全文获取类型
收费全文 | 3052篇 |
免费 | 17篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 20篇 |
化学工业 | 208篇 |
金属工艺 | 13篇 |
机械仪表 | 27篇 |
建筑科学 | 135篇 |
矿业工程 | 1篇 |
能源动力 | 50篇 |
轻工业 | 130篇 |
水利工程 | 14篇 |
石油天然气 | 4篇 |
无线电 | 138篇 |
一般工业技术 | 146篇 |
冶金工业 | 2083篇 |
原子能技术 | 12篇 |
自动化技术 | 89篇 |
出版年
2022年 | 7篇 |
2021年 | 9篇 |
2019年 | 13篇 |
2018年 | 11篇 |
2017年 | 10篇 |
2016年 | 9篇 |
2015年 | 12篇 |
2014年 | 20篇 |
2013年 | 50篇 |
2012年 | 26篇 |
2011年 | 41篇 |
2010年 | 27篇 |
2009年 | 26篇 |
2008年 | 30篇 |
2007年 | 29篇 |
2006年 | 35篇 |
2005年 | 25篇 |
2004年 | 32篇 |
2003年 | 25篇 |
2002年 | 25篇 |
2001年 | 28篇 |
2000年 | 26篇 |
1999年 | 74篇 |
1998年 | 629篇 |
1997年 | 364篇 |
1996年 | 286篇 |
1995年 | 132篇 |
1994年 | 131篇 |
1993年 | 145篇 |
1992年 | 42篇 |
1991年 | 53篇 |
1990年 | 39篇 |
1989年 | 46篇 |
1988年 | 42篇 |
1987年 | 36篇 |
1986年 | 32篇 |
1985年 | 33篇 |
1984年 | 18篇 |
1983年 | 32篇 |
1982年 | 22篇 |
1981年 | 29篇 |
1980年 | 45篇 |
1979年 | 19篇 |
1978年 | 16篇 |
1977年 | 65篇 |
1976年 | 126篇 |
1975年 | 12篇 |
1973年 | 16篇 |
1969年 | 6篇 |
1968年 | 6篇 |
排序方式: 共有3070条查询结果,搜索用时 15 毫秒
101.
Bonnie Brinton Anderson Anthony Vance C Brock Kirwan David Eargle Jeffrey L Jenkins 《欧洲信息系统杂志》2016,25(4):364-390
Users are vital to the information security of organizations. In spite of technical safeguards, users make many critical security decisions. An example is users’ responses to security messages – discrete communication designed to persuade users to either impair or improve their security status. Research shows that although users are highly susceptible to malicious messages (e.g., phishing attacks), they are highly resistant to protective messages such as security warnings. Research is therefore needed to better understand how users perceive and respond to security messages. In this article, we argue for the potential of NeuroIS – cognitive neuroscience applied to Information Systems – to shed new light on users’ reception of security messages in the areas of (1) habituation, (2) stress, (3) fear, and (4) dual-task interference. We present an illustrative study that shows the value of using NeuroIS to investigate one of our research questions. This example uses eye tracking to gain unique insight into how habituation occurs when people repeatedly view security messages, allowing us to design more effective security messages. Our results indicate that the eye movement-based memory (EMM) effect is a cause of habituation to security messages – a phenomenon in which people unconsciously scrutinize stimuli that they have previously seen less than other stimuli. We show that after only a few exposures to a warning, this neural aspect of habituation sets in rapidly, and continues with further repetitions. We also created a polymorphic warning that continually updates its appearance and found that it is effective in substantially reducing the rate of habituation as measured by the EMM effect. Our research agenda and empirical example demonstrate the promise of using NeuroIS to gain novel insight into users’ responses to security messages that will encourage more secure user behaviors and facilitate more effective security message designs. 相似文献
102.
Christopher W. Brown Michael Jenkins 《International Journal of Information Security》2016,15(6):621-635
“Secure” Web browsing with HTTPS uses TLS/SSL and X.509 certificates to provide authenticated, confidential communication between Web clients and Web servers. The authentication component of the system has a variety of weaknesses, which have led to a variety of proposals for improving the current environment. In this paper, we survey, analyze, compare and contrast five prominent proposals. To do this, we attempt to systematically capture the properties one might require of such a system: authentication properties, forensics/privacy properties, usability properties and pragmatic properties. Enumerating these properties is an important part of understanding these proposals and the nature of the authentication problem for the secure Web. Finally, we offer a few conclusions and suggestions pertaining to these proposals and possible future directions of research. 相似文献
103.
The paradoxical behaviour of a new command and control concept called Network Enabled Capability (NEC) provides the motivation for this paper. In it, a traditional hierarchical command and control organisation was pitted against a network centric alternative on a common task, played thirty times, by two teams. Multiple regression was used to undertake a simple form of time series analysis. It revealed that whilst the NEC condition ended up being slightly slower than its hierarchical counterpart, it was able to balance and optimise all three of the performance variables measured (task time, enemies neutralised and attrition). From this it is argued that a useful conceptual response is not to consider NEC as an end product comprised of networked computers and standard operating procedures, nor to regard the human system interaction as inherently stable, but rather to view it as a set of initial conditions from which the most adaptable component of all can be harnessed: the human. 相似文献
104.
The Victoria Planning Provisions (VPPs) include siting and design regulations incorporated into local government planning schemes to mitigate risk in areas prone to bushfires. Introduced in 1997, these provisions were previously called the Wildfire Management Overlay (WMO). Now updated and renamed the Bushfire Management Overlay (BMO), the provision's ongoing development has been informed by fire behaviour and how houses ignite. The aim of the research reported here, conducted following the catastrophic February 2009 Victorian fires, was to review dwelling losses in terms of the WMO's effectiveness. Empirical evidence compares house losses of dwellings referred to the Country Fire Authority (CFA) via the WMO, with overall house losses. The results suggest that proportionately fewer houses referred to the CFA were lost, compared with those not assessed under the WMO. It should be noted that other factors influenced the results, such as the houses assessed under the WMO being generally newer. 相似文献
105.
