首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2906篇
  免费   374篇
  国内免费   134篇
电工技术   156篇
综合类   209篇
化学工业   465篇
金属工艺   101篇
机械仪表   134篇
建筑科学   180篇
矿业工程   53篇
能源动力   75篇
轻工业   213篇
水利工程   41篇
石油天然气   94篇
武器工业   29篇
无线电   539篇
一般工业技术   474篇
冶金工业   108篇
原子能技术   24篇
自动化技术   519篇
  2024年   4篇
  2023年   49篇
  2022年   60篇
  2021年   118篇
  2020年   115篇
  2019年   109篇
  2018年   130篇
  2017年   101篇
  2016年   106篇
  2015年   113篇
  2014年   131篇
  2013年   192篇
  2012年   189篇
  2011年   201篇
  2010年   185篇
  2009年   206篇
  2008年   185篇
  2007年   176篇
  2006年   145篇
  2005年   135篇
  2004年   103篇
  2003年   112篇
  2002年   99篇
  2001年   68篇
  2000年   56篇
  1999年   63篇
  1998年   51篇
  1997年   30篇
  1996年   26篇
  1995年   31篇
  1994年   22篇
  1993年   5篇
  1992年   13篇
  1991年   8篇
  1990年   8篇
  1989年   6篇
  1988年   13篇
  1987年   4篇
  1986年   10篇
  1985年   2篇
  1984年   5篇
  1983年   4篇
  1982年   5篇
  1981年   6篇
  1980年   2篇
  1979年   3篇
  1978年   2篇
  1977年   5篇
  1967年   1篇
  1965年   1篇
排序方式: 共有3414条查询结果,搜索用时 797 毫秒
51.
Different doses of ketamine (10 mg/kg, 20 mg/kg, 30 mg/kg, 40 mg/kg, 50 mg/kg, and 60 mg/kg) were injected i.p. (I.P.), respectively, to male ICR mice to determine the optimal dosage for chronic administration. At and above 40 mg/kg I.P. injection, mice had almost no hindlimb movement during swimming test. Subsequently, 30 mg/kg was used as the dose for the study in the toxicity of long-term ketamine administration on urinary bladder and sperm motility. The treatment group were subdivided into two (n = 10 each group); one received daily ketamine treatment i.p. for 3 months and another group for 6 months. Corresponding number of mice in control groups (n = 5 each group) received saline injection instead of ketamine. Terminal dUTP nick and labeling (TUNEL) study and Sirius red staining were carried out on the sectioned slides of the urinary bladders to study the degree of apoptosis in both epithelium and muscular layers of the urinary bladder and the relative thickness of the muscular layers in this organ was also computed. Apoptosis in the bladder epithelium was observed initially in the 3-month ketamine treated mice and the number of apoptotic cells was significantly different (P < 0.05) between the 3-month and 6-month ketamine treated mice and the control. The relative thickness of muscular layers in the bladder wall also decreased significantly (P < 0.05) when the 6-month treated mice and the control were compared. Sirius red staining revealed increase of collagen in the urinary bladder of the treated mice, most evidently 6 months after ketamine treatment. In addition, the sperm motility was studied and there was a statistically significant difference between the control and ketamine treated groups in the percentages of sperms which were motile (P < 0.05). This suggested that the chronic administration of ketamine affected the genital system as well.  相似文献   
52.
In this paper, an efficient arbitrated quantum signature scheme is proposed by combining quantum cryptographic techniques and some ideas in classical cryptography. In the presented scheme, the signatory and the receiver can share a long-term secret key with the arbitrator by utilizing the key together with a random number. While in previous quantum signature schemes, the key shared between the signatory and the arbitrator or between the receiver and the arbitrator could be used only once, and thus each time when a signatory needs to sign, the signatory and the receiver have to obtain a new key shared with the arbitrator through a quantum key distribution protocol. Detailed theoretical analysis shows that the proposed scheme is efficient and provably secure.  相似文献   
53.
