   12篇
  2014年   16篇
  2013年   38篇
  2012年   26篇
  2011年   24篇
  2010年   15篇
  2009年   22篇
  2008年   19篇
  2007年   14篇
  2006年   14篇
  2005年   5篇
  2004年   19篇
  2003年   9篇
  2002年   12篇
  2001年   5篇
  2000年   3篇
  1999年   6篇
  1998年   3篇
  1997年   11篇
  1996年   3篇
  1995年   2篇
  1994年   3篇
  1993年   3篇
  1992年   2篇
  1991年   3篇
  1990年   3篇
  1988年   1篇
  1987年   1篇
  1986年   3篇
  1985年   1篇
  1984年   1篇
  1982年   1篇
  1981年   2篇
  1980年   3篇
  1979年   3篇
  1977年   2篇
  1976年   1篇
  1974年   1篇
  1971年   1篇
  1970年   1篇
  1969年   1篇
  1954年   1篇
排序方式: 共有440条查询结果,搜索用时 218 毫秒
1.
2.
In this paper, denoted a continuous function from [0,1]2 into [0,1] by f, we consider the iterative process:
  相似文献   
3.
4.
In this study some analytical methods, which have been used in oil crop breeding, are compared from the point of view of plant breeding. For oil content determination a gravimetric method, NMR and NIR have been used. Protein content has been determined by the classical Kjeldahl technique, by the Biuret method and by NIR. The results indicate that the NIR spectroscopy is specially useful in screening breeding materials. This method enables the breeder to select for several quality characters simultaneously at a high speed and at a low cost. Since NIR spectroscopy is nondestructive, the same seed lot can be used for analysis and planting. Thus it is possible to select on a large scale for single plants.  相似文献   
5.
Natural rubber vulcanizates of two formulations, with sulfur/N-cyclohexyl-2-benzothiazolesulfenamide (CBS) and tetramethylthiuram disulfide (TMTD), respectively, were analyzed by pyrolysis gas chromatography. A sulfur-selective flame-photometric detector was utilized. The main pyrolysis products were identified as CS2 and some thiophenes. The yields of the pyrolysis products from the two types of rubber were very different. The yields also varied with the curing time of the rubbers.  相似文献   
6.

Definition of the problem

The role of stories is well established in the traditions of narrative ethics and casuistry. However, from a methodological point of view, the inclusion of fictional works in moral deliberation remains yet unanswered. The paper explains the potential of dystopias for bioethics by means of selected examples and a critical reconstruction and expansion of existing approaches.

Arguments

By means of literary theories, it is proposed to include moral beliefs that motivate dystopias in coherent reflection and reasoning procedures. Furthermore, dystopia’s potential through socioculturally dense scenarios, a contemporary-historical context, and a sensitization to the moral relevance of language for bioethical research are systematically presented.

Conclusion

The methodological considerations provide, on the one hand, practical points of reference for didactic approaches and, on the other hand, for public deliberation. However, the analysis also shows that dystopias introduce their own moral positions beyond a mere illustration or warning.
  相似文献   
7.
In this focused issue on the theme of “Leveraging Values in Global Organizations”, we highlight several prevalent themes on national, organizational and individual values in the literature. We argue that many premises in the literature have been accepted as fact; yet there are still many avenues open to exploration. We present several paradoxes that are often overlooked or lead to inconsistencies in the literature on values. The five articles in this focused issue address these premises and paradoxes, presenting new challenges and opportunities, providing progress and paving the way for future research on leveraging values in global organizations. The selected articles explore values with respect to international alliances and subsidiaries of multinational organizations at the organizational level, among global managers at the group level, and among employees and inpatriates at the individual level of analysis. We trust that readers of this issue will agree that the articles provide novel insights into key issues in the established, yet dynamic, field of research on values in the context of global organizations.  相似文献   
8.
Cellular Automata (CA) are discrete dynamical systems and an abstract model of parallel computation. The limit set of a cellular automaton is its maximal topological attractor. A well-known result, due to Kari, says that all nontrivial properties of limit sets are undecidable. In this paper we consider the properties of limit set dynamics, i.e. properties of the dynamics of CA restricted to their limit sets. There can be no equivalent of Kari’s theorem for limit set dynamics. Anyway we show that there is a large class of undecidable properties of limit set dynamics, namely all properties of limit set dynamics which imply stability or the existence of a unique subshift attractor. As a consequence we have that it is undecidable whether the cellular automaton map restricted to the limit set is the identity map and whether it is closing, injective, expansive, positively expansive and transitive.  相似文献   
9.
Widespread use of GPS and similar technologies makes it possible to collect extensive amounts of trajectory data. These data sets are essential for reasonable decision making in various application domains. Additional information, such as events taking place along a trajectory, makes data analysis challenging, due to data size and complexity. We present an integrated solution for interactive visual analysis and exploration of events along trajectories data. Our approach supports analysis of event sequences at three different levels of abstraction, namely spatial, temporal, and events themselves. Customized views as well as standard views are combined to form a coordinated multiple views system. In addition to trajectories and events, we include on-the-fly derived data in the analysis. We evaluate our integrated solution using the IEEE VAST 2015 Challenge data set. A successful detection and characterization of malicious activity indicate the usefulness and efficiency of the presented approach.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号