首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   755篇
  免费   41篇
  国内免费   1篇
电工技术   4篇
化学工业   228篇
金属工艺   7篇
机械仪表   16篇
建筑科学   21篇
矿业工程   1篇
能源动力   16篇
轻工业   251篇
水利工程   3篇
石油天然气   14篇
无线电   38篇
一般工业技术   91篇
冶金工业   42篇
自动化技术   65篇
  2023年   5篇
  2022年   25篇
  2021年   40篇
  2020年   25篇
  2019年   20篇
  2018年   23篇
  2017年   16篇
  2016年   23篇
  2015年   20篇
  2014年   27篇
  2013年   48篇
  2012年   41篇
  2011年   63篇
  2010年   33篇
  2009年   59篇
  2008年   43篇
  2007年   45篇
  2006年   30篇
  2005年   30篇
  2004年   18篇
  2003年   20篇
  2002年   24篇
  2001年   11篇
  2000年   12篇
  1999年   7篇
  1998年   19篇
  1997年   10篇
  1996年   7篇
  1995年   11篇
  1994年   10篇
  1993年   2篇
  1992年   5篇
  1991年   3篇
  1990年   5篇
  1989年   3篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1984年   1篇
  1983年   3篇
  1982年   3篇
  1981年   2篇
  1970年   1篇
  1967年   1篇
排序方式: 共有797条查询结果,搜索用时 15 毫秒
1.
2.
Previous studies suggest that berberine, an isoquinoline alkaloid, has antiviral potential and is a possible therapeutic candidate against SARS-CoV-2. The molecular underpinnings of its action are still unknown. Potential targets include quadruplexes (G4Q) in the viral genome as they play a key role in modulating the biological activity of viruses. While several DNA-G4Q structures and their binding properties have been elucidated, RNA-G4Qs such as RG-1 of the N-gene of SARS-CoV-2 are less explored. Using biophysical techniques, the berberine binding thermodynamics and the associated conformational and hydration changes of RG-1 could be characterized and compared with human telomeric DNA-G4Q 22AG. Berberine can interact with both quadruplexes. Substantial changes were observed in the interaction of berberine with 22AG and RG-1, which adopt different topologies that can also change upon ligand binding. The strength of interaction and the thermodynamic signatures were found to dependent not only on the initial conformation of the quadruplex, but also on the type of salt present in solution. Since berberine has shown promise as a G-quadruplex stabilizer that can modulate viral gene expression, this study may also contribute to the development of optimized ligands that can discriminate between binding to DNA and RNA G-quadruplexes.  相似文献   
3.
A TaqMan real-time polymerase chain reaction (PCR) method was developed for specific detection of bovine, ovine and caprine processed animal protein (PAP) in industrial feedstuffs. The method uses species-specific primers and probes targeting short mitochondrial D-loop sequences, and a positive amplification control based on 18S rRNA gene. The applicability of the real-time PCR protocol was assessed through analysis of 126 industrial feed samples that were manufactured to reproduce rendering processes of commercial feeds destined for farmed animals. The assay successfully classified samples as positive or negative according to the ruminant composition, enabling qualitative detection of banned material in feeds at levels as low as 0.1%. Although the method provides quantitative potential, results suggest that the real quantitative capability of the assay is limited by the existing variability in terms of composition and processing treatments of the feeds, which affect the amount and quality of amplifiable DNA.  相似文献   
4.
The degradation of seven acidic drugs and two metabolites during chlorination was investigated by liquid chromatography-mass spectrometry (LC-MS). A triple-quadrupole (QqQ) system was used to follow the time course of the pharmaceuticals and by-products, while a quadrupole time-of-flight (Q-TOF) system was also used for the identification of the by-products. Under strong chlorination conditions (10 mg/L Cl2, 24 h), only four of the target compounds were significantly degraded: salicylic acid, naproxen, diclofenac and indomethacine. The degradation kinetics of these four compounds were investigated at different concentrations of chlorine, bromide and pH by means of a Box-Behnken experimental design. Depending on these factors, measured pseudo-first order half-lives were in the ranges: 23-573 h for salicylic acid, 13-446 min for naproxen, 5-328 min for diclofenac and 0.4-13.4 min for indomethacine. Also, it was observed that chlorine concentration was the overall most significant factor, followed by the bromide concentration (except for indomethacine), resulting in increased degradation kinetics as they are increased. The degradation path of salicylic acid, naproxen and diclofenac consisted of aromatic substitution of one or two hydrogens by chlorine and/or bromide. Moreover, for diclofenac, two other by-products corresponding to a decarboxylation/hydroxylation pathway from the monohalogenated products were also identified. On the other hand, indomethacine degradation did not lead to halogenation products but to oxidation ones. The investigation of these by-products in real samples by LC-MS/MS (QqQ) showed that the halogenated derivates of salicylic acid occurred in all the drinking water and wastewater samples analysed.  相似文献   
5.
