首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2739篇
  免费   20篇
  国内免费   1篇
电工技术   10篇
化学工业   72篇
金属工艺   4篇
机械仪表   9篇
建筑科学   31篇
能源动力   33篇
轻工业   92篇
水利工程   7篇
石油天然气   3篇
无线电   72篇
一般工业技术   76篇
冶金工业   2197篇
原子能技术   4篇
自动化技术   150篇
  2023年   4篇
  2022年   8篇
  2021年   3篇
  2020年   5篇
  2019年   5篇
  2018年   8篇
  2017年   8篇
  2016年   11篇
  2015年   10篇
  2014年   16篇
  2013年   23篇
  2012年   29篇
  2011年   25篇
  2010年   16篇
  2009年   25篇
  2008年   27篇
  2007年   24篇
  2006年   28篇
  2005年   12篇
  2004年   29篇
  2003年   23篇
  2002年   16篇
  2001年   29篇
  2000年   28篇
  1999年   82篇
  1998年   692篇
  1997年   452篇
  1996年   274篇
  1995年   158篇
  1994年   122篇
  1993年   135篇
  1992年   16篇
  1991年   31篇
  1990年   14篇
  1989年   21篇
  1988年   36篇
  1987年   23篇
  1986年   21篇
  1985年   13篇
  1984年   3篇
  1983年   3篇
  1982年   14篇
  1981年   18篇
  1980年   20篇
  1979年   3篇
  1978年   6篇
  1977年   50篇
  1976年   130篇
  1975年   3篇
  1973年   2篇
排序方式: 共有2760条查询结果,搜索用时 15 毫秒
71.
OBJECTIVE AND IMPORTANCE: We report a unique case of ivory osteoma of the cervical spine. CLINICAL PRESENTATION: The clinical presentation was one of polyradicular deficit without myelopathy after trauma. The imaging characteristics and histology of the lesion were those of a classic ivory osteoma. INTERVENTION: A complete surgical excision of the lesion was accomplished. CONCLUSION: We think we have recorded the only well-documented case of ivory osteoma affecting the spine.  相似文献   
72.
On 2 October 1996, IBM announced the formation of a new business alliance which will develop a different approach to law enforcement — accessible encryption that will not face government export controls or require the ‘escrowing’ of keys with either escrow ‘quote agents’ or trusted third parties. The day before, the White House announced a new government plan that would permit companies that promise to participate in a ‘key recovery’ system to receive a six-month license to export up to 56-bit DES encryption. When they fulfill their obligations and the government is satisfied that it can get access to the decryption keys, the 56-bit limit will be lifted. If, by the end of the two-year grace period, companies have not fulfilled their obligations to implement a key-recovery scheme, the 56-bit limit will be reduced to the current 40-bit export limit.  相似文献   
73.
Because many patients present themselves for treatment with both craniofacial and craniocervical pain, 2 questions arise: (1) What are the sensory and motor consequences of dysfunction in either of these areas on the other? (2) Do craniofacial and craniocervical pain have a similar cause? These questions formed the impetus for this review article. The phenomenon of concurrent pain in craniofacial and cervical structures is considered, and clinical reports and opinions are presented regarding theories of cervical-to-craniofacial and craniofacial-to-cervical pain referral. Because pain referral between these 2 areas requires anatomic and functional connectivity between trigeminally and cervically innervated structures, basic neurophysiologic and neuroanatomic literature is reviewed. The published data clearly demonstrate neurophysiologic and structural convergence of cervical sensory and muscle afferent inputs onto trigeminal subnucleus caudalis nociceptive and non-nociceptive neurons. Moreover, changes in metabolic activity and blood flow in the brainstem and cervical dorsal horn of the spinal cord in both monkeys and cats have been demonstrated after electric stimulation of the V1-innervated superior sagittal sinus. In conclusion, the animal experimental data support the findings of human empiric and experimental studies, which suggest that strong connectivity exists between trigeminal and cervical motor and sensory responses.  相似文献   
74.
75.
76.
77.
The algae Dunaliella bardawil and Dunaliella salina naturally contain large concentrations of all-trans and 9-cis beta-carotene (betaC). The purpose of this study was to compare the relative serum and tissue accumulation of all-trans and 9-cis betaC in ferrets fed different ratios of all-trans/9-cis betaC derived from two commercial sources, D. bardawil or D. salina (Betatene). Male ferrets (7 wk old) were fed carotene-free, pelleted diets for 27 d. Beginning on d 18, groups of ferrets (n = 6 or 7) received daily, one of six oral supplements varying in ratios of 9-cis and all-trans betaC mixed with approximately 1.0mL of Ensure. Four supplements containing 5.2-8.3 micromol total betaC were prepared from a 20% Betatene preparation, D. bardawil, a high-cis Betatene preparation, and Betatene further enriched in 9-cis betaC with all-trans betaC/9-cis betaC ratios of 2.2, 1.5, 0.6 and 0.4, respectively. Two control supplements, high and low betaC, were prepared from commercial betaC beadlets. The high control supplement had an all-trans/9-cis ratio of 19.0, whereas 9-cis betaC was not detected in the low supplement. On d 27, serum and tissues were obtained for HPLC analysis of betaC and its isomers. Analysis of livers showed that all-trans betaC was the primary isomer present, but 9-cis and other isomers were also detected in all groups. The hepatic all-trans/9-cis ratios were 5.9, 4.9, 2.5, 1.4, 52.2 and47.5, respectively, for the groups listed above. Lower amounts of all-trans and 9-cis betaC were found in kidneys compared with the liver, but ratios of all-trans/9-cis were not different among groups. Only trace amounts of 9-cis betaC were found in serum. These results demonstrate that the algae D. bardawil and D. salina provide a bioavailable source of betaC isomers, but, as in humans, absorption of 9-cis betaC is poor and any 9-cis betaC absorbed is apparently cleared by the liver.  相似文献   
78.
79.
80.
ABSTRACT

Communicating with confidential data requires special attention in a mobile agents environment, especially when the other hosts must be prevented from eavesdropping on the communication. We propose a communication model for secured communication between the agents belonging to publishers and consumers data. Confidentiality is ensured using our on-the-fly encryption-decryption sequence using ElGamal system to directly convert the message or plaintext into one that is encrypted directly with the public key of consumer. The scheme ensures that the data possessed by the agents is secured at all times when it is executing at any untrusted host. Our minimal implementation of the model with Aglets agent platform gives the first faithful picture of the happenings in the model. Finally, we also explain how the homomorphic property of ElGamal scheme can be integrated with our model for a Web-based application such as voting involving multiple agents.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号