首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20471篇
  免费   2443篇
  国内免费   1797篇
电工技术   2169篇
技术理论   5篇
综合类   2097篇
化学工业   313篇
金属工艺   34篇
机械仪表   325篇
建筑科学   906篇
矿业工程   497篇
能源动力   328篇
轻工业   333篇
水利工程   400篇
石油天然气   150篇
武器工业   100篇
无线电   4372篇
一般工业技术   462篇
冶金工业   215篇
原子能技术   44篇
自动化技术   11961篇
  2024年   52篇
  2023年   243篇
  2022年   450篇
  2021年   622篇
  2020年   642篇
  2019年   461篇
  2018年   403篇
  2017年   549篇
  2016年   618篇
  2015年   710篇
  2014年   1906篇
  2013年   1445篇
  2012年   1937篇
  2011年   2110篇
  2010年   1544篇
  2009年   1564篇
  2008年   1586篇
  2007年   1730篇
  2006年   1459篇
  2005年   1224篇
  2004年   952篇
  2003年   844篇
  2002年   508篇
  2001年   351篇
  2000年   253篇
  1999年   133篇
  1998年   86篇
  1997年   53篇
  1996年   48篇
  1995年   29篇
  1994年   27篇
  1993年   16篇
  1992年   19篇
  1991年   11篇
  1990年   9篇
  1989年   9篇
  1988年   6篇
  1987年   5篇
  1986年   5篇
  1985年   23篇
  1984年   20篇
  1983年   16篇
  1982年   12篇
  1981年   5篇
  1980年   3篇
  1979年   3篇
  1958年   1篇
  1957年   1篇
  1956年   1篇
  1955年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
11.
ABSTRACT

The purpose of this study was to examine the influence of trust variables (trust: competence, trust: benevolence, trust: integrity) on leadership regarding the organization’s information security policy (ISP) compliance. An instrument with four constructs was used to collect data from 474 non-management subjects from various organizations in the USA. Collected data were analyzed through multiple regression procedure. Results revealed that all trust variables (trust: competence, trust: benevolence, trust: integrity) were influential in predicting the leadership regarding the organization’s ISP compliance. The findings are discussed and implications for practice are outlined. Conclusion, limitations, and recommendations for future research are drawn.  相似文献   
12.
肖凯  王蒙  唐新余  蒋同海 《计算机应用》2019,39(7):2156-2161
在现有的时间银行系统中,时间币的发行功能和结算功能完全集中到一个中心节点上。这种极度中心化的功能结构,不仅存在容易发生中心节点单点失效、数据容易被篡改等信息安全问题,还存在着时间币的发行和流通缺乏透明度以及时间币的结算依赖中心化的结算机构等问题。针对这些问题,提出了一种基于区块链技术的解决方法。首先,将时间币的发行功能和结算功能从中心节点上分离出来;然后,利用具有分布式去中心化、集体维护和不可篡改等特性的区块链技术,将分离出来的发行功能逐步去中心化,将分离出来的结算功能去中心化,形成公益时间链(PWTB);最终,PWTB利用区块链技术以去中心化的方式将时间银行系统由单个节点维护账本变成由集体维护一个分布式的共享账本,使时间币的发行和流通公开透明,时间币的结算不依赖某个中心化的节点。安全分析表明所设计的PWTB能够实现安全的信息传输与存储,以及数据的共享。  相似文献   
13.
田康  王延荣  许冉 《水利水电技术》2018,49(12):118-125
针对我国水资源紧缺、水生态损害、水环境污染等相关水问题,以提升全民爱水惜水节水护水的意识和能力为目标,从水素养概念出发,通过扎根理论质性研究方法对公民水素养评价的表征因素进行筛选和提炼,最终得出包含水知识、水态度、水行为为主范畴的10个表征因素并运用解释结构模型(ISM)深入剖析各因素之间的内在联系。在此基础上建立了3级多层次递阶结构模型,进一步精确描述系统各要素两两之间的直接关系。结果表明:公民水素养评价的表征因素自上而下形成了表象层、中间层和根源层等3个层级,可直观、清晰地反映表征因素之间的递阶、层级关系;水态度在各表征因素中具有调节作用以及各表征因素之间存在内在逻辑关系。研究成果为提高公民水素养水平提供一定的科学依据和政策参考。  相似文献   
14.
