首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5460篇
  免费   866篇
  国内免费   734篇
电工技术   188篇
综合类   518篇
化学工业   213篇
金属工艺   31篇
机械仪表   69篇
建筑科学   556篇
矿业工程   57篇
能源动力   63篇
轻工业   1374篇
水利工程   62篇
石油天然气   211篇
武器工业   13篇
无线电   646篇
一般工业技术   446篇
冶金工业   148篇
原子能技术   20篇
自动化技术   2445篇
  2024年   61篇
  2023年   200篇
  2022年   311篇
  2021年   385篇
  2020年   366篇
  2019年   299篇
  2018年   271篇
  2017年   276篇
  2016年   283篇
  2015年   319篇
  2014年   369篇
  2013年   372篇
  2012年   433篇
  2011年   441篇
  2010年   290篇
  2009年   303篇
  2008年   288篇
  2007年   295篇
  2006年   249篇
  2005年   226篇
  2004年   192篇
  2003年   160篇
  2002年   129篇
  2001年   90篇
  2000年   75篇
  1999年   54篇
  1998年   50篇
  1997年   42篇
  1996年   37篇
  1995年   31篇
  1994年   19篇
  1993年   16篇
  1992年   18篇
  1991年   13篇
  1990年   14篇
  1989年   12篇
  1988年   8篇
  1987年   8篇
  1986年   2篇
  1985年   10篇
  1984年   4篇
  1983年   10篇
  1982年   7篇
  1981年   3篇
  1980年   5篇
  1979年   2篇
  1978年   2篇
  1966年   2篇
  1965年   2篇
  1956年   1篇
排序方式: 共有7060条查询结果,搜索用时 946 毫秒
1.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability.  相似文献   
2.
ABSTRACT

Bacteriocin is a proteinaceous biomolecule produced by bacteria (both Gram-positive and Gram-negative) that exhibits antimicrobial activity against closely related species, and food-borne pathogens. It has recently gained importance and attracted the attention of several researchers looking to produce it from various substrates and bacterial strains. This ushers in a new era of food preservation where the use of bacteriocin in food products will be an alternative to chemical preservatives, and heat treatment which are understood to cause unwanted side effects, and reduce sensory and nutritional quality. However, this new market depends on the success of novel downstream separation schemes from various types of crude feedstocks which are both effective and economic. This review focuses on the downstream separation of bacteriocin from various sources using both conventional and novel techniques. Finally, recommendations for future interesting areas of research that need to be pursued are highlighted.  相似文献   
3.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved.  相似文献   
4.
Hyperbaric storage (HS) was evaluated as a new food preservation methodology at room temperature (RT) for beef and pork meat, both minced and in pieces, and compared to refrigeration (RF) storage. The meat samples were stored at 50, 75 and 100 MPa and variable RT up to 60 days. HS at 75 and 100 MPa could not only inhibit microbial growth but also inactivate microorganisms. Regarding physicochemical analyses, an overall equal to better pH maintenance in HS samples was achieved, and similar colour differences between HS and RF were observed. Generally, similarities in moisture content and drip loss between HS (mostly 75 and 100 MPa) and RF were detected (tendency for lower values in the former and higher values in the latter for the higher pressure level). Protein solubility revealed a decrease of sarcoplasmic protein values during storage with a pressure level dependency in some samples.  相似文献   
5.
Many e-commerce companies collect users’ personal data for marketing purposes despite privacy concerns. Information-collecting companies often offer a monetary reward to users to alleviate privacy concerns and ease the collection of personal information. This study focused on the negative effects of monetary rewards on both information privacy concerns (IPC) and information disclosure. A survey approach was used to collect data and 370 final responses were analysed using a two-way analysis of variance and a binomial logistic regression model. The results show that monetary rewards increase IPC when an information-collecting company requires sensitive information. Additional results indicate that building trust is a more effective way of collecting personal data. This study identifies how organisations can best execute information-collection activities and contributes additional insights for academia and practitioners.  相似文献   
6.
