首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   676篇
  免费   18篇
  国内免费   39篇
综合类   8篇
化学工业   1篇
机械仪表   1篇
建筑科学   24篇
轻工业   2篇
无线电   124篇
一般工业技术   25篇
冶金工业   4篇
自动化技术   544篇
  2024年   5篇
  2023年   25篇
  2022年   28篇
  2021年   40篇
  2020年   29篇
  2019年   17篇
  2018年   31篇
  2017年   40篇
  2016年   44篇
  2015年   25篇
  2014年   53篇
  2013年   57篇
  2012年   33篇
  2011年   57篇
  2010年   26篇
  2009年   43篇
  2008年   35篇
  2007年   35篇
  2006年   31篇
  2005年   17篇
  2004年   14篇
  2003年   6篇
  2002年   9篇
  2001年   4篇
  2000年   8篇
  1999年   2篇
  1998年   1篇
  1997年   2篇
  1996年   1篇
  1995年   1篇
  1994年   2篇
  1992年   1篇
  1989年   2篇
  1988年   1篇
  1986年   1篇
  1984年   1篇
  1983年   1篇
  1982年   2篇
  1981年   2篇
  1979年   1篇
排序方式: 共有733条查询结果,搜索用时 906 毫秒
81.
The study investigated differences in worker satisfaction and perceived job performance regarding privacy, interaction, and acoustic quality issues in personal workspaces between five office types in LEED-certified buildings. It finds that people in high cubicles showed significantly lower satisfaction and job performance in relation to visual privacy and interaction with co-workers than both enclosed private and enclosed shared office types. They also showed significantly lower satisfaction with noise level and sound privacy and lower job performance perceived by acoustic quality than enclosed private, enclosed shared, and bullpen types. The bullpen type, open-plan office without partitions, presented significantly higher satisfaction with noise level and higher performance perceived by acoustic quality than both high and low cubicles. Considering the bullpen type also showed higher satisfaction with sound privacy than the high cubicle type, high partitions don't seem to contribute to creating workspaces where people can have a secure conversation. The bullpen type didn't show any difference from the enclosed shared type in all privacy, interaction, and acoustic quality questions, indicating it may be a good option for a small office space instead of the enclosed shared type.  相似文献   
82.
While it is generally accepted that the mobile cell phone has become ubiquitous within society for communicating, the actual use of the utilities on a phone have not been reported. Understanding how communication patterns are changing in society as a result of the mobile cell phone will enable the development and/or modification of existing cell phone utilities, the concept of privacy, and a mobile literacy research domain. To explore mobile cell phone utility use, 99 people completed a mobile phone usage questionnaire. Key results from the questionnaire are physical location when using a mobile cell phone, the length of communication episodes, the usage of phone utilities and existing privacy concerns related to mobile cell phones.  相似文献   
83.
熊世春 《建筑师》2010,(6):139-141
建筑师通过对十户联拼住宅设计的分析,探索了一种新型低层高密度的居住方式,并在空间组合方式上尝试融入传统空间体系与序列.实体营造中尝试了预制混凝土的多种使用方法。  相似文献   
84.
Recently, several studies addressed security and privacy issues in vehicular ad hoc networks (VANETs). Most of them focused on safety applications. As VANETs will be available widely, it is anticipated that Internet services could be accessed through VANETs in the near future. Thus, non-safety applications for VANETs would rise in popularity. This paper proposes a novel portable privacy-preserving authentication and access control protocol, named PAACP, for non-safety applications in VANETs. In addition to the essential support of authentication, key establishment, and privacy preservation, PAACP is developed to provide sophisticated differentiated service access control, which will facilitate the deployment of a variety of non-safety applications. Besides, the portability feature of PAACP can eliminate the backend communications with service providers. Therefore, better performance and scalability can be achieved in PAACP.  相似文献   
85.
叶鹏  李雪 《华中建筑》2011,29(2):54-57
21世纪的中国已经进入老龄化社会,老年公寓的建设方兴未艾该文以安庆市福利中心老年公寓的方案设计为例,以满足老人心理及行为需求为目标,引入"家"的概念,提出了老年公寓空间环境的综合设计方法和策略.  相似文献   
86.
k-Anonymity is a method for providing privacy protection by ensuring that data cannot be traced to an individual. In a k-anonymous dataset, any identifying information occurs in at least k tuples. To achieve optimal and practical k-anonymity, recently, many different kinds of algorithms with various assumptions and restrictions have been proposed with different metrics to measure quality. This paper evaluates a family of clustering-based algorithms that are more flexible and even attempts to improve precision by ignoring the restrictions of user-defined Domain Generalization Hierarchies. The evaluation of the new approaches with respect to cost metrics shows that metrics may behave differently with different algorithms and may not correlate with some applications’ accuracy on output data.  相似文献   
87.
