全文获取类型
收费全文 | 11978篇 |
免费 | 863篇 |
国内免费 | 809篇 |
专业分类
电工技术 | 263篇 |
技术理论 | 1篇 |
综合类 | 800篇 |
化学工业 | 136篇 |
金属工艺 | 118篇 |
机械仪表 | 657篇 |
建筑科学 | 651篇 |
矿业工程 | 197篇 |
能源动力 | 81篇 |
轻工业 | 102篇 |
水利工程 | 103篇 |
石油天然气 | 75篇 |
武器工业 | 95篇 |
无线电 | 1537篇 |
一般工业技术 | 408篇 |
冶金工业 | 290篇 |
原子能技术 | 30篇 |
自动化技术 | 8106篇 |
出版年
2024年 | 9篇 |
2023年 | 84篇 |
2022年 | 157篇 |
2021年 | 215篇 |
2020年 | 202篇 |
2019年 | 168篇 |
2018年 | 181篇 |
2017年 | 238篇 |
2016年 | 322篇 |
2015年 | 283篇 |
2014年 | 722篇 |
2013年 | 588篇 |
2012年 | 736篇 |
2011年 | 1053篇 |
2010年 | 729篇 |
2009年 | 701篇 |
2008年 | 886篇 |
2007年 | 920篇 |
2006年 | 940篇 |
2005年 | 755篇 |
2004年 | 665篇 |
2003年 | 673篇 |
2002年 | 522篇 |
2001年 | 405篇 |
2000年 | 300篇 |
1999年 | 258篇 |
1998年 | 200篇 |
1997年 | 137篇 |
1996年 | 108篇 |
1995年 | 111篇 |
1994年 | 55篇 |
1993年 | 43篇 |
1992年 | 35篇 |
1991年 | 35篇 |
1990年 | 19篇 |
1989年 | 26篇 |
1988年 | 15篇 |
1987年 | 12篇 |
1986年 | 17篇 |
1985年 | 30篇 |
1984年 | 17篇 |
1983年 | 14篇 |
1982年 | 9篇 |
1981年 | 17篇 |
1980年 | 10篇 |
1979年 | 8篇 |
1977年 | 5篇 |
1976年 | 4篇 |
1975年 | 4篇 |
1973年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 21 毫秒
1.
目的 为了解决目前三维数据隐藏算法不能兼顾无失真和盲提取的问题,提出一种新的完全无失真的三维网格模型数据隐藏盲算法。方法 首先使用混沌逻辑映射选择嵌入与提取模式,保证数据的安全性。然后利用面元素重排,完全不会造成三维模型失真的性质,通过不同嵌入模式规则对三角面元素进行重排,以嵌入秘密数据。接收端则可根据相应的提取模式规则提取秘密数据。结果 仿真结果与分析表明,该算法不会对三维模型造成任何失真,嵌入容量为每顶点2比特,且能抵抗仿射变换攻击、噪声攻击和平滑攻击等。结论 这种三维数据隐藏盲算法无失真,容量大、安全性高、鲁棒性强,适用于三维载体不容修改的情形,如军事、医学、秘密通信和版权保护等。 相似文献
2.
3.
4.
Sorting-based reversible data hiding (RDH) methods like pixel-value-ordering (PVO) can predict pixel values accurately and achieve an extremely low distortion on the embedded image. However, the excellent performance of these methods was not well explained in previous works, and there are unexploited common points among them. In this paper, we propose a general multi-predictor (GMP) framework to summarize PVO-based RDH methods and explain their high prediction accuracy. Moreover, by utilizing the proposed GMP framework, a more efficient sorting-based RDH method is given as an example to show the generality and applicability of our framework. Comparing with other PVO-based methods, the proposed example method can achieve significant improvement in embedding performance. It is hopeful that more efficient sorting-based RDH algorithms can be designed according to our proposed framework by designing better predictors and their combination methods. 相似文献
5.
