首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3067篇
  免费   135篇
工业技术   3202篇
  2023年   15篇
  2022年   17篇
  2021年   86篇
  2020年   32篇
  2019年   40篇
  2018年   61篇
  2017年   74篇
  2016年   70篇
  2015年   64篇
  2014年   96篇
  2013年   143篇
  2012年   155篇
  2011年   173篇
  2010年   140篇
  2009年   132篇
  2008年   145篇
  2007年   127篇
  2006年   141篇
  2005年   109篇
  2004年   116篇
  2003年   110篇
  2002年   69篇
  2001年   53篇
  2000年   39篇
  1999年   56篇
  1998年   142篇
  1997年   84篇
  1996年   76篇
  1995年   46篇
  1994年   50篇
  1993年   58篇
  1992年   32篇
  1991年   27篇
  1990年   19篇
  1989年   17篇
  1988年   22篇
  1987年   22篇
  1986年   27篇
  1985年   28篇
  1984年   24篇
  1983年   19篇
  1982年   17篇
  1981年   26篇
  1980年   21篇
  1979年   21篇
  1977年   18篇
  1976年   33篇
  1975年   17篇
  1974年   13篇
  1973年   17篇
排序方式: 共有3202条查询结果,搜索用时 312 毫秒
81.
We consider cryptographic and physical zero-knowledge proof schemes for Sudoku, a popular combinatorial puzzle. We discuss methods that allow one party, the prover, to convince another party, the verifier, that the prover has solved a Sudoku puzzle, without revealing the solution to the verifier. The question of interest is how a prover can show: (i) that there is a solution to the given puzzle, and (ii) that he knows the solution, while not giving away any information about the solution to the verifier. In this paper we consider several protocols that achieve these goals. Broadly speaking, the protocols are either cryptographic or physical. By a cryptographic protocol we mean one in the usual model found in the foundations of cryptography literature. In this model, two machines exchange messages, and the security of the protocol relies on computational hardness. By a physical protocol we mean one that is implementable by humans using common objects, and preferably without the aid of computers. In particular, our physical protocols utilize items such as scratch-off cards, similar to those used in lotteries, or even just simple playing cards. The cryptographic protocols are direct and efficient, and do not involve a reduction to other problems. The physical protocols are meant to be understood by “lay-people” and implementable without the use of computers. Research of R. Gradwohl was supported by US-Israel Binational Science Foundation Grant 2002246. Research of M. Naor was supported in part by a grant from the Israel Science Foundation. Research of B. Pinkas was supported in part by the Israel Science Foundation (grant number 860/06). Research of G.N. Rothblum was supported by NSF grant CNS-0430450 and NSF grant CFF-0635297.  相似文献   
82.
The aim of this study was to reproduce the delayed (secondary) cerebral energy failure previously described in birth-asphyxiated newborn infants and to investigate relationships between primary insult severity and the extent of the delayed energy failure. Phosphorus (31P) magnetic resonance spectroscopy (MRS) at 7 T was used to study the brains of 12 newborn piglets during an acute, reversible, cerebral hypoxic-ischemic episode which continued until nucleotide triphosphates (NTP) were depleted. After reperfusion and reoxygenation, spectroscopy was continued for 48 h. High-energy metabolite concentrations returned to near normal levels after the insult, but later they fell as delayed energy failure developed. The time integral of NTP depletion in the primary insult correlated strongly with the minimum [phosphocreatine (PCr)]/[inorganic orthophosphate (Pi)] observed 24–48 h after the insult. (Linear regression analysis gave slope –8.04 h–1; ordinate intercept=1.23;r=0.92;P<0.0001.) This model is currently being used to investigate the therapeutic potential of various cerebroprotective strategies including hypothermia.  相似文献   
83.
The dynamics of the erbium doped fiber laser is analysed both experimentally and theoretically. This laser operates spontaneously in self-pulsing, in sinusoidal or in CW regime. Experiments have allowed to determine the control parameters : the cavity losses, the pumping rate and the ion pairs concentration. An antiphase dynamics is observed when the laser operates simultaneously at 1.55 µn and 1.536 µm. The self-pulsing behavior is attributed to a fast energy transfer which occurs between two neighboring ions (pair induced quenching). A simple model considering the active medium as a mixture of isolated ions and ions pairs is developped and leads to a good qualitative agreement with the experimental results.  相似文献   
84.
The goal of this paper is twofold : at first, to present the stochastic timed Pétri nets model by emphasizing its ability to express the main characteristics of real time distributed systems (parallelism, synchronization by message exchange, time attributes and in particular time constraints) and to allow both qualitative and quantitative analysis (concept of randomized states graph); second, to show a modeling methodology based on this model that allows a rigorous modeling of theDqdb protocol (Qa access, bwb mechanism role,Pa access influence). A new contribution to theQa mechanism has been done (1).  相似文献   
85.
86.
There is an increasing demand for the development of a simple Si‐based universal memory device at the nanoscale that operates at high frequencies. Spin‐electronics (spintronics) can, in principle, increase the efficiency of devices and allow them to operate at high frequencies. A primary challenge for reducing the dimensions of spintronic devices is the requirement for high spin currents. To overcome this problem, a new approach is presented that uses helical chiral molecules exhibiting spin‐selective electron transport, which is called the chiral‐induced spin selectivity (CISS) effect. Using the CISS effect, the active memory device is miniaturized for the first time from the micrometer scale to 30 nm in size, and this device presents memristor‐like nonlinear logic operation at low voltages under ambient conditions and room temperature. A single nanoparticle, along with Au contacts and chiral molecules, is sufficient to function as a memory device. A single ferromagnetic nanoplatelet is used as a fixed hard magnet combined with Au contacts in which the gold contacts act as soft magnets due to the adsorbed chiral molecules.  相似文献   
87.
