首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1361篇
  免费   128篇
  国内免费   14篇
电工技术   29篇
综合类   5篇
化学工业   280篇
金属工艺   23篇
机械仪表   35篇
建筑科学   54篇
矿业工程   5篇
能源动力   38篇
轻工业   86篇
水利工程   8篇
石油天然气   7篇
武器工业   1篇
无线电   306篇
一般工业技术   338篇
冶金工业   62篇
原子能技术   3篇
自动化技术   223篇
  2023年   11篇
  2022年   24篇
  2021年   41篇
  2020年   34篇
  2019年   37篇
  2018年   57篇
  2017年   34篇
  2016年   58篇
  2015年   44篇
  2014年   51篇
  2013年   99篇
  2012年   63篇
  2011年   74篇
  2010年   60篇
  2009年   84篇
  2008年   94篇
  2007年   62篇
  2006年   50篇
  2005年   56篇
  2004年   56篇
  2003年   64篇
  2002年   39篇
  2001年   38篇
  2000年   32篇
  1999年   35篇
  1998年   32篇
  1997年   22篇
  1996年   15篇
  1995年   25篇
  1994年   17篇
  1993年   4篇
  1992年   6篇
  1991年   9篇
  1990年   7篇
  1989年   5篇
  1988年   8篇
  1987年   8篇
  1986年   4篇
  1985年   3篇
  1984年   6篇
  1983年   3篇
  1982年   5篇
  1981年   6篇
  1980年   2篇
  1979年   4篇
  1977年   6篇
  1969年   1篇
  1959年   1篇
  1909年   2篇
  1885年   2篇
排序方式: 共有1503条查询结果,搜索用时 4 毫秒
21.
Different doses of ketamine (10 mg/kg, 20 mg/kg, 30 mg/kg, 40 mg/kg, 50 mg/kg, and 60 mg/kg) were injected i.p. (I.P.), respectively, to male ICR mice to determine the optimal dosage for chronic administration. At and above 40 mg/kg I.P. injection, mice had almost no hindlimb movement during swimming test. Subsequently, 30 mg/kg was used as the dose for the study in the toxicity of long-term ketamine administration on urinary bladder and sperm motility. The treatment group were subdivided into two (n = 10 each group); one received daily ketamine treatment i.p. for 3 months and another group for 6 months. Corresponding number of mice in control groups (n = 5 each group) received saline injection instead of ketamine. Terminal dUTP nick and labeling (TUNEL) study and Sirius red staining were carried out on the sectioned slides of the urinary bladders to study the degree of apoptosis in both epithelium and muscular layers of the urinary bladder and the relative thickness of the muscular layers in this organ was also computed. Apoptosis in the bladder epithelium was observed initially in the 3-month ketamine treated mice and the number of apoptotic cells was significantly different (P < 0.05) between the 3-month and 6-month ketamine treated mice and the control. The relative thickness of muscular layers in the bladder wall also decreased significantly (P < 0.05) when the 6-month treated mice and the control were compared. Sirius red staining revealed increase of collagen in the urinary bladder of the treated mice, most evidently 6 months after ketamine treatment. In addition, the sperm motility was studied and there was a statistically significant difference between the control and ketamine treated groups in the percentages of sperms which were motile (P < 0.05). This suggested that the chronic administration of ketamine affected the genital system as well.  相似文献   
22.
In this paper, an efficient arbitrated quantum signature scheme is proposed by combining quantum cryptographic techniques and some ideas in classical cryptography. In the presented scheme, the signatory and the receiver can share a long-term secret key with the arbitrator by utilizing the key together with a random number. While in previous quantum signature schemes, the key shared between the signatory and the arbitrator or between the receiver and the arbitrator could be used only once, and thus each time when a signatory needs to sign, the signatory and the receiver have to obtain a new key shared with the arbitrator through a quantum key distribution protocol. Detailed theoretical analysis shows that the proposed scheme is efficient and provably secure.  相似文献   
23.
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges of identity frauds. For example, the sole biometric approach suffers from the privacy invasion and non-revocable issues. Passwords and tokens are easily forgotten and lost. To address these issues, the notion of cancellable biometrics was introduced to denote biometric templates that can be cancelled and replaced with the inclusion of another independent authentication factor. BioHash is a form of cancellable biometrics which mixes a set of user-specific random vectors with biometric features. In verification setting, BioHash is able to deliver extremely low error rates as compared to the sole biometric approach when a genuine token is used. However, this raises the possibility of two identity theft scenarios: (i) stolen-biometrics, in which an impostor possesses intercepted biometric data of sufficient high quality to be considered genuine and (ii) stolen-token, in which an impostor has access to the genuine token and used by the impostor to claim as the genuine user. We found that the recognition rate for the latter case is poorer. In this paper, the quantised random projection ensemble based on the Johnson–Lindenstrauss Lemma is used to establish the mathematical foundation of BioHash. Based on this model, we elucidate the characteristics of BioHash in pattern recognition as well as security view points and propose new methods to rectify the stolen-token problem.  相似文献   
24.
