首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1674篇
  免费   104篇
  国内免费   3篇
电工技术   14篇
综合类   3篇
化学工业   446篇
金属工艺   12篇
机械仪表   15篇
建筑科学   82篇
能源动力   44篇
轻工业   177篇
水利工程   10篇
石油天然气   1篇
无线电   148篇
一般工业技术   268篇
冶金工业   150篇
原子能技术   16篇
自动化技术   395篇
  2024年   3篇
  2023年   14篇
  2022年   21篇
  2021年   41篇
  2020年   44篇
  2019年   45篇
  2018年   48篇
  2017年   50篇
  2016年   81篇
  2015年   40篇
  2014年   80篇
  2013年   100篇
  2012年   108篇
  2011年   129篇
  2010年   78篇
  2009年   91篇
  2008年   100篇
  2007年   85篇
  2006年   68篇
  2005年   72篇
  2004年   57篇
  2003年   53篇
  2002年   55篇
  2001年   29篇
  2000年   23篇
  1999年   39篇
  1998年   35篇
  1997年   31篇
  1996年   29篇
  1995年   20篇
  1994年   13篇
  1993年   8篇
  1992年   12篇
  1991年   3篇
  1990年   6篇
  1989年   5篇
  1988年   7篇
  1987年   5篇
  1986年   5篇
  1985年   3篇
  1984年   6篇
  1983年   6篇
  1982年   5篇
  1981年   6篇
  1979年   3篇
  1977年   2篇
  1976年   3篇
  1975年   2篇
  1963年   2篇
  1944年   2篇
排序方式: 共有1781条查询结果,搜索用时 17 毫秒
21.
In 2007, the US National Institute for Standards and Technology (NIST) announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities like differential attacks identified in existing hash functions, such as MD5 and SHA-1. NIST received many submissions, 51 of which got accepted to the first round. 14 candidates were left in the second round, out of which five candidates have been recently chosen for the final round. An important criterion in the selection process is the SHA-3 hash function security. We identify two important classes of security arguments for the new designs: (1) the possible reductions of the hash function security to the security of its underlying building blocks and (2) arguments against differential attack on building blocks. In this paper, we compare the state of the art provable security reductions for the second round candidates and review arguments and bounds against classes of differential attacks. We discuss all the SHA-3 candidates at a high functional level, analyze, and summarize the security reduction results and bounds against differential attacks. Additionally, we generalize the well-known proof of collision resistance preservation, such that all SHA-3 candidates with a suffix-free padding are covered.  相似文献   
22.
Brugada syndrome (BrS) is an inherited cardiac arrhythmia that predisposes to ventricular fibrillation and sudden cardiac death. It originates from oligogenic alterations that affect cardiac ion channels or their accessory proteins. The main hurdle for the study of the functional effects of those variants is the need for a specific model that mimics the complex environment of human cardiomyocytes. Traditionally, animal models or transient heterologous expression systems are applied for electrophysiological investigations, each of these models having their limitations. The ability to create induced pluripotent stem cell-derived cardiomyocytes (iPSC-CMs), providing a source of human patient-specific cells, offers new opportunities in the field of cardiac disease modelling. Contemporary iPSC-CMs constitute the best possible in vitro model to study complex cardiac arrhythmia syndromes such as BrS. To date, thirteen reports on iPSC-CM models for BrS have been published and with this review we provide an overview of the current findings, with a focus on the electrophysiological parameters. We also discuss the methods that are used for cell derivation and data acquisition. In the end, we critically evaluate the knowledge gained by the use of these iPSC-CM models and discuss challenges and future perspectives for iPSC-CMs in the study of BrS and other arrhythmias.  相似文献   
23.
CYP154C5 from Nocardia farcinica is a P450 monooxygenase able to hydroxylate a range of steroids with high regio- and stereoselectivity at the 16α-position. Using protein engineering and substrate modifications based on the crystal structure of CYP154C5, an altered regioselectivity of the enzyme in steroid hydroxylation had been achieved. Thus, conversion of progesterone by mutant CYP154C5 F92A resulted in formation of the corresponding 21-hydroxylated product 11-deoxycorticosterone in addition to 16α-hydroxylation. Using MD simulation, this altered regioselectivity appeared to result from an alternative binding mode of the steroid in the active site of mutant F92A. MD simulation further suggested that the entrance of water to the active site caused higher uncoupling in this mutant. Moreover, exclusive 15α-hydroxylation was observed for wild-type CYP154C5 in the conversion of 5α-androstan-3-one, lacking an oxy-functional group at C17. Overall, our data give valuable insight into the structure–function relationship of this cytochrome P450 monooxygenase for steroid hydroxylation.  相似文献   
24.
