首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   412篇
  免费   22篇
  国内免费   1篇
电工技术   6篇
综合类   3篇
化学工业   45篇
金属工艺   10篇
机械仪表   20篇
建筑科学   25篇
能源动力   17篇
轻工业   18篇
水利工程   2篇
无线电   65篇
一般工业技术   73篇
冶金工业   35篇
原子能技术   3篇
自动化技术   113篇
  2023年   6篇
  2022年   2篇
  2021年   7篇
  2020年   6篇
  2019年   7篇
  2018年   6篇
  2017年   7篇
  2016年   10篇
  2015年   9篇
  2014年   11篇
  2013年   47篇
  2012年   19篇
  2011年   26篇
  2010年   12篇
  2009年   16篇
  2008年   19篇
  2007年   23篇
  2006年   16篇
  2005年   12篇
  2004年   15篇
  2003年   13篇
  2002年   14篇
  2001年   6篇
  2000年   9篇
  1999年   6篇
  1998年   19篇
  1997年   10篇
  1996年   11篇
  1995年   6篇
  1994年   3篇
  1993年   5篇
  1992年   10篇
  1990年   2篇
  1989年   2篇
  1988年   4篇
  1987年   2篇
  1986年   3篇
  1984年   5篇
  1983年   5篇
  1981年   2篇
  1980年   3篇
  1977年   2篇
  1976年   2篇
  1975年   3篇
  1974年   3篇
  1973年   2篇
  1972年   1篇
  1969年   1篇
  1968年   1篇
  1966年   1篇
排序方式: 共有435条查询结果,搜索用时 109 毫秒
431.
Topic modeling is a type of statistical model for discovering the latent “topics” that occur in a collection of documents through machine learning. Currently, latent Dirichlet allocation (LDA) is a popular and common modeling approach. In this paper, we investigate methods, including LDA and its extensions, for separating a set of scientific publications into several clusters. To evaluate the results, we generate a collection of documents that contain academic papers from several different fields and see whether papers in the same field will be clustered together. We explore potential scientometric applications of such text analysis capabilities.  相似文献   
432.
The first searchable public key encryption scheme with designated testers (dPEKS) known to be secure against keyword guessing attacks was due to Rhee et al. [H.S. Rhee, W. Susilo, and H.J. Kim, Secure searchable public key encryption scheme against keyword guessing attacks, IEICE Electron. Express 6(5) (2009), pp. 237–243]. Recently, some dPEKS schemes, including the Rhee et al. scheme, were found to be vulnerable to keyword guessing attacks by a malicious server. However, the Rhee et al. dPEKS scheme and its improved variants are still known to be secure against keyword guessing attack by the outsider attacker to date. In this paper, we present a keyword guessing attack by the outsider attacker on the existing dPEKS schemes. We first describe the attack scenario which is possible in the current nature of the Internet and public key encryption with keyword search applications, e.g. email routing. We then demonstrate the detailed attack steps on the Rhee et al. scheme as an attack instance. We emphasize that our attack is generic and it equally applies to all existing dPEKS schemes that claim to be secure against keyword guessing attacks by the outsider attacker.  相似文献   
433.
Currently available mass spectrometric (MS) techniques lack specificity in identifying protein modifications because molecular mass is the only parameter used to characterize these changes. Consequently, the suspected modified peptides are subjected to tandem MS/MS sequencing that may demand more time and sample. We report the use of stable isotope-enriched amino acids as residue-specific "mass signatures" for the rapid and sensitive detection of protein modifications directly from the peptide mass map (PMM) without enrichment of the modified peptides. These mass signatures are easily recognized through their characteristic spectral patterns and provide fingerprints for peptides containing the same content of specific amino acid residue(s) in a PMM. Without the need for tandem MS/MS sequencing, a peptide and its modified form(s) can readily be identified through their identical fingerprints, regardless of the nature of modifications. In this report, we demonstrate this strategy for the detection of methionine oxidation and protein phosphorylation. More interestingly, the phosphorylation of a histone protein, H2A.X, obtained from human skin fibroblast cells, was effectively identified in response to low-dose radiation. In general, this strategy of residue-specific mass tagging should be applicable to other posttranslational modifications.  相似文献   
434.
435.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号