全文获取类型
收费全文 | 868篇 |
免费 | 105篇 |
国内免费 | 83篇 |
专业分类
电工技术 | 30篇 |
综合类 | 97篇 |
化学工业 | 10篇 |
金属工艺 | 4篇 |
机械仪表 | 22篇 |
建筑科学 | 7篇 |
矿业工程 | 4篇 |
能源动力 | 4篇 |
轻工业 | 8篇 |
水利工程 | 4篇 |
石油天然气 | 2篇 |
武器工业 | 2篇 |
无线电 | 170篇 |
一般工业技术 | 19篇 |
冶金工业 | 260篇 |
原子能技术 | 2篇 |
自动化技术 | 411篇 |
出版年
2023年 | 6篇 |
2022年 | 10篇 |
2021年 | 14篇 |
2020年 | 16篇 |
2019年 | 17篇 |
2018年 | 12篇 |
2017年 | 18篇 |
2016年 | 33篇 |
2015年 | 22篇 |
2014年 | 32篇 |
2013年 | 41篇 |
2012年 | 64篇 |
2011年 | 83篇 |
2010年 | 91篇 |
2009年 | 67篇 |
2008年 | 96篇 |
2007年 | 88篇 |
2006年 | 73篇 |
2005年 | 63篇 |
2004年 | 59篇 |
2003年 | 40篇 |
2002年 | 33篇 |
2001年 | 24篇 |
2000年 | 4篇 |
1999年 | 6篇 |
1997年 | 6篇 |
1995年 | 1篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 5篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1979年 | 1篇 |
1970年 | 1篇 |
1968年 | 1篇 |
1965年 | 4篇 |
1964年 | 2篇 |
1963年 | 2篇 |
1962年 | 3篇 |
1961年 | 1篇 |
1959年 | 1篇 |
1957年 | 1篇 |
1955年 | 1篇 |
1954年 | 1篇 |
排序方式: 共有1056条查询结果,搜索用时 62 毫秒
1.
现有互联网因其原始设计不足已在服务质量、资源利用率、管控能力等诸多方面暴露出严重弊端,难以支撑起"互联网+"新业态高速发展对通信网络与服务日趋复杂化、多元化的需求.因此,如何设计全新的互联网已成为信息领域最为迫切与核心的研究内容之一,受到学术界与产业界的高度重视.本文基于前期"标识网络"与"智慧标识网络"研究,创造性提出"智融标识网络"体系及其关键机制,通过全网多空间、多维度资源的智慧融合,实现个性化服务的按需供给与灵活化组网的有效支撑,为不同行业与用户提供高效的差异化、定制化通信网络服务,以普遍适用于高铁网络、工业互联网、车联网等各类迥异应用情景. 相似文献
2.
Open source projects leverage a large number of people to review products and improve code quality. Differences among participants are inevitable and important to this collaborative review process—participants with different expertise, experience, resources, and values approach the problems differently, increasing the likelihood of finding more bugs and fixing the particularly difficult ones. To understand the impacts of member differences on the open source software peer review process, we examined bug reports of Mozilla Firefox. These analyses show that the various types of member differences increase workload as well as frustration and conflicts. However, they facilitate situated learning, problem characterization, design review, and boundary spanning. We discuss implications for work performance and community engagement, and suggest several ways to leverage member differences in the open source software peer review process. 相似文献
3.
Receiving negative peer feedback in social media may have negative consequences for adolescents’ psychosocial development and well-being. Therefore, the first aim of this study was to investigate online behavior (i.e., online social exploration, risky online self-presentation) that predicts receiving negative online peer feedback. The second aim was to examine three types of precursors that may predict this online behavior and, indirectly, negative feedback: (a) developmental (i.e., sex, age), (b) dispositional (i.e., sensation seeking, inhibitory control), and (c) social precursors (i.e., peer problems, family conflict). We collected survey data among 785 Dutch adolescents (10–15 years old). Our results showed that adolescents who engaged in online social exploration and risky online self-presentation more often, were more likely to receive negative peer feedback. Online social exploration was more prevalent among the older adolescents and adolescents characterized by higher sensation seeking and more family conflict. In addition, risky online self-presentation was more prevalent among adolescents high in sensation seeking. Consequently, these adolescents’ online behavior, indirectly, made them more at risk of receiving negative peer feedback in social media. 相似文献
4.
Extended access control lists (ACLs) are used to filter packets for network security. However, in current network frameworks, ACL rules are not transferred simultaneously with devices that move across network segments. The Internet Engineering Task Force proposed the Locator/Identifier Separation Protocol (LISP), which enables routers (xTRs) to configure ACL rules for blocking immobile endpoint identifiers (EIDs). However, when an EID moves from the original xTR to a new xTR, the ACL rules at the original xTR cannot be transferred with the EID. Thus, the new xTR lacks the corresponding ACL rules to effectively block the EID, resulting in security risks. The highlights of this study are as follows. First, a method is proposed for dynamically transferring ACL rules in LISP environments and frameworks. Second, the map‐register and map‐notify protocols were combined to encapsulate and transfer the ACL rules and thus obviate an additional process required to transfer these rules. Third, the experimental results verified that the proposed method can be used to achieve synchronized security protection in an LISP environment involving cross‐segment EID movements. 相似文献
5.
