全文获取类型
收费全文 | 16274篇 |
免费 | 2101篇 |
国内免费 | 1770篇 |
专业分类
电工技术 | 788篇 |
综合类 | 1735篇 |
化学工业 | 177篇 |
金属工艺 | 139篇 |
机械仪表 | 720篇 |
建筑科学 | 449篇 |
矿业工程 | 217篇 |
能源动力 | 80篇 |
轻工业 | 187篇 |
水利工程 | 127篇 |
石油天然气 | 75篇 |
武器工业 | 110篇 |
无线电 | 4854篇 |
一般工业技术 | 1122篇 |
冶金工业 | 384篇 |
原子能技术 | 26篇 |
自动化技术 | 8955篇 |
出版年
2024年 | 44篇 |
2023年 | 274篇 |
2022年 | 470篇 |
2021年 | 577篇 |
2020年 | 647篇 |
2019年 | 540篇 |
2018年 | 552篇 |
2017年 | 678篇 |
2016年 | 709篇 |
2015年 | 767篇 |
2014年 | 1277篇 |
2013年 | 1223篇 |
2012年 | 1237篇 |
2011年 | 1202篇 |
2010年 | 988篇 |
2009年 | 955篇 |
2008年 | 1115篇 |
2007年 | 1185篇 |
2006年 | 952篇 |
2005年 | 945篇 |
2004年 | 818篇 |
2003年 | 716篇 |
2002年 | 537篇 |
2001年 | 483篇 |
2000年 | 257篇 |
1999年 | 173篇 |
1998年 | 135篇 |
1997年 | 129篇 |
1996年 | 103篇 |
1995年 | 129篇 |
1994年 | 68篇 |
1993年 | 49篇 |
1992年 | 35篇 |
1991年 | 26篇 |
1990年 | 24篇 |
1989年 | 11篇 |
1988年 | 11篇 |
1987年 | 6篇 |
1986年 | 5篇 |
1985年 | 11篇 |
1984年 | 4篇 |
1983年 | 11篇 |
1982年 | 8篇 |
1976年 | 4篇 |
1964年 | 12篇 |
1962年 | 5篇 |
1961年 | 5篇 |
1960年 | 5篇 |
1959年 | 4篇 |
1955年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security. 相似文献
2.
Dimpi Paul Rajib Biswas Gunjan Saikia 《International Journal of Communication Systems》2021,34(1):e4669
We report here the development of two computational tools PCFPS (Photonic Crystal Fiber Parameter Study) and PCFPA (Photonic Crystal Fiber Parameter Analysis), equipped with graphical user interface (GUI) for modeling of photonic crystal fiber. The tools are based on different structural parameters, and they provide characteristic analysis of the modal parameters from the structural parameters. The main feature of PCFPS is that it enables the user to find out the values of each defining modal parameter that has an immense contribution towards the manufacture of photonic crystal fiber. Additionally, PCFPA allows the user to observe the variation in the modal parameters with respect to the changes in structural parameters (such as d, Λ, d/Λ, and λ/>Λ). Besides their ease of use, these two schemes have high computational precision and adaptability, giving a novel platform to optical engineers to modulate the microstructured fibers according to their requirement. 相似文献
3.
Understanding the mechanisms leading to the rise and dissemination of antimicrobial resistance (AMR) is crucially important for the preservation of power of antimicrobials and controlling infectious diseases. Measures to monitor and detect AMR, however, have been significantly delayed and introduced much later after the beginning of industrial production and consumption of antimicrobials. However, monitoring and detection of AMR is largely focused on bacterial pathogens, thus missing multiple key events which take place before the emergence and spread of AMR among the pathogens. In this regard, careful analysis of AMR development towards recently introduced antimicrobials may serve as a valuable example for the better understanding of mechanisms driving AMR evolution. Here, the example of evolution of tet(X), which confers resistance to the next-generation tetracyclines, is summarised and discussed. Initial mechanisms of resistance to these antimicrobials among pathogens were mostly via chromosomal mutations leading to the overexpression of efflux pumps. High-level resistance was achieved only after the acquisition of flavin-dependent monooxygenase-encoding genes from the environmental microbiota. These genes confer resistance to all tetracyclines, including the next-generation tetracyclines, and thus were termed tet(X). ISCR2 and IS26, as well as a variety of conjugative and mobilizable plasmids of different incompatibility groups, played an essential role in the acquisition of tet(X) genes from natural reservoirs and in further dissemination among bacterial commensals and pathogens. This process, which took place within the last decade, demonstrates how rapidly AMR evolution may progress, taking away some drugs of last resort from our arsenal. 相似文献
4.
A random placement of large-scale sensor network in the outdoor environment often causes low coverage.An area coverage optimization algorithm of mobile sensor network (MSN) based on virtual force perturbation and Cuckoo search (VF-CS) was proposed.Firstly,the virtual force of the sensor nodes within the Thiessen polygon was analyzed based on the partitioning of Voronoi diagram of the monitoring area.Secondly,the force of polygon vertices and neighbor nodes was taken as the perturbation factor for updating the node’s location of the Cuckoo search (CS).Finally,the VF-CS guided the node to move so as to achieve the optimal coverage.The simulation results demonstrate that the proposed algorithm has higher coverage and shorter average moving distance of nodes than the Voronoi diagram based algorithms in literatures. 相似文献
5.