We conceptualized security-related stress (SRS) and proposed a theoretical model linking SRS, discrete emotions, coping response, and information security policy (ISP) compliance. We used an experience sampling design, wherein 138 professionals completed surveys. We observed that SRS had a positive association with frustration and fatigue, and these negative emotions were associated with neutralization of ISP violations. Additionally, frustration and fatigue make employees more likely to follow through on their rationalizations of ISP violations by decreased ISP compliance. Our findings provide evidence that neutralization is not a completely stable phenomenon but can vary within individuals from one time point to another. 相似文献
6.
The Curriculum Vitae (CV, also referred to as “résumé”) is an established representation of a person's academic and professional history. A typical CV is comprised of multiple sections associated with spatio‐temporal, nominal, hierarchical, and ordinal data. The main task of a recruiter is, given a job application with specific requirements, to compare and assess CVs in order to build a short list of promising candidates to interview. Commonly, this is done by viewing CVs in a side‐by‐side fashion. This becomes challenging when comparing more than two CVs, because the reader is required to switch attention between them. Furthermore, there is no guarantee that the CVs are structured similarly, thus making the overview cluttered and significantly slowing down the comparison process. In order to address these challenges, in this paper we propose “CV3”, an interactive exploration environment offering users a new way to explore, assess, and compare multiple CVs, to suggest suitable candidates for specific job requirements. We validate our system by means of domain expert feedback whose results highlight both the efficacy of our approach and its limitations. We learned that CV3 eases the overall burden of recruiters thereby assisting them in the selection process. 相似文献
7.
Joanna Paliszkiewicz 《Journal of Computer Information Systems》2019,59(3):211-217
ABSTRACTThe purpose of this study was to examine the influence of trust variables (trust: competence, trust: benevolence, trust: integrity) on leadership regarding the organization’s information security policy (ISP) compliance. An instrument with four constructs was used to collect data from 474 non-management subjects from various organizations in the USA. Collected data were analyzed through multiple regression procedure. Results revealed that all trust variables (trust: competence, trust: benevolence, trust: integrity) were influential in predicting the leadership regarding the organization’s ISP compliance. The findings are discussed and implications for practice are outlined. Conclusion, limitations, and recommendations for future research are drawn. 相似文献
9.
Smart cities are built upon information and communication technologies (ICTs) to enable a broad range of advanced services. Through a comprehensive literature review, this study identified four pitfalls brought by the pervasive application of ICT, including information insecurity, privacy leakage, information islands, and digital divide. Therefore, a questionnaire survey together with 27 interviews was conducted in Hong Kong to investigate how the public perceived these pitfalls within the context of mobile apps providing real-time parking information which form a major part of smart mobility. System insecurity and privacy leakage were found to arouse worries among the app-users while their awareness of protecting personal data was found to have room for improvement. Islands of real-time parking information occur as a result of the lack of collaboration among private carpark operators. Digital divide existed widely among the disadvantaged groups and the problem cannot be solved by mere provision of ICT facilities. Overall, technologies alone cannot make a city smart or smarter. It is the suitable way in which ICTs are used to serve all citizens that matters. 相似文献
10.
Mercedes Delgado 《Industry and innovation》2020,27(8):842-870
ABSTRACT This paper quantifies the extent of co-location of innovation and production for industry clusters with varying knowledge intensity. If input-output, knowledge, and skill linkages are interdependent and geographically bounded, then we would expect innovation and production to be co-located in regional clusters. However, theory predicts that the degree of agglomeration benefits associated with co-location may vary across economic activities with different knowledge intensity. Using data from the U.S. Cluster Mapping Project, I develop measures of the co-location of innovation and production for 27 industry clusters, examining patterns across regions and over time (1998–2015) in the United States. I find that there is a significant co-location of innovation and production for many clusters, especially for those with higher knowledge intensity. This paper focuses on the Information Technology and Analytical Instruments cluster and the Automotive cluster to illustrate the co-location measures and the micro-geography of innovation and production. 相似文献