25.
26.
Throughout the VEGETATION programme, the Flemish Institute for Technological Research (VITO) uninterruptedly hosted the prime user segment of both VEGETATION 1 and VEGETATION 2 multispectral instruments on board the Satellite Pour l’Observation de la Terre 4 (SPOT 4) and SPOT 5 satellites. Operational since the launch of SPOT 4 in March 1998, and foreseen to continue at least until the end of the SPOT 5 mission (anticipated in spring 2014), this user segment comprises a processing facility (PF), actively receiving, processing, correcting, archiving, and distributing the VEGETATION data and derived added-value products. First and foremost, the VEGETATION programme has been serving the needs of operational users – both institutional and commercial – requesting data in near-real time. However, scientific and educational users too benefited significantly, in particular from VEGETATION’s unique time series of the Earth’s land cover, and more specifically the vegetation cover. Over the years, the centralized archive houses processed data covering the equivalent of 11,000 times the Earth’s surface, and delivered more than 50 terapixels to around 10.000 users. As such, VEGETATION’s mission is a prime example of what Europe wants to achieve through the Global Monitoring for Environment and Security (GMES) initiative: truly operational services providing reliable and up-to-date information.

This article describes the processing facility, the way the data and products are archived, the different dissemination channels as well as the data policy adopted and the users served. One of the recent evolutions, the development of an entirely new product distribution facility (PDF), implemented as part of the Project for On-Board Autonomy – Vegetation (PROBA-V) user segment is discussed.  相似文献   
27.
The enantioselective hydrogenation of ethyl pyruvate to (S)-ethyl lactate over cinchonine- and -isocinchonine-modified Pt/Al2O3 catalysts was studied as a function of modifier concentration and reaction temperature. The maximum enantioselectivities obtained under the applied mild conditions were 89% ee using cinchonine (0.014 mmoldm–3, 1 bar H2, 23°C, 6% AcOH in toluene), and 76% ee in the case of -isocinchonine (0.14 mmoldm–3, 1 bar H2, –10°C, 6% AcOH in toluene). Since -isocinchonine of rigid structure exists only in anti-open conformation these data provide additional experimental evidence to support the former suggestion concerning the dominating role of anti-open conformation in these cinchona-modified enantioselective hydrogenations.  相似文献   
28.
Symmetries in constraint problems present an opportunity for reducing search. This paper presents Lightweight Dynamic Symmetry Breaking, an automatic symmetry breaking method that is efficient enough to be used as a default, since it never yields a major slowdown while often giving major performance improvements. This is achieved by automatically exploiting certain kinds of symmetry that are common, can be compactly represented, easily and efficiently processed, automatically detected, and lead to large reductions in search. Moreover, the method is easy to implement and integrate in any constraint system. Experimental results show the method is competitive with the best symmetry breaking methods without risking poor performance.  相似文献   
29.
Public key Kerberos (PKINIT) is a standard authentication and key establishment protocol. Unfortunately, it suffers from a security flaw when combined with smart cards. In particular, temporary access to a user’s card enables an adversary to impersonate that user for an indefinite period of time, even after the adversary’s access to the card is revoked. In this paper, we extend Shoup’s key exchange security model to the smart card setting and examine PKINIT in this model. Using this formalization, we show that PKINIT is indeed flawed, propose a fix, and provide a proof that this fix leads to a secure protocol.  相似文献   
30.
The crystal structure and molecular conformation of 2-cyano-4-bromo-4′-N,N-diethylaminoazobenzene (C17H17N4Br, mol. wt. = 357·2 a.m.u) has been determined from X-ray diffraction data; triclinic, P1 (No. 2), a = 10·132(11) Å, b = 12·216(16) Å, c = 6·966(11) Å, α = 104·21(9)°, β = 92·67(12)°, γ = 97·22(7)°, V = 826·5(9) Å3, Z = 2, Dc = 1·436 g cm?3, F(000) = 378, λ(MoKα) = 0·71069 Å, μ(MoKα) = 26·0 cm?1. The structure was solved by the multiple solution direct method and refined by full-matrix least-squares to R = 0·059 for 1538 independent observed reflections. The azobenzene skeleton is planar to within 0·06 Å. Most significant bonding data are: NN, 1·290(8) Å; BrC, 1·866(6) Å; mean CN (azo) 1·380(8) Å; NNC, 113·6(4) and 115·3(4)°; NCC (cis relative to NN) 125·9(4)° and 126·7(4)°; NCC (trans) 116·8°(5)° and 116·1(4)°.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号