首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1528篇
  免费   1篇
电工技术   1篇
综合类   1篇
化学工业   42篇
能源动力   1篇
轻工业   12篇
石油天然气   4篇
无线电   13篇
一般工业技术   35篇
冶金工业   1407篇
原子能技术   3篇
自动化技术   10篇
  2017年   1篇
  2016年   1篇
  2015年   1篇
  2014年   1篇
  2013年   2篇
  2012年   1篇
  2011年   2篇
  2010年   4篇
  2009年   3篇
  2008年   4篇
  2007年   2篇
  2006年   3篇
  2005年   8篇
  2004年   3篇
  2003年   11篇
  2002年   2篇
  2001年   2篇
  1999年   49篇
  1998年   473篇
  1997年   274篇
  1996年   167篇
  1995年   84篇
  1994年   72篇
  1993年   79篇
  1992年   10篇
  1991年   20篇
  1990年   11篇
  1989年   22篇
  1988年   22篇
  1987年   27篇
  1986年   16篇
  1985年   19篇
  1984年   2篇
  1983年   3篇
  1982年   6篇
  1981年   5篇
  1980年   6篇
  1979年   1篇
  1978年   2篇
  1977年   25篇
  1976年   45篇
  1975年   3篇
  1974年   4篇
  1973年   1篇
  1972年   1篇
  1955年   1篇
  1945年   6篇
  1944年   10篇
  1943年   6篇
  1942年   3篇
排序方式: 共有1529条查询结果,搜索用时 15 毫秒
21.
22.
Oral administration of high dosages of the dithiocarbamate pesticides maneb and mancozeb was teratogenic in rats but not in mice. The malformations, severe limb and craniofacial defects, were pronounced after maneb treatment but less so after mancozeb and propineb, zinc-containing compounds. The teratogenic effect of maneb was progressively reduced by simultaneously administering increasing amounts of zinc acetate. The mechanism of the teratogenic effect may involve the compounds being chelating agents, trapping zinc required for many important enzyme systems.  相似文献   
23.
24.
Presynaptic terminals contain several specialized compartments, which have been described by electron microscopy. We show in an identified Drosophila neuromuscular synapse that several of these compartments-synaptic vesicle clusters, presynaptic plasma membrane, presynaptic cytosol, and axonal cytoskeleton-labeled by specific reagents may be resolved from one another by laser scanning confocal microscopy. Using a panel of compartment-specific markers and Drosophila shibire(ts1) mutants to trap an intermediate stage in synaptic vesicle recycling, we have examined the localization and redistribution of dynamin within single synaptic varicosities at the larval neuromuscular junction. Our results suggest that dynamin is not a freely diffusible molecule in resting nerve terminals; rather, it appears localized to synaptic sites by association with yet uncharacterized presynaptic components. In shi(ts1) nerve terminals depleted of synaptic vesicles, dynamin is quantitatively redistributed to the plasma membrane. It is not, however, distributed uniformly over presynaptic plasmalemma; instead, fluorescence images show "hot spots" of dynamin on the plasma membrane of vesicle-depleted nerve terminals. We suggest that these dynamin-rich domains may mark the active zones for synaptic vesicle endocytosis first described at the frog neuromuscular junction.  相似文献   
25.
26.
The growing use of antibody-based separation methods has paralleled the expansion of immunochemical detection methods in moving beyond the clinical diagnostic field to applications in environmental monitoring. In recent years high-performance immunoaffinity chromatography, which began as a separation technique in biochemical and clinical research, has been adapted for separating and quantifying environmental pollutants. Bioaffinity offers a selective biological basis for separation that can be incorporated into a modular analytical process for more efficient environmental analysis. The use of immunoaffinity chromatography for separation complements the use of immunoassay for detection. A widely used immunochemical detection method for environmental analyses is enzyme immunoassay. The objective of this paper is to review the status of bioaffinity-based analytical procedures for environmental applications and human exposure assessment studies. Environmental methods based on bioaffinity range from mature immunoassays to emerging techniques such as immunosensors and immunoaffinity chromatography procedures for small molecules.  相似文献   
27.
We have studied the polarized resolved photoluminescence of n-type GaAs/AlAs/GaAlAs resonant tunneling diodes under magnetic field parallel to the tunnel current. Under resonant tunneling conditions, we have observed two emission lines attributed to neutral (X) and negatively charged excitons (X). We have observed a voltage-controlled circular polarization degree from the quantum well emission for both lines, with values up to −88% at 15 T at low voltages which are ascribed to an efficient spin injection from the 2D gases formed at the accumulation layers.  相似文献   
28.
29.

This work describes a class of Algorithm Substitution Attack (ASA) generically targeting the receiver of a communication between two parties. Our work provides a unified framework that applies to any scheme where a secret key is held by the receiver; in particular, message authentication schemes (MACs), authenticated encryption (AEAD) and public key encryption (PKE). Our unified framework brings together prior work targeting MAC schemes (FSE’19) and AEAD schemes (IMACC’19); we extend prior work by showing that public key encryption may also be targeted. ASAs were initially introduced by Bellare, Paterson and Rogaway in light of revelations concerning mass surveillance, as a novel attack class against the confidentiality of encryption schemes. Such an attack replaces one or more of the regular scheme algorithms with a subverted version that aims to reveal information to an adversary (engaged in mass surveillance), while remaining undetected by users. Previous work looking at ASAs against encryption schemes can be divided into two groups. ASAs against PKE schemes target key generation by creating subverted public keys that allow an adversary to recover the secret key. ASAs against symmetric encryption target the encryption algorithm and leak information through a subliminal channel in the ciphertexts. We present a new class of attack that targets the decryption algorithm of an encryption scheme for symmetric encryption and public key encryption, or the verification algorithm for an authentication scheme. We present a generic framework for subverting a cryptographic scheme between a sender and receiver, and show how a decryption oracle allows a subverter to create a subliminal channel which can be used to leak secret keys. We then show that the generic framework can be applied to authenticated encryption with associated data, message authentication schemes, public key encryption and KEM/DEM constructions. We consider practical considerations and specific conditions that apply for particular schemes, strengthening the generic approach. Furthermore, we show how the hybrid subversion of key generation and decryption algorithms can be used to amplify the effectiveness of our decryption attack. We argue that this attack represents an attractive opportunity for a mass surveillance adversary. Our work serves to refine the ASA model and contributes to a series of papers that raises awareness and understanding about what is possible with ASAs.

  相似文献   
30.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号