首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3052篇
  免费   17篇
  国内免费   1篇
电工技术   20篇
化学工业   208篇
金属工艺   13篇
机械仪表   27篇
建筑科学   135篇
矿业工程   1篇
能源动力   50篇
轻工业   130篇
水利工程   14篇
石油天然气   4篇
无线电   138篇
一般工业技术   146篇
冶金工业   2083篇
原子能技术   12篇
自动化技术   89篇
  2022年   7篇
  2021年   9篇
  2019年   13篇
  2018年   11篇
  2017年   10篇
  2016年   9篇
  2015年   12篇
  2014年   20篇
  2013年   50篇
  2012年   26篇
  2011年   41篇
  2010年   27篇
  2009年   26篇
  2008年   30篇
  2007年   29篇
  2006年   35篇
  2005年   25篇
  2004年   32篇
  2003年   25篇
  2002年   25篇
  2001年   28篇
  2000年   26篇
  1999年   74篇
  1998年   629篇
  1997年   364篇
  1996年   286篇
  1995年   132篇
  1994年   131篇
  1993年   145篇
  1992年   42篇
  1991年   53篇
  1990年   39篇
  1989年   46篇
  1988年   42篇
  1987年   36篇
  1986年   32篇
  1985年   33篇
  1984年   18篇
  1983年   32篇
  1982年   22篇
  1981年   29篇
  1980年   45篇
  1979年   19篇
  1978年   16篇
  1977年   65篇
  1976年   126篇
  1975年   12篇
  1973年   16篇
  1969年   6篇
  1968年   6篇
排序方式: 共有3070条查询结果,搜索用时 15 毫秒
101.
Users are vital to the information security of organizations. In spite of technical safeguards, users make many critical security decisions. An example is users’ responses to security messages – discrete communication designed to persuade users to either impair or improve their security status. Research shows that although users are highly susceptible to malicious messages (e.g., phishing attacks), they are highly resistant to protective messages such as security warnings. Research is therefore needed to better understand how users perceive and respond to security messages. In this article, we argue for the potential of NeuroIS – cognitive neuroscience applied to Information Systems – to shed new light on users’ reception of security messages in the areas of (1) habituation, (2) stress, (3) fear, and (4) dual-task interference. We present an illustrative study that shows the value of using NeuroIS to investigate one of our research questions. This example uses eye tracking to gain unique insight into how habituation occurs when people repeatedly view security messages, allowing us to design more effective security messages. Our results indicate that the eye movement-based memory (EMM) effect is a cause of habituation to security messages – a phenomenon in which people unconsciously scrutinize stimuli that they have previously seen less than other stimuli. We show that after only a few exposures to a warning, this neural aspect of habituation sets in rapidly, and continues with further repetitions. We also created a polymorphic warning that continually updates its appearance and found that it is effective in substantially reducing the rate of habituation as measured by the EMM effect. Our research agenda and empirical example demonstrate the promise of using NeuroIS to gain novel insight into users’ responses to security messages that will encourage more secure user behaviors and facilitate more effective security message designs.  相似文献   
102.
“Secure” Web browsing with HTTPS uses TLS/SSL and X.509 certificates to provide authenticated, confidential communication between Web clients and Web servers. The authentication component of the system has a variety of weaknesses, which have led to a variety of proposals for improving the current environment. In this paper, we survey, analyze, compare and contrast five prominent proposals. To do this, we attempt to systematically capture the properties one might require of such a system: authentication properties, forensics/privacy properties, usability properties and pragmatic properties. Enumerating these properties is an important part of understanding these proposals and the nature of the authentication problem for the secure Web. Finally, we offer a few conclusions and suggestions pertaining to these proposals and possible future directions of research.  相似文献   
103.
The paradoxical behaviour of a new command and control concept called Network Enabled Capability (NEC) provides the motivation for this paper. In it, a traditional hierarchical command and control organisation was pitted against a network centric alternative on a common task, played thirty times, by two teams. Multiple regression was used to undertake a simple form of time series analysis. It revealed that whilst the NEC condition ended up being slightly slower than its hierarchical counterpart, it was able to balance and optimise all three of the performance variables measured (task time, enemies neutralised and attrition). From this it is argued that a useful conceptual response is not to consider NEC as an end product comprised of networked computers and standard operating procedures, nor to regard the human system interaction as inherently stable, but rather to view it as a set of initial conditions from which the most adaptable component of all can be harnessed: the human.  相似文献   
104.
The Victoria Planning Provisions (VPPs) include siting and design regulations incorporated into local government planning schemes to mitigate risk in areas prone to bushfires. Introduced in 1997, these provisions were previously called the Wildfire Management Overlay (WMO). Now updated and renamed the Bushfire Management Overlay (BMO), the provision's ongoing development has been informed by fire behaviour and how houses ignite. The aim of the research reported here, conducted following the catastrophic February 2009 Victorian fires, was to review dwelling losses in terms of the WMO's effectiveness. Empirical evidence compares house losses of dwellings referred to the Country Fire Authority (CFA) via the WMO, with overall house losses. The results suggest that proportionately fewer houses referred to the CFA were lost, compared with those not assessed under the WMO. It should be noted that other factors influenced the results, such as the houses assessed under the WMO being generally newer.  相似文献   
105.
