首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   249篇
  免费   2篇
电工技术   2篇
化学工业   64篇
金属工艺   2篇
机械仪表   2篇
建筑科学   2篇
能源动力   17篇
轻工业   4篇
水利工程   1篇
无线电   18篇
一般工业技术   41篇
冶金工业   22篇
原子能技术   2篇
自动化技术   74篇
  2023年   3篇
  2022年   10篇
  2021年   9篇
  2020年   7篇
  2019年   4篇
  2018年   2篇
  2017年   4篇
  2016年   4篇
  2015年   2篇
  2014年   8篇
  2013年   8篇
  2012年   9篇
  2011年   11篇
  2010年   10篇
  2009年   10篇
  2008年   7篇
  2007年   10篇
  2005年   6篇
  2004年   8篇
  2003年   5篇
  2002年   2篇
  2001年   5篇
  2000年   2篇
  1999年   5篇
  1998年   11篇
  1997年   3篇
  1996年   2篇
  1995年   6篇
  1994年   7篇
  1993年   7篇
  1992年   5篇
  1991年   8篇
  1990年   4篇
  1989年   3篇
  1988年   7篇
  1987年   3篇
  1986年   3篇
  1984年   4篇
  1981年   2篇
  1980年   6篇
  1978年   3篇
  1977年   1篇
  1976年   1篇
  1975年   2篇
  1973年   2篇
  1972年   2篇
  1970年   1篇
  1969年   1篇
  1968年   1篇
  1966年   1篇
排序方式: 共有251条查询结果,搜索用时 0 毫秒
101.
The structural and superconducting properties of (Gd1–xy Ca y M x )Ba2Cu3O z with M = Mo, Hf are investigated using X-ray diffraction, electrical resistivity, and oxygen content measurements. The effect of increasing the Mo concentration in (Gd1–x Mo x )Ba2Cu3O z changes the structure from orthorhombic to tetragonal accompanied by a large increase in resistivity and a fast decrease in T c at the rate of 1.9 K per at.% of Mo, unlike that of Hf substitution in (Gd1–x Hf x )Ba2Cu3O z , which maintains the orthorhombic structure and decreases T c very slowly at the rate of 0.6 K per atm.% of Hf with nearly no change in resistivity. The suppression of T c by M = Mo, Hf can be counterbalanced by hole doping by Ca which increases T c with increasing Ca content showing maximum compensation for Mo. A comparative study of M = Mo, Hf doped samples in (Gd1–xy Ca y M x )Ba2Cu3O z indicates that the valence of the dopant M = Mo4+,6+, Hf4+ and its ionic radius play an important role in controlling the structural and superconducting properties of the systems.  相似文献   
102.
Trust is considered as a critical enabler in reducing consumer concerns regarding e-commerce transactions. Another enabler that helps reduce consumers’ concerns is Web Assurance Seal Services (WASS). We suggest that both factors help in the reduction of a critical hindrance to e-commerce, namely consumer concerns, and foster e-commerce transactions. Prior research has focused on trust in e-commerce, and separately, on the effectiveness of WASS within certain nations or cultures. However, given that e-commerce is now a global phenomenon we contend that the national or cultural characteristics of consumers are important to understand. This comparative national research attempts to fill this gap. This study makes the following contributions: It identifies a hindrance (i.e., consumers’ concerns), and two enablers (i.e., effectiveness of WASS and trust) in e-commerce technologies as a shopping channel (i.e., trust in e-Channel). It proposes consumers’ concerns for e-commerce as a second-order three-dimensional construct (i.e., security, privacy, and business integrity concern) and compares the effects of trust in e-Channel and WASS on consumers’ e-commerce transaction intention in two different national/cultural contexts (i.e., the U.S.A. and South Korea). The results of the study indicate that the perceived effectiveness of WASS of the U.S. consumers has a strong positive impact on their transaction intention and has a strong negative influence on their concerns for e-commerce. In contrast, Korean consumers’ perceived effectiveness of WASS does not significantly influence their transaction intention and their concerns for e-commerce. The results of group comparison analysis confirm that the strength of perceived effectiveness of WASS of the U.S. consumers is significantly stronger than that of Korean consumers. Interpretations from a cross-national perspective, theoretical and practical implications as well as limitations are discussed.  相似文献   
103.
Enterprises establish computer security policies to ensure the security of information resources; however, if employees and end-users of organisational information systems (IS) are not keen or are unwilling to follow security policies, then these efforts are in vain. Our study is informed by the literature on IS adoption, protection-motivation theory, deterrence theory, and organisational behaviour, and is motivated by the fundamental premise that the adoption of information security practices and policies is affected by organisational, environmental, and behavioural factors. We develop an Integrated Protection Motivation and Deterrence model of security policy compliance under the umbrella of Taylor-Todd's Decomposed Theory of Planned Behaviour. Furthermore, we evaluate the effect of organisational commitment on employee security compliance intentions. Finally, we empirically test the theoretical model with a data set representing the survey responses of 312 employees from 78 organisations. Our results suggest that (a) threat perceptions about the severity of breaches and response perceptions of response efficacy, self-efficacy, and response costs are likely to affect policy attitudes; (b) organisational commitment and social influence have a significant impact on compliance intentions; and (c) resource availability is a significant factor in enhancing self-efficacy, which in turn, is a significant predictor of policy compliance intentions. We find that employees in our sample underestimate the probability of security breaches.  相似文献   
104.
