全文获取类型
收费全文 | 1492篇 |
免费 | 91篇 |
国内免费 | 3篇 |
学科分类
工业技术 | 1586篇 |
出版年
2023年 | 10篇 |
2022年 | 10篇 |
2021年 | 32篇 |
2020年 | 40篇 |
2019年 | 40篇 |
2018年 | 48篇 |
2017年 | 44篇 |
2016年 | 70篇 |
2015年 | 33篇 |
2014年 | 72篇 |
2013年 | 89篇 |
2012年 | 100篇 |
2011年 | 113篇 |
2010年 | 74篇 |
2009年 | 78篇 |
2008年 | 86篇 |
2007年 | 74篇 |
2006年 | 64篇 |
2005年 | 70篇 |
2004年 | 57篇 |
2003年 | 53篇 |
2002年 | 53篇 |
2001年 | 26篇 |
2000年 | 21篇 |
1999年 | 32篇 |
1998年 | 32篇 |
1997年 | 27篇 |
1996年 | 22篇 |
1995年 | 15篇 |
1994年 | 6篇 |
1993年 | 7篇 |
1992年 | 11篇 |
1991年 | 2篇 |
1990年 | 6篇 |
1989年 | 6篇 |
1988年 | 7篇 |
1987年 | 5篇 |
1986年 | 6篇 |
1985年 | 3篇 |
1984年 | 6篇 |
1983年 | 5篇 |
1982年 | 5篇 |
1981年 | 6篇 |
1980年 | 2篇 |
1977年 | 3篇 |
1976年 | 3篇 |
1975年 | 3篇 |
1963年 | 2篇 |
1959年 | 1篇 |
1939年 | 1篇 |
排序方式: 共有1586条查询结果,搜索用时 218 毫秒
21.
J Schramlová K Blazek B Otová M Bartácková D Hulínská 《Canadian Metallurgical Quarterly》1997,43(5):195-199
The antiphlogistic Ibuprofen incorporated in liposomes caused a decrease of the inflammatory edema induced by Carrageenan in the distal part of the rat's hind leg after both the intramuscular and percutaneous administration. The antiphlogistic effect of free Ibuprofen in the cream was weaker. Intramuscular administration of empty liposomes slowed down in the initial stages the development of inflammation and slightly diminished the size of edema. 相似文献
22.
The possible flow measurement error due to heating or cooling of exhaust gases in the Single‐Burning‐Item (SBI) test is estimated from numerical experiments. It is illustrated that there is no one‐to‐one correspondence between the velocity profile shape and the instantaneous Reynolds number, due to the time‐dependent temperature and density profile evolution in the exhaust gas pipe. A non‐ambiguous relation is found between the velocity profile shape and an ‘effective’ Reynolds number, based on the turbulent viscosity. Maximum variations of the velocity correction factors, relating the mean velocity to the velocity on the pipe axis, are found to be in the order of 2% for limiting circumstances for the SBI test. The primary effect is caused by instantaneous Reynolds number variations. The effect of heating or cooling of the flow by the hot or cold pipe is noticeable, too. The statements are proved to be valid independent of the computational grid, the turbulence model and the time steps taken to obtain the numerical solutions. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
23.
In this paper we show that finding solutions of a system of multivariate polynomial equalities and inequalities in the max algebra is equivalent to solving an Extended Linear Complementarity Problem. This allows us to find all solutions of such a system of multivariate polynomial equalities and inequalities and provides a geometrical insight in the structure of the solution set. We also demonstrate that this enables us to solve many important problems in the max algebra and the max-min-plus algebra such as matrix decompositions, construction of matrices with a given characteristic polynomial, state space transformations and the (minimal) state space realization problem.Research assistant with the N.F.W.O. (Belgian National Fund for Scientific Research).Senior research associate with the N.F.W.O. 相似文献
24.
Elena Andreeva Andrey Bogdanov Bart Mennink Bart Preneel Christian Rechberger 《International Journal of Information Security》2012,11(2):103-120
In 2007, the US National Institute for Standards and Technology (NIST) announced a call for the design of a new cryptographic
hash algorithm in response to vulnerabilities like differential attacks identified in existing hash functions, such as MD5
and SHA-1. NIST received many submissions, 51 of which got accepted to the first round. 14 candidates were left in the second
round, out of which five candidates have been recently chosen for the final round. An important criterion in the selection
process is the SHA-3 hash function security. We identify two important classes of security arguments for the new designs:
(1) the possible reductions of the hash function security to the security of its underlying building blocks and (2) arguments
against differential attack on building blocks. In this paper, we compare the state of the art provable security reductions
for the second round candidates and review arguments and bounds against classes of differential attacks. We discuss all the
SHA-3 candidates at a high functional level, analyze, and summarize the security reduction results and bounds against differential
attacks. Additionally, we generalize the well-known proof of collision resistance preservation, such that all SHA-3 candidates
with a suffix-free padding are covered. 相似文献
25.
