全文获取类型
收费全文 | 295篇 |
免费 | 50篇 |
国内免费 | 4篇 |
专业分类
化学 | 51篇 |
力学 | 1篇 |
综合类 | 25篇 |
数学 | 55篇 |
物理学 | 8篇 |
无线电 | 209篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2022年 | 10篇 |
2021年 | 17篇 |
2020年 | 17篇 |
2019年 | 14篇 |
2018年 | 7篇 |
2017年 | 12篇 |
2016年 | 12篇 |
2015年 | 9篇 |
2014年 | 22篇 |
2013年 | 22篇 |
2012年 | 31篇 |
2011年 | 27篇 |
2010年 | 36篇 |
2009年 | 19篇 |
2008年 | 13篇 |
2007年 | 17篇 |
2006年 | 24篇 |
2005年 | 8篇 |
2004年 | 5篇 |
2003年 | 3篇 |
2002年 | 7篇 |
2000年 | 4篇 |
1999年 | 2篇 |
1998年 | 2篇 |
1996年 | 3篇 |
1995年 | 1篇 |
1993年 | 1篇 |
1984年 | 1篇 |
排序方式: 共有349条查询结果,搜索用时 15 毫秒
41.
K. Krawielitzki T. Zebrowska R. Schadereit J. Kowalczyk F. Kreienbring 《Isotopes in environmental and health studies》2013,49(1-2):157-162
Abstract Three female pigs (LW~30 kg) were fitted with re-entrant cannulas in the duodenum and the ileum and with bladder catheters. Animal No. 1 was labelled by continuous infusion of [15N]leucine via a catheter into the vena jugularis. After reaching a steady state in the level of endogenous N (4–5 d after beginning of the infusion) the digesta of the labelled animal No. 1 and the two unlabelled animals were exchanged in a 3 day experiment. During this time the course of transit rates of digesta, digesta N and 15N through duodenum and ileum as well as the proportion of endogenous N: exogenous N were estimated. Using these data it was possible to calculate the secretion and absorption rates of endogenous and exogenous N in the three segments of the digestive tract: mouth-duodenum, duodenum-ileum, ileum-anus and in addition the reabsorption (intestinal recycling) of the endogenous N during its passage through the gut could be computed. 相似文献
42.
43.
随着计算机及网络技术的日趋成熟,全面解决计算机安全问题的要求就显得十分迫切。本文首先分析了已有的可信计算在解决计算机安全问题方面提供的一些手段,并指出其中存在的不足。之后提出保护计算的概念,具体阐述其机制和原理,最后论述保护计算作为一种对于可信计算的补充和完善对于解决现有计算机安全问题的所能提供的更优越的方案。 相似文献
44.
45.
46.
47.
随着网络规模的增长,对网络进行精细化管控变得尤为重要。在下一代互联网中将用户可信身份嵌入 IPv6 地址后缀形成可信地址,能够进一步提高网络行为的可追溯性。目前已有研究基于 Portal 认证配合DHCPv6将用户的身份信息嵌入用户终端的IPv6地址中,但是为了分配可信地址而改动的DHCPv6过程造成了机制对用户终端不透明,无法大规模部署。提出了一种面向Portal认证的IPv6可信地址分配机制,通过服务器信令交互配合软件定义网络(SDN)技术实现IPv6可信地址的间接分配,而且与地址分配方式无关。最后,实现了一个原型系统并在江苏南京电信现网机房评估了其可行性和性能,结果表明此机制在对终端透明的情况下仅带来很少的额外开销。 相似文献
48.
Jin Yang Linjiang Song Meiling Shen Xinyu Gou Liping Bai Li Wang Wenli Zhang Qinjie Wu Changyang Gong 《Advanced functional materials》2021,31(37):2104423
Targeting apoptotic pathways in tumor cells is recognized as a potent anticancer strategy. However, monotherapies that target a single apoptotic pathway often do not meet expectations and the nonspecific and uncontrolled activation of apoptotic pathways can overshadow potential application prospects. Here, a novel tumor-microenvironment-activated nano-artificial virus (TMAN) with hierarchically responsive capacity is fabricated and loaded with the plasmid encoding tumor necrosis factor-related apoptosis-inducing ligand (TRAIL) and mitochondria-targeted red fluorescent phototoxic protein (KillerRed) simultaneously for precise and controllable exogenous and endogenous apoptosis coactivation. The inert TMAN is endowed with in vivo longevity and undergoes orderly acidity-triggered deshielding of a masking layer, enzyme-responsive charge-reversal, and oxidative stress-sensitive structural fragmentation in the tumor extra/intracellular microenvironment to exert precise tumor recognition, deep penetration, cellular internalization, rapid endosomes escape, and effective gene release ability, leading to the effective and tumor-specific delivery of payloads. Given the virtues of TMAN, a favorable collaboration of TRAIL-triggered exogenous apoptosis and mitochondria-targeted KillerRed induced endogenous apoptosis is achieved synchronously under the control of light irradiation, thus remarkably improving antitumor efficacy with minimal toxicity. Taken together, this strategy highlights the significance of exogenous and endogenous apoptosis coactivation in cancer treatments and offers a promising paradigm for precise exo/endogenous dual-augmented antitumor therapy. 相似文献
49.
In the greenhouse environment,the concentration of nutrient solution was always ignored.At the same time,the core node coordinator of the ZigBee wireless monitoring system was easily compromised.A trusted solution monitoring system based on ZigBee wireless sensor network was designed and implemented.Firstly the hardware structure of sensor,router and coordinator was introduced.Then the processes of external voltage measurement and data cleaning were illustrated.For realizing the trusted boot of the coordinator,trusted u-boot to measure the integrity of some key files was designed.Experimental results show that the solution concentration data could be sent from each node to the monitoring computer and the remote terminal.At the same time,the trusted module of the coordinator can detect the captured coordinator node and warning.Therefore,the designed system has strong function and security. 相似文献
50.
考察内生网络环境下局中人之间的局部策略互动, 网络中的局中人只与直接邻居进行协同对策. 网络生成的过程中, 建立连接的费用是异质的~(具有两种水平), 与采取有效行动的局中人建立连接时执行高水平费用, 与采取风险占优行动的局中人建立连接时执行低水平费用. 在异质连接费用的情形下, 首次较为完整地给出了均衡网络的结构特性和局中人的行动选择, 并分析了费用参数对均衡结果的影响. 相似文献