全文获取类型
收费全文 | 287篇 |
免费 | 10篇 |
专业分类
电工技术 | 6篇 |
化学工业 | 58篇 |
金属工艺 | 1篇 |
机械仪表 | 2篇 |
建筑科学 | 12篇 |
矿业工程 | 1篇 |
能源动力 | 2篇 |
轻工业 | 22篇 |
石油天然气 | 1篇 |
无线电 | 38篇 |
一般工业技术 | 42篇 |
冶金工业 | 60篇 |
原子能技术 | 8篇 |
自动化技术 | 44篇 |
出版年
2023年 | 4篇 |
2022年 | 5篇 |
2021年 | 10篇 |
2020年 | 2篇 |
2018年 | 8篇 |
2017年 | 8篇 |
2016年 | 9篇 |
2015年 | 8篇 |
2014年 | 9篇 |
2013年 | 15篇 |
2012年 | 12篇 |
2011年 | 11篇 |
2010年 | 7篇 |
2009年 | 9篇 |
2008年 | 6篇 |
2007年 | 8篇 |
2006年 | 5篇 |
2005年 | 6篇 |
2004年 | 6篇 |
2003年 | 4篇 |
2002年 | 5篇 |
2001年 | 3篇 |
2000年 | 8篇 |
1999年 | 8篇 |
1998年 | 20篇 |
1997年 | 2篇 |
1996年 | 14篇 |
1995年 | 6篇 |
1994年 | 6篇 |
1993年 | 6篇 |
1991年 | 4篇 |
1990年 | 5篇 |
1989年 | 4篇 |
1988年 | 2篇 |
1987年 | 8篇 |
1986年 | 7篇 |
1985年 | 5篇 |
1984年 | 5篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1979年 | 5篇 |
1978年 | 4篇 |
1976年 | 2篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1943年 | 1篇 |
1942年 | 1篇 |
1940年 | 1篇 |
1936年 | 1篇 |
1934年 | 1篇 |
排序方式: 共有297条查询结果,搜索用时 0 毫秒
1.
Rehana Yasmin Eike Ritter Guilin Wang 《International Journal of Information Security》2014,13(5):453-465
Designing efficient as well as secure cryptographic protocols for resource-constrained applications is a challenging task. In this paper, we formally analyze the security of an efficient one-pass authenticated key establishment protocol, the 1P-AKE protocol, which is primarily proposed for resource-constrained sensor nodes devices in wireless sensor networks (WSNs). In contrast to the existing identity-based one-pass key establishment protocols, the 1P-AKE protocol does not require any bilinear pairing computation in order to establish a key. This feature makes it really attractive for resource-constrained application environments, such as WSNs, where pairing computations are too expensive. We show that in the random oracle model, the 1P-AKE protocol is a secure authenticated one-pass key establishment protocol under the computational Diffie–Hellman assumption. The performance of the 1P-AKE protocol is also discussed and compared with the existing relevant protocols. 相似文献
2.
3.
Andreas Zeller 《Datenschutz und Datensicherheit - DuD》2016,40(8):519-522
Moderne Testgeneratoren finden Schwachstellen in Eingabeschnittstellen von Programmen, indem sie in Sekunden tausende Eingaben zufällig erzeugen. Die Werkzeuge lassen sich leicht von jedermann einsetzen–zum Angriff oder zur Verteidigung. 相似文献
4.
Termeer M Oliván Bescós J Breeuwer M Vilanova A Gerritsen F Gröller ME Nagel E 《IEEE transactions on visualization and computer graphics》2008,14(6):1595-1602
Visually assessing the effect of the coronary artery anatomy on the perfusion of the heart muscle in patients with coronary artery disease remains a challenging task. We explore the feasibility of visualizing this effect on perfusion using a numerical approach. We perform a computational simulation of the way blood is perfused throughout the myocardium purely based on information from a three-dimensional anatomical tomographic scan. The results are subsequently visualized using both three-dimensional visualizations and bull's eye plots, partially inspired by approaches currently common in medical practice. Our approach results in a comprehensive visualization of the coronary anatomy that compares well to visualizations commonly used for other scanning technologies. We demonstrate techniques giving detailed insight in blood supply, coronary territories and feeding coronary arteries of a selected region. We demonstrate the advantages of our approach through visualizations that show information which commonly cannot be directly observed in scanning data, such as a separate visualization of the supply from each coronary artery. We thus show that the results of a computational simulation can be effectively visualized and facilitate visually correlating these results to for example perfusion data. 相似文献
5.
Dealing with discrepancies in data is still a big challenge in data integration systems. The problem occurs both during eliminating duplicates from semantic overlapping sources as well as during combining complementary data from different sources. Though using SQL operations like grouping and join seems to be a viable way, they fail if the attribute values of the potential duplicates or related tuples are not equal but only similar by certain criteria. As a solution to this problem, we present in this paper similarity-based variants of grouping and join operators. The extended grouping operator produces groups of similar tuples, the extended join combines tuples satisfying a given similarity condition. We describe the semantics of this operator, discuss efficient implementations for the edit distance similarity and present evaluation results. Finally, we give examples of application from the context of a data reconciliation project for looted art. 相似文献
6.
