全文获取类型
收费全文 | 56746篇 |
免费 | 2476篇 |
国内免费 | 199篇 |
专业分类
电工技术 | 867篇 |
综合类 | 93篇 |
化学工业 | 10830篇 |
金属工艺 | 2067篇 |
机械仪表 | 3065篇 |
建筑科学 | 1236篇 |
矿业工程 | 52篇 |
能源动力 | 2156篇 |
轻工业 | 4065篇 |
水利工程 | 252篇 |
石油天然气 | 210篇 |
武器工业 | 1篇 |
无线电 | 10017篇 |
一般工业技术 | 11226篇 |
冶金工业 | 5817篇 |
原子能技术 | 630篇 |
自动化技术 | 6837篇 |
出版年
2023年 | 531篇 |
2022年 | 833篇 |
2021年 | 1403篇 |
2020年 | 991篇 |
2019年 | 1009篇 |
2018年 | 1332篇 |
2017年 | 1326篇 |
2016年 | 1648篇 |
2015年 | 1302篇 |
2014年 | 2031篇 |
2013年 | 3480篇 |
2012年 | 3192篇 |
2011年 | 3903篇 |
2010年 | 2970篇 |
2009年 | 3163篇 |
2008年 | 2917篇 |
2007年 | 2461篇 |
2006年 | 2242篇 |
2005年 | 1937篇 |
2004年 | 1848篇 |
2003年 | 1699篇 |
2002年 | 1650篇 |
2001年 | 1290篇 |
2000年 | 1204篇 |
1999年 | 1182篇 |
1998年 | 2194篇 |
1997年 | 1436篇 |
1996年 | 1203篇 |
1995年 | 961篇 |
1994年 | 724篇 |
1993年 | 683篇 |
1992年 | 490篇 |
1991年 | 494篇 |
1990年 | 417篇 |
1989年 | 404篇 |
1988年 | 321篇 |
1987年 | 275篇 |
1986年 | 254篇 |
1985年 | 231篇 |
1984年 | 199篇 |
1983年 | 151篇 |
1982年 | 152篇 |
1981年 | 130篇 |
1980年 | 129篇 |
1979年 | 102篇 |
1978年 | 94篇 |
1977年 | 123篇 |
1976年 | 158篇 |
1975年 | 80篇 |
1974年 | 74篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
The present study investigated the effects of multi-media modules and their combinations on the learning of procedural tasks. In the experiment, 72 participants were classified as having either low- or high spatial ability based on their spatial ability test. They were randomly assigned to one of the six experimental conditions in a 2 × 3 factorial design with verbal modality (on-screen text procedure vs. auditory procedure) and the format of visual representation (static visual representation vs. static visual representation with motion cues vs. animated visual representation). After they completed their learning session, the ability to perform the procedural task was directly measured in a realistic setting. The results revealed that: (1) in the condition of static visual representation, the high spatial ability group outperformed the low spatial ability group, (2) for the low spatial ability participants, the animated visual representation group outperformed the static visual representation group, however, the static visual representation with motion cues group did not outperform the static visual representation group, (3) the use of animated visual representation helped participants with low spatial ability more than those with high spatial ability, and (4) a modality effect was found for the measure of satisfaction when viewing the animated visual representation. Since the participants with low spatial ability benefited from the use of animation, the results might support an idea that people are better able to retrieve the procedural information by viewing animated representation. The findings also might reflect a preference for the auditory mode of presentation with greater familiarity with the type of visual representation. 相似文献
992.
A number of studies have examined virtual worlds, which can facilitate knowledge sharing, education, and enjoyment, among others. However, no study has provided an insightful research model for evaluating virtual worlds. This study suggests that users’ identification with virtual communities and avatars plays a critical role in the construction of attractive virtual worlds. The proposed model measures the level of the user’s identification with virtual communities, through which the user builds his or her trust in other community members. In addition, the study suggests that users’ identification with avatars is an important element of their satisfaction with virtual worlds. The results indicate that users’ identification with virtual communities as well as avatars can enhance their efficacy and trust and thus facilitate their sustained use of virtual services. The results have important theoretical and practical implications. 相似文献
993.
The current study reconceptualized self-construal as a social cognitive indicator of self-observation that individuals employ for developing and maintaining social relationship with others. From the social cognitive perspective, this study investigated how consumers’ self-construal can affect consumers’ electronic word of mouth (eWOM) behavior through two cognitive factors (online community engagement self-efficacy and social outcome expectations) in the context of a social networking site. This study conducted an online experiment that directed 160 participants to visit a newly created online community. The results demonstrated that consumers’ relational view became salient when the consumers’ self-construal was primed to be interdependent rather than independent. Further, the results showed that such interdependent self-construal positively influenced consumers’ eWOM behavioral intentions through their community engagement self-efficacy and their social outcome expectations. 相似文献
994.
Social media services such as YouTube and Flickr have become online necessities for millions of users worldwide. Social media are online services that enable users to share contents, opinions, and perspectives that support communication with other users. Social media places an emphasis on the shared experience between users, which we call co-experience. However, the online characteristics of social media increase psychological distance between users, which, in turn, results in a decrease in the quality of co-experience. Hence, as the goal of this study, we theoretically modeled and empirically verified the antecedents and user experience-based consequences of psychological distance in a social media-enhanced real-time streaming video service. In order to reduce psychological distance, we introduced two system elements: inhabited space (the degree of being situated in context and in a meaningful place) and isomorph effects (the degree of preserving the structure of a user’s actions). We constructed a social media-enhanced real-time streaming video service prototype and conducted a field experiment with actual social media users. The prototype, which streamed a live baseball game, enabled users to simultaneously view the game from remote locations and to interact with each other through cheering tools. The results indicate that inhabited space and isomorph effects reduce psychological distance between users, and this, in turn, enhances co-experience. This paper ends with theoretical as well as practical implications of the study. 相似文献
995.
Although supplier involvement in new product development (NPD) projects has become increasingly important for strengthening a firm's competitive position, few studies have investigated the impact of changing research and development (R&D) workloads in NPD. According to the level of design-related characteristics including design-related communication and design-related nature, we identify four types of supplier–manufacturer relationships: sequential mode, passive supplier involvement, active supplier involvement, and strategic development. Differing from qualitative and survey-oriented research, this study proposes a system dynamics model for the quantitative exploration of workload impacts on R&