首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2819篇
  免费   67篇
  国内免费   9篇
电工技术   40篇
综合类   4篇
化学工业   431篇
金属工艺   37篇
机械仪表   50篇
建筑科学   175篇
矿业工程   34篇
能源动力   75篇
轻工业   130篇
水利工程   41篇
石油天然气   9篇
无线电   347篇
一般工业技术   442篇
冶金工业   614篇
原子能技术   27篇
自动化技术   439篇
  2022年   26篇
  2021年   36篇
  2020年   13篇
  2019年   24篇
  2018年   36篇
  2017年   31篇
  2016年   35篇
  2015年   38篇
  2014年   44篇
  2013年   147篇
  2012年   85篇
  2011年   108篇
  2010年   76篇
  2009年   90篇
  2008年   111篇
  2007年   119篇
  2006年   120篇
  2005年   101篇
  2004年   112篇
  2003年   103篇
  2002年   73篇
  2001年   73篇
  2000年   84篇
  1999年   77篇
  1998年   167篇
  1997年   111篇
  1996年   102篇
  1995年   73篇
  1994年   49篇
  1993年   47篇
  1992年   20篇
  1991年   29篇
  1990年   30篇
  1989年   28篇
  1988年   18篇
  1987年   26篇
  1986年   32篇
  1985年   31篇
  1984年   32篇
  1983年   26篇
  1982年   17篇
  1981年   21篇
  1980年   25篇
  1979年   23篇
  1978年   20篇
  1977年   25篇
  1976年   46篇
  1975年   16篇
  1974年   13篇
  1971年   13篇
排序方式: 共有2895条查询结果,搜索用时 15 毫秒
951.
In preparation for picosecond pump-probe experiments at the SwissFEL X-ray laser facility, the feasibility of collectively initiating surface chemical reactions using energetic pulses of terahertz radiation is being tested.  相似文献   
952.
Over the last 20 years, the privacy of most GSM phone conversations was protected by the A5/1 and A5/2 stream ciphers, which were repeatedly shown to be cryptographically weak. They are being replaced now by the new A5/3 and A5/4 algorithms, which are based on the block cipher KASUMI. In this paper we describe a new type of attack called a sandwich attack, and use it to construct a simple related-key distinguisher for 7 of the 8 rounds of KASUMI with an amazingly high probability of 2?14. By using this distinguisher and analyzing the single remaining round, we can derive the complete 128-bit key of the full KASUMI with a related-key attack which uses only 4 related keys, 226 data, 230 bytes of memory, and 232 time. These completely practical complexities were experimentally verified by performing the attack in less than two hours on a single-core of a PC. Interestingly, neither our technique nor any other published attack can break the original MISTY block cipher (on which KASUMI is based) significantly faster than exhaustive search. Our results thus indicate that the modifications made by ETSI’s SAGE group in moving from MISTY to KASUMI made it extremely weak when related-key attacks are allowed, but do not imply anything about its resistance to single-key attacks. Consequently, there is no indication that the way KASUMI is implemented in GSM and 3G networks is practically vulnerable in any realistic attack model.  相似文献   
953.
Network covert channels are policy-breaking and stealthy communication channels in computer networks. These channels can be used to bypass Internet censorship, to exfiltrate data without raising attention, to allow a safe and stealthy communication for members of political oppositions and for spies, to hide the communication of military units at the battlefield from the enemy, and to provide stealthy communication for today’s malware, especially for botnets. To enhance network covert channels, researchers started to add protocol headers, so-called micro-protocols, to hidden payload in covert channels. Such protocol headers enable fundamental features such as reliability, dynamic routing, proxy capabilities, simultaneous connections, or session management for network covert channels—features which enrich future botnet communications to become more adaptive and more stealthy than nowadays. In this survey, we provide the first overview and categorization of existing micro-protocols. We compare micro-protocol features and present currently uncovered research directions for these protocols. Afterwards, we discuss the significance and the existing means for micro-protocol engineering. Based on our findings, we propose further research directions for micro-protocols. These features include to introduce multi-layer protocol stacks, peer auto-configuration, and peer group communication based on micro-protocols, as well as to develop protocol translation in order to achieve inter-connectivity for currently separated overlay networks.  相似文献   
954.
