首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   895篇
  免费   20篇
  国内免费   1篇
电工技术   20篇
化学工业   186篇
金属工艺   9篇
机械仪表   17篇
建筑科学   58篇
矿业工程   14篇
能源动力   33篇
轻工业   74篇
水利工程   5篇
石油天然气   4篇
无线电   50篇
一般工业技术   64篇
冶金工业   281篇
原子能技术   8篇
自动化技术   93篇
  2022年   14篇
  2021年   11篇
  2020年   9篇
  2019年   18篇
  2018年   9篇
  2017年   12篇
  2016年   11篇
  2015年   9篇
  2014年   24篇
  2013年   56篇
  2012年   27篇
  2011年   28篇
  2010年   26篇
  2009年   20篇
  2008年   30篇
  2007年   25篇
  2006年   21篇
  2005年   28篇
  2004年   13篇
  2003年   16篇
  2002年   18篇
  2001年   13篇
  2000年   16篇
  1999年   24篇
  1998年   18篇
  1997年   17篇
  1996年   15篇
  1995年   15篇
  1994年   15篇
  1993年   16篇
  1992年   8篇
  1991年   13篇
  1990年   18篇
  1989年   9篇
  1987年   11篇
  1986年   13篇
  1985年   13篇
  1984年   13篇
  1982年   9篇
  1981年   14篇
  1980年   20篇
  1979年   17篇
  1978年   9篇
  1977年   10篇
  1976年   11篇
  1975年   14篇
  1974年   15篇
  1973年   8篇
  1957年   9篇
  1956年   7篇
排序方式: 共有916条查询结果,搜索用时 31 毫秒
11.
A kinetic study of the anionic polymerization of ethylene oxide has been made in tetrahydrofuran at 20°C, with the cryptate Cs+ + [TC] as counterion, [TC] being a spheroidal macrotricyclic ligand. Conductance measurements have been made on THF solutions of ?4BCs + [TC]. Ionic associations higher than cryptated ion pairs are negligible for living end concentrations lower than 3 × 10?4 moll?1. k± and the alkoxide ion pair dissociation constant KD were determined from both sets of kinetic data obtained with and without added salt knowing the value of k? from kinetic data performed with K+ + [222] as counterion. Free alkoxide ions are about twenty times more reactive than cryptated caesium ion pairs.  相似文献   
12.
Castor oil (CO) is an environmentally friendly renewable green resource and ideal alternative to petroleum resources. The preparation of high strength and high toughness castor oil-based polyurethane prepolymer (COPU) composites has significant applications such as supporting material and engineering plastic sheet. In this study, unmodified clam shell powder (CSP) with a unique CaCO3-proteoglycan structure was used as a filler to prepare compatible reinforced COPU composite materials. Investigation of the mechanical properties revealed that the elastic modulus of the composite COPU reinforced with 50 wt% of CSP had increased to 5859.0 ± 8.4 MPa representing 187.77% to obtain stiffer and stronger material over pure COPU (2036.6 ± 196.9 MPa). Moreover, the scanning electron microscopy, thermogravimetric analysis and contact angle results demonstrated that the reinforced COPU composites have better compatibility, thermal stability, and water resistance than pure COPU. This work will promote the application prospects of CO-based polyurethane.  相似文献   
13.
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.  相似文献   
14.
15.
The aim of this study was to reproduce the delayed (secondary) cerebral energy failure previously described in birth-asphyxiated newborn infants and to investigate relationships between primary insult severity and the extent of the delayed energy failure. Phosphorus (31P) magnetic resonance spectroscopy (MRS) at 7 T was used to study the brains of 12 newborn piglets during an acute, reversible, cerebral hypoxic-ischemic episode which continued until nucleotide triphosphates (NTP) were depleted. After reperfusion and reoxygenation, spectroscopy was continued for 48 h. High-energy metabolite concentrations returned to near normal levels after the insult, but later they fell as delayed energy failure developed. The time integral of NTP depletion in the primary insult correlated strongly with the minimum [phosphocreatine (PCr)]/[inorganic orthophosphate (Pi)] observed 24–48 h after the insult. (Linear regression analysis gave slope –8.04 h–1; ordinate intercept=1.23;r=0.92;P<0.0001.) This model is currently being used to investigate the therapeutic potential of various cerebroprotective strategies including hypothermia.  相似文献   
16.
17.
Shen  Lang  Poudel  Nirakar  Gibson  George N.  Hou  Bingya  Chen  Jihan  Shi  Haotian  Guignon  Ernest  Page  William D.  Pilar  Arturo  Cronin  Stephen B. 《Nano Research》2018,11(4):2310-2314
Nano Research - We report plasmon resonant excitation of hot electrons in a photodetector based on a metal/oxide/metal (Au/Al2O3/graphene) heterostructure. In this device, hot electrons, excited...  相似文献   
18.
19.
This paper investigates the fundamental difference between a simple e-tender box and a traditional physical tender box, and highlights a series of security traps created by the functional differences. Based on our findings, we have defined the security requirements for an e-tender submission protocol. We also discuss functional limitations of cryptographic technologies. As a result, two secure e-tender submission protocols are proposed which enable a secure e-tender submission. Protocols are assumed to run under the condition that all tendering parties (principal and tenderers) are dishonest players. Our informal and formal security analysis show that these protocols meet their security goals under well known collusion scenarios. Because security is a process not a product, our approach will have broad industry application for developing secure electronic business processes in areas other than e-tendering.
Colin BoydEmail:
  相似文献   
20.
An important aspect in the specification of conceptual schemas is the definition of general constraints that cannot be expressed by the predefined constructs provided by conceptual modeling languages. This is generally achieved by using general-purpose languages like OCL. In this paper we propose a new approach that facilitates the definition of such general constraints in UML. More precisely, we define a profile that extends the set of predefined UML constraints by adding certain types of constraints that are commonly used in conceptual schemas. We also show how our proposal facilitates reasoning about the constraints and their automatic code generation, study the application of our ideas to the specification of two real-life applications, and present a prototype tool implementation.
Ernest TenienteEmail:
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号