首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8639篇
  免费   609篇
  国内免费   636篇
工业技术   9884篇
  2024年   17篇
  2023年   138篇
  2022年   262篇
  2021年   394篇
  2020年   424篇
  2019年   214篇
  2018年   192篇
  2017年   287篇
  2016年   297篇
  2015年   301篇
  2014年   586篇
  2013年   598篇
  2012年   648篇
  2011年   606篇
  2010年   380篇
  2009年   283篇
  2008年   328篇
  2007年   380篇
  2006年   376篇
  2005年   395篇
  2004年   408篇
  2003年   460篇
  2002年   480篇
  2001年   474篇
  2000年   443篇
  1999年   280篇
  1998年   137篇
  1997年   53篇
  1996年   26篇
  1995年   12篇
  1994年   1篇
  1993年   2篇
  1986年   1篇
  1981年   1篇
排序方式: 共有9884条查询结果,搜索用时 15 毫秒
71.
Classical pedagogy about Human History has dealt with many historic events as a mere collection of dates, locations and a number of confronted sides with a final result of victory or defeat. In the same line of thinking, many popular battles and wars are not well understood due to non-rigorous treatment in comics, movies and documentaries. In order to fight these drawbacks we propose a novel technology-enhanced pedagogical approach named REENACT which is aimed at engaging groups of people into immersive experiences to improve their learning about historical battles and wars from the points of view of reenactors and historians. To this aim, REENACT relies on handheld devices and an advanced technological facility that comprises social networking features, augmented reality capabilities and repositories of multimedia contents. Our pedagogical approach has been experimentally validated in collaboration with the Foundation of the Hellenic World in Greece and the School of Telecommunication Engineering from the University of Vigo in Spain. The obtained results in terms of Quality of Experience, Quality of Service and Quality of Community reveal the potential value of the approach to provide new edutainment collective experiences which remain unexplored thus far in educational environments.  相似文献   
72.
The security and privacy issues have been well investigated in typical vehicle ad hoc networks. However, considering the drive-thru Internet properties, in particular for a secure and in-motion payment services case, merely implementing the existing online payment schemes may be either infeasible or inefficient. In this paper, we propose an advanced online payment framework, which integrates three main features, including the novel pairing-free certificateless encryption, signature and semi-honest RSU-aided verification, and the CA-aided tracking and batch auditing, and providing following properties independently, e.g., achieving a higher trust level and supporting primary security services, introducing a semi-honest RSU to indicate more practicality, and optimizing the verifying and auditing efficiency for a large number of authentication requests case. Performance evaluations such as security analysis, efficiency analysis, and simulation evaluation show the security and feasibility of the proposed framework.  相似文献   
73.
以物联网技术为核心,整合目前校内分离的各个信息化系统,建立校内资源共享的综合信息门户。运用RFID技术、传感网技术、云计算等多种先进技术建设基于物联网理念的感知校园服务平台。  相似文献   
74.
近年来,中国物联网政策支持力度不断加大,技术创新成果接连涌现,各领域应用持续深化,产业规模保持快速增长。本论文以物联网接入边界为切入点,探讨了物联网安全接入问题的解决方案。设计了基于可信计算3.0的物联网可信网关,以及安全管理中心,构建了可信的物联网安全边界接入系统。为各种异构物联网终端设备提供了安全屏障,隔绝了针对于物联网设备的网络安全威胁。  相似文献   
75.
