首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6392篇
  免费   976篇
  国内免费   915篇
电工技术   420篇
综合类   806篇
化学工业   137篇
金属工艺   53篇
机械仪表   226篇
建筑科学   342篇
矿业工程   83篇
能源动力   111篇
轻工业   56篇
水利工程   234篇
石油天然气   152篇
武器工业   70篇
无线电   886篇
一般工业技术   391篇
冶金工业   154篇
原子能技术   39篇
自动化技术   4123篇
  2024年   7篇
  2023年   90篇
  2022年   91篇
  2021年   136篇
  2020年   157篇
  2019年   194篇
  2018年   150篇
  2017年   196篇
  2016年   213篇
  2015年   262篇
  2014年   370篇
  2013年   438篇
  2012年   498篇
  2011年   549篇
  2010年   493篇
  2009年   524篇
  2008年   536篇
  2007年   616篇
  2006年   446篇
  2005年   387篇
  2004年   295篇
  2003年   270篇
  2002年   208篇
  2001年   150篇
  2000年   132篇
  1999年   121篇
  1998年   101篇
  1997年   112篇
  1996年   97篇
  1995年   69篇
  1994年   89篇
  1993年   58篇
  1992年   39篇
  1991年   43篇
  1990年   18篇
  1989年   24篇
  1988年   19篇
  1987年   13篇
  1986年   4篇
  1985年   11篇
  1984年   7篇
  1983年   6篇
  1982年   6篇
  1981年   6篇
  1980年   5篇
  1976年   3篇
  1974年   3篇
  1962年   2篇
  1960年   2篇
  1956年   2篇
排序方式: 共有8283条查询结果,搜索用时 24 毫秒
1.
ABSTRACT

The purpose of this study was to examine the influence of trust variables (trust: competence, trust: benevolence, trust: integrity) on leadership regarding the organization’s information security policy (ISP) compliance. An instrument with four constructs was used to collect data from 474 non-management subjects from various organizations in the USA. Collected data were analyzed through multiple regression procedure. Results revealed that all trust variables (trust: competence, trust: benevolence, trust: integrity) were influential in predicting the leadership regarding the organization’s ISP compliance. The findings are discussed and implications for practice are outlined. Conclusion, limitations, and recommendations for future research are drawn.  相似文献   
2.
随着无源光网络的发展,光纤-无线网络能同时支持集中式云和边缘云计算技术,成为一种具有发展前景的网络结构。但是,现有的基于光纤-无线网络的任务协同计算卸载研究主要以最小化移动设备的能耗为目标,忽略了实时性高的任务的需求。针对实时性高的任务,提出了以最小化任务的总处理时间为目标的集中式云和边缘云协同计算卸载问题,并对其进行形式化描述。同时,通过将该问题归约为装箱问题,从而证明其为NP难解问题。提出一个启发式协同计算卸载算法,该算法通过比较不同卸载策略的任务处理时间,优先选择时间最短的任务卸载策略。同时,提出一个定制的遗传算法,获得一个更优的任务卸载策略。实验结果表明,与现有的算法相比,本文提出的启发式算法得到的任务卸载策略平均减少4.34%的任务总处理时间,而定制的遗传算法的卸载策略平均减少18.41%的任务总处理时间。同时,定制的遗传算法的卸载策略与本文提出的启发式算法相比平均减少14.49%的任务总处理时间。  相似文献   
3.
田保军  杨浒昀  房建东 《计算机应用》2019,39(10):2834-2840
针对推荐精度不准确、数据稀疏、恶意推荐的问题,提出融合信任基于概率矩阵分解(PMF)的新推荐模型。首先,通过建立基于信任的协同过滤模型(CFMTS)将改进的信任机制融入到协同过滤推荐算法中。信任值通过全局信任及局部信任计算获得,其中局部信任利用了信任传播机制计算用户的直接信任值和间接信任值得到,全局信任采用信任有向图的方式计算得到。然后,将信任值与评分相似度融合以解决数据稀疏、恶意推荐的问题。同时,将CFMTS融入到PMF模型中以建立新的推荐模型——融合信任基于概率矩阵分解模型(MPMFFT),通过梯度下降算法对用户特征向量和项目特征向量进行计算以产生预测评分值,进一步提高推荐系统的精准度。通过实验将提出的MPMFFT与经典的PMF、社交信息的矩阵分解(SocialMF)、社交信息的推荐(SoRec)、加权社交信息的推荐(RSTE)等模型进行了结果的对比和分析,在公开的真实数据集Epinions上MPMFFT的平均绝对误差(MAE)和均方根误差(RMSE)比最优的RSTE模型分别降低2.9%和1.5%,同时在公开的真实数据集Ciao上MPMFFT的MAE和RMSE比最优的SocialMF模型分别降低1.1%和1.8%,结果证实了模型能在一定程度上解决数据稀疏、恶意推荐问题,有效提高推荐质量。  相似文献   
4.
5.
ABSTRACT

While some cities attempt to determine their residents’ demand for smart-city technologies, others simply move forward with smart-related strategies and projects. This study is among the first to empirically determine which factors most affect residents’ and public servants’ intention to use smart-city services. A Smart Cities Stakeholders Adoption Model (SSA), based on Unified Theory of Acceptance and Use of Technology (UTAUT2), is developed and tested on a mid-size U.S. city as a case study. A questionnaire was administered in order to determine the influence of seven factors – effort expectancy, self-efficacy, perceived privacy, perceived security, trust in technology, price value and trust in government – on behaviour intention, specifically the decision to adopt smart-city technologies. Results show that each of these factors significantly influenced citizen intention to use smart-city services. They also reveal perceived security and perceived privacy to be strong determinants of trust in technology, and price value a determinant of trust in government. In turn, both types of trust are shown to increase user intention to both adopt and use smart-city services. These findings offer city officials an approach to gauging residential intention to use smart-city services, as well as identify those factors critical to developing a successful smart-city strategy.  相似文献   
6.
