首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   622篇
  免费   11篇
工业技术   633篇
  2023年   6篇
  2022年   14篇
  2021年   18篇
  2020年   14篇
  2019年   9篇
  2018年   12篇
  2017年   9篇
  2016年   12篇
  2015年   12篇
  2014年   20篇
  2013年   37篇
  2012年   20篇
  2011年   28篇
  2010年   17篇
  2009年   18篇
  2008年   26篇
  2007年   11篇
  2006年   20篇
  2005年   16篇
  2004年   14篇
  2003年   14篇
  2002年   13篇
  2001年   9篇
  2000年   7篇
  1999年   9篇
  1998年   28篇
  1997年   20篇
  1996年   16篇
  1995年   14篇
  1994年   8篇
  1993年   11篇
  1992年   4篇
  1991年   6篇
  1990年   8篇
  1989年   11篇
  1988年   16篇
  1987年   4篇
  1986年   3篇
  1985年   6篇
  1984年   8篇
  1983年   5篇
  1982年   8篇
  1981年   3篇
  1980年   6篇
  1979年   7篇
  1978年   10篇
  1977年   11篇
  1976年   9篇
  1974年   7篇
  1973年   6篇
排序方式: 共有633条查询结果,搜索用时 0 毫秒
1.
Two polypeptide antigens with molecular sizes of 34,000 daltons (34 kDa) and 38 kDa were separated from heated cells of a human clinical treponeme strain G7201 and Treponema denticola ATCC 35404, respectively. The rabbit polyclonal antisera against these antigens were produced and examined for their immunological reactions with the two heated antigens or intact spirochetal cells. Immunoblot analysis showed that the 34-kDa protein was also detected in T. denticola ATCC 35404 and ATCC 33520, and the 38-kDa protein was detected only in the two ATCC strains. Immunoelectron microscopy using the two rabbit antisera and protein A-gold complexes demonstrated that the 38-kDa protein antigen was present on the axial flagella of two T. denticola strains, and that the 34-kDa protein was located in the axial flagella of the G7201 cell, but neither in axial flagella nor on outer envelopes of the two ATCC strains cells, suggesting that the native 34-kDa axial flagellar protein of the G7201 strain may be different from that of T. denticola in terms of immunological reactivity.  相似文献   
2.
This article presents the abandonment-symbiosis hypothesis. This hypothesis pertains to the dynamics of suicide in youngsters who experience difficulties in separation from their symbiotic families. It is suggested that such youngsters have experienced various types of rejection and abandonment in early childhood and have developed insecure attachment styles and insufficient ego functions in order to cope with difficulties. It is also suggested that these youngsters have become scapegoats by their dysfunctional families and that they are held in a symbiotic grip in order to continue to bear the negative projections of their families. As such, they are prevented from developing a proper sense of individuation and autonomy. The sequence that begins with abandonment and continues with symbiosis is a reversal of normal development is critical for the emergence of suicidal behavior. The various aspects of the abandonment-symbiosis hypothesis are demonstrated by case studies and empirical data. A combination of individual and family treatment is recommended as the best approach for the treatment of such youngsters. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
3.
4.
Fifty-two case-hardened, severely self-abusive and aggressive autistic and retarded students, living in six different community residences, were trained to exit their residences, without the presence or assistance of staff, when a fire alarm sounded at night. On a pretest, prior to an 11-week period of intensive environmental and behavioral interventions, only 25% of the students exited within 2 1/2 minutes and independent of staff assistance. At posttest, 100% exited successfully, in a mean evacuation time of 60 seconds. The study was conducted at the Behavior Research Institute (BRI).  相似文献   
5.
The electrostatic potentials for the three-dimensional structures of cholinesterases from various species were calculated, using the Delphi algorithm, on the basis of the Poisson–Boltzmann equation. We used structures for Torpedo californica and mouse acetylcholinesterase, and built homology models of the human, Bungarus fasciatus, and Drosophila melanogaster acetylcholinesterases and human butyrylcholinesterase. All these structures reveal a negative external surface potential, in the area around the entrance to the active-site gorge, that becomes more negative as the rim of the gorge is approached. Moreover, in all cases, the potential becomes increasingly more negative along the central axis running down the gorge, and is largest at the base of the gorge, near the active site. Ten key acidic residues conserved in the sequence alignments of AChE from various species, both in the surface area near the entrance of the active-site gorge and at its base, appear to be primarily responsible for these potentials. The potentials are highly correlated among the structures examined, down to sequence identities as low as 35%. This indicates that they are a conserved property of the cholinesterase family, could serve to attract the positively charged substrate into and down the gorge to the active site, and may play other roles important for cholinesterase function.  相似文献   
6.
This letter presents a general analysis of time jitter in sigma-delta synthesizer. One of the practical applications of 1-bit sigma-delta systems is a generation of high-resolution local oscillator (LO) signals. In order to generate LO signals, one may use a single-bit sigma-delta technique to encode sine waves. Today, direct generation of high-frequency sine wave using a clock with higher frequency, is possible. In this letter, we will analyze different LO signal generators and develop a practical way of computation to decide how to choose the best configuration under minimum degradation of signal-to-noise ratio (SNR) at the output.  相似文献   
7.