Patients with schizophrenia, and rodent models of the disease, both exhibit suppressed neurogenesis, with antipsychotics possibly enhancing neurogenesis in pre-clinical models. Nestin, a cytoskeletal protein, is implicated in neuronal differentiation and adult neurogenesis. We hypothesized that schizophrenia pathogenesis involves nestin downregulation; however, few studies have related nestin to schizophrenia. We assessed nestin protein concentration, prepulse inhibition (PPI), and social interaction in the MK-801 model of schizophrenia, with or without antipsychotic (clozapine) treatment. Adult male Sprague–Dawley rats were intraperitoneally administered saline or MK-801 (0.1 mg/kg) to produce a schizophrenia-like phenotype, with concomitant subcutaneous injections of vehicle or clozapine (5 mg/kg). PPI was assessed on days 1, 8, and 15, and social interaction was assessed on day 4. Hippocampus tissue samples were dissected for Western blotting of nestin concentration. MK-801 alone did not alter nestin concentration, while clozapine alone enhanced hippocampal nestin concentration; this effect was not apparent in animals with MK-801 and clozapine co-administration. MK-801 also produced schizophrenia-like PPI disruptions, some of which were reversed by clozapine. Social interaction deficits were not detected in this model. This is the first report of clozapine-induced enhancements of hippocampal nestin concentration that might be mediated by NMDA receptors. Future studies will explore the impact of neurodevelopmental nestin concentration on symptom onset and antipsychotic treatment.  相似文献   
106.
A boronic acid-based anthracene fluorescent probe was functionalised with an acrylamide unit to incorporate into a hydrogel system for monosaccharide detection. In solution, the fluorescent probe displayed a strong fluorescence turn-on response upon exposure to fructose, and an expected trend in apparent binding constants, as judged by a fluorescence response where D-fructose>D-galactose>D-mannose>D-glucose. The hydrogel incorporating the boronic acid monomer demonstrated the ability to detect monosaccharides by fluorescence with the same overall trend as the monomer in solution with the addition of D-fructose resulting in a 10-fold enhancement (≤0.25 mol/L).  相似文献   
107.
A new alternating double aquo-bridged and single cyano-bridged polymeric complex {[Ba2(phen)4(H2O)6Fe(CN)6]·Cl·2(phen)·3H2O}n (1) (phen = 1,10-phenanthroline) has been synthesized and structurally characterized. In the crystal structure the two centrosymmetric [Ba2(phen)4(H2O)6] units are bridged through two trans CN groups of [Fe(CN)6]3− ion, which results in the formation of a zig-zag polymeric chain. In each [Ba2(phen)4(H2O)6] unit, the two Ba centers are joined by double aquo bridges. Both the Ba atoms are 9-coordinated with distorted mono-capped square antiprismatic geometry. An elaborate hydrogen bonding system holds the parallel polymeric chains together.  相似文献   
108.
A mixed culture of dye-decolorising Pseudomonas spp. was immobilised on polyurethane foam, and used in a bench-scale continuous culture bioreactor to treat textile effluent for colour removal. The provision of soluble wheat starch (0.2% w/v) to the culture medium promoted growth of biomass and enhanced decolorisation of effluent in the bioreactor. The bioprocess was further combined with membrane filtration technology to improve the quality of treated effluent. The treated effluent showed 90, 82 and 60% reduction in COD, BOD5 and toxicity levels, respectively, and had potential for re-use in dyeing processes. The colour difference of the cotton fabrics dyed using the treated effluent samples compared to those dyed using normal supply water was found to be industrially acceptable. The described process could improve treatment efficiency and allow water recycling within the textile factory.  相似文献   
109.
110.
The device design and performance of double-poly self-aligned p-n-p technology, featuring a low-resistivity p+ subcollector, thin p-epi, and boron-doped poly-emitter are described. Device isolation is provided by deep and shallow trenches which reduce the collector-to-substrate capacitance while maintaining a high breakdown voltage (⩾40 V). By utilizing a shallow emitter process in conjunction with an optimized arsenic-base implant, devices with emitter-base junction depths as shallow as 20 nm and base widths of less than 100 nm were obtained. Cutoff frequencies of up to 27 GHz were obtained, and the AC performance was demonstrated by an NTL-gate delay of 36 ps and an active-pull-down (APD) ECL-gate delay of 20 ps. This high-performance p-n-p technology was developed to be compatible with existing double-poly n-p-n technologies. The matching speed of p-n-p devices opens up new opportunities for high-performance complementary bipolar circuits  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号