赵伦  颜昌沁 《计算机时代》2011,(8):14-16,19
通道在Photoshop中被认为是十分难理解的概念,文章通过颜色模式为RGB的图像阐述了通道的两个主要作用,并详细说明了通道的本质;基于时原色通道及Alpha通道的认识和理解,探讨了如何利用色阶、调整编辑Alphaia通道制作精确的选区并对选区进行各种处理的方法。  相似文献   
54.
研究糖尿病变,定期的眼底筛查清晰病变图像,是发现和治疗病变的重要手段.图像清晰度评价函数的选择是自动对焦技术的关键.为了保证对焦的精度,提出了以血管边缘的清晰度作为评价函数和粗精调焦相结合的自动对焦算法.利用边缘置信度的辅助检测能快速准确地提取出血管边缘,将血管边缘检测结果作为自动对焦的评价函数.在接近正焦区域使用该评...  相似文献   
55.
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges of identity frauds. For example, the sole biometric approach suffers from the privacy invasion and non-revocable issues. Passwords and tokens are easily forgotten and lost. To address these issues, the notion of cancellable biometrics was introduced to denote biometric templates that can be cancelled and replaced with the inclusion of another independent authentication factor. BioHash is a form of cancellable biometrics which mixes a set of user-specific random vectors with biometric features. In verification setting, BioHash is able to deliver extremely low error rates as compared to the sole biometric approach when a genuine token is used. However, this raises the possibility of two identity theft scenarios: (i) stolen-biometrics, in which an impostor possesses intercepted biometric data of sufficient high quality to be considered genuine and (ii) stolen-token, in which an impostor has access to the genuine token and used by the impostor to claim as the genuine user. We found that the recognition rate for the latter case is poorer. In this paper, the quantised random projection ensemble based on the Johnson–Lindenstrauss Lemma is used to establish the mathematical foundation of BioHash. Based on this model, we elucidate the characteristics of BioHash in pattern recognition as well as security view points and propose new methods to rectify the stolen-token problem.  相似文献   
56.
57.
在GPU渲染及虚拟人理论基础上建立一个包含人体脏腑结构、骨骼和穴位的虚拟经络的研究系统.分析系统的整体结构,并阐述系统各模块的具体实现,内容包括模型获取、模型操作、穴位拾取算法和GPU渲染,最后通过GPU渲染与传统方式渲染的比较,给出实验结果.  相似文献   
58.
In this paper, we investigate the trade off between performance and confidentiality in signature-based air indexing schemes for wireless data broadcast. Two metrics, namely, false drop probability and false guess probability, are defined to quantify the filtering efficiency and confidentiality loss of a signature scheme. Our analysis reveals that false drop probability and false guess probability share a similar trend as the tuning parameters of a signature scheme change and it is impossible to achieve a low false drop probability and a high false guess probability simultaneously. In order to balance the performance and confidentiality, we perform an analysis to provide a guidance for parameter settings of the signature schemes to meet different system requirements. In addition, we propose the jump pointer technique and the XOR signature scheme to further improve the performance and confidentiality. A comprehensive simulation has been conducted to validate our findings.  相似文献   
59.
Boolean Operations on Conic Polygons   总被引:1,自引:0,他引:1       下载免费PDF全文
An algorithm for Boolean operations on conic polygons is proposed.Conic polygons are polygons consisting of conic segments or bounded conics with directions.Preliminaries of Boolean operations on general polygons are presented.In our algorithm,the intersection points and the topological relationships between two conic polygons are computed.Boundaries are obtained by tracking path and selecting uncrossed boundaries following rule tables to build resulting conic polygons. We define a set of rules for the i...  相似文献   
60.
中国戏曲脸谱有着深厚的文化意蕴和丰富的历史内容,其艺术特征主要有装饰性、程式性、象征性等特征。从戏曲脸谱的这些特点中,我们也能找到很多可以供给现代设计借鉴的内容。本文探索何把中国文化博大精深的内涵应用到现代设计中去,从中国戏曲脸谱艺术里汲取现代产品造型设计的灵感,探讨现代设计与中国传统文化的关系。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号