首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   51801篇
  免费   5230篇
  国内免费   3279篇
工业技术   60310篇
  2024年   139篇
  2023年   605篇
  2022年   1391篇
  2021年   2005篇
  2020年   1508篇
  2019年   1164篇
  2018年   1387篇
  2017年   1563篇
  2016年   1438篇
  2015年   2152篇
  2014年   2916篇
  2013年   3326篇
  2012年   4110篇
  2011年   4245篇
  2010年   3951篇
  2009年   3746篇
  2008年   3798篇
  2007年   3706篇
  2006年   3334篇
  2005年   2867篇
  2004年   2174篇
  2003年   1657篇
  2002年   1623篇
  2001年   1374篇
  2000年   1093篇
  1999年   795篇
  1998年   487篇
  1997年   368篇
  1996年   359篇
  1995年   233篇
  1994年   225篇
  1993年   125篇
  1992年   108篇
  1991年   72篇
  1990年   62篇
  1989年   61篇
  1988年   32篇
  1987年   21篇
  1986年   19篇
  1985年   9篇
  1984年   9篇
  1983年   3篇
  1982年   7篇
  1981年   4篇
  1980年   11篇
  1979年   7篇
  1975年   5篇
  1969年   3篇
  1959年   2篇
  1951年   8篇
排序方式: 共有10000条查询结果,搜索用时 120 毫秒
21.
The traditional ciphertext policy attribute-based encryption (CP-ABE) has two problems:one is that the access policy must be embedded in the ciphertext and sent, which leads to the disclosure of user爷 s privacy information, the other is that it does not support collaborative decryption, which cannot meet the actual demand of conditional collaborative decryption among multiple users. In order to deal with the above two problems at the same time, a fine-grained cooperative access control scheme with hidden policies (FCAC-HP) is proposed based on the existing CP-ABE schemes combined with blockchain technology. In FCAC-HP scheme, users are grouped by group identifier so that only users within the same group can cooperate. In the data encryption stage, the access policy is encrypted and then embedded in the ciphertext to protect the privacy information of the access policy. In the data access stage, the anonymous attribute matching technology is introduced so that only matched users can decrypt ciphertext data to improve the efficiency of the system. In this process, a smart contract is used to execute the verification algorithm to ensure the credibility of the results. In terms of security, FCAC-HP scheme is based on the prime subgroup discriminative assumption and is proved to be indistinguishable under chosen plaintext attack (CPA) by dual system encryption technology. Experimental verification and analysis show that FCAC-HP scheme improves computational efficiency while implementing complex functions.  相似文献   
22.
Incompressible dipping substrata are commonly encountered in engineering practice. Compared to horizontal underlying strata, the inclined underlying stratum increase the risk of collapse of embankments reinforced with columns because it weakens the restraint of the column base. The objective of this study is to investigate the effectiveness of geosynthetics on improving the embankment stability when the underlying stratum is inclined. The influence of geosynthetic tensile stiffness on the ultimate surcharge and failure mechanism is studied. A deep-seated failure with column tilting occurs when the geosynthetic tensile stiffness is low, whereas a lateral sliding occurs when the geosynthetic tensile stiffness is high. To illustrate the contribution of geosynthetics, the distribution of the lateral pressures acting on the columns is analyzed.  相似文献   
23.
Lithium-sulfur batteries (LSBs) are considered a promising next-generation energy storage device owing to their high theoretical energy density. However, their overall performance is limited by several critical issues such as lithium polysulfide (PS) shuttles, low sulfur utilization, and unstable Li metal anodes. Despite recent huge progress, the electrolyte/sulfur ratio (E/S) used is usually very high (≥20 µL mg−1), which greatly reduces the practical energy density of devices. To push forward LSBs from the lab to the industry, considerable attention is devoted to reducing E/S while ensuring the electrochemical performance. To date, however, few reviews have comprehensively elucidated the possible strategies to achieve that purpose. In this review, recent advances in low E/S cathodes and anodes based on the issues resulting from low E/S and the corresponding solutions are summarized. These will be beneficial for a systematic understanding of the rational design ideas and research trends of low E/S LSBs. In particular, three strategies are proposed for cathodes: preventing PS formation/aggregation to avoid inadequate dissolution, designing multifunctional macroporous networks to address incomplete infiltration, and utilizing an imprison strategy to relieve the adsorption dependence on specific surface area. Finally, the challenges and future prospects for low E/S LSBs are discussed.  相似文献   
24.
Ni2+ modified MgTa2O6 ceramics with a trirutile phase and space group P42/mnm were obtained. The correlations between crystallographic characteristics and microwave dielectric performance of MgTa2O6 ceramics were systematically studied based on the chemistry bond theory (PVL theory) for the first time. The results indicate that the introduction of Ni2+ causes a change in polarizability and the Mg–O bond ionicity, which contributes to the variation of dielectric constant. Moreover, the lattice energy, and packing fraction, full width at half maximum of the Raman peak of Ta–O bond, as the quantitative characterization of crystallographic parameters, regulate the dielectric loss of MgTa2O6 ceramics in GHz frequency band. In addition, the study of sintering behavior shows that the densification and micromorphology are the crucial factors affecting the microwave dielectric performance. Typically, Ni2+ doping on the A-site of MgTa2O6 can effectively promote the Q × f values to 173,000 GHz (at 7.43 GHz), which ensures its applicability in 5G communication technology.  相似文献   
25.
