全文获取类型
收费全文 | 4759篇 |
免费 | 793篇 |
国内免费 | 508篇 |
专业分类
电工技术 | 495篇 |
技术理论 | 1篇 |
综合类 | 555篇 |
化学工业 | 45篇 |
金属工艺 | 45篇 |
机械仪表 | 234篇 |
建筑科学 | 248篇 |
矿业工程 | 73篇 |
能源动力 | 59篇 |
轻工业 | 29篇 |
水利工程 | 105篇 |
石油天然气 | 35篇 |
武器工业 | 17篇 |
无线电 | 1042篇 |
一般工业技术 | 305篇 |
冶金工业 | 86篇 |
原子能技术 | 12篇 |
自动化技术 | 2674篇 |
出版年
2024年 | 10篇 |
2023年 | 66篇 |
2022年 | 169篇 |
2021年 | 193篇 |
2020年 | 225篇 |
2019年 | 142篇 |
2018年 | 147篇 |
2017年 | 156篇 |
2016年 | 229篇 |
2015年 | 244篇 |
2014年 | 376篇 |
2013年 | 343篇 |
2012年 | 392篇 |
2011年 | 476篇 |
2010年 | 362篇 |
2009年 | 326篇 |
2008年 | 370篇 |
2007年 | 399篇 |
2006年 | 322篇 |
2005年 | 240篇 |
2004年 | 198篇 |
2003年 | 159篇 |
2002年 | 126篇 |
2001年 | 86篇 |
2000年 | 70篇 |
1999年 | 53篇 |
1998年 | 34篇 |
1997年 | 27篇 |
1996年 | 24篇 |
1995年 | 9篇 |
1994年 | 17篇 |
1993年 | 12篇 |
1992年 | 5篇 |
1991年 | 8篇 |
1990年 | 4篇 |
1989年 | 7篇 |
1988年 | 4篇 |
1986年 | 3篇 |
1985年 | 5篇 |
1984年 | 1篇 |
1982年 | 1篇 |
1981年 | 3篇 |
1979年 | 2篇 |
1978年 | 3篇 |
1977年 | 1篇 |
1976年 | 7篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1972年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有6060条查询结果,搜索用时 26 毫秒
1.
目的 探究消费者对共享单车的需求偏好,获取用户和设计师对产品的认知差距,并提出相应的设计决策,为共享单车以及两轮车行业的产品创新提供启迪与参考。方法 从设计师思维与消费者偏好的视角出发,对共享单车消费者偏好的各项设计原则(属性)进行细致分类,建立8个评价维度与41个评价特征,采用KANO模型对有效回收样本进行定量统计及定性分析。结果 基于前期调研与KANO模型分析,提出后共享时代单车设计的相关策略。结论 在后共享单车时代下,设计师需要根据用户真实的产品偏好与体验感知进行设计策略的研究,以设计出真正满足用户需求和体验期望的产品。同时也证明KANO模型作为一种阐明用户不同感性需求的方法,有助于设计师进行设计决策的综合判断,提升设计的竞争力。 相似文献
2.
3.
随着社会的发展,信息和文化资源大多来自于图书和网络,而高校图书馆有着丰富的藏书和网络资源,因此,高校图书馆网络资源的共建共享就是科学文化发展的必然结果。那么如何实现网络资源的共建共享,网络资源的共建共享又存在哪些问题,又该如何解决,本文在这里就简单的浅谈一下高校图书馆的资源共享。 相似文献
4.
We consider ex post demand information sharing in a two-echelon supply chain in which two suppliers sell differentiated products through a common retailer. We model three scenarios of information sharing to characterise the conditions under which information sharing may benefit or hurt different players: (1) no supplier is informed; (2) only one supplier is informed; and (3) both suppliers are informed. We find that the retailer may voluntarily share the low demand information when the product differentiation and demand magnitude satisfy certain conditions. In contrast, the retailer has no incentive to share the high demand information, even though this information benefits the suppliers. To achieve information sharing, we propose a side payment mechanism, which allows benefitted players to subsidise hurtful players. Finally, we extend our model by considering a situation where the suppliers have limited capacity and may invest to ramp up production capacity to satisfy a high demand. 相似文献
5.
