首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1492篇
  免费   91篇
  国内免费   3篇
工业技术   1586篇
  2023年   10篇
  2022年   10篇
  2021年   32篇
  2020年   40篇
  2019年   40篇
  2018年   48篇
  2017年   44篇
  2016年   70篇
  2015年   33篇
  2014年   72篇
  2013年   89篇
  2012年   100篇
  2011年   113篇
  2010年   74篇
  2009年   78篇
  2008年   86篇
  2007年   74篇
  2006年   64篇
  2005年   70篇
  2004年   57篇
  2003年   53篇
  2002年   53篇
  2001年   26篇
  2000年   21篇
  1999年   32篇
  1998年   32篇
  1997年   27篇
  1996年   22篇
  1995年   15篇
  1994年   6篇
  1993年   7篇
  1992年   11篇
  1991年   2篇
  1990年   6篇
  1989年   6篇
  1988年   7篇
  1987年   5篇
  1986年   6篇
  1985年   3篇
  1984年   6篇
  1983年   5篇
  1982年   5篇
  1981年   6篇
  1980年   2篇
  1977年   3篇
  1976年   3篇
  1975年   3篇
  1963年   2篇
  1959年   1篇
  1939年   1篇
排序方式: 共有1586条查询结果,搜索用时 218 毫秒
21.
The antiphlogistic Ibuprofen incorporated in liposomes caused a decrease of the inflammatory edema induced by Carrageenan in the distal part of the rat's hind leg after both the intramuscular and percutaneous administration. The antiphlogistic effect of free Ibuprofen in the cream was weaker. Intramuscular administration of empty liposomes slowed down in the initial stages the development of inflammation and slightly diminished the size of edema.  相似文献   
22.
The possible flow measurement error due to heating or cooling of exhaust gases in the Single‐Burning‐Item (SBI) test is estimated from numerical experiments. It is illustrated that there is no one‐to‐one correspondence between the velocity profile shape and the instantaneous Reynolds number, due to the time‐dependent temperature and density profile evolution in the exhaust gas pipe. A non‐ambiguous relation is found between the velocity profile shape and an ‘effective’ Reynolds number, based on the turbulent viscosity. Maximum variations of the velocity correction factors, relating the mean velocity to the velocity on the pipe axis, are found to be in the order of 2% for limiting circumstances for the SBI test. The primary effect is caused by instantaneous Reynolds number variations. The effect of heating or cooling of the flow by the hot or cold pipe is noticeable, too. The statements are proved to be valid independent of the computational grid, the turbulence model and the time steps taken to obtain the numerical solutions. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
23.
In this paper we show that finding solutions of a system of multivariate polynomial equalities and inequalities in the max algebra is equivalent to solving an Extended Linear Complementarity Problem. This allows us to find all solutions of such a system of multivariate polynomial equalities and inequalities and provides a geometrical insight in the structure of the solution set. We also demonstrate that this enables us to solve many important problems in the max algebra and the max-min-plus algebra such as matrix decompositions, construction of matrices with a given characteristic polynomial, state space transformations and the (minimal) state space realization problem.Research assistant with the N.F.W.O. (Belgian National Fund for Scientific Research).Senior research associate with the N.F.W.O.  相似文献   
24.
In 2007, the US National Institute for Standards and Technology (NIST) announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities like differential attacks identified in existing hash functions, such as MD5 and SHA-1. NIST received many submissions, 51 of which got accepted to the first round. 14 candidates were left in the second round, out of which five candidates have been recently chosen for the final round. An important criterion in the selection process is the SHA-3 hash function security. We identify two important classes of security arguments for the new designs: (1) the possible reductions of the hash function security to the security of its underlying building blocks and (2) arguments against differential attack on building blocks. In this paper, we compare the state of the art provable security reductions for the second round candidates and review arguments and bounds against classes of differential attacks. We discuss all the SHA-3 candidates at a high functional level, analyze, and summarize the security reduction results and bounds against differential attacks. Additionally, we generalize the well-known proof of collision resistance preservation, such that all SHA-3 candidates with a suffix-free padding are covered.  相似文献   
25.