The neurodevelopmental and neuroprotective actions of docosahexaenoic acid (DHA) are mediated by mechanisms involving membrane- and metabolite-related signal transduction. A key characteristic in the membrane-mediated action of DHA results from the stimulated synthesis of neuronal phosphatidylserine (PS). The resulting DHA-PS-rich membrane domains facilitate the translocation and activation of kinases such as Raf-1, protein kinase C (PKC), and Akt. The activation of these signaling pathways promotes neuronal development and survival. DHA is also metabolized in neural tissues to bioactive mediators. Neuroprotectin D1, a docosatriene synthesized by the lipoxygenase activity, has an anti-inflammatory property, and elovanoids formed from DHA elongation products exhibit antioxidant effects in the retina. Synaptamide, an endocannabinoid-like lipid mediator synthesized from DHA in the brain, promotes neurogenesis and synaptogenesis and exerts anti-inflammatory effects. It binds to the GAIN domain of the GPR110 (ADGRF1) receptor, triggers the cAMP/protein kinase A (PKA) signaling pathway, and activates the cAMP-response element binding protein (CREB). The DHA status in the brain influences not only the PS-dependent signal transduction but also the metabolite formation and expression of pre- and post-synaptic proteins that are downstream of the CREB and affect neurotransmission. The combined actions of these processes contribute to the neurodevelopmental and neuroprotective effects of DHA.  相似文献   
955.
New technologies as well as new ways of using network services are rapidly changing the Internet’s landscape. These developments will have far-reaching implications for the architecture of the networks of the future. However, the current Internet design is plagued with a number of fundamental limitations, which makes its use as the sole basis for the networking applications of the future questionable. We believe that the Future Internet must allow the co-existence of diverse network designs and paradigms, both new and old, to remain open to innovation and meet the challenges of the future. In this paper, we propose to use network virtualization, embedded in an architectural framework, to achieve this goal and to lay the foundation for the deployment of novel concepts such as content-centric networking.
Norbert NiebertEmail:
  相似文献   
956.
对4种调整糖度方法对葡萄酒质量的影响进行了比较,采用的葡萄品种为灰比诺,可溶性固形物为19.5°Brix,通过不同的调整糖度措施使可溶性目形物提高2.5°Brix,达到22°Brix.4种调整糖度方法分别为:直接往葡萄汁中加入蔗糖;往葡萄汁中加入68°Brix浓缩葡萄汁;冷冻除冰使葡萄汁浓缩和借助反渗透机器浓缩葡萄汁.结果表明,在调整糖度幅度为2.5°Brix的情况下,不同调整糖度方法对葡萄酒的质量影响不大.  相似文献   
957.
The effect of heat treatments on the chemical, physical, and mineralogical properties of topaz is described. The samples were obtained from a deposit of potential commercial importance. Brick made from calcined and uncalcined topaz were tested according to standard A.S.T.M. test methods, and the results are presented.  相似文献   
958.
Polymorphic systems with arrays (PSAs) is a general class of nondeterministic reactive systems. A PSA is polymorphic in the sense that it depends on a signature, which consists of a number of type variables, and a number of symbols whose types can be built from the type variables. Some of the state variables of a PSA can be arrays, which are functions from one type to another. We present several new decidability and undecidability results for parameterised control-state reacha- bility problems on subclasses of PSAs.  相似文献   
959.
Mary Kalantzis's plenary address at the 2005 International Conference on the Humanities (Cambridge, U.K.) argues that globalization and diversity ground the world of our times. The article expands on this notion as Kalantzis and co-author Bill Cope describe three instantiations of globalization since the evolutionary processes of human beings began. The third globalization of which we are a part today, they argue, is characterized by layers upon layers of difference. These layers, moreover, are supported through new media and the Internet—and may indeed return us to “multilingualism, divergence, and enduringly deep diversity.”  相似文献   
960.
Reactions of methylcyclopentane on tungsten carbides show that in presence of oxygen the extensive hydrogenolysis is inhibited in favour of ring enlargement and ring opening via a bifunctional mechanism due to the coexistence of surface acid-rearrangement and hydrogenation-dehydrogenation sites. The oxycarbidic materials are very active and selective in skeletal rearrangement of hydrocarbons.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号