陈佳  杨少鹏  余双波  贾悠 《通信技术》2020,(5):1277-1279
当前,骚扰电话乱象屡禁不止,严重影响了人民群众的正常生活,甚至威胁到个人财产安全,因此简单有效地识别骚扰电话技术成为亟待解决的问题。区别于现有的对电话号码进行黑白名单标记、大数据分析等识别方法,提出基于信任链的骚扰电话预判技术,从可信度量的角度计算来电号码的可靠程度,并针对高危受害群体的典型应用场景进行分析,通过对骚扰电话的预判,降低其受到电话骚扰甚至电话诈骗的可能性。  相似文献   
7.
为解释以往关于信任对项目绩效正向或负向影响的研究分歧,以 PPP 项目为背景,构建以信任(能力信任和善意信任)为自变量、项目绩效为因变量、合作行为(角色内行为和角色外行为)作为中介变量的理论模型。通过结构方程模型分析 286 份有效问卷,结果表明:能力信任和善意信任对 PPP 项目绩效起正向促进作用,角色内行为和角色外行为对 PPP项目绩效起正向促进作用。同时,角色内行为和角色外行为在能力信任、善意信任与 PPP 项目绩效间均发挥部分中介作用。研究结果有助于深入理解中国 PPP 情境下不同维度信任对项目绩效的影响,也为 PPP 项目实践中面临的绩效低下问题提供了管理建议。  相似文献   
8.
《Journal of dairy science》2019,102(10):8807-8818
A series of food safety incidents related to domestically produced dairy in China harmed consumer confidence and caused a dramatic decrease in dairy consumption from 2008 to 2010. Compared with previous studies that mainly assessed consumer confidence in food or dairy in general, this study focused on 2 specific dairy products, milk and infant milk formula (IMF). Based on data from 934 Chinese consumers, confidence in the safety of milk and IMF was measured by using a multi-item scale with 2 dimensions—optimism and pessimism. We found that Chinese consumers were optimistic about the safety of milk and IMF but, at the same time, were concerned about the risks related to milk and IMF. Chinese consumers have less confidence in IMF than in milk. Structural equation modeling indicated that consumer trust in manufacturers and third parties in the dairy supply chain and confidence in other foods, such as meat and fish, can foster consumer confidence in the safety of milk and IMF, while the extent of recall of the melamine infant formula incident in 2008 and trait worry exert negative effects. In addition, consumers with more children or less family income are likely to be more confident in domestically produced IMF. These insights into consumer confidence and its determinants can assist dairy supply chains and regulatory institutions in formulating effective risk communication strategies to strengthen consumer confidence.  相似文献   
9.
Colors can be characterized by three main attributes: hue, value, and saturation. But colors also exhibit other phenomenological qualities. In this study, we identify one such secondary attribute of color: perceived density. We discuss the prevalence of dense colors in Japan starting from the “48 Teas and 100 Mice” colors of the Edo period, and develop the concept of perceived density through this aspect of Japanese color preference. When vivid colors were forbidden to commoners during the Edo period, subtle variations of brownish and grayish colors were created. These colors with base tones were not salient, yet they looked dense. Muted colors with paradoxical richness are still common in Japan today. Japanese commodity design often uses muddy colors with white or gray undertones, and deep colors with black undertones. Together they form distinct groupings of relatively dense color. The perceived density of color corresponds to how dense and filled, or thin and airy a color appears. Colors of higher perceived density appear to be more packed and to have mass. Perceived density of color is unusual in that it does not have a monotonic relationship with one of the primary perceptual attributes. High apparent density is observed in a central region of an equi‐hue plane where value or saturation are at intermediate values. We consider two possible explanations of how high values of density can coincide with middling values of value and saturation: characteristics of the spectral reflectance curves, or the complexity of the neural signals that underlie the emergent property.  相似文献   
10.
López-Alt et al.(STOC12)put forward a primitive called multi-key fully homomorphic encryption(MKFHE),in which each involved party encrypts their own data using keys that are independently and randomly chosen whereby arbitrary computations can be performed on these encrypted data by a final collector.Subsequently,several superior schemes based on the standard assumption(LWE)were proposed.Most of these schemes were constructed by expanding a fresh GSW-ciphertext or BGV-ciphertext under a single key to a new same-type ciphertext of the same message under a combination of associated parties’keys.Therefore,the new ciphertext’s size grew more or less linearly with an increase in the number of parties.In this paper,we proposed a novel and simple scheme of MKFHE based on LWE without increasing the size of the ciphertext in the two non-collusion server model.In other words,each party first independently shares their own data between two servers and each server only needs a one-round communication with another to construct a ciphertext of the same plaintext under a sum of associated parties’keys.Our new ciphertext under multiple keys has the same size as that of the original one with only one-round communication between two servers.The communication complexity is O(kmlogq)-bit,where k is the number of input ciphertexts involved,m is the size of a GSW-ciphertext and q is a modulus.In conclusion,we proved that our scheme is CPA-secure against semi-honest adversaries.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号