面对三维空间移动机器人从起始点到终止点的最短路径问题,提出一种新型的边缘点树启发式搜索(TreeEP)算法,该方法将地图空间进行密度可调的三维离散化处理,根据障碍安全距离筛选出障碍物的可靠边缘点信息,再利用树扩散架构选出最能引导搜索方向的潜力点进行扩散搜索,最终得出最短路径。提出局部调整策略,得到改进的Tree-EP算法。实验结果表明,在带障碍复杂地形最短路径搜索应用中,提出的Tree-EP算法与已有方法相比,能找到更短的移动路径。 相似文献
6.
Search results of spatio-temporal data are often displayed on a map, but when the number of matching search results is large, it can be time-consuming to individually examine all results, even when using methods such as filtered search to narrow the content focus. This suggests the need to aggregate results via a clustering method. However, standard unsupervised clustering algorithms like -means (i) ignore relevance scores that can help with the extraction of highly relevant clusters, and (ii) do not necessarily optimize search results for purposes of visual presentation. In this article, we address both deficiencies by framing the clustering problem for search-driven user interfaces in a novel optimization framework that (i) aims to maximize the relevance of aggregated content according to cluster-based extensions of standard information retrieval metrics and (ii) defines clusters via constraints that naturally reflect interface-driven desiderata of spatial, temporal, and keyword coherence that do not require complex ad-hoc distance metric specifications as in -means. After comparatively benchmarking algorithmic variants of our proposed approach – RadiCAL – in offline experiments, we undertake a user study with 24 subjects to evaluate whether RadiCAL improves human performance on visual search tasks in comparison to -means clustering and a filtered search baseline. Our results show that (a) our binary partitioning search (BPS) variant of RadiCAL is fast, near-optimal, and extracts higher-relevance clusters than -means, and (b) clusters optimized via RadiCAL result in faster search task completion with higher accuracy while requiring a minimum workload leading to high effectiveness, efficiency, and user satisfaction among alternatives. 相似文献
7.
为了提高夹心式压电驱动移动系统的机械输出性能,提出了一种U型预压力调节机构,并开展了预压力对夹心式压电驱动履带移动系统输出性能影响关系的实验研究。首先,针对U型预压力调节机构的安装对夹心式压电振子的振动特性影响关系开展了有限元仿真分析,发现U型预压力调节机构始终处在夹心式压电振子的两相工作模态振动节点位置;其次,开展了夹心式压电驱动履带移动系统的原理样机的预压力调节测试实验,确定了系统的最大输出牵引力及其所对应的最佳预压力;最后,在最佳预压力工作状态下,开展了原理样机的牵引力特性、越障性能以及模拟月壤环境下的运动特性实验。研究结果表明,在最佳预压力工作状态下,夹心式压电驱动履带移动系统的机械输出性能最佳,为其进一步在月面巡视器上的应用提供了技术支持和试验基础。 相似文献
8.
Tayana Panova Xavier Carbonell Andres Chamarro Diana Ximena Puerta-Cortés 《Behaviour & Information Technology》2020,39(9):944-956
ABSTRACT People around the world spend hours of their daily lives using smartphones; therefore, it is important to conduct cross-cultural research on the effects of smartphone use on health and well-being as culture influences values, motivations and communication patterns. The purpose of this study was to explore 5 popular uses of the smartphone – messaging, browsing the Internet, posting social content, reading social content, and playing games – how they relate to anxiety and depression scores, and how they vary depending on the country of the participants: Spain, the United States, and Colombia. In all three countries the ranking of most popular uses was the same: (1) Messaging, (2) Reading social content, and (3) Browsing the Internet. In the USA, game playing contributed to anxiety scores whereas reading social content was a protective factor; regarding depression scores, text messaging was a contributing factor. In Spain, browsing the Internet contributed to anxiety scores; regarding depression scores, messaging was a contributing factor and posting social content was a protective factor. In Colombia, no specific use influenced anxiety scores; regarding depression scores, only game playing was a protective factor. Our results showed that in all the countries, problematic smartphone use contributed to anxiety scores. 相似文献
9.
伴随着教育信息化和混合式教学的浪潮,许多课程都开始了信息化的教学改革。本文以《移动商务》课程为例,从课程定位、课程目标、课程设计、课程实施、课程评价五个方面对该课程的信息化教学予以总结,希望进一步提高《移动商务》课程的教学效果。 相似文献
10.
为进一步减少煤矿事故发生后的人员伤亡、财产损失,在分析国内外煤矿井下避难系统发展的基础上,以何家塔煤矿井下避难硐室系统的构建设计与应用为例,详细介绍了井下避难硐室系统的分类、结构构成、功能需求和配套设施等,并通过紧急避险疏散时间的校验计算,提出避难硐室距离采掘工作面以不超过1 000 m为宜,且应按照“地面最安全,先逃生后避险”原则进行避险救援,为国内其他矿井避难硐室的构建应用和相关标准的制定提供了参考。 相似文献