Traces of superconductivity (SC) were observed in three different inhomogeneous sulfur-doped amorphous carbon (a-C) systems: (i) in old commercial powder, (ii) in fabricated (by pyrolytic decomposition of sucrose) powder, and (iii) in a-C thin films. (i) The commercial a-C powder contains 0.21 at% sulfur and reveals traces of two superconducting phases around T C ?34 and T C~65 K. (ii) The fabricated a-C powder is diamagnetic but not superconducting. However, mixtures of this powder with sulfur (a-CS) which were heated to 250 °C also show traces of SC up to T C~42 K. (iii) Non-superconducting a-C thin films were grown by electron-beam induced deposition. SC at T C~34 K emerged only after heat treatment with sulfur. It is proposed that the high SC states in a-CS (T C~65 K at ambient pressure) and in H3S materials (T C = 203 K under >200 GPa) has the same origin. In both sulfur-containing systems, SC is induced by the interaction between electrons and the high frequencies of low mass atom (H or C) vibrations a-CS products obtained by heating commercial and fabricated a-C powders at 400 °C show unusual magnetic features: (a) pronounced irreversible peaks around 55–80 K which appear in the first zero-field-cooled (ZFC) runs only. This temperature range is close to the highest T C observed. (b) These peaks are totally suppressed in the second ZFC sweeps measured a few minutes later. (c) The peaks reappear after 18 months. (d) Around the peak position, the field-cooled (FC) curves cross the ZFC plots (ZFC > FC). All these phenomena are intrinsic properties of the amorphous carbon materials and were not observed in crystalline graphite. The ZFC > FC state was also observed in chiral-based magnetic memory device and unexpectedly in the liver taken from a patient with mantle cell lymphoma. This peculiarity will be discussed.  相似文献   
8.
In this paper, we address the problem of determining whether a mobile robot, called the pursuer, is able to maintain strong mutual visibility (a visibility notion between regions over a convex partition of the environment) of an antagonist agent, called the evader. We frame the problem as a non cooperative game. We consider the case in which the pursuer and the evader move at bounded speed, traveling in a known polygonal environment with or without holes, and in which there are no restrictions as to the distance that might separate the agents. Unlike our previous efforts (Murrieta-Cid et al. in Int J Robot Res 26:233–253, 2007), we give special attention to the combinatorial problem that arises when searching for a solution through visiting several locations in an environment with obstacles. In this paper we take a step further, namely, we assume an antagonistic evader who moves continuously and unpredictably, but with a constraint over its set of admissible motion policies, as the evader moves in the shortest-path roadmap, also called the reduced visibility graph (RVG). The pursuer does not know which among the possible paths over the RVG the evader will choose, but the pursuer is free to move within all the environment. We provide a constructive method to solve the decision problem of determining whether or not the pursuer is able to maintain strong mutual visibility of the evader. This method is based on an algorithm that computes the safe areas (areas that keep evader surveillance) at all times. We prove decidability of this problem, and provide a complexity measure to this evader surveillance game; both contributions hold for any general polygonal environment that might or not contain holes. All our algorithms have been implemented and we show simulation results.  相似文献   
9.
In the field of heuristic search it is usually assumed that admissible heuristics are consistent, implying that consistency is a desirable attribute. The term “inconsistent heuristic” has, at times, been portrayed negatively, as something to be avoided. Part of this is historical: early research discovered that inconsistency can lead to poor performance for A? (nodes might be re-expanded many times). However, the issue has never been fully investigated, and was not re-considered after the invention of IDA?.This paper shows that many of the preconceived notions about inconsistent heuristics are outdated. The worst-case exponential time of inconsistent heuristics is shown to only occur on contrived graphs with edge weights that are exponential in the size of the graph. Furthermore, the paper shows that rather than being something to be avoided, inconsistent heuristics often add a diversity of heuristic values into a search which can lead to a reduction in the number of node expansions. Inconsistent heuristics are easy to create, contrary to the common perception in the AI literature. To demonstrate this, a number of methods for achieving effective inconsistent heuristics are presented.Pathmax is a way of propagating inconsistent heuristic values in the search from parent to children. This technique is generalized into bidirectional pathmax (BPMX) which propagates values from a parent to a child node, and vice versa. BPMX can be integrated into IDA? and A?. When inconsistent heuristics are used with BPMX, experimental results show a large reduction in the search effort required by IDA?. Positive results are also presented for A? searches.  相似文献   
10.
Presents the "experiment" conducted by the prophet Elijah in 1 Kings 18:17–40 in which the priests of Baal and Elijah each sacrificed a bull and invoked the name of their respective god, but only Elijah's god responded. Satirical comments of 3 "reviewers" of psychological articles are included to show the ethical and methodological issues that might be raised if such an experiment were conducted today. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号