Brugada syndrome (BrS) is an inherited cardiac arrhythmia that predisposes to ventricular fibrillation and sudden cardiac death. It originates from oligogenic alterations that affect cardiac ion channels or their accessory proteins. The main hurdle for the study of the functional effects of those variants is the need for a specific model that mimics the complex environment of human cardiomyocytes. Traditionally, animal models or transient heterologous expression systems are applied for electrophysiological investigations, each of these models having their limitations. The ability to create induced pluripotent stem cell-derived cardiomyocytes (iPSC-CMs), providing a source of human patient-specific cells, offers new opportunities in the field of cardiac disease modelling. Contemporary iPSC-CMs constitute the best possible in vitro model to study complex cardiac arrhythmia syndromes such as BrS. To date, thirteen reports on iPSC-CM models for BrS have been published and with this review we provide an overview of the current findings, with a focus on the electrophysiological parameters. We also discuss the methods that are used for cell derivation and data acquisition. In the end, we critically evaluate the knowledge gained by the use of these iPSC-CM models and discuss challenges and future perspectives for iPSC-CMs in the study of BrS and other arrhythmias.  相似文献   
26.
27.
Throughout the VEGETATION programme, the Flemish Institute for Technological Research (VITO) uninterruptedly hosted the prime user segment of both VEGETATION 1 and VEGETATION 2 multispectral instruments on board the Satellite Pour l’Observation de la Terre 4 (SPOT 4) and SPOT 5 satellites. Operational since the launch of SPOT 4 in March 1998, and foreseen to continue at least until the end of the SPOT 5 mission (anticipated in spring 2014), this user segment comprises a processing facility (PF), actively receiving, processing, correcting, archiving, and distributing the VEGETATION data and derived added-value products. First and foremost, the VEGETATION programme has been serving the needs of operational users – both institutional and commercial – requesting data in near-real time. However, scientific and educational users too benefited significantly, in particular from VEGETATION’s unique time series of the Earth’s land cover, and more specifically the vegetation cover. Over the years, the centralized archive houses processed data covering the equivalent of 11,000 times the Earth’s surface, and delivered more than 50 terapixels to around 10.000 users. As such, VEGETATION’s mission is a prime example of what Europe wants to achieve through the Global Monitoring for Environment and Security (GMES) initiative: truly operational services providing reliable and up-to-date information.

This article describes the processing facility, the way the data and products are archived, the different dissemination channels as well as the data policy adopted and the users served. One of the recent evolutions, the development of an entirely new product distribution facility (PDF), implemented as part of the Project for On-Board Autonomy – Vegetation (PROBA-V) user segment is discussed.  相似文献   
28.
The enantioselective hydrogenation of ethyl pyruvate to (S)-ethyl lactate over cinchonine- and -isocinchonine-modified Pt/Al2O3 catalysts was studied as a function of modifier concentration and reaction temperature. The maximum enantioselectivities obtained under the applied mild conditions were 89% ee using cinchonine (0.014 mmoldm–3, 1 bar H2, 23°C, 6% AcOH in toluene), and 76% ee in the case of -isocinchonine (0.14 mmoldm–3, 1 bar H2, –10°C, 6% AcOH in toluene). Since -isocinchonine of rigid structure exists only in anti-open conformation these data provide additional experimental evidence to support the former suggestion concerning the dominating role of anti-open conformation in these cinchona-modified enantioselective hydrogenations.  相似文献   
29.
Symmetries in constraint problems present an opportunity for reducing search. This paper presents Lightweight Dynamic Symmetry Breaking, an automatic symmetry breaking method that is efficient enough to be used as a default, since it never yields a major slowdown while often giving major performance improvements. This is achieved by automatically exploiting certain kinds of symmetry that are common, can be compactly represented, easily and efficiently processed, automatically detected, and lead to large reductions in search. Moreover, the method is easy to implement and integrate in any constraint system. Experimental results show the method is competitive with the best symmetry breaking methods without risking poor performance.  相似文献   
30.
Public key Kerberos (PKINIT) is a standard authentication and key establishment protocol. Unfortunately, it suffers from a security flaw when combined with smart cards. In particular, temporary access to a user’s card enables an adversary to impersonate that user for an indefinite period of time, even after the adversary’s access to the card is revoked. In this paper, we extend Shoup’s key exchange security model to the smart card setting and examine PKINIT in this model. Using this formalization, we show that PKINIT is indeed flawed, propose a fix, and provide a proof that this fix leads to a secure protocol.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号