首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11978篇
  免费   863篇
  国内免费   809篇
电工技术   263篇
技术理论   1篇
综合类   800篇
化学工业   136篇
金属工艺   118篇
机械仪表   657篇
建筑科学   651篇
矿业工程   197篇
能源动力   81篇
轻工业   102篇
水利工程   103篇
石油天然气   75篇
武器工业   95篇
无线电   1537篇
一般工业技术   408篇
冶金工业   290篇
原子能技术   30篇
自动化技术   8106篇
  2024年   9篇
  2023年   84篇
  2022年   157篇
  2021年   215篇
  2020年   202篇
  2019年   168篇
  2018年   181篇
  2017年   238篇
  2016年   322篇
  2015年   283篇
  2014年   722篇
  2013年   588篇
  2012年   736篇
  2011年   1053篇
  2010年   729篇
  2009年   701篇
  2008年   886篇
  2007年   920篇
  2006年   940篇
  2005年   755篇
  2004年   665篇
  2003年   673篇
  2002年   522篇
  2001年   405篇
  2000年   300篇
  1999年   258篇
  1998年   200篇
  1997年   137篇
  1996年   108篇
  1995年   111篇
  1994年   55篇
  1993年   43篇
  1992年   35篇
  1991年   35篇
  1990年   19篇
  1989年   26篇
  1988年   15篇
  1987年   12篇
  1986年   17篇
  1985年   30篇
  1984年   17篇
  1983年   14篇
  1982年   9篇
  1981年   17篇
  1980年   10篇
  1979年   8篇
  1977年   5篇
  1976年   4篇
  1975年   4篇
  1973年   3篇
排序方式: 共有10000条查询结果,搜索用时 21 毫秒
1.
文猛  张释如 《包装工程》2022,43(21):162-168
目的 为了解决目前三维数据隐藏算法不能兼顾无失真和盲提取的问题,提出一种新的完全无失真的三维网格模型数据隐藏盲算法。方法 首先使用混沌逻辑映射选择嵌入与提取模式,保证数据的安全性。然后利用面元素重排,完全不会造成三维模型失真的性质,通过不同嵌入模式规则对三角面元素进行重排,以嵌入秘密数据。接收端则可根据相应的提取模式规则提取秘密数据。结果 仿真结果与分析表明,该算法不会对三维模型造成任何失真,嵌入容量为每顶点2比特,且能抵抗仿射变换攻击、噪声攻击和平滑攻击等。结论 这种三维数据隐藏盲算法无失真,容量大、安全性高、鲁棒性强,适用于三维载体不容修改的情形,如军事、医学、秘密通信和版权保护等。  相似文献   
2.
《工程爆破》2022,(4):78-84
介绍了在包头市某工程实施管道穿越黄河施工中,采用爆破法处理卡钻的经验。针对深水环境条件及钻杆内径小不宜采用集团装药的条件,确定采用"小直径爆破筒,钻杆内部装药"的爆破方案,阐述了爆破设计及施工注意事项。可供类似工程参考。  相似文献   
3.
4.
Sorting-based reversible data hiding (RDH) methods like pixel-value-ordering (PVO) can predict pixel values accurately and achieve an extremely low distortion on the embedded image. However, the excellent performance of these methods was not well explained in previous works, and there are unexploited common points among them. In this paper, we propose a general multi-predictor (GMP) framework to summarize PVO-based RDH methods and explain their high prediction accuracy. Moreover, by utilizing the proposed GMP framework, a more efficient sorting-based RDH method is given as an example to show the generality and applicability of our framework. Comparing with other PVO-based methods, the proposed example method can achieve significant improvement in embedding performance. It is hopeful that more efficient sorting-based RDH algorithms can be designed according to our proposed framework by designing better predictors and their combination methods.  相似文献   
5.
We conceptualized security-related stress (SRS) and proposed a theoretical model linking SRS, discrete emotions, coping response, and information security policy (ISP) compliance. We used an experience sampling design, wherein 138 professionals completed surveys. We observed that SRS had a positive association with frustration and fatigue, and these negative emotions were associated with neutralization of ISP violations. Additionally, frustration and fatigue make employees more likely to follow through on their rationalizations of ISP violations by decreased ISP compliance. Our findings provide evidence that neutralization is not a completely stable phenomenon but can vary within individuals from one time point to another.  相似文献   
6.
The Curriculum Vitae (CV, also referred to as “résumé”) is an established representation of a person's academic and professional history. A typical CV is comprised of multiple sections associated with spatio‐temporal, nominal, hierarchical, and ordinal data. The main task of a recruiter is, given a job application with specific requirements, to compare and assess CVs in order to build a short list of promising candidates to interview. Commonly, this is done by viewing CVs in a side‐by‐side fashion. This becomes challenging when comparing more than two CVs, because the reader is required to switch attention between them. Furthermore, there is no guarantee that the CVs are structured similarly, thus making the overview cluttered and significantly slowing down the comparison process. In order to address these challenges, in this paper we propose “CV3”, an interactive exploration environment offering users a new way to explore, assess, and compare multiple CVs, to suggest suitable candidates for specific job requirements. We validate our system by means of domain expert feedback whose results highlight both the efficacy of our approach and its limitations. We learned that CV3 eases the overall burden of recruiters thereby assisting them in the selection process.  相似文献   
7.
ABSTRACT

The purpose of this study was to examine the influence of trust variables (trust: competence, trust: benevolence, trust: integrity) on leadership regarding the organization’s information security policy (ISP) compliance. An instrument with four constructs was used to collect data from 474 non-management subjects from various organizations in the USA. Collected data were analyzed through multiple regression procedure. Results revealed that all trust variables (trust: competence, trust: benevolence, trust: integrity) were influential in predicting the leadership regarding the organization’s ISP compliance. The findings are discussed and implications for practice are outlined. Conclusion, limitations, and recommendations for future research are drawn.  相似文献   
8.
9.
Smart cities are built upon information and communication technologies (ICTs) to enable a broad range of advanced services. Through a comprehensive literature review, this study identified four pitfalls brought by the pervasive application of ICT, including information insecurity, privacy leakage, information islands, and digital divide. Therefore, a questionnaire survey together with 27 interviews was conducted in Hong Kong to investigate how the public perceived these pitfalls within the context of mobile apps providing real-time parking information which form a major part of smart mobility. System insecurity and privacy leakage were found to arouse worries among the app-users while their awareness of protecting personal data was found to have room for improvement. Islands of real-time parking information occur as a result of the lack of collaboration among private carpark operators. Digital divide existed widely among the disadvantaged groups and the problem cannot be solved by mere provision of ICT facilities. Overall, technologies alone cannot make a city smart or smarter. It is the suitable way in which ICTs are used to serve all citizens that matters.  相似文献   
10.
ABSTRACT

This paper quantifies the extent of co-location of innovation and production for industry clusters with varying knowledge intensity. If input-output, knowledge, and skill linkages are interdependent and geographically bounded, then we would expect innovation and production to be co-located in regional clusters. However, theory predicts that the degree of agglomeration benefits associated with co-location may vary across economic activities with different knowledge intensity. Using data from the U.S. Cluster Mapping Project, I develop measures of the co-location of innovation and production for 27 industry clusters, examining patterns across regions and over time (1998–2015) in the United States. I find that there is a significant co-location of innovation and production for many clusters, especially for those with higher knowledge intensity. This paper focuses on the Information Technology and Analytical Instruments cluster and the Automotive cluster to illustrate the co-location measures and the micro-geography of innovation and production.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号