全文获取类型
收费全文 | 622篇 |
免费 | 11篇 |
学科分类
工业技术 | 633篇 |
出版年
2023年 | 6篇 |
2022年 | 14篇 |
2021年 | 18篇 |
2020年 | 14篇 |
2019年 | 9篇 |
2018年 | 12篇 |
2017年 | 9篇 |
2016年 | 12篇 |
2015年 | 12篇 |
2014年 | 20篇 |
2013年 | 37篇 |
2012年 | 20篇 |
2011年 | 28篇 |
2010年 | 17篇 |
2009年 | 18篇 |
2008年 | 26篇 |
2007年 | 11篇 |
2006年 | 20篇 |
2005年 | 16篇 |
2004年 | 14篇 |
2003年 | 14篇 |
2002年 | 13篇 |
2001年 | 9篇 |
2000年 | 7篇 |
1999年 | 9篇 |
1998年 | 28篇 |
1997年 | 20篇 |
1996年 | 16篇 |
1995年 | 14篇 |
1994年 | 8篇 |
1993年 | 11篇 |
1992年 | 4篇 |
1991年 | 6篇 |
1990年 | 8篇 |
1989年 | 11篇 |
1988年 | 16篇 |
1987年 | 4篇 |
1986年 | 3篇 |
1985年 | 6篇 |
1984年 | 8篇 |
1983年 | 5篇 |
1982年 | 8篇 |
1981年 | 3篇 |
1980年 | 6篇 |
1979年 | 7篇 |
1978年 | 10篇 |
1977年 | 11篇 |
1976年 | 9篇 |
1974年 | 7篇 |
1973年 | 6篇 |
排序方式: 共有633条查询结果,搜索用时 0 毫秒
1.
Two polypeptide antigens with molecular sizes of 34,000 daltons (34 kDa) and 38 kDa were separated from heated cells of a human clinical treponeme strain G7201 and Treponema denticola ATCC 35404, respectively. The rabbit polyclonal antisera against these antigens were produced and examined for their immunological reactions with the two heated antigens or intact spirochetal cells. Immunoblot analysis showed that the 34-kDa protein was also detected in T. denticola ATCC 35404 and ATCC 33520, and the 38-kDa protein was detected only in the two ATCC strains. Immunoelectron microscopy using the two rabbit antisera and protein A-gold complexes demonstrated that the 38-kDa protein antigen was present on the axial flagella of two T. denticola strains, and that the 34-kDa protein was located in the axial flagella of the G7201 cell, but neither in axial flagella nor on outer envelopes of the two ATCC strains cells, suggesting that the native 34-kDa axial flagellar protein of the G7201 strain may be different from that of T. denticola in terms of immunological reactivity. 相似文献
2.
This article presents the abandonment-symbiosis hypothesis. This hypothesis pertains to the dynamics of suicide in youngsters who experience difficulties in separation from their symbiotic families. It is suggested that such youngsters have experienced various types of rejection and abandonment in early childhood and have developed insecure attachment styles and insufficient ego functions in order to cope with difficulties. It is also suggested that these youngsters have become scapegoats by their dysfunctional families and that they are held in a symbiotic grip in order to continue to bear the negative projections of their families. As such, they are prevented from developing a proper sense of individuation and autonomy. The sequence that begins with abandonment and continues with symbiosis is a reversal of normal development is critical for the emergence of suicidal behavior. The various aspects of the abandonment-symbiosis hypothesis are demonstrated by case studies and empirical data. A combination of individual and family treatment is recommended as the best approach for the treatment of such youngsters. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
3.
4.
ML Israel DA Connolly RE von Heyn JM Rock PW Smith 《Canadian Metallurgical Quarterly》1993,24(4):343-355
Fifty-two case-hardened, severely self-abusive and aggressive autistic and retarded students, living in six different community residences, were trained to exit their residences, without the presence or assistance of staff, when a fire alarm sounded at night. On a pretest, prior to an 11-week period of intensive environmental and behavioral interventions, only 25% of the students exited within 2 1/2 minutes and independent of staff assistance. At posttest, 100% exited successfully, in a mean evacuation time of 60 seconds. The study was conducted at the Behavior Research Institute (BRI). 相似文献
5.
Clifford E Felder Simone A Botti Shneior Lifson Israel Silman Joel L Sussman 《Journal of molecular graphics & modelling》1997,15(5):318-327
The electrostatic potentials for the three-dimensional structures of cholinesterases from various species were calculated, using the Delphi algorithm, on the basis of the Poisson–Boltzmann equation. We used structures for Torpedo californica and mouse acetylcholinesterase, and built homology models of the human, Bungarus fasciatus, and Drosophila melanogaster acetylcholinesterases and human butyrylcholinesterase. All these structures reveal a negative external surface potential, in the area around the entrance to the active-site gorge, that becomes more negative as the rim of the gorge is approached. Moreover, in all cases, the potential becomes increasingly more negative along the central axis running down the gorge, and is largest at the base of the gorge, near the active site. Ten key acidic residues conserved in the sequence alignments of AChE from various species, both in the surface area near the entrance of the active-site gorge and at its base, appear to be primarily responsible for these potentials. The potentials are highly correlated among the structures examined, down to sequence identities as low as 35%. This indicates that they are a conserved property of the cholinesterase family, could serve to attract the positively charged substrate into and down the gorge to the active site, and may play other roles important for cholinesterase function. 相似文献
6.