In this paper, a modified time‐varying particle swarm optimization (MTVPSO) is proposed for solving nonconvex economic load dispatch problems. It is a variant of the traditional particle swarm optimization (PSO) algorithm. In an MTVPSO, novel acceleration coefficients for cognitive and social components are presented as linear time‐varying parameters in the velocity update equation of the PSO algorithm. In the early stages of the optimization process, it improves the global search capability of particles and directs the global optima at the end stage. Additionally, a linearly decreased inertia weight is introduced in an MTVPSO, instead of a fixed constant value, which helps improve the diversity of the population. Through this modification mechanism in PSO, the proposed algorithm has a higher probability of avoiding local optima, and it is likely to find global optima more quickly. Six complex benchmark functions have been used to validate the effectiveness of the proposed algorithm. Furthermore, to demonstrate its efficiency, feasibility, and fastness, six different cases (3‐, 6‐, 13‐, 15‐, and 40‐unit systems and one large‐scale Korean power 140‐unit system) of the economic load dispatch problem are solved by an MTVPSO. The results of the proposed algorithm have been compared with state‐of‐the‐art algorithms. It was found that the proposed MTVPSO can deliver better results in terms of solution quality, convergence characteristics, and robustness.  相似文献   
105.
Software vulnerability disclosure has generated much interest and debate. Recently some private intermediaries have entered this market. This paper examines the effects of such private intermediaries on optimal timing of disclosure policy made by public intermediaries and vendors’ reactions. Our analysis of private intermediaries’ role suggests that public intermediary’s optimal disclosure time does not change with private intermediary’s participation. However, a vendor’s patch time increases when the probability of information leakage is low, if not non-existent. In other words, private intermediaries’ service decreases a vendor’s willingness to deliver quick patches. Empirical evidence with 1493 vulnerability observations from CERT/CC and other 326 different vulnerability observations from iDefense provided support for our analytical results.
H. Raghav Rao (Corresponding author)Email:
  相似文献   
106.
Hydroxylamine has been recently found to react with ethyl acetate to generate diimide in situ. This reaction was used to reduce 10-undecenoic, oleic, linoleic, stearolic, concentrates of ricinoleic, cyclopentene and cyclopropene fatty acids (FA), dehydrated castor oil FA, 10-undecen-1-ol, oleyl alcohol and castor fatty alcohols. Unsaturated FA and their corresponding alcohols reacted in a similar manner. Terminally unsaturated, cyclopropene and cyclopentene FA were more reactive than oleic acid, which, in turn, was more reactive than hydroxymonoenoic acids. Conjugated dienoic FA reduced faster than nonconjugated dienoic acids. Partial hydrogenation using this reagent is particularly advantageous in determining geometry and the position of double bonds in the polyunsaturated FA, as it can be carried out in the absence of oxygen or oxidizing agents unlike hydrazine reductions.  相似文献   
107.
This paper proposes a Barker coded excitation for defect detection using infrared non-destructive testing. Capability of the proposed excitation scheme is highlighted with recently introduced correlation based post processing approach and compared with the existing phase based analysis by taking the signal to noise ratio into consideration. Applicability of the proposed scheme has been experimentally validated on a carbon fiber reinforced plastic specimen containing flat bottom holes located at different depths.  相似文献   
108.
109.
A major source of three-dimensional (3D) information about objects in the world is available to the observer in the form of time-varying imagery. Relative motion between textured objects and the observer generates a time-varying optic array at the image, from which image motion of contours, edge fragments, and feature points can be extracted. These dynamic features serve to sample the underlying image flow field. New, closed-form solutions are given for the structure and motion of planar and curved surface patches from monocular image flow and its derivatives through second order. Both planar and curved surface solutions require at most, the solution of a cubic equation. The analytic solution for curved surface patches combines the transformation of Longuet-Higgins and Prazdny [25] with the planar surface solution of Subbarao and Waxman [43]. New insights regarding uniqueness of solutions also emerge. Thus, the structure-motion coincidence of Waxman and Ullman [54] is interpreted as the duality of tangent plane solutions. The multiplicity of transformation angles (up to three) is related to the sign of the Gaussian curvature of the surface patch. Ovoid patches (i.e., bowls) are shown to possess a unique transform angle, though they are subject to the local structure-motion coincidence. Thus, ovoid patches almost always yield a unique 3D interpretation. In general, ambiguous solutions can be resolved by requiring continuity of the solution over time.The support of the Defense Advanced Research Projects Agency and the U.S. Army Night Vision Laboratory under Contract DAAK70-83-K-0018 (DARPA Order 3206) is gratefully acknowledged.  相似文献   
110.
Research in the area of information acquisition has been based on two key assumptions, namely, nonsatiety (implying more is preferable to less) and transitivity (implying that if A is preferred to B and B to C then A will be preferred to C). While at first glance these assumptions do not seem altogether unjustifiable, they do, in practice, constrain the empirical application of the research models. The primary purpose of the paper is to test the validity of these two key assumptions underlying most theoretical research in information acquisition and resource allocation. We begin by introducing four partial order structures and highlight the assumptions upon which they have been based. We then discuss how these structures could be used in estimating consumer preferences. We also provide a statistical methodology to implement such estimation. In later sections, we implement the empirical model on two data sets and discuss the results and propose generalizations  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号