Manufacturers of automated systems and their components have been allocating an enormous amount of time and effort in R&D activities, which led to the availability of prototypes demonstrating new capabilities as well as the introduction of such systems to the market within different domains. Manufacturers need to make sure that the systems function in the intended way and according to specifications. This is not a trivial task as system complexity rises dramatically the more integrated and interconnected these systems become with the addition of automated functionality and features to them. This effort translates into an overhead on the V&V (verification and validation) process making it time-consuming and costly. In this paper, we present VALU3S, an ECSEL JU (joint undertaking) project that aims to evaluate the state-of-the-art V&V methods and tools, and design a multi-domain framework to create a clear structure around the components and elements needed to conduct the V&V process. The main expected benefit of the framework is to reduce time and cost needed to verify and validate automated systems with respect to safety, cyber-security, and privacy requirements. This is done through identification and classification of evaluation methods, tools, environments and concepts for V&V of automated systems with respect to the mentioned requirements. VALU3S will provide guidelines to the V&V community including engineers and researchers on how the V&V of automated systems could be improved considering the cost, time and effort of conducting V&V processes. To this end, VALU3S brings together a consortium with partners from 10 different countries, amounting to a mix of 25 industrial partners, 6 leading research institutes, and 10 universities to reach the project goal.  相似文献   
88.
Smart home automation provides residents with relief and convenience in everyday life and allows for self-determined aging in place. Yet, market penetration is offset by user concerns related to privacy and trust issues: With increasing system complexity, users may perceive a loss of control and fear technical unreliability. While barriers to acceptance in terms of privacy and trust are well understood when considered separately, they are hardly investigated in conjunction so far. We conducted a quantitative study using Adaptive Choice-Based Conjoint Analysis via an online questionnaire. We explored how aspects of privacy and trust determine the willingness to use smart homes from the perspective of (future) users (n = 137, 18 to 64 years of age), and also with respect to the level of automation and application field. Results show that semi-automated systems are rather preferred than fully automated smart home technology. The perceived reliability of automation is the most important acceptance determinant, followed by the location of data storage. Whereas the awareness to use (e.g., recommendations), the type of data, and application field are less important factors for the overall willingness to use smart homes. Findings inform scientists in the field of human-automation interaction and technical developers of smart home automation for technology innovation adapted to user needs.  相似文献   
89.
Smart cities are built upon information and communication technologies (ICTs) to enable a broad range of advanced services. Through a comprehensive literature review, this study identified four pitfalls brought by the pervasive application of ICT, including information insecurity, privacy leakage, information islands, and digital divide. Therefore, a questionnaire survey together with 27 interviews was conducted in Hong Kong to investigate how the public perceived these pitfalls within the context of mobile apps providing real-time parking information which form a major part of smart mobility. System insecurity and privacy leakage were found to arouse worries among the app-users while their awareness of protecting personal data was found to have room for improvement. Islands of real-time parking information occur as a result of the lack of collaboration among private carpark operators. Digital divide existed widely among the disadvantaged groups and the problem cannot be solved by mere provision of ICT facilities. Overall, technologies alone cannot make a city smart or smarter. It is the suitable way in which ICTs are used to serve all citizens that matters.  相似文献   
90.
Despite the benefits of EHRs (Electronic Health Records), there is a growing concern over the risks of privacy exposure associated with the technologies of EHR storing and transmission. To deal with this problem, a time-aware searchable encryption with designated server is proposed in this paper. It is based on Boneh's public key encryption with keyword search and Rivest's timed-release cryptology. Our construction has three features: the user cannot issue a keyword search query successfully unless the search falls into the specific time range; only the authorized user can generate a valid trapdoor; only the designated server can execute the search. Applying our scheme in a multi-user environment, the number of the keyword ciphertexts would not increase linearly with the number of the authorized users. The security and performance analysis shows that our proposed scheme is securer and more efficient than the existing similar schemes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号