首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   454篇
  免费   24篇
  国内免费   24篇
电工技术   4篇
综合类   29篇
化学工业   3篇
金属工艺   1篇
机械仪表   6篇
建筑科学   70篇
矿业工程   1篇
轻工业   14篇
水利工程   1篇
武器工业   2篇
无线电   61篇
一般工业技术   12篇
冶金工业   8篇
自动化技术   290篇
  2024年   2篇
  2023年   2篇
  2022年   3篇
  2021年   5篇
  2020年   10篇
  2019年   8篇
  2018年   10篇
  2017年   13篇
  2016年   19篇
  2015年   16篇
  2014年   37篇
  2013年   37篇
  2012年   32篇
  2011年   34篇
  2010年   33篇
  2009年   25篇
  2008年   31篇
  2007年   46篇
  2006年   23篇
  2005年   33篇
  2004年   17篇
  2003年   16篇
  2002年   10篇
  2001年   12篇
  2000年   6篇
  1999年   4篇
  1998年   2篇
  1997年   3篇
  1996年   3篇
  1995年   2篇
  1994年   1篇
  1993年   3篇
  1991年   1篇
  1989年   1篇
  1982年   1篇
  1980年   1篇
排序方式: 共有502条查询结果,搜索用时 15 毫秒
1.
This study explored adolescents’ opinions about how Internet use supports the achievement of their developmental tasks. Qualitative data were collected in focus groups interviews with 127 Italian Internet users (11–20) attending middle and high schools. Discussions were recorded, transcribed and analyzed using content analysis. Results showed that the Internet plays important functions in identity formation, personal autonomy, and relationships outside the family. It allows teens to develop their own interests, to identify with others and, at the same time, differentiate from others. The Internet is also an arena in which adolescents develop and practice autonomy. The Internet can be a source of conflict with parents, because of parents’ concerns about Internet use. However, the Internet can also be a meeting ground with parents. Finally, participants indicated the Internet is used to form close relationships with peers. Gender and age differences are discussed. Although the study is cross-sectional and relies only on adolescent report, findings illustrate how the conceptual framework of developmental goals may be helpful for understanding how the Internet can affect adolescents’ lives.  相似文献   
2.
Meat is deeply associated with masculine identity. As such, it is unsurprising that women are more likely than men are to become vegetarian. Given the gendered nature of vegetarianism, might men and women who become vegetarian express distinct identities around their diets? Through two highly powered preregistered studies (Ns = 890 and 1775) of self-identified vegetarians, combining both frequentist and Bayesian approaches, I found that men and women differ along two dimensions of vegetarian identity: (1) dietary motivation and (2) dietary adherence. Compared to vegetarian men, vegetarian women reported that they are more prosocially motivated to follow their diet and adhere to their diet more strictly (i.e., are less likely to cheat and eat meat). By considering differences in how men and women construe vegetarian dieting, investigators can generate deeper insights into the gendered nature of eating behavior.  相似文献   
3.
The purpose of this study was to examine the relationships between computer use, identity formation, and self-esteem among Black and White emerging adult females. One hundred 56 female college students participated in this study by completing a survey that included the Internet/Computer Use Questionnaire, the Ego Identity Process Questionnaire, and the Rosenberg Self Esteem Scale. Racial differences were found between Black and White females with regard to perceived problematic use of the Internet and use of the computer for communication and use of the Internet for schoolwork. In addition, differences between Black and White females were found between identity formation and problematic use of the Internet and between self-esteem and type of use of the Internet. These findings were discussed in relation to future research and interventions.  相似文献   
4.
本文在广义ElGamal型签名方案上建立了许多口令鉴别方案,并且提出了文[1]的三个改进方案。利用这些方案,计算机系统不仅能监测和控制口令的使用,而且可以抗击许多对口令的伪造攻击。  相似文献   
5.
陶志勇  杨静 《信息技术》2003,27(4):51-53
电子商务中信息传输与共享技术是电子商务的核心技术 ,电子商务是以Internet为基础的新兴产业 ,保护信息的安全无疑是十分重要的 ,人们越来越多地使用计算机网络来传送对安全敏感的信息 ,所以在信息传输域共享中 ,认证业务、保密业务、数据完整性业务、不可否认业务是当前电子商务急需解决的关键技术 ,本文对这方面做了一些探讨并提出自己的看法  相似文献   
6.
对导线物证同一性的鉴定,可先用X射线能谱仪快速确定物证为同一物的必要条件,再用扫描电镜对物证的特征条纹或金相组织进行最后判定。该方法简便,可靠。  相似文献   
7.
PKI技术及其在校园网中的应用研究   总被引:1,自引:0,他引:1  
将PKI技术引入校园网络,构建基于PKI技术的数字认证中心,既保证了校园网络的安全性,实现安全文件传输,又解决了校园网络用户身份认证的问题,推进高校信息化的同时提高校园网的安全性。  相似文献   
8.
Prior research has shown that approximately 50% of active participants in the 3D virtual world of Second Life have one or more secondary avatars or “alts” in addition to their primary avatar. Thus, these individuals are operating a “multiple or poly-identity system” composed of a physical self, a primary avatar, and one or more alts. However, little is known about the functions these virtual identities serve for the virtual-world user. The current study involved qualitative analysis of semistructured interviews with Second Life participants (N = 24) who had a primary avatar and at least one alt. Interviews were coded to examine the functions that primary avatars and alts served. Eight functions—seven suggested by previous research on virtual world identity and one that emerged from analyses—were reflected in a large majority of the transcribed interviews and are described in the article. The current findings add to our understanding of how multifaceted identity systems operate, as more individuals augment their physical self with a set of virtual identities.  相似文献   
9.
各种类型的移动平台如智能手机、平板电脑、嵌入式系统快速普及,并渗透到生活和工作的方方面面,但是移动平台在带给大家丰富多彩的应用和方便快捷的生活的同时,也带来了许多新的安全问题。身份认证和接入认证是保护移动平台的第一道屏障。结合多点触控技术、重力感应技术和图形密码,设计、开发了适用于移动平台的几种身份认证方案,包括绘制曲线认证方案、图像选择认证方案、多点指划认证方案和重力感应认证方案。所设计的方案较之单纯的口令式密码,设置口令和验证口令直观方便,通过简单的操作即可产生较大的密钥空间。经分析,所提方案操作方便,安全性较高。  相似文献   
10.
随着云计算的发展,身份管理问题已经引起业界高度关注。基于群签名的身份认证机制保证了云服务提供者不能通过外包的数据回溯用户的身份信息,并广泛应用于云计算环境的身份管理中,但它无法阻止恶意用户对云服务的非法访问。针对此不足,改进了现有的身份管理模型,将信任管理与群签名机制相结合,设计了基于信任的身份管理模型。本模型首先计算用户信任度并将其作为群签名分组的依据,再利用群签名机制实现用户认证,在应用中既能保证用户隐私,又能帮助云计算提供者保护资源。实验结果表明,本模型能有效识别恶意用户,帮助云服务提供者阻止恶意用户对资源的访问。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号