首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   555篇
  免费   83篇
  国内免费   79篇
电工技术   2篇
综合类   48篇
化学工业   3篇
机械仪表   8篇
建筑科学   6篇
矿业工程   1篇
轻工业   2篇
石油天然气   1篇
武器工业   1篇
无线电   156篇
一般工业技术   23篇
冶金工业   4篇
原子能技术   11篇
自动化技术   451篇
  2024年   4篇
  2023年   9篇
  2022年   27篇
  2021年   37篇
  2020年   31篇
  2019年   17篇
  2018年   16篇
  2017年   43篇
  2016年   41篇
  2015年   36篇
  2014年   76篇
  2013年   52篇
  2012年   58篇
  2011年   69篇
  2010年   48篇
  2009年   39篇
  2008年   33篇
  2007年   25篇
  2006年   19篇
  2005年   19篇
  2004年   9篇
  2003年   4篇
  2001年   1篇
  1998年   1篇
  1991年   1篇
  1981年   1篇
  1959年   1篇
排序方式: 共有717条查询结果,搜索用时 15 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
2.
Smartphones are indispensable for many young people, which in turn increases the risk of smartphone addiction. Previous studies have discovered significant and positive influences of boredom proneness, sensation seeking and smartphone addiction. This study further explored these influences, their underlying mechanisms, and the mediating effects of pastime, flow experience and self-regulation on smartphone addiction. A total of 442 Chinese college students completed a survey focusing on boredom proneness, sensation seeking, pastime, flow experience, self-regulation and smartphone addiction. The results indicated that boredom proneness positively affects smartphone addiction. Contrary to expectations, the results showed that there is no significant relationship between sensation seeking and smartphone addiction. Moreover, pastime and self-regulation have partial mediation effects on the relationship between boredom proneness and smartphone addiction, while the effect of sensation seeking on smartphone addiction is completely transmitted with the help of flow experience and self-regulation. The findings and their implications are discussed.  相似文献   
3.
The falling down problem has become one of the very important issues of global public health in an aging society. The specific equipment was adopted as the detection device of falling-down in the early studies, but it is inconvenient for the elderly and difficult for future application. The smart phone more commonly used than the specific fall detection equipment is selected as a mobile device for human fall detection, and a fall detection algorithm is developed for this purpose. What the user has to do is to put the smart phone in his/her thigh pocket for falling down detection. The signals detected by the tri-axial G-sensor are converted into signal vector magnitudes as the basis of detecting a human body in a stalling condition. The Z-axis data sets are captured for identification of human body inclination and the occurrence frequencies at the peak of the area of use are used as the input parameters. A high-level fuzzy Petri net is used for the analysis and the development of identifying human actions, including normal action, exercising, and falling down. The results of this study can be used in the relevant equipments or in the field of home nursing.  相似文献   
4.
At some point in their careers, clinicians who work or consult in forensic and correctional settings will almost certainly encounter individuals who exhibit psychopathic personality features. Because of the widespread use of this disorder to inform legal and clinical decision making, psychologists should be exceedingly familiar with the relevant research literature on this topic before venturing into these settings. This article reviews the empirical bases of several clinically relevant claims and assertions regarding psychopathy and concludes that many areas of research are decidedly more equivocal in their findings than is commonly perceived. Although there is much to be gained by assessing psychopathy in various contexts, clinicians need to be cautious about drawing overzealous and empirically questionable conclusions about an important disorder that also has great potential for abuse. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
5.
在计算机取证过程中,对于删除文件的分析常常提供有价值的信息。知道在哪里找到被删除文件并且能够理解文件被删除过程中产生的元数据,这是一个合格的计算机取证人员必备的素质。本文对Window 8系统的回收站与传统的Windows XP系统的回收站的相似点和不同点进行了对比分析,并详细说明了Windows 8系统回收站的工作细节,以期为计算机取证人员提供帮助。  相似文献   
6.
伴随着国家正在大规模建设3G网络,智能手机使用普及率也在不断的提高。手机不仅仅是一个简单的通信工具,它被赋予了更加优质而强大的功能,智能手机正在改变着人们的工作方式和生活方式.我们已经步入了移动互联网时代。Android作为智能手机的新宠得到了飞速的发展,受到大家的关注而被广泛的应用,Android平台的应用程序开发的群体也在逐渐地壮大起来。  相似文献   
7.
手机规范取证研究   总被引:3,自引:0,他引:3  
着立法滞后,规范等问题,取证的方法.在司法实践中,涉及到手机的案件越来越多,手机取证的重要性日益突出,但在取证中却存在移动通信技术检验机构不完善,缺少高素质的取证人员,技术落后,缺乏取证的意识和流程不阻碍了手机电子证据在司法实践中的应用。文章针对手机取证中存在的问题,探讨了规范手机为手机取证的规范化提供理论参考。  相似文献   
8.
IPv6环境下网络取证研究   总被引:4,自引:0,他引:4  
随着IPv4地址即将耗尽,IPv4向IPv6过渡已成为必经之路。IPv6的应用将对网络取证技术产生重大影响,文章以分析IPv6协议的基本报文格式、IPSec协议为基础,对IPv6和IPv4进行了对比,提出了IPv6环境下以及在IPv4向IPv6过渡期的网络取证的特点和存在的难点。  相似文献   
9.
目前,以计算机信.g-系统为犯罪对象和工具的新型犯罪活动越来越多,造成的危害也越来越大。侦破这些案件必须要用到计算机取证技术,而电子证据本身和取证过程有许多不同于传统物证和取证的特点,给司法工作和信息安全领域都提出了新的挑战。为此,文章设计开发了一款基于WindowsPE系统的便捷、实用、安全、有效的计算机便携式取证系统。电子证据的收集与处理是通过内置于u盘的WindowsPE系统来完成的;利用OpenSSL提供的编程接口和PKI相关技术实现对电子证据的保密、认证与保存等功能。最后通过测试与分析,表明该系统能实现对电子证据的收集、处理和电子证据的安全有效保存。  相似文献   
10.
数字图像取证是计算机取证、信息安全领域的一门新学科。为实现照片图像与真实感计算机图形的可靠识别,提出一种基于图像稀疏表示的数字图像取证方法,该方法在抵抗压缩方面具有较好性能,从而保证图像压缩不会改变照片图像与真实感计算机图形的真实性本质。Tetrolet变换为保护图像局部几何结构,在L1-范数最小约束下搜索4×4图像块的最优覆盖(Covering)形式,获得图像的稀疏表示。观察自适应值c的统计分布,得到一幅图像中117种Covering出现次数的归一化直方图,从而得到图像的HoC(histogram of covering)特征。实验结果表明,在饱和度(S)分量提取的HoC特征能够很好地刻画照片图像与真实感计算机图形在局部几何结构上的不同统计特性,算法在识别能力、泛化能力,尤其是抵抗压缩能力上表现出良好性能,能够应用于图像真实性检测及照片图像与计算机图形的自动分类。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号