全文获取类型
收费全文 | 2874篇 |
免费 | 0篇 |
专业分类
电工技术 | 2篇 |
化学工业 | 17篇 |
金属工艺 | 15篇 |
机械仪表 | 6篇 |
建筑科学 | 7篇 |
能源动力 | 6篇 |
轻工业 | 28篇 |
水利工程 | 1篇 |
石油天然气 | 2篇 |
无线电 | 9篇 |
一般工业技术 | 30篇 |
冶金工业 | 2744篇 |
自动化技术 | 7篇 |
出版年
2019年 | 3篇 |
2014年 | 3篇 |
2013年 | 18篇 |
2012年 | 4篇 |
2011年 | 2篇 |
2010年 | 5篇 |
2009年 | 2篇 |
2008年 | 9篇 |
2007年 | 4篇 |
2006年 | 5篇 |
2005年 | 2篇 |
2004年 | 4篇 |
2003年 | 7篇 |
2002年 | 3篇 |
2001年 | 4篇 |
2000年 | 6篇 |
1999年 | 86篇 |
1998年 | 826篇 |
1997年 | 475篇 |
1996年 | 310篇 |
1995年 | 171篇 |
1994年 | 144篇 |
1993年 | 183篇 |
1992年 | 36篇 |
1991年 | 41篇 |
1990年 | 32篇 |
1989年 | 38篇 |
1988年 | 52篇 |
1987年 | 34篇 |
1986年 | 33篇 |
1985年 | 28篇 |
1984年 | 3篇 |
1983年 | 4篇 |
1982年 | 13篇 |
1981年 | 18篇 |
1980年 | 24篇 |
1979年 | 4篇 |
1978年 | 6篇 |
1977年 | 50篇 |
1976年 | 155篇 |
1975年 | 11篇 |
1971年 | 1篇 |
1968年 | 1篇 |
1967年 | 2篇 |
1966年 | 1篇 |
1965年 | 1篇 |
1962年 | 1篇 |
1957年 | 2篇 |
1955年 | 3篇 |
1954年 | 1篇 |
排序方式: 共有2874条查询结果,搜索用时 15 毫秒
41.
42.
43.
44.
45.
Binding of an arm repeat protein to the kinase domain of the S-locus receptor kinase 总被引:1,自引:0,他引:1
Screening of a yeast two-hybrid library for proteins that interact with the kinase domain of an S-locus receptor kinase (SRK) resulted in the isolation of a plant protein called ARC1 (Arm Repeat Containing). This interaction was mediated by the C-terminal region of ARC1 in which five arm repeat units were identified. Using the yeast two-hybrid system and in vitro binding assays, ARC1 was found to interact specifically with the kinase domains from SRK-910 and SRK-A14 but failed to interact with kinase domains from two different Arabidopsis receptor-like kinases. In addition, treatment with a protein phosphatase or the use of a kinase-inactive mutant reduced or abolished the binding of ARC1 to the SRK-910 kinase domain, indicating that the interaction was phosphorylation dependent. Lastly, RNA blot analysis revealed that the expression of ARC1 is restricted to the stigma, the site of the self-incompatibility response. 相似文献
46.
47.
48.
49.
Illumination with solid state lighting technology 总被引:13,自引:0,他引:13
Steigerwald D.A. Bhat J.C. Collins D. Fletcher R.M. Holcomb M.O. Ludowise M.J. Martin P.S. Rudaz S.L. 《IEEE journal of selected topics in quantum electronics》2002,8(2):310-320
High-power light-emitting diodes (LEDs) have begun to differentiate themselves from their more common cousins the indicator LED. Today these LEDs are designed to generate 10-100 lm per LED with efficiencies that surpass incandescent and halogen bulbs. After a summary of the motivation for the development of the high-power LED and a look at the future markets, we describe the current state of high-power LED technology and the challenges that lay ahead for development of a true "solid state lamp." We demonstrate record performance and reliability for high-power colored and white LEDs and show results from the worlds first 100-plus lumen white LED lamp, the solid state equivalent of Thomas Edison's 20-W incandescent lightbulb approximately one century later 相似文献
50.
DR. CHRISTIAN MUELLER-SCHLOER 《Cryptologia》2013,37(3):257-273
Secrecy and authentication are two important features of a secure communication system. Public Key Cryptosystems, based, e.g., on the Rivest-Shamir-Adleman (RSA) algorithm, provide a very elegant solution to the problem of authenticity verification or true electronic signatures. Practical problems, however, mainly the lack of execution speed, prevent a straightforward application. In order to sign a long message it is much faster to first calculate a short digest or checksum and then sign the compressed message. For this checksum calculation the fast, inexpensive and extensively tested Data Encryption Standard (DES) can be used. But care must be taken that this additional processing step does not introduce any weakness into the signature scheme. This paper investigates two DES-based hashing methods. It is shown that neither method seems to introduce any statistical regularities in the generated checksums. The “Cipher/Message to Plain Feedback,” however, is not secure under a modification compensation attack. It is further shown how the second method, the “Cipher to Plain Feedback” proposed by Davies and Price, can be broken by a “meet in the middle attack.” This checksum method, however, can be used safely with a slight modification. 相似文献