首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   447篇
  免费   64篇
  国内免费   62篇
电工技术   68篇
综合类   88篇
化学工业   2篇
金属工艺   1篇
机械仪表   15篇
建筑科学   22篇
矿业工程   4篇
能源动力   2篇
轻工业   7篇
水利工程   12篇
石油天然气   4篇
武器工业   21篇
无线电   50篇
一般工业技术   11篇
冶金工业   29篇
原子能技术   1篇
自动化技术   236篇
  2023年   4篇
  2022年   9篇
  2021年   16篇
  2020年   10篇
  2019年   24篇
  2018年   12篇
  2017年   19篇
  2016年   31篇
  2015年   21篇
  2014年   44篇
  2013年   44篇
  2012年   46篇
  2011年   49篇
  2010年   48篇
  2009年   43篇
  2008年   25篇
  2007年   28篇
  2006年   23篇
  2005年   21篇
  2004年   10篇
  2003年   10篇
  2002年   10篇
  2001年   9篇
  2000年   1篇
  1999年   2篇
  1998年   2篇
  1997年   1篇
  1994年   1篇
  1993年   2篇
  1992年   2篇
  1979年   1篇
  1972年   1篇
  1970年   1篇
  1963年   1篇
  1961年   1篇
  1957年   1篇
排序方式: 共有573条查询结果,搜索用时 15 毫秒
41.
Counterfeiting products and abusing labels lead to less credibility for traceability system in China recently. Authentication and supervision agencies driven by government departments play an important role for ensuring the quality safety in the case of lacking the willingness and credit of enterprises. A complete authentication and supervision flow framework was constructed based on an identification code (IdC) for authenticated origin base, which linked two actors of the agencies and the enterprises, and three subsystems of On-line Authentication Subsystem (OAS), Safety Production Management Client (SMC) and Mobile Supervision Application (MSA). IdC consisted of longitude and latitude of origin base as position code, production code and authentication type code. With a relative position partition method on 6 zones every 27° for China map and a coordination transformation algorithm, an absolute longitude and latitude value was converted into a relative position value and a zone mark value. IdC and packaging date code formed initial traceability code (TC). 8 digits packaging date code was reconstructed into 3 digits relative time value and 1 digit period mark according to a relative time period partition method with a period of 999d as time intervals and four periods form a cycle. Validation code was generated integrating the zone mark value, period mark value and authentication type code. Therefore, transformed 20 digits TC with the characters of shorter code length and stronger encryption was formed with IdC, relative time value and validation code. Three subsystems for different actors which provide the main function such as origin base registration, agency authentication, QR code generation, data uploading and product verification, were developed. The system has been used in Tianjin city from 2012. 213 enterprises were audited through OAS and used SMC. Through investigating 8 supervision agency staffs, 30 origin base owners, and 50 customers, it is shown that the positive effects are approved by most of the investigators and two negative effects for enhancing the costs and doubting the authentication reliability are laid by 17 enterprises and 12 customers. Furthermore, 4 typical cases for counterfeiting and abusing the labels were exampled and can be solved to a certain extent with the system. However, except for the technology itself, a management measures fitting the supervision flow and system need to draft in order to improve the system application well in the future.  相似文献   
42.
机群监测系统是用来管理机群,方便用户使用机群的软件系统.针对当前已有的机群管理系统在时效性、健壮性等方面的不足,提出了一种基于异步时钟的服务器监测技术,通过把指定的服务器集合组成一个具有反馈机制的环形队列的方法,使得用户能够将机群作为一个整体来进行管理.该系统能够透明地加入和删除服务器节点,自动重新配置以达到高可用性,本文采用的线程池技术和I/O多路转换技术能够有效提高机群监测系统的反应时间.实际的测试结果证明,该系统能够根据传输延迟、丢包率、系统繁忙程度、服务器或网络故障等情况采取适当的对策,在短时间内发现和排除故障,可以较好地应用于邮件服务器、WEB服务器等事务性机群处理系统中.  相似文献   
43.
