首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20627篇
  免费   2331篇
  国内免费   1242篇
电工技术   1613篇
技术理论   1篇
综合类   1568篇
化学工业   3073篇
金属工艺   1115篇
机械仪表   1365篇
建筑科学   1613篇
矿业工程   639篇
能源动力   658篇
轻工业   1337篇
水利工程   604篇
石油天然气   905篇
武器工业   166篇
无线电   2636篇
一般工业技术   2345篇
冶金工业   785篇
原子能技术   410篇
自动化技术   3367篇
  2024年   104篇
  2023年   320篇
  2022年   602篇
  2021年   916篇
  2020年   668篇
  2019年   642篇
  2018年   581篇
  2017年   679篇
  2016年   671篇
  2015年   818篇
  2014年   1108篇
  2013年   1226篇
  2012年   1356篇
  2011年   1552篇
  2010年   1426篇
  2009年   1348篇
  2008年   1242篇
  2007年   1192篇
  2006年   1219篇
  2005年   901篇
  2004年   772篇
  2003年   793篇
  2002年   936篇
  2001年   737篇
  2000年   495篇
  1999年   452篇
  1998年   284篇
  1997年   211篇
  1996年   181篇
  1995年   138篇
  1994年   124篇
  1993年   99篇
  1992年   83篇
  1991年   69篇
  1990年   64篇
  1989年   45篇
  1988年   44篇
  1987年   15篇
  1986年   18篇
  1985年   7篇
  1984年   9篇
  1983年   4篇
  1982年   6篇
  1980年   5篇
  1979年   8篇
  1978年   7篇
  1977年   3篇
  1976年   3篇
  1959年   4篇
  1951年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
Verifiable Distributed Oblivious Transfer and Mobile Agent Security   总被引:1,自引:0,他引:1  
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting mobile agents not only is possible, but also can be implemented efficiently. This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399 and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003. Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases, and wireless networks. On the theoretical side, he is interested in cryptography and game theory. Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS) at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998 and 2001).  相似文献   
62.
Three kinds of carboxymethyl chitosan/β-cyclodextrin microspheres loaded with theophylline were prepared by spray drying intended for pulmonary delivery. Mucociliotoxicity, permeation rate, and drug release characteristics of the product were investigated. The microspheres obtained by spray drying were found to be spherical with smooth or wrinkled surfaces. The mean particle size was between 3.39 and 6.06 µm. The microspheres demonstrated high product yield (43.7-50.2%), high drug loading (13.7-38.1%), and high encapsulation efficiency (86.9-92.8%). FT-IR indicated that there were interactions of theophylline with carboxymethyl chitosan matrix. Further studies on mucociliotoxicity and permeation confirmed that microspheres had better adaptability and high permeation rate. In vitro drug release from the microspheres was not related to the drug/polymer ratios.  相似文献   
63.
文中介绍了长治市水资源的特点和水资源开发利用现状,并总结了长治市水资源开发利用中存在的问题。针对性地提出了合理配置水资源、建设节水型社会、开发新水源、建立高效运行管理体制、运用市场经济机制以及改革现行的水价政策等一系列措施.从而实现全市水资源的优化配置和合理使用,促进全市经济的全面发展。  相似文献   
64.
beta2-Glycoprotein I (beta2GPI) is a phospholipid-binding serum protein with anticoagulant properties. It plays a vital role in the binding of anti-cardiolipin Abs purified from patients with autoimmune disease when assayed in a cardiolipin (CL) ELISA. Based on a three-dimensional model of beta2GPI, electrostatic calculations, and earlier peptide studies, a highly positively charged amino acid sequence, Lys282-Asn-Lys-Glu-Lys-Lys287, located in the fifth domain of beta2GPI, has been predicted to be the phospholipid binding site. We tested this hypothesis by site-directed mutagenesis of residues in the predicted phospholipid binding site and by assessing the mutants for phospholipid binding and anti-beta2GPI activity. A single amino acid change from Lys286 to Glu significantly decreased the binding of beta2GPI to CL. Double and triple mutants 2k (from Lys286, 287 to Glu286, 287), 2ka (from Lys284, 287 to Glu284, 287), and 3k (from Lys284, 286, 287 to Glu284, 286, 287) possessed no binding of Ab to beta2GPI in a CL ELISA, as well as no inhibitory activity on the binding of iodinated native beta2GPI to CL. These results indicate that the residues Lys284, Lys286, and Lys287 in the fifth domain of beta2GPI are critical for its binding to anionic phospholipids and its subsequent capture for binding of anti-beta2GPI Abs.  相似文献   
65.
本文提出一种“利用原色漂移量调整法”确定当物体光谱反射率未知时光源与物体色显色关系。 利用该关系,通过微机真彩色数字图象技术对光环境进行仿真模拟。  相似文献   
66.
67.
管线用高强韧性宽厚钢板的开发   总被引:1,自引:0,他引:1  
常跃峰  刘生 《宽厚板》2002,8(3):7-10
本文回顾了舞钢高强韧性管线用宽厚钢板的研制开发过程,并结合生产工艺,对钢板性能作了全面分析,指导了钢管线钢的生产。舞钢X70级管线钢有较高的断裂韧性、良好的可焊性以及抗SSCC、HIC性能。舞钢正在进行技术改造,以进一步改善组织,提高性能、满足西气东输要求。  相似文献   
68.
热处理工艺对冲击曲线的影响   总被引:1,自引:0,他引:1  
通过SA515Gr.70钢的不同温度正火和13MnNiMoNbR钢正火不同温度回火试样的示波冲击试验,研究了不同热处理工艺对冲击曲线的影响。  相似文献   
69.
70.
A new time finite-element method based on the extrapolation technique and the Galerkin time finite-element method is presented. In this method, the second-order governing differential equations of motion for dynamic problems are rewritten as a set of first order differential equations in state space. The standard Galerkin method is then employed for the temporal discretization. The algorithm is first-order accurate only. Based on the first-order Galerkin time finite-element formulation, the extrapolation technique is introduced to improve the order of accuracy. It is achieved by expressing the numerical amplification matrix of higher-order algorithm as a linear combination of the basic amplification matrices evaluated at selected instances of time. The matrices are combined with different weighting factors. The pairs of the selected instance of time and the corresponding weighting factors are free parameters. Unconditionally stable higher-order accurate formulations can be derived by properly choosing the free parameters. Algorithms up to fourth-order accurate are presented in this paper. Detailed analyses on stability, numerical dissipation and numerical dispersion are also given. Comparisons of the present algorithms with some well-known time-integration methods are presented to demonstrate the versatility of the present method, in particular its accuracy in the higher-order formulations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号