In WiMAX systems the Base Station scheduler plays a key role as it controls the sharing of the radio resources among the users. The goal of the scheduler is multiple: achieve fair usage of the resources, satisfy the QoS requirements of the users, maximize goodput, and minimize power consumption, and at the same time ensuring feasible algorithm complexity and system scalability. Since most of these goals are contrasting, scheduler designers usually focus their attention on optimizing one aspect only. In this scenario, we propose a scheduling algorithm (called GTSNmathrm{GTS_N}) whose goal is to contemporaneously achieve efficiency and fairness, while also taking into account the QoS requirements and the channel state. GTSNmathrm{GTS_N} exploits the properties of Time Utility Functions (TUFs) and Game Theory. Simulations prove that the performance of GTSN,mathrm{GTS_N}, when compared to that of several well-known schedulers, is remarkable. GTSNmathrm{GTS_N} provides the best compromise between the two contrasting objectives of fairness and efficiency, while QoS requirements are in most cases guaranteed. However, the exponential complexity introduced by the game theory technique makes it rather impractical and not computationally scalable for a large number of users. Thus we developed a suboptimal version, named sub-GTSN.mathrm{GTS_N}. We show that this version retains most of the features and performance figures of its brother, but its complexity is linear with the number of users.  相似文献   
6.
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems   总被引:4,自引:0,他引:4  
A Distributed Key Generation (DKG) protocol is an essential component of threshold cryptosystems required to initialize the cryptosystem securely and generate its private and public keys. In the case of discrete-log-based (dlog-based) threshold signature schemes (ElGamal and its derivatives), the DKG protocol is further used in the distributed signature generation phase to generate one-time signature randomizers (r = gk). In this paper we show that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random distribution of generated keys: we describe an efficient active attacker controlling a small number of parties which successfully biases the values of the generated keys away from uniform. We then present a new DKG protocol for the setting of dlog-based cryptosystems which we prove to satisfy the security requirements from DKG protocols and, in particular, it ensures a uniform distribution of the generated keys. The new protocol can be used as a secure replacement for the many applications of Pedersen's protocol. Motivated by the fact that the new DKG protocol incurs additional communication cost relative to Pedersen's original protocol, we investigate whether the latter can be used in specific applications which require relaxed security properties from the DKG protocol. We answer this question affirmatively by showing that Pedersen's protocol suffices for the secure implementation of certain threshold cryptosystems whose security can be reduced to the hardness of the discrete logarithm problem. In particular, we show Pedersen's DKG to be sufficient for the construction of a threshold Schnorr signature scheme. Finally, we observe an interesting trade-off between security (reductions), computation, and communication that arises when comparing Pedersen's DKG protocol with ours.  相似文献   
7.
Transmission electron microscopy (TEM), scanning electron microscopy (SEM), mercury intrusion porosimetry (MIP), and nitrogen sorption technique (BET) were utilized to characterize the microstructure of a 10:90 wt% colloidal silica/potassium silicate gel as first described by Shoup. Gels in the unsintered state (15% theoretical density) were prepared for microscopy by the techniques of ultramicrotomy, Pt/C replication, and pore casting. Electron microscopic images of the ultramicrotomed thin sections (70 nm) show that the unfired gel possesses three distinct species of pores which are referred to as the micropores, mesopores, and macropores. The average micropore diameter was found to be 4 nm as determined by nitrogen desorption. Quantitative stereological analysis of the ultramicrotomed sections indicated that the average circular and lengthwise dimensions of the cylindrical mesopores were 0.15 and 0.39 μm, respectively. Similarly, this same analysis determined the average spherical macropore diameter to be 0.83 μm. In contrast, MIP results suggested that these gels possessed a unimodal pore size distribution centered around the 0.2-μm pore size. The discrepancy between MIP and microscopy can be explained by viewing the void space as a pore-throat network. Experimental evidence for this type of pore geometry was obtained from stereo pairs of Pt/C replicas and thick microtomed sections (0.5 μm) which gave information about particle connectivity and pore casts which depicted the pore connectivity in three dimensions.  相似文献   
8.
In this paper, we present a new rectifying device, compatible with the technology of CMOS image sensors, suitable for implementing a direct-conversion detector operating at room temperature for operation at up to terahertz frequencies. The rectifying device can be obtained by introducing some simple modifications of the charge-storage well in conventional CMOS integrated circuits, making the proposed solution easy to integrate with the existing imaging systems. The rectifying device is combined with the different elements of the detector, composed of a 3D high-performance antenna and a charge-storage well. In particular, its position just below the edge of the 3D antenna takes maximum advantage of the high electric field concentrated by the antenna itself. In addition, the proposed structure ensures the integrity of the charge-storage well of the detector. In the structure, it is not necessary to use very scaled and costly technological nodes, since the CMOS transistor only provides the necessary integrated readout electronics. On-wafer measurements of RF characteristics of the designed junction are reported and discussed. The overall performances of the entire detector in terms of noise equivalent power (NEP) are evaluated by combining low-frequency measurements of the rectifier with numerical simulations of the 3D antenna and the semiconductor structure at 1 THz, allowing prediction of the achievable NEP.  相似文献   
9.
10.
Securing Threshold Cryptosystems against Chosen Ciphertext Attack   总被引:6,自引:0,他引:6  
For the most compelling applications of threshold cryptosystems, security against chosen cipher text attack is a requirement. However, prior to the results presented here, there appeared to be no practical threshold cryptosystems in the literature that were provably chosen ciphertext secure, even in the idealized random oracle model. The contribution of this paper is to present two very practical threshold cryptosystems, and to prove that they are secure against chosen ciphertext attack in the random oracle model. Not only are these protocols computationally very efficient, but they are also non-interactive, which means they can be easily run over an asynchronous communication network. Received November 2000 and revised September 2001 Online publication 11 March 2002  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号