We developed a novel bivalent antibody fragment, the linear(L-) F(ab')2, comprising tandem repeats of a heavy chain fragmentVH–CH1–VH–CH1 cosecreted with a light chain.Functional humanized L-F(ab')2 directed against p185HER2 wassecreted from Escherichia coli at high titer (100 mg/l) andpurified to homogeneity. The L-F(ab')2 binds two equivalentsof antigen with an apparent affinity (Kd = 0.46 nM) that iswithin 3-fold of the corresponding thioether-linked F(ab')2fragment The N-terminal site binds antigen with an affinity(Kd = 1.2 nM) that is 4-fold greater than that for the C-terminalsite, as shown by the comparison of L-F(ab')2 variants containinga single functional binding site. L-F(ab')2 has greater antiproliferativeactivity than the thioether-linked F(ab')2 against the p185HER2-overexpressingtumor cell line BT474. Linear and thioether-linked F(ab')2 havevery similar pharmacokinetic properties in normal mice, andtheir serum permanence times are respectively 7- and 8-foldlonger than the corresponding Fab fragment L-F(ab')2 offersa facile route to bivalent antibody fragments that are potentiallysuitable for clinical applications, and that may have improvedbiological activity compared with thioether-linked F(ab')2 fragments.  相似文献   
25.
26.
In this paper, single crystalline copper nanowires (CuNWs) have been electrochemically grown through anodic aluminum oxide template. The environmental stability of the as‐obtained CuNWs in both 40% relative humidity (RH) atmosphere and 0.1 m NaOH aqueous solution has been subsequently studied. In 40% RH atmosphere, a uniform compact Cu2O layer is formed as a function of exposure time following the logarithmic law and epitaxially covers the CuNW surfaces. It is also found that the oxide layers on CuNWs are sequentially grown when subjected to the cyclic voltammetry measurement in 0.1 m NaOH solution. An epitaxially homogeneous Cu2O layer is initially formed over the surface of the CuNW substrates by solid‐state reaction (SSR). Subsequently, the conversion of Cu2O into epitaxial CuO based on the SSR takes place with the increase of applied potential. This CuO layer is partially dissolved in the solution forming Cu(OH)2, which then redeposited on the CuNW surfaces (i.e., dissolution‐redeposition (DR) process) giving rise to a mixed polycrystalline CuO/Cu(OH)2 layer. The further increase of applied potential allows the complete oxidation of Cu2O into CuO to form a dual‐layer structure (i.e., CuO inner layer and Cu(OH)2 outer layer) with random orientations through an enhanced DR process.  相似文献   
27.
28.
Given a hypergraph and a set of embedded functional dependencies, we investigate the problem of determining the conditions under which we can efficiently generate redundancy-free XML storage structures with as few scheme trees as possible. Redundancy-free XML structures guarantee both economy in storage space and the absence of update anomalies, and having the least number of scheme trees requires the fewest number of joins to navigate among the data elements. We know that the general problem is intractable. The problem may still be intractable even when the hypergraph is acyclic and each hyperedge is in Boyce–Codd normal form (BCNF). As we show here, however, given an acyclic hypergraph with each hyperedge in BCNF, a polynomial-time algorithm exists that generates a largest possible redundancy-free XML storage structure. Successively generating largest possible scheme trees from among hyperedges not already included in generated scheme trees constitutes a reasonable heuristic for finding the fewest possible scheme trees. For many practical cases, this heuristic finds the set of redundancy-free XML storage structures with the fewest number of scheme trees. In addition to a correctness proof and a complexity analysis showing that the algorithm is polynomial, we also give experimental results over randomly generated but appropriately constrained hypergraphs showing empirically that the algorithm is indeed polynomial.  相似文献   
29.
The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by adopting multiple Private Key Generators (PKGs). Recently, there was a proposal that attempted to reduce the trust of the PKG by allowing a malicious PKG to be caught if he reveals the user’s identity-based private key illegally. Nonetheless, the proposal does not consider that the PKG can simply decrypt the ciphertext instead of revealing the private key itself (in the case of identity-based encryption schemes). The aim of this paper is to present an escrow-free identity-based signature (IBS) scheme, in which the malicious PKG will be caught if it releases a signature on behalf of the user but signed by itself. We present a formal model to capture such a scheme and provide a concrete construction.  相似文献   
30.
The intersecting path is an important tool path generation method. This paper proposes an approach for the quart-parametric interpolation of intersecting paths. The objective of our approach is that the intersecting paths for surface machining can be directly interpolated within the computer numerical control (CNC) system. This enables the CNC interpolator to process the intersecting paths without geometric approximation as in existing approaches and take into consideration any specific feedrate profiles and further machining dynamical issues along the path.The interpolation of the intersection of two general parametric surfaces is transferred into interpolation of its projection curves and the time trajectories of four parameters along the intersecting curves are obtained. Our strategy is to carry out the quart-parametric interpolation based on the projection interpolation. The feedrate control method is developed, and then the interpolation algorithms for two projection curves are proposed. An error reduction scheme is presented to alleviate point deviation from the drive parametric surface. Simulations of quart-parametric interpolation have been carried out to verify the effectiveness of the proposed algorithm.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号