Hakan Kayir Bryan W. Jenkins Begüm Alural Jibran Y. Khokhar 《International journal of molecular sciences》2022,23(7)
Patients with schizophrenia, and rodent models of the disease, both exhibit suppressed neurogenesis, with antipsychotics possibly enhancing neurogenesis in pre-clinical models. Nestin, a cytoskeletal protein, is implicated in neuronal differentiation and adult neurogenesis. We hypothesized that schizophrenia pathogenesis involves nestin downregulation; however, few studies have related nestin to schizophrenia. We assessed nestin protein concentration, prepulse inhibition (PPI), and social interaction in the MK-801 model of schizophrenia, with or without antipsychotic (clozapine) treatment. Adult male Sprague–Dawley rats were intraperitoneally administered saline or MK-801 (0.1 mg/kg) to produce a schizophrenia-like phenotype, with concomitant subcutaneous injections of vehicle or clozapine (5 mg/kg). PPI was assessed on days 1, 8, and 15, and social interaction was assessed on day 4. Hippocampus tissue samples were dissected for Western blotting of nestin concentration. MK-801 alone did not alter nestin concentration, while clozapine alone enhanced hippocampal nestin concentration; this effect was not apparent in animals with MK-801 and clozapine co-administration. MK-801 also produced schizophrenia-like PPI disruptions, some of which were reversed by clozapine. Social interaction deficits were not detected in this model. This is the first report of clozapine-induced enhancements of hippocampal nestin concentration that might be mediated by NMDA receptors. Future studies will explore the impact of neurodevelopmental nestin concentration on symptom onset and antipsychotic treatment. 相似文献
106.
Suying Xu Adam C. Sedgwick Souad A. Elfeky Wenbo Chen Ashley S. Jones George T. Williams A. Toby A. Jenkins Steven D. Bull John S. Fossey Tony D. James 《Frontiers of Chemical Science and Engineering》2020,14(1):112
A boronic acid-based anthracene fluorescent probe was functionalised with an acrylamide unit to incorporate into a hydrogel system for monosaccharide detection. In solution, the fluorescent probe displayed a strong fluorescence turn-on response upon exposure to fructose, and an expected trend in apparent binding constants, as judged by a fluorescence response where D-fructose>D-galactose>D-mannose>D-glucose. The hydrogel incorporating the boronic acid monomer demonstrated the ability to detect monosaccharides by fluorescence with the same overall trend as the monomer in solution with the addition of D-fructose resulting in a 10-fold enhancement (≤0.25 mol/L). 相似文献
107.
Nirmal Kumar Karan Samiran Mitra Georgina Rosair David J. Jenkins K. M. Abdul Malik 《Inorganic chemistry communications》2001,4(12)
A new alternating double aquo-bridged and single cyano-bridged polymeric complex {[Ba2(phen)4(H2O)6Fe(CN)6]·Cl·2(phen)·3H2O}n (1) (phen = 1,10-phenanthroline) has been synthesized and structurally characterized. In the crystal structure the two centrosymmetric [Ba2(phen)4(H2O)6] units are bridged through two trans CN groups of [Fe(CN)6]3− ion, which results in the formation of a zig-zag polymeric chain. In each [Ba2(phen)4(H2O)6] unit, the two Ba centers are joined by double aquo bridges. Both the Ba atoms are 9-coordinated with distorted mono-capped square antiprismatic geometry. An elaborate hydrogen bonding system holds the parallel polymeric chains together. 相似文献
108.
A mixed culture of dye-decolorising Pseudomonas spp. was immobilised on polyurethane foam, and used in a bench-scale continuous culture bioreactor to treat textile effluent for colour removal. The provision of soluble wheat starch (0.2% w/v) to the culture medium promoted growth of biomass and enhanced decolorisation of effluent in the bioreactor. The bioprocess was further combined with membrane filtration technology to improve the quality of treated effluent. The treated effluent showed 90, 82 and 60% reduction in COD, BOD5 and toxicity levels, respectively, and had potential for re-use in dyeing processes. The colour difference of the cotton fabrics dyed using the treated effluent samples compared to those dyed using normal supply water was found to be industrially acceptable. The described process could improve treatment efficiency and allow water recycling within the textile factory. 相似文献
109.
110.
Lu P.-F. Warnock J.D. Cressler J.D. Jenkins K.A. Toh K.-Y. 《Electron Devices, IEEE Transactions on》1991,38(6):1410-1418
The device design and performance of double-poly self-aligned p-n-p technology, featuring a low-resistivity p+ subcollector, thin p-epi, and boron-doped poly-emitter are described. Device isolation is provided by deep and shallow trenches which reduce the collector-to-substrate capacitance while maintaining a high breakdown voltage (⩾40 V). By utilizing a shallow emitter process in conjunction with an optimized arsenic-base implant, devices with emitter-base junction depths as shallow as 20 nm and base widths of less than 100 nm were obtained. Cutoff frequencies of up to 27 GHz were obtained, and the AC performance was demonstrated by an NTL-gate delay of 36 ps and an active-pull-down (APD) ECL-gate delay of 20 ps. This high-performance p-n-p technology was developed to be compatible with existing double-poly n-p-n technologies. The matching speed of p-n-p devices opens up new opportunities for high-performance complementary bipolar circuits 相似文献