针对基于容积脉搏波(PPG)提取运动心率时,传统心率提取算法由于运动噪声干扰使测量结果误差大、实时性不好的问题,提出一种抗运动干扰的实时心率提取方法。该方法通过实时小波去噪,同时结合三轴加速度信号(ACC)对运动进行分类训练,计算各运动状态心率增益,对实时心率值进行补偿。实验结果表明,通过与同时采集的ECG信号计算出的实时心率进行对比,绝对误差率仅为1.2%左右。相比传统心率提取算法,该算法具有抗干扰性强,实时准确的特点。  相似文献   
26.
In this article, adaptive compensation designs are developed for nonlinear systems with uncertainties from the system functions and persistent actuator failures of characterizations that (i) some unknown system inputs are stuck at some unknown fixed or varying values at unknown time instants and (ii) the failure pattern always switches from one to another and the switching does not stop. Such a controlled plant is described by an uncertain time-varying nonlinear system, and some robust adaptive feedback linearization based failure compensation results are studied for closed-loop system stabilization and bounded output tracking for some specific conditions. To improve the tracking performance in the presence of persistent actuator failures, a new adaptive control scheme is developed, using the failure indicator function which contains the failure pattern and failure time in the formulation. Detailed stability and tracking performance are shown. Simulation results are shown to verify the effectiveness of the proposed adaptive actuator failure compensation method.  相似文献   
27.
Neutrophils readily infiltrate infection foci, phagocytose and usually destroy microbes. In tuberculosis (TB), a chronic pulmonary infection caused by Mycobacterium tuberculosis (Mtb), neutrophils harbor bacilli, are abundant in tissue lesions, and their abundances in blood correlate with poor disease outcomes in patients. The biology of these innate immune cells in TB is complex. Neutrophils have been assigned host-beneficial as well as deleterious roles. The short lifespan of neutrophils purified from blood poses challenges to cell biology studies, leaving intracellular biological processes and the precise consequences of Mtb–neutrophil interactions ill-defined. The phenotypic heterogeneity of neutrophils, and their propensity to engage in cellular cross-talk and to exert various functions during homeostasis and disease, have recently been reported, and such observations are newly emerging in TB. Here, we review the interactions of neutrophils with Mtb, including subcellular events and cell fate upon infection, and summarize the cross-talks between neutrophils and lung-residing and -recruited cells. We highlight the roles of neutrophils in TB pathophysiology, discussing recent findings from distinct models of pulmonary TB, and emphasize technical advances that could facilitate the discovery of novel neutrophil-related disease mechanisms and enrich our knowledge of TB pathogenesis.  相似文献   
28.
In this paper, we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme, which was found insecure under two kinds of attacks, fake entangled particles attack and disentanglement attack. Then, by changing the party of the preparation of cluster states and using unitary operations, we present an improved protocol which can avoid these two kinds of attacks. Moreover, the protocol is proposed using the three-qubit partially entangled set of states. It is more efficient by only using three particles rather than four or even more to transmit one bit secret information. Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource, it makes this protocol more convenient from an applied point of view.  相似文献   
29.
Basins with various mineral resources coexisting and enriching often occupy an important strategic position. The exploration of various mineral resources is repetitive at present due to unshared data and imperfect management mechanism. This situation greatly increases the cost of energy exploitation in the country. Traditional data-sharing mode has several disadvantages, such as high cost, difficulty in confirming the right of data, and lack of incentive mechanism, which make achieving real data sharing difficult. In this paper, we propose a data-sharing mechanism based on blockchain and provide implementation suggestions and technical key points. Compared with traditional data-sharing methods, the proposed data-sharing mechanism can realize data sharing, ensure data quality, and protect intellectual property. Moreover, key points in the construction are stated in the case study section to verify the feasibility of the data-sharing system based on blockchain proposed in this paper.  相似文献   
30.
This article theoretically and empirically analyzes backtesting portfolio value-at-risk (VaR) with estimation risk in an intrinsically multi-variate framework. It particularly takes into account the estimation of portfolio weights in forecasting portfolio VaR and its impact on backtesting. It shows that the estimation risk from estimating portfolio weights and that from estimating the multi-variate dynamic model make the existing methods in a univariate framework inapplicable. It proposes a general theory to quantify estimation risk applicable to the present problem and suggests practitioners a simple but effective way to implement valid inference to overcome the effect of estimation risk in backtesting portfolio VaR. In particular, we apply our theory to the efficient mean-variance-skewness portfolio for a multi-variate generalized autoregressive conditional heteroscedasticity model with multi-variate general hyperbolic distributed innovations. Some Monte Carlo simulations and an empirical application demonstrate the merits of our method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号