Abu Avi Lupa Israel 《AEUE-International Journal of Electronics and Communications》2005,59(5):307-310
This letter presents a general analysis of time jitter in sigma-delta synthesizer. One of the practical applications of 1-bit sigma-delta systems is a generation of high-resolution local oscillator (LO) signals. In order to generate LO signals, one may use a single-bit sigma-delta technique to encode sine waves. Today, direct generation of high-frequency sine wave using a clock with higher frequency, is possible. In this letter, we will analyze different LO signal generators and develop a practical way of computation to decide how to choose the best configuration under minimum degradation of signal-to-noise ratio (SNR) at the output. 相似文献
7.
Superconductivity and Unusual Magnetic Features in Amorphous Carbon and in Other Unrelated Materials
Israel Felner 《Journal of Superconductivity and Novel Magnetism》2017,30(1):55-61
Traces of superconductivity (SC) were observed in three different inhomogeneous sulfur-doped amorphous carbon (a-C) systems: (i) in old commercial powder, (ii) in fabricated (by pyrolytic decomposition of sucrose) powder, and (iii) in a-C thin films. (i) The commercial a-C powder contains 0.21 at% sulfur and reveals traces of two superconducting phases around T C ?34 and T C~65 K. (ii) The fabricated a-C powder is diamagnetic but not superconducting. However, mixtures of this powder with sulfur (a-CS) which were heated to 250 °C also show traces of SC up to T C~42 K. (iii) Non-superconducting a-C thin films were grown by electron-beam induced deposition. SC at T C~34 K emerged only after heat treatment with sulfur. It is proposed that the high SC states in a-CS (T C~65 K at ambient pressure) and in H3S materials (T C = 203 K under >200 GPa) has the same origin. In both sulfur-containing systems, SC is induced by the interaction between electrons and the high frequencies of low mass atom (H or C) vibrations a-CS products obtained by heating commercial and fabricated a-C powders at 400 °C show unusual magnetic features: (a) pronounced irreversible peaks around 55–80 K which appear in the first zero-field-cooled (ZFC) runs only. This temperature range is close to the highest T C observed. (b) These peaks are totally suppressed in the second ZFC sweeps measured a few minutes later. (c) The peaks reappear after 18 months. (d) Around the peak position, the field-cooled (FC) curves cross the ZFC plots (ZFC > FC). All these phenomena are intrinsic properties of the amorphous carbon materials and were not observed in crystalline graphite. The ZFC > FC state was also observed in chiral-based magnetic memory device and unexpectedly in the liver taken from a patient with mantle cell lymphoma. This peculiarity will be discussed. 相似文献
8.
Israel Becerra Rafael Murrieta-Cid Raul Monroy Seth Hutchinson Jean-Paul Laumond 《Autonomous Robots》2016,40(2):395-423
In this paper, we address the problem of determining whether a mobile robot, called the pursuer, is able to maintain strong mutual visibility (a visibility notion between regions over a convex partition of the environment) of an antagonist agent, called the evader. We frame the problem as a non cooperative game. We consider the case in which the pursuer and the evader move at bounded speed, traveling in a known polygonal environment with or without holes, and in which there are no restrictions as to the distance that might separate the agents. Unlike our previous efforts (Murrieta-Cid et al. in Int J Robot Res 26:233–253, 2007), we give special attention to the combinatorial problem that arises when searching for a solution through visiting several locations in an environment with obstacles. In this paper we take a step further, namely, we assume an antagonistic evader who moves continuously and unpredictably, but with a constraint over its set of admissible motion policies, as the evader moves in the shortest-path roadmap, also called the reduced visibility graph (RVG). The pursuer does not know which among the possible paths over the RVG the evader will choose, but the pursuer is free to move within all the environment. We provide a constructive method to solve the decision problem of determining whether or not the pursuer is able to maintain strong mutual visibility of the evader. This method is based on an algorithm that computes the safe areas (areas that keep evader surveillance) at all times. We prove decidability of this problem, and provide a complexity measure to this evader surveillance game; both contributions hold for any general polygonal environment that might or not contain holes. All our algorithms have been implemented and we show simulation results. 相似文献
9.
Ariel Felner Uzi Zahavi Robert Holte Jonathan Schaeffer Nathan Sturtevant Zhifu Zhang 《Artificial Intelligence》2011,175(9-10):1570-1603
In the field of heuristic search it is usually assumed that admissible heuristics are consistent, implying that consistency is a desirable attribute. The term “inconsistent heuristic” has, at times, been portrayed negatively, as something to be avoided. Part of this is historical: early research discovered that inconsistency can lead to poor performance for A? (nodes might be re-expanded many times). However, the issue has never been fully investigated, and was not re-considered after the invention of IDA?.This paper shows that many of the preconceived notions about inconsistent heuristics are outdated. The worst-case exponential time of inconsistent heuristics is shown to only occur on contrived graphs with edge weights that are exponential in the size of the graph. Furthermore, the paper shows that rather than being something to be avoided, inconsistent heuristics often add a diversity of heuristic values into a search which can lead to a reduction in the number of node expansions. Inconsistent heuristics are easy to create, contrary to the common perception in the AI literature. To demonstrate this, a number of methods for achieving effective inconsistent heuristics are presented.Pathmax is a way of propagating inconsistent heuristic values in the search from parent to children. This technique is generalized into bidirectional pathmax (BPMX) which propagates values from a parent to a child node, and vice versa. BPMX can be integrated into IDA? and A?. When inconsistent heuristics are used with BPMX, experimental results show a large reduction in the search effort required by IDA?. Positive results are also presented for A? searches. 相似文献
10.
Presents the "experiment" conducted by the prophet Elijah in 1 Kings 18:17–40 in which the priests of Baal and Elijah each sacrificed a bull and invoked the name of their respective god, but only Elijah's god responded. Satirical comments of 3 "reviewers" of psychological articles are included to show the ethical and methodological issues that might be raised if such an experiment were conducted today. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献