Host cardinality estimation is an important research field in network management and network security. The host cardinality estimation algorithm based on the linear estimator array is a common method. Existing algorithms do not take memory footprint into account when selecting the number of estimators used by each host. This paper analyzes the relationship between memory occupancy and estimation accuracy and compares the effects of different parameters on algorithm accuracy. The cardinality estimating algorithm is a kind of random algorithm, and there is a deviation between the estimated results and the actual cardinalities. The deviation is affected by some systematical factors, such as the random parameters inherent in linear estimator and the random functions used to map a host to different linear estimators. These random factors cannot be reduced by merging multiple estimators, and existing algorithms cannot remove the deviation caused by such factors. In this paper, we regard the estimation deviation as a random variable and proposed a sampling method, recorded as the linear estimator array step sampling algorithm (L2S), to reduce the influence of the random deviation. L2S improves the accuracy of the estimated cardinalities by evaluating and remove the expected value of random deviation. The cardinality estimation algorithm based on the estimator array is a computationally intensive algorithm, which takes a lot of time when processing high-speed network data in a serial environment. To solve this problem, a method is proposed to port the cardinality estimating algorithm based on the estimator array to the Graphics Processing Unit (GPU). Experiments on real-world highspeed network traffic show that L2S can reduce the absolute bias by more than 22% on average, and the extra time is less than 61 milliseconds on average.  相似文献   
15.
分析了国内外物联网安全政策、技术、标准、产业等形势,重点强调了当前我国物联网发展中存在的安全风险,包括大连接环境下的设备风险、物联网网络本身安全风险以及物联网上承载的各类应用安全风险,提出了打造以密码为核心的物联网安全体系,加速新技术在物联网安全的应用,以新基建为契机建立物联网领域安全设备泛在化部署新体系,以多层次立体式理念确保物联网安全,呼吁供给侧需求侧建立安全协同新机制,共同促进物联网产业安全可持续发展。  相似文献   
16.
由于我台倒班方式,造成了技术管理分散,不利于人才的培养和电台健康的发展。为进一步提高电台安全播出管理水平,推进电台的自动化建设,充分利用现代化手段,对中控机房进行了改造。新模式的成功实施,能极大地提高我台安全传输发射水平。  相似文献   
17.
Ways of increasing the production of wheat, the most widely grown cereal crop, will need to be found to meet the increasing demand caused by human population growth in the coming decades. This increase must occur despite the decrease in yield gains now being reported in some regions, increased price volatility and the expected increase in the frequency of adverse weather events that can reduce yields. However, if and how the frequency of adverse weather events will change over Europe, the most important wheat-growing area, has not yet been analysed. Here, we show that the accumulated probability of 11 adverse weather events with the potential to significantly reduce yield will increase markedly across all of Europe. We found that by the end of the century, the exposure of the key European wheat-growing areas, where most wheat production is currently concentrated, may increase more than twofold. However, if we consider the entire arable land area of Europe, a greater than threefold increase in risk was predicted. Therefore, shifting wheat production to new producing regions to reduce the risk might not be possible as the risk of adverse events beyond the key wheat-growing areas increases even more. Furthermore, we found a marked increase in wheat exposure to high temperatures, severe droughts and field inaccessibility compared with other types of adverse events. Our results also showed the limitations of some of the presently debated adaptation options and demonstrated the need for development of region-specific strategies. Other regions of the world could be affected by adverse weather events in the future in a way different from that considered here for Europe. This observation emphasizes the importance of conducting similar analyses for other major wheat regions.  相似文献   
18.
This article sounds the alarm that a significant build-out of efficient lighting and renewable energy technologies may be endangered by shortages of rare earths and rare earth permanent magnets. At the moment, China is the predominant supplier of both and its recent rare earth industrial policies combined with its own growing demand for rare earths have caused widespread concern. To diversify supplies, new mining—outside of China—is needed. But what many observers of the “rare earth problem” overlook is that China also dominates in (1) the processing of rare earths, particularly the less abundant heavy rare earths, and (2) the supply chains for permanent magnets. Heavy rare earths and permanent magnets are critical for many renewable energy technologies, and it will require decades to develop new non-Chinese deposits, processing capacity, and supply chains. This article clarifies several misconceptions, evaluates frequently proposed solutions, and urges policy makers outside of China to undertake measures to avert a crisis, such as greater support for research and development and for the cultivation of intellectual capital.  相似文献   
19.
20.
随着大数据和云计算的技术的深入应用,人工智能时代的机器学习和深度学习更需要日益增长的数据,因此数据安全与隐私保护变得更加迫切。本文介绍人工智能的定义以及特征,探究数据安全和隐私保护现状,分析数据安全和隐私保护面临的诸多问题,并提出在人工智能时代对数据安全和隐私保护的措施。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号