Most real-world vehicle nodes can be structured into an interconnected network of vehicles. Through structuring these services and vehicle device interactions into multiple types, such internet of vehicles becomes multidimensional heterogeneous overlay networks. The heterogeneousness of the overlays makes it difficult for the overlay networks to coordinate with each other to improve their performance. Therefore, it poses an interesting but critical challenge to the effective analysis of heterogeneous virtual vehicular networks. A variety of virtual vehicular networks can be easily deployed onto the native network by applying the concept of SDN (Software Defined Networking). These virtual networks reflect their heterogeneousness due to their different performance goals, and they compete for the same physical resources of the underlying network, so that a sub-optimal performance of the virtual networks may be achieved. Therefore, we propose a Deep Reinforcement Learning (DRL) approach to make the virtual networks cooperate with each other through the SDN controller. A cooperative solution based on the asymmetric Nash bargaining is proposed for co-existing virtual networks to improve their performance. Moreover, the Markov Chain model and DRL resolution are introduced to leverage the heterogeneous performance goals of virtual networks. The implementation of the approach is introduced, and simulation results confirm the performance improvement of the latency sensitive, loss-rate sensitive and throughput sensitive heterogeneous vehicular networks using our cooperative solution.  相似文献   
76.
Fog computing has emerged to support the requirements of IoT applications that could not be met by today’s solutions. Different initiatives have been presented to drive the development of fog, and much work has been done to improve certain aspects. However, an in-depth analysis of the different solutions, detailing how they can be integrated and applied to meet specific requirements, is still required. In this work, we present a unified architectural model and a new taxonomy, by comparing a large number of solutions. Finally, we draw some conclusions and guidelines for the development of IoT applications based on fog.  相似文献   
77.
The use of the Internet for conducting research has found that the level of anonymity intrinsic to web-based surveys is useful in deterring various participant biases. Though, concerns about Internet privacy could interfere with the effects of perceived anonymity and influence how a person responds. In this study, participants were asked to take an Internet survey and then were randomly assigned to conditions with varying degrees of implied privacy in which they answered questions about their desire for casual sex (sociosexuality) and their lifetime sexual partners. Only in the condition without any threat to the participant’s anonymity was there no difference between men and women’s reports of their sexual behavior. However, in every condition men reported having a significantly higher sociosexuality than women. Findings are consistent with both the biologic and gender-biased explanations in differences of self-report for sexual information. Implications for social constraints and Internet based research are discussed.  相似文献   
78.
SUMMARY

Before September 2001, bioterrorism was a term that appeared occasionally in the news, but usually only in reference to foreign wars and conflicts, or in relation to an obscure possible threat. After anthrax spores began to be mailed to offices and agencies in October of 2001, the threat was no longer an abstraction, but a reality. As the Internet has become a ubiquitous resource, authoritative agencies and organizations have used the Internet as the quickest way to provide information on bioterrorism to the general public and to planning agencies. This article provides a starting point for searching for bioterrorism information and is by no means an exhaustive list.  相似文献   
79.
ABSTRACT

Internet voice and video calling have demonstrated a dramatic rise in quality in the past several years and have quickly become communication technologies with a disruptive impact on society. Librarians, who regularly adopt such technologies in outreach and public services, should evaluate Web-calling programs as potential sources of innovative reference programming. This article describes the development of Skype video and Internet telephony pilot reference services at the Ohio University Libraries and considers the utility of Skype and VoIP in a library setting.  相似文献   
80.
Despite previous research efforts on identifying the risk and protective factors of problematic Internet use (PIU), the specific mechanism among these factors are largely unknown. Thus, the present study examined the effect of adolescents’ social relationships on their PIU, as well as the effect of self-esteem as a mediator and the effect of self-control as a moderator. Survey data from 750 South Korean middle and high school students in Seoul and Gyeonggi areas were analyzed using structural equation modeling. The results are as follows. First, PIU is significantly associated with relationship with peers and with mother. Second, self-esteem did not mediate the effect of communication with mother on PIU, but was found to partially mediate the effect of peer relationship on PIU. Third, adolescents’ self-control significantly moderated the indirect effect of peer relationship on PIU via self-esteem. Through detailed analyses, this study identified self-esteem as a mediator and self-control as a moderator in the relationship between social relationships and PIU. Implications of these results for understanding the relationship among social relationships, self-esteem, self-control, and PIU are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号