Luc Rochette Loubna Mazini Gabriel Malka Marianne Zeller Yves Cottin Catherine Vergely 《International journal of molecular sciences》2020,21(23)
The potential use of stem cell-based therapies for the repair and regeneration of various tissues and organs is a major goal in repair medicine. Stem cells are classified by their potential to differentiate into functional cells. Compared with other sources, adipose-derived stem cells (ADSCs) have the advantage of being abundant and easy to obtain. ADSCs are considered to be tools for replacing, repairing, and regenerating dead or damaged cells. The capacity of ADSCs to maintain their properties depends on the balance of complex signals in their microenvironment. Their properties and the associated outcomes are in part regulated by reactive oxygen species, which mediate the oxidation-reduction state of cells as a secondary messenger. ADSC therapy has demonstrated beneficial effects, suggesting that secreted factors may provide protection. There is evidence that ADSCs secrete a number of cytokines, growth factors, and antioxidant factors into their microenvironment, thus regulating intracellular signaling pathways in neighboring cells. In this review, we introduce the roles of ADSCs in the protection of cells by modulating inflammation and immunity, and we develop their potential therapeutic properties. 相似文献
7.
Seung Geol Choi Dennis Hofheinz Eike Kiltz Dong Hoon Lee Moti Yung 《Information Processing Letters》2009,109(16):897-901
At CRYPTO 2004, Kurosawa and Desmedt presented a new hybrid encryption scheme that is chosen-ciphertext (CCA2) secure in the standard model. Until now it was unknown if the key encapsulation part of the Kurosawa-Desmedt scheme by itself is still CCA2-secure or not. In this note we answer this question to the negative, namely we present a simple CCA2 attack on the Kurosawa-Desmedt key encapsulation mechanism. Our attack further supports the design paradigm of Kurosawa and Desmedt to build CCA2-secure hybrid encryption from weak key encapsulation. 相似文献
8.
Annette Zeller 《LWT》2009,42(3):717-1937
Various calibration strategies for the quantitation of the phenylpropane estragole by gas chromatography-mass spectrometry were developed and compared. For application in stable isotope dilution assays, two deuterium labelled estragole isotopologues were synthesized. Of these, [3′,3′-2H2]estragole was prepared by Wittig reaction of 4-methoxy-phenylacetaldehyde with [2H3]methyl-triphenyl-phosphonium bromide, whereas [1″,1″,1″-2H3]estragole was obtained by demethylation of estragole and deuteromethylation of the resulting 4-allylphenole.Besides estragole isotopologues, 1,2,4-trimethoxybenzene and 4-propylanisole were also tested as internal standards (I.S.) for the determination of estragole in fennel tea.[1″,1″,1″-2H3]Estragole, 1,2,4-trimethoxybenzene, and 4-propylanisole revealed linear calibration functions and, therefore, were suitable for estragole quantitation. In contrast to this, [3′,3′-2H2]estragole could only be applied as I.S. if it was added to the extracts in stoichiometric deficiency compared to unlabelled estragole. Moreover, due to its different chemical and physical properties, 1,2,4-trimethoxybenzene showed a recovery as low as 77%, whereas the other I.S. revealed recovery rates close to 100%. Considering the “real” values of estragole in fennel tea, the choice of the I.S. obviously is less important than the way of preparing the tea. In contrast to the common method for tea preparation, squeezing of the teabags increased the estragole content significantly by 50%. 相似文献
9.
B. Aumüller A. N. Kirkbride R. Zeller H. W. Bergmann 《Materialwissenschaft und Werkstofftechnik》1996,27(2):72-79
Process-Identification at Plasma Spraying Thermally Sensitive Materials Using an Infra-red Thermal Imaging System Nowadays so called thermally sensitive materials are deposited by thermal spray techniques. Due to the high temperature process an undesired alteration (evaporation, chemical decomposition) of the material could occur. Therefore, optimisation of the deposition based only on empirical methods may be deremental with respect to the coating properties. This study shows the potential of an IR thermal imaging technique as a process control for evaluation and optimisation of the deposition through better understanding of the thermal spray process. The spray trials presented are based on preliminary examinations carried out with diagnostic tools. Therefore it was possible to achieve defined air plasma sprayed coatings of hydroxyapatite with different coating and component properties. This is particularly of interest, since there exists only a standard for hydroxyapatite as starting material but not for plasma sprayed coatings. Hence the coatings had either high or low contents of undesired phases, different degrees of cristallinity and bond strengths-varying from 5 to 42 MPa. Besides the power levels and the way to obtain the power the carrier gas flow significantly influences the properties of the coatings. 相似文献
10.
Kräß af Ekenstam R. Trendelenburg Zeller Frey-Wyssling M. Wolf G. Becker Liese Thienhaus Graf A. Troche A. v. Wacek O. Kratky M. Lüdtke Gustav G. Klem Schulz K. Storch Müller E. Becker Klauditz K. Nising A. Nowak L. Metz Egner Fessel Thiele Kraemer Lehnartz Kaiser Tiemann B. Thunell 《Holz als Roh- und Werkstoff》1940,3(11):383-393
Ohne Zusammenfassung 相似文献