Aleksandra Nijak Johan Saenen Alain J. Labro Dorien Schepers Bart L. Loeys Maaike Alaerts 《International journal of molecular sciences》2021,22(6)
Brugada syndrome (BrS) is an inherited cardiac arrhythmia that predisposes to ventricular fibrillation and sudden cardiac death. It originates from oligogenic alterations that affect cardiac ion channels or their accessory proteins. The main hurdle for the study of the functional effects of those variants is the need for a specific model that mimics the complex environment of human cardiomyocytes. Traditionally, animal models or transient heterologous expression systems are applied for electrophysiological investigations, each of these models having their limitations. The ability to create induced pluripotent stem cell-derived cardiomyocytes (iPSC-CMs), providing a source of human patient-specific cells, offers new opportunities in the field of cardiac disease modelling. Contemporary iPSC-CMs constitute the best possible in vitro model to study complex cardiac arrhythmia syndromes such as BrS. To date, thirteen reports on iPSC-CM models for BrS have been published and with this review we provide an overview of the current findings, with a focus on the electrophysiological parameters. We also discuss the methods that are used for cell derivation and data acquisition. In the end, we critically evaluate the knowledge gained by the use of these iPSC-CM models and discuss challenges and future perspectives for iPSC-CMs in the study of BrS and other arrhythmias. 相似文献
26.
27.
Bart Deronde Walter Debruyn Eric Gontier Erwin Goor Tim Jacobs Sara Verbeiren 《International journal of remote sensing》2014,35(7):2402-2420
Throughout the VEGETATION programme, the Flemish Institute for Technological Research (VITO) uninterruptedly hosted the prime user segment of both VEGETATION 1 and VEGETATION 2 multispectral instruments on board the Satellite Pour l’Observation de la Terre 4 (SPOT 4) and SPOT 5 satellites. Operational since the launch of SPOT 4 in March 1998, and foreseen to continue at least until the end of the SPOT 5 mission (anticipated in spring 2014), this user segment comprises a processing facility (PF), actively receiving, processing, correcting, archiving, and distributing the VEGETATION data and derived added-value products. First and foremost, the VEGETATION programme has been serving the needs of operational users – both institutional and commercial – requesting data in near-real time. However, scientific and educational users too benefited significantly, in particular from VEGETATION’s unique time series of the Earth’s land cover, and more specifically the vegetation cover. Over the years, the centralized archive houses processed data covering the equivalent of 11,000 times the Earth’s surface, and delivered more than 50 terapixels to around 10.000 users. As such, VEGETATION’s mission is a prime example of what Europe wants to achieve through the Global Monitoring for Environment and Security (GMES) initiative: truly operational services providing reliable and up-to-date information.This article describes the processing facility, the way the data and products are archived, the different dissemination channels as well as the data policy adopted and the users served. One of the recent evolutions, the development of an entirely new product distribution facility (PDF), implemented as part of the Project for On-Board Autonomy – Vegetation (PROBA-V) user segment is discussed. 相似文献
28.
The enantioselective hydrogenation of ethyl pyruvate to (S)-ethyl lactate over cinchonine- and -isocinchonine-modified Pt/Al2O3 catalysts was studied as a function of modifier concentration and reaction temperature. The maximum enantioselectivities obtained under the applied mild conditions were 89% ee using cinchonine (0.014 mmoldm–3, 1 bar H2, 23°C, 6% AcOH in toluene), and 76% ee in the case of -isocinchonine (0.14 mmoldm–3, 1 bar H2, –10°C, 6% AcOH in toluene). Since -isocinchonine of rigid structure exists only in anti-open conformation these data provide additional experimental evidence to support the former suggestion concerning the dominating role of anti-open conformation in these cinchona-modified enantioselective hydrogenations. 相似文献
29.
Symmetries in constraint problems present an opportunity for reducing search. This paper presents Lightweight Dynamic Symmetry Breaking, an automatic symmetry breaking method that is efficient enough to be used as a default, since it never yields a major slowdown while often giving major performance improvements. This is achieved by automatically exploiting certain kinds of symmetry that are common, can be compactly represented, easily and efficiently processed, automatically detected, and lead to large reductions in search. Moreover, the method is easy to implement and integrate in any constraint system. Experimental results show the method is competitive with the best symmetry breaking methods without risking poor performance. 相似文献
30.
Nikos Mavrogiannopoulos Andreas Pashalidis Bart Preneel 《International Journal of Information Security》2014,13(3):217-228
Public key Kerberos (PKINIT) is a standard authentication and key establishment protocol. Unfortunately, it suffers from a security flaw when combined with smart cards. In particular, temporary access to a user’s card enables an adversary to impersonate that user for an indefinite period of time, even after the adversary’s access to the card is revoked. In this paper, we extend Shoup’s key exchange security model to the smart card setting and examine PKINIT in this model. Using this formalization, we show that PKINIT is indeed flawed, propose a fix, and provide a proof that this fix leads to a secure protocol. 相似文献