针对当前网络APT隐蔽目标攻击识别方法准确率低、攻击识别耗时长的问题,提出面向APT攻击的网络安全威胁隐蔽目标识别方法.引入关联规则算法构建隐蔽目标识别模型,据此构建APT攻击隐蔽目标识别的总体框架,根据APT目标档案属性相关性计算网络安全威胁之间的关联规则,根据关联规则提取APT目标档案数据,通过可信度计算实现APT攻击下的网络安全威胁隐蔽目标识别.仿真实验表明,所提方法具有较高的攻击识别准确率,且攻击识别耗时短,能够高效、准确地实现APT攻击下网络安全威胁隐蔽目标识别.  相似文献   
44.
诚实信用原则与会计信息失真的法律思考   总被引:2,自引:0,他引:2  
诚实信用原则为民法"帝王"原则,它要求民事主体在从事民事活动中遵守诚实信用原则.而会计信息失真为会计行业当前重大问题,造成会计信息失真的根本原因则是会计从业人员对诚实信用原则的丧失.本文试从法学角度探析会计学领域的重大突出问题,并力图找出解决之办法.  相似文献   
45.
In this article, the authors assessed job seekers' organizational image beliefs before and after they experienced 3 recruitment media. The authors examined whether perceptions of media richness and credibility were related to improvements in the correspondence between job seekers' image beliefs and firms' projected images. Both media richness and credibility perceptions were associated with correspondence between job seekers' image beliefs and firms' projected images. However, results revealed that richness and credibility perceptions were likely to enhance job seekers' initial beliefs about firms' images when their beliefs were positive but did not diminish job seekers' beliefs about firms' images when their initial impressions were too positive. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
46.
基于主观Bayes方法对Web使用挖掘的研究   总被引:1,自引:0,他引:1  
为了更加合理地组织Web服务器的结构,使用户能及时快速地浏览到自己所需的网页信息,借鉴专家系统的不确定性推理方法——主观Bayes方法,提出了网页链接的可信度思想,并给出了网页链接的可信度因子模型。该模型可以定期、定时地根据Internet用户浏览的Web日志记录,动态地改善Web服务器的结构,从而实现基于用户浏览兴趣的网页链接结构的改进。  相似文献   
47.
目的考查团队内部基于交互记忆系统的知识整合问题,探索团队内部交互记忆系统及其专长性维度、可信性维度、协调性维度与知识整合的关系。方法采用问卷调查的方法。对176个团队样本进行调查。结果在团队中,交互记忆系统及其三个维度与知识整合存在显著正相关关系,其中可信性维度对知识整合的影响最大。结论在团队中,交互记忆系统能够促进知识整合,并且其专长性、可信性、协调性维度均能对知识整合产生不同正向影响,其中,可信性维度对知识整合的正向影响最大。  相似文献   
48.
Abstract

The connection between the simplicity of scientific theories and the credence attributed to their predictions seems to permeate the practice of scientific discovery. When a scientist succeeds in explaining a set of nobservations using a model Mof complexity c then it is generally believed that the likelihood of finding another explanatory model with similar complexity but leading to opposite predictions decreases with increasing nand decreasing c. This paper derives formal relationships between n, c and the probability of ambiguous predictions by examining three modeling languages under binary classification tasks: perceptrons, Boolean formulae, and Boolean networks. Bounds are also derived for the probability of error associated with the policy of accepting only models of complexity not exceeding c. Human tendency to regard the simpler as the more trustworthy is given a qualified justification.  相似文献   
49.
信息融合关键在于如何控制信息的数量,处理各种信息之间的关系以及优先级别。提出一种基于信息特征可信度的信息融合方法运用于信息融合的模态构建之中。通过预先优化信息特征的可信度进行信息的一次融合,再通过多信息模态中的特征关联进行信息的二次融合。找到最佳的多信息的模态构建方法,提高信息融合的质量和可信度。  相似文献   
50.
One hundred twenty mock jurors heard 1 of several versions of a civil trial. The tort trial was either high or low in information load and contained evidence that either clearly favored the plaintiffs or was ambiguous. Expert witnesses testified in either technical or less technical language. Verdicts favored the plaintiffs when the evidence was clear and was presented in technical language because technical language enhanced witnesses' credibility when the evidence was clear. Although high information loads and technical language hindered evidence processing, jurors endeavored to comprehend, as indicated by the recall of more facts and alternative constructions of the evidence when that evidence was ambiguous. However, those constructions were of poorer quality, incorporating evidence of lesser probative value. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号