Basins with various mineral resources coexisting and enriching often occupy an important strategic position. The exploration of various mineral resources is repetitive at present due to unshared data and imperfect management mechanism. This situation greatly increases the cost of energy exploitation in the country. Traditional data-sharing mode has several disadvantages, such as high cost, difficulty in confirming the right of data, and lack of incentive mechanism, which make achieving real data sharing difficult. In this paper, we propose a data-sharing mechanism based on blockchain and provide implementation suggestions and technical key points. Compared with traditional data-sharing methods, the proposed data-sharing mechanism can realize data sharing, ensure data quality, and protect intellectual property. Moreover, key points in the construction are stated in the case study section to verify the feasibility of the data-sharing system based on blockchain proposed in this paper. 相似文献
6.
7.
Herein, we report integrated photo-rechargeable supercapacitors (IPSs) composed of the inverted organic solar cell (iOSC) and solid-state supercapacitor (SC), enabling a high-performance self-power pack. The iOSC serves as a self-power source while the SC functions as energy storage, and both share an indium-tin-oxide (ITO) electrode that affords improved charge propagation across the devices. Combining the energy harvesting and storage devices in this way significantly alleviates the limitations of each device. The power fluctuation of the iOSC can be reimbursed by the SC, thus allowing for a stable energy output. Moreover, the SC is frequently charged by the iOSC during the daytime, thereby greatly reducing the charging time and avoiding a complete discharge as well. When the SC of the IPS is charged by the iOSC under AM 1.5 G of illumination, the overall energy conversion-storage efficiency is ca. 2.27%. Our work provides an effective strategy for further study to fabricate a small, lightweight, portable/wearable self-power pack by integrating energy harvesting and energy storage devices into a single structure. 相似文献
8.
Fake news dissemination on COVID-19 has increased in recent months, and the factors that lead to the sharing of this misinformation is less well studied. Therefore, this paper describes the result of a Nigerian sample (n = 385) regarding the proliferation of fake news on COVID-19. The fake news phenomenon was studied using the Uses and Gratification framework, which was extended by an “altruism” motivation. The data were analysed with Partial Least Squares (PLS) to determine the effects of six variables on the outcome of fake news sharing. Our results showed that altruism was the most significant factor that predicted fake news sharing of COVID-19. We also found that social media users’ motivations for information sharing, socialisation, information seeking and pass time predicted the sharing of false information about COVID-19. In contrast, no significant association was found for entertainment motivation. We concluded with some theoretical and practical implications. 相似文献
9.
Bingbing JIANG 《Frontiers of Computer Science》2022,16(1):161809
López-Alt et al.(STOC12)put forward a primitive called multi-key fully homomorphic encryption(MKFHE),in which each involved party encrypts their own data using keys that are independently and randomly chosen whereby arbitrary computations can be performed on these encrypted data by a final collector.Subsequently,several superior schemes based on the standard assumption(LWE)were proposed.Most of these schemes were constructed by expanding a fresh GSW-ciphertext or BGV-ciphertext under a single key to a new same-type ciphertext of the same message under a combination of associated parties’keys.Therefore,the new ciphertext’s size grew more or less linearly with an increase in the number of parties.In this paper,we proposed a novel and simple scheme of MKFHE based on LWE without increasing the size of the ciphertext in the two non-collusion server model.In other words,each party first independently shares their own data between two servers and each server only needs a one-round communication with another to construct a ciphertext of the same plaintext under a sum of associated parties’keys.Our new ciphertext under multiple keys has the same size as that of the original one with only one-round communication between two servers.The communication complexity is O(kmlogq)-bit,where k is the number of input ciphertexts involved,m is the size of a GSW-ciphertext and q is a modulus.In conclusion,we proved that our scheme is CPA-secure against semi-honest adversaries. 相似文献
10.
基于事故后果的安全规划法常运用于重大危险源的土地使用规划,MAPGIS具有空间地理信息方面的功能优势。安全规划的图形可以在MAPGIS环境下进行数据的提取、转换、共享、属性调整和危险分区,实现基于后果的安全规划法与MAPGIS技术的结合。以某规划的石化项目发生池火灾为实证分析,结合有关计算模型,模拟得到了MAPGIS环境下有关池火灾的危险分区图。 相似文献