随着大数据和云计算的技术的深入应用,人工智能时代的机器学习和深度学习更需要日益增长的数据,因此数据安全与隐私保护变得更加迫切。本文介绍人工智能的定义以及特征,探究数据安全和隐私保护现状,分析数据安全和隐私保护面临的诸多问题,并提出在人工智能时代对数据安全和隐私保护的措施。  相似文献   
7.
The aim of the study was to identify the importance of individual food product attributes (the use of preservatives, processing method, shelf-life period and nutritional value) as well as their relation to the purchase behaviour. To achieve this, consumer preferences were decomposed in conditions of full access to information, and data was compared with actual consumer behaviour related to making purchasing decisions in front of the store shelf. Based on data from 338 respondents, conjoint analysis and repeated ANOVA measurements were carried out, allowing to eliminate individual behavioural patterns. The results showed a dissonance between the consumers attitudes towards the attributes and their shopping behaviour. The processing method was the most important declared attribute for consumers, meanwhile this information was the least searched for during purchase. At the same time, shelf-life period marked as the least important was the main information searched for by consumers when shopping. The results also show a clear dislike towards the use of microwaves as a preservation method, while traditional thermal preservation was marked as the most positive for consumers. In addition, consumers were classified into 3 heterogeneous groups, identifying differences in the preferences of food attributes. The obtained results have practical value relating not only to the preferences of individual attributes, but also to their various variants. The results can be a guide for companies to properly label food products. The indicated dissonance illustrates the educational gap and related insufficient motivation to get to know the product before buying it. This is extremely important in connection with technological development and new food processing methods.  相似文献   
8.
Consumer studies and market reports show an increase in consumption of ready‐to‐eat (RTE) foods. Although conventional processing technologies can in most cases produce safe products, they can also lead to the degradation of nutritional compounds and negatively affect quality characteristics. Consumers strongly prefer food that is minimally processed with the maximum amount of health‐promoting substances. Novel processing technologies as pre‐ or post‐treatment decontamination methods or as substitutes of conventional technologies have the potential to produce foods that are safe, rich in nutrient content and with superior organoleptic properties. Combining novel with conventional processes can eliminate potential drawbacks of novel technologies. This review examines available scientific information and critically evaluates the suitability and efficiency of various novel thermal and nonthermal technologies in terms of microbial safety, quality as well as nutrient content on the production of RTE meals, meats and pumpable products.  相似文献   
9.
本文主要研究随机环境中配对依赖人口数两性 Galton-Watson 分枝过程的条件均值增长率的极限性质.利用上可加函数的性质,得到配对单元平均增长率的极限性质和该过程条件均值的上界和下界.文中给出了关于过程条件均值增长率的两个序列,利用配对单元平均增长率的性质,获得了这两个序列的极限性质.随机环境中配对依赖人口数两性分枝过程比较复杂,本文的结论推广了现有的研究成果.  相似文献   
10.
垦71井区三维VSP资料波场分离方法应用研究   总被引:8,自引:5,他引:3  
张卫红  陈林  高志凌 《石油物探》2006,45(5):532-536
三维VSP资料是多偏移距VSP资料,资料中多种类型的波叠合在一起形成复杂波场。从复杂波场中分离出单一的保幅反射波波场是三维VSP波场分离的重要工作。常规二维VSP波场处理方法单一,难以适用于复杂的三维波场处理。针对三维VSP资料的波场特点,以分离上行反射P波为例,将单一波场分离方法加以适当组合,对垦71井区三维VSP实际资料进行了应用研究。结果表明,波场分离处理中叠加消去法和中值滤波相结合以及F—K滤波和中值滤波相结合的方法克服了单一方法的缺陷,波场处理后获得了波组特征明显、波场清晰单一的上行反射P波保幅波场,取得了较好的波场分离效果。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号