首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1414篇
  免费   78篇
  国内免费   111篇
电工技术   9篇
综合类   62篇
化学工业   8篇
金属工艺   1篇
机械仪表   22篇
建筑科学   72篇
矿业工程   3篇
能源动力   1篇
轻工业   70篇
水利工程   1篇
石油天然气   11篇
武器工业   5篇
无线电   274篇
一般工业技术   15篇
冶金工业   9篇
原子能技术   1篇
自动化技术   1039篇
  2024年   3篇
  2023年   11篇
  2022年   8篇
  2021年   10篇
  2020年   23篇
  2019年   16篇
  2018年   24篇
  2017年   34篇
  2016年   43篇
  2015年   33篇
  2014年   68篇
  2013年   80篇
  2012年   86篇
  2011年   136篇
  2010年   89篇
  2009年   86篇
  2008年   93篇
  2007年   127篇
  2006年   109篇
  2005年   122篇
  2004年   97篇
  2003年   88篇
  2002年   55篇
  2001年   43篇
  2000年   27篇
  1999年   30篇
  1998年   16篇
  1997年   6篇
  1996年   6篇
  1995年   8篇
  1994年   3篇
  1993年   5篇
  1991年   4篇
  1990年   6篇
  1989年   1篇
  1988年   2篇
  1987年   1篇
  1985年   1篇
  1983年   1篇
  1982年   1篇
  1980年   1篇
排序方式: 共有1603条查询结果,搜索用时 15 毫秒
1.
This study explored adolescents’ opinions about how Internet use supports the achievement of their developmental tasks. Qualitative data were collected in focus groups interviews with 127 Italian Internet users (11–20) attending middle and high schools. Discussions were recorded, transcribed and analyzed using content analysis. Results showed that the Internet plays important functions in identity formation, personal autonomy, and relationships outside the family. It allows teens to develop their own interests, to identify with others and, at the same time, differentiate from others. The Internet is also an arena in which adolescents develop and practice autonomy. The Internet can be a source of conflict with parents, because of parents’ concerns about Internet use. However, the Internet can also be a meeting ground with parents. Finally, participants indicated the Internet is used to form close relationships with peers. Gender and age differences are discussed. Although the study is cross-sectional and relies only on adolescent report, findings illustrate how the conceptual framework of developmental goals may be helpful for understanding how the Internet can affect adolescents’ lives.  相似文献   
2.
Meat is deeply associated with masculine identity. As such, it is unsurprising that women are more likely than men are to become vegetarian. Given the gendered nature of vegetarianism, might men and women who become vegetarian express distinct identities around their diets? Through two highly powered preregistered studies (Ns = 890 and 1775) of self-identified vegetarians, combining both frequentist and Bayesian approaches, I found that men and women differ along two dimensions of vegetarian identity: (1) dietary motivation and (2) dietary adherence. Compared to vegetarian men, vegetarian women reported that they are more prosocially motivated to follow their diet and adhere to their diet more strictly (i.e., are less likely to cheat and eat meat). By considering differences in how men and women construe vegetarian dieting, investigators can generate deeper insights into the gendered nature of eating behavior.  相似文献   
3.
论文比较详细地阐述了涉密网主机系统所面临的安全隐患,提出了涉密网主机安全防护所要解决的几个技术问题,并就可能实现的技术方法进行了探讨和比较。  相似文献   
4.
The purpose of this study was to examine the relationships between computer use, identity formation, and self-esteem among Black and White emerging adult females. One hundred 56 female college students participated in this study by completing a survey that included the Internet/Computer Use Questionnaire, the Ego Identity Process Questionnaire, and the Rosenberg Self Esteem Scale. Racial differences were found between Black and White females with regard to perceived problematic use of the Internet and use of the computer for communication and use of the Internet for schoolwork. In addition, differences between Black and White females were found between identity formation and problematic use of the Internet and between self-esteem and type of use of the Internet. These findings were discussed in relation to future research and interventions.  相似文献   
5.
本文在广义ElGamal型签名方案上建立了许多口令鉴别方案,并且提出了文[1]的三个改进方案。利用这些方案,计算机系统不仅能监测和控制口令的使用,而且可以抗击许多对口令的伪造攻击。  相似文献   
6.
陶志勇  杨静 《信息技术》2003,27(4):51-53
电子商务中信息传输与共享技术是电子商务的核心技术 ,电子商务是以Internet为基础的新兴产业 ,保护信息的安全无疑是十分重要的 ,人们越来越多地使用计算机网络来传送对安全敏感的信息 ,所以在信息传输域共享中 ,认证业务、保密业务、数据完整性业务、不可否认业务是当前电子商务急需解决的关键技术 ,本文对这方面做了一些探讨并提出自己的看法  相似文献   
7.
对导线物证同一性的鉴定,可先用X射线能谱仪快速确定物证为同一物的必要条件,再用扫描电镜对物证的特征条纹或金相组织进行最后判定。该方法简便,可靠。  相似文献   
8.
由于B/S模式下客户机对服务器的验证困难,提出了使用Remoting程序对网站的真伪进行验证。方案实现了客户端和服务器端的相互认证、服务器端敏感信息的安全存储和每次认证产生不同的会话密钥,安全分析表明,所提的方案能有效防范钓鱼网站等的常见攻击,增加了系统的安全性。方案使用.NET进行实现,证明是可行的。  相似文献   
9.
PKI技术及其在校园网中的应用研究   总被引:1,自引:0,他引:1  
将PKI技术引入校园网络,构建基于PKI技术的数字认证中心,既保证了校园网络的安全性,实现安全文件传输,又解决了校园网络用户身份认证的问题,推进高校信息化的同时提高校园网的安全性。  相似文献   
10.
Prior research has shown that approximately 50% of active participants in the 3D virtual world of Second Life have one or more secondary avatars or “alts” in addition to their primary avatar. Thus, these individuals are operating a “multiple or poly-identity system” composed of a physical self, a primary avatar, and one or more alts. However, little is known about the functions these virtual identities serve for the virtual-world user. The current study involved qualitative analysis of semistructured interviews with Second Life participants (N = 24) who had a primary avatar and at least one alt. Interviews were coded to examine the functions that primary avatars and alts served. Eight functions—seven suggested by previous research on virtual world identity and one that emerged from analyses—were reflected in a large majority of the transcribed interviews and are described in the article. The current findings add to our understanding of how multifaceted identity systems operate, as more individuals augment their physical self with a set of virtual identities.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号