首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   185篇
  免费   4篇
化学工业   34篇
机械仪表   1篇
建筑科学   15篇
能源动力   7篇
轻工业   9篇
石油天然气   2篇
无线电   34篇
一般工业技术   24篇
冶金工业   25篇
原子能技术   1篇
自动化技术   37篇
  2022年   3篇
  2021年   3篇
  2020年   2篇
  2019年   2篇
  2018年   4篇
  2017年   4篇
  2016年   6篇
  2015年   3篇
  2014年   2篇
  2013年   10篇
  2012年   8篇
  2011年   8篇
  2010年   7篇
  2009年   7篇
  2008年   6篇
  2007年   7篇
  2006年   6篇
  2005年   5篇
  2004年   9篇
  2003年   3篇
  2002年   5篇
  2001年   5篇
  2000年   1篇
  1998年   11篇
  1997年   9篇
  1996年   2篇
  1995年   3篇
  1994年   2篇
  1993年   3篇
  1992年   1篇
  1990年   1篇
  1989年   2篇
  1985年   1篇
  1984年   2篇
  1983年   5篇
  1982年   6篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1976年   1篇
  1975年   2篇
  1974年   3篇
  1973年   2篇
  1972年   5篇
  1971年   1篇
  1970年   4篇
  1969年   2篇
  1965年   1篇
排序方式: 共有189条查询结果,搜索用时 15 毫秒
101.
Continuous density decreases of 50% within 98 μm long and 3.2 nm wide cylindrical ion damage trails, latent ion tracks, created in a {1 0 0} LiF platelet by 2.31 GeV Pb ions, have been measured by small-angle X-ray scattering. Structural alteration is attributed mainly to radiolytic decomposition of the crystal into Li atoms and fluorine molecules, and subsequent transport and release of the fluorine gas through the low-density tracks. Free volume and Li residues undoubtedly account for the observed enhanced etchability of the track-core region.  相似文献   
102.
103.
With increasing demand for esthetics, dentists face the challenge of delivering definitive restorations that fulfill patients' expectations of esthetics, biocompatibility, and durability. Recent technical developments have encouraged fabrication of gold-reinforced porcelain inlays that meet these important criteria. This article describes a sequence to construct metal-reinforced porcelain inlay restorations.  相似文献   
104.
Hyperploidy is a rare finding in leukemias, with isolated cases of tetraploidy reported in acute myeloblastic and acute lymphblastic leukemias. We report the first case of acute myeloid leukemia with near-pentaploidy (5 n+/-) which was present in 100% of metaphases at diagnosis. By light microscopy, the leukemic blasts were exceptionally large and coarsely granulated. Following one cycle of induction chemotherapy, complete morphologic and cytogenetic remission was documented. Four weeks later relapse occured, at which time the karyotype was diploid and the morphological and immunophenotypic characteristics were those of a lymphoid leukemia. However, the presence of three aberrant chromosomes (5q+, 6q+ and 20q+) confirmed that this was clonal evolution of the original myeloid leukemia. To the best of our knowledge, this case represents the first report of near-pentaloidy in de novo, pretreatment human leukemia.  相似文献   
105.
According to the quasi-steady-state approximation of long rod penetration, the total penetration efficiency should approach the so called hydrodynamic limit at high impact velocities. However, both experiments and computer simulations show that this is not the case. The total penetration efficiency usually overshoots the hydrodynamic limit at velocities above approximately 3 km/s. We ran computer simulations to investigate the significance of the hydrodynamic limit. We found that the overshoot occurs during the end (or terminal) phase. The end phase starts upon completion of the rod erosion. The kinetic energy trapped in the residual rod and in the target at this stage can cause significant additional deepening of the crater. As the overshoot of the hydrodynamic limit is an edge effect, it is expected to decrease as the aspect ratio of the rod increases.  相似文献   
106.
This article reviews memory-related impairments in trauma survivors with posttraumatic stress disorder and their possible association to neuroendocrine alterations seen in this disorder. The neuroendocrine profile in PTSD first described in chronically ill combat veterans is characterized by lower basal cortisol levels, higher glucocorticoid receptor number, enhanced sensitivity to exogenous steroids, and increased variation in basal cortisol levels over the diurnal cycle. The generalizability and time course of these neuroendocrine alterations are explored in longitudinal studies and studies in other traumatized populations. These studies suggest that at least some aspects of this neuroendocrine profile can also be seen in other populations, including women, children, and victims of childhood trauma. Additionally, the alterations may be present early in the course of illness, perhaps even in the immediate aftermath of trauma, and may continue to be manifest in elderly trauma survivors. The mechanisms by which these neuroendocrine alterations may influence the formation and processing of traumatic memories are discussed.  相似文献   
107.
In this paper we analyze contracts for multiple products when the supplier offers business volume discounts. The contract takes the form of price discounts for total minimum dollar volume commitments over the horizon with flexibility to adjust the total purchases upwards by a fixed percentage about this minimum commitment. The optimal policy could be complex since it involves the solution of a constrained multi-period multi-product dynamic program. We suggest approximations that give us an upper bound. To develop this upper bound, we present the optimal policy for a similar contract for a single product problem. We then develop a lower bound for the multiproduct problem and show, numerically, that the gap is small. Given the approximations standard single period resource allocation algorithms can be used to solve the problem. The resulting solution methodology is fast and permits evaluation of various what-if scenarios.  相似文献   
108.
In this note, we show the existence of constant-round computational zero-knowledge proofs of knowledge for all $\mathcal {NP}$ . The existence of constant-round zero-knowledge proofs was proven by Goldreich and Kahan (Journal of Cryptology, 1996), and the existence of constant-round zero-knowledge arguments of knowledge was proven by Feige and Shamir (CRYPTO, 1989). However, the existence of constant-round zero-knowledge proofs of knowledge for all $\mathcal {NP}$ is folklore, to the best of our knowledge, since no proof of this fact has been published.  相似文献   
109.
In the setting of secure computation, a set of parties wish to securely compute some function of their inputs, in the presence of an adversary. The adversary in question may be static (meaning that it controls a predetermined subset of the parties) or adaptive (meaning that it can choose to corrupt parties during the protocol execution and based on what it sees). In this paper, we study two fundamental questions relating to the basic zero-knowledge and oblivious transfer protocol problems:
•  Adaptive zero-knowledge proofs: We ask whether it is possible to construct adaptive zero-knowledge proofs (with unconditional soundness) for all of NP\mathcal{NP}. Beaver (STOC [1996]) showed that known zero-knowledge proofs are not adaptively secure, and in addition showed how to construct zero-knowledge arguments (with computational soundness).  相似文献   
110.
Universal composability and concurrent general composition consider a setting where secure protocols are run concurrently with each other and with arbitrary other possibly insecure protocols. Protocols that meet the definition of universal composability are guaranteed to remain secure even when run in this strongly adversarial setting. In the case of an honest majority, or where there is a trusted setup phase of some kind (like a common reference string or the key-registration public-key infrastructure of Barak et al.?in FOCS 2004), it has been shown that any functionality can be securely computed in a universally composable way. On the negative side, it has also been shown that in the plain model where there is no trusted setup at all, there are large classes of functionalities which cannot be securely computed in a universally composable way without an honest majority. In this paper, we extend these impossibility results for universal composability. We study a number of public-key models and show for which models the impossibility results of universal composability hold and for which they do not. We also consider a setting where the inputs to the protocols running in the network are fixed before any execution begins. The majority of our results are negative and we show that the known impossibility results for universal composability in the case of no honest majority extend to many other settings.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号