Lisa C. Morgans Sarah Bolt Elizabeth Bruno-McClung Lisa van Dijk Maria P. Escobar Henry J. Buller David C.J. Main Kristen K. Reyher 《Journal of dairy science》2021,104(2):2212-2230
Farmer-led, participatory approaches are being increasingly employed in agricultural research, with promising results. This study aimed to understand how a participatory approach based on the Danish stable schools could help to achieve practical, farmer-led changes that reduced reliance on antimicrobials in the UK. Five facilitated farmer action groups comprising 30 dairy farms across South West England met on farm at regular intervals between 2016 and 2018, and worked collaboratively within their groups to discuss how to reduce antimicrobial use. Qualitative data from group discussions and individual semi-structured interviews were collected and analyzed using thematic analysis to explore how the approach helped farmers address and deal with changes to their on-farm practices. Facilitator-guided reviews of antimicrobial use and benchmarking were carried out on each farm to assess any change in usage and help farmers review their practices. The pattern of antimicrobial use changed over the 2 yr of the study, with 21 participating farms reducing their use of highest-priority critically important antibiotics (6 farms were not using any of these critical medicines from the outset). Thirty practical action plans were co-developed by the groups with an average implementation rate of 54.3% within a year. All assessed farms implemented 1 recommendation, and many were still ongoing at the end of the study. Farmers particularly valued the peer-to-peer learning during farm walks. Farmers reported how facilitated discussions and action planning as a peer group had empowered them to change practices. Participants identified knowledge gaps during the project, particularly on highest-priority critically important antibiotics, where they were not getting information from their veterinarians. The study demonstrated that facilitation has a valuable role to play in participatory approaches beyond moderating discussion; facilitators encouraged knowledge mobilization within the groups and were participants in the research as well. Facilitated, farmer-led, participatory approaches that mobilize different forms of knowledge and encourage peer learning are a promising way of helping farmers to adapt and develop responsible practices. 相似文献
6.
Christer Thrane 《Journal of Wine Research》2019,30(2):166-177
The micro level behavioral foundation for how quality reviews of experts and word of mouth (WOM) affect demand for experience goods has received scant attention in previous research. Taking an experimental approach, the present study examines how quality reviews and peer recommendations influence consumers’ decisions to buy red wine. Four main findings are presented for a sample of Norwegian wine consumers. First, consumers prefer wines that have obtained very good quality reviews to wines getting OK quality reviews. Second, consumers prefer peer-recommended wines to non-recommended wines. Third, the effect of a very good quality review is greater for non-recommended wines than for peer-recommended wines. Fourth, some of these effects on wine buying decisions are contingent on price level, and there is also some heterogeneity to their magnitude. The results are mainly in concert with the proposed hypotheses. 相似文献
7.
8.
最近几年逐渐出现了对同行评议文本情感分析的研究,包括通过同行评议文本预测审稿人的推荐状态的任务。现有模型融入了论文本身或摘要信息,采用神经网络学习论文或摘要的高层表示,结合同行评议文本预测审稿人的推荐状态,这使得模型变得非常复杂的同时结果却没有实质性的提高。为此,提出了OSA机制来提高情感分析模型中对观点句的关注度。具体来说,采用pu-learning从同行评议文本的前N个句子中学习观点句的特征,使每一个句子都得到一个观点句权重,将其应用于情感分析模型的倒数第二层,由此得到最终的预测结果。在ICLR2017—2018数据集上使用不同的情感分析模型对OSA进行了评估,实验结果验证了OSA的高效性,并在两个数据集上取得了优异的性能。 相似文献
9.
In mobile ad hoc peer to peer (M-P2P) networks, since nodes are highly resource constrained, it is effective to retrieve data items using a top-k query, in which data items are ordered by the score of a particular attribute and the query-issuing node acquires data items with the k highest scores. However, when network partitioning occurs, the query-issuing node cannot connect to some nodes having data items included in the top-k query result, and thus, the accuracy of the query result decreases. To solve this problem, data replication is a promising approach. However, if each node sends back its own data items (replicas) responding to a query without considering replicas held by others, same data items are sent back to the query-issuing node more than once through long paths, which results in increase of traffic. In this paper, we propose a top-k query processing method considering data replication in M-P2P networks. This method suppresses duplicate transmissions of same data items through long paths. Moreover, an intermediate node stops transmitting a query message on-demand. 相似文献
10.
Decentralized Online Social Networks (DOSNs) have recently captured the interest of users because of the more control given to them over their shared contents. Indeed, most of the user privacy issues related to the centralized Online Social Network (OSN) services (such as Facebook or Google+) do not apply in the case of DOSNs because of the absence of the centralized service provider. However, these new architectures have motivated researchers to investigate new privacy solutions that allow DOSN’s users to protect their contents by taking into account the decentralized nature of the DOSNs platform.In this survey, we provide a comprehensive overview of the privacy solutions adopted by currently available DOSNs, and we compare them by exploiting several criteria. After presenting the differences that existing DOSNs present in terms of provided services and architecture, we identify, for each of them, the privacy model used to define the privacy policies and the mechanisms for their management (i.e., initialization and modification of the privacy policy). In addition, we evaluate the overhead introduced by the security mechanisms adopted for privacy policy management and enforcement by discussing their advantages and drawbacks. 相似文献