Nano Research - The engineering of self-organized plasmonic metasurfaces is demonstrated using a maskless technique with defocused ion-beam sputtering and kinetically controlled deposition. The...  相似文献   
88.
The use of colloidal quantum dots (CQDs) as a gain medium in infrared laser devices has been underpinned by the need for high pumping intensities, very short gain lifetimes, and low gain coefficients. Here, PbS/PbSSe core/alloyed-shell CQDs are employed as an infrared gain medium that results in highly suppressed Auger recombination with a lifetime of 485 ps, lowering the amplified spontaneous emission (ASE) threshold down to 300 µJ cm−2, and showing a record high net modal gain coefficient of 2180 cm−1. By doping these engineered core/shell CQDs up to nearly filling the first excited state, a significant reduction of optical gain threshold is demonstrated, measured by transient absorption, to an average-exciton population-per-dot 〈Nthg of 0.45 due to bleaching of the ground state absorption. This in turn have led to a fivefold reduction in ASE threshold at 〈NthASE = 0.70 excitons-per-dot, associated with a gain lifetime of 280 ps. Finally, these heterostructured QDs are used to achieve near-infrared lasing at 1670 nm at a pump fluences corresponding to sub-single-exciton-per-dot threshold (〈NthLas = 0.87). This work brings infrared CQD lasing thresholds on par to their visible counterparts, and paves the way toward solution-processed infrared laser diodes.  相似文献   
89.
The concept of risk, in relation to human health, is a topic of primary interest for occupational health professionals. A new legislation recently established in Italy (626/94) according to European Community directives in the field of Preventive Medicine, called attention to this topic, and in particular to risk assessment and evaluation. Motivated by this context and by the impression that the concept of risk is frequently misunderstood, the present paper has two aims: the identification of the different meanings of the term "risk" in the new Italian legislation and the critical discussion of some commonly used definitions; and the proposal of a general definition, with the specification of a mathematical expression for quantitative risk estimation. The term risk (and risk estimation, assessment, or evaluation) has mainly referred to three different contexts: hazard identification, exposure assessment, and adverse health effects occurrence. Unfortunately, there are contexts in the legislation in which it is difficult to identify the true meaning of the term. This might cause equivocal interpretations and erroneous applications of the law because hazard evaluation, exposure assessment, and adverse health effects identification are completely different topics that require integrated but distinct approaches to risk management. As far as a quantitative definition of risk is of concern, we suggest an algorithm which connects the three basic risk elements (hazard, exposure, adverse health effects) by means of their probabilities of occurrence: the probability of being exposed (to a definite dose) given that a specific hazard is present (Pr(e[symbol: see text]p)), and the probability of occurrence of an adverse health effect as a consequence of that exposure (Pr(d[symbol: see text]e)). Using these quantitative components, risk can be defined as a sequence of measurable events that starts with hazard identification and terminates with disease occurrence; therefore, the following formal definition of risk is proposed: the probability of occurrence, in a given period of time, of an adverse health effect as a consequence of the existence of an hazard. In formula: R(d[symbol: see text]p) = Pr(e[symbol: see text]p) x Pr(d[symbol: see text]e). While Pr(e[symbol: see text]p) (exposure given hazard) must be evaluated in the situation under study, two alternatives exist for the estimation of the occurrence of adverse health effects (Pr(d[symbol: see text]e)): a "direct" estimation of the damage (Pr(d[symbol: see text]e) through formal epidemiologic studies conducted in the situation under observation; and an "indirect" estimation of Pr(d[symbol: see text]e) using information taken from the scientific literature (epidemiologic evaluations, dose-response relationships, extrapolations, ...). Both conditions are presented along with their respective advantages, disadvantages, and uncertainties. The usefulness of the proposed algorithm is discussed with respect to commonly used applications of risk assessment in occupational medicine; the relevance of time for risk estimation (both in the term of duration of observation, duration of exposure, and latency of effect) is briefly explained; and how the proposed algorithm takes into account (in terms of prevention and public health) both the etiologic relevance of the exposure and the consequences of exposure removal is highlighted. As a last comment, it is suggested that the diffuse application of good work practices (technical, behavioral, organizational, ...), or the exhaustive use of check lists, can be relevant in terms of improvement of prevention efficacy, but does not represent any quantitative procedure of risk assessment which, in any circumstance, must be considered the elective approach to adverse health effect prevention.  相似文献   
90.
We address the problem of contour inference from partial data, as obtained from state-of-the-art edge detectors.We argue that in order to obtain more pereeptually salient contours, it is necessary to impose generic constraints such as continuity and co-curvilinearity.The implementation is in the form of a convolution with a mask which encodes both the orientation and the strength of the possible continuations. We first show how the mask, called the Extension field is derived, then how the contributions from different sites are collected to produce a saliency map.We show that the scheme can handle a variety of input data, from dot patterns to oriented edgels in a unified manner, and demonstrate results on a variety of input stimuli.We also present a similar approach to the problem of inferring contours formed by end points. In both cases, the scheme is non-linear, non iterative, and unified in the sense that all types of input tokens are handled in the same manner.This research was supported by the Advanced Research Projects Agency of the Department of Defense and was monitored by the Air Force Office of Scientific Research under Contract No. F49620-90-C-0078, and by a NSF Grant under award No. IRI-9024369. The United States Government is authorized to reproduce and distribute reprints for governmental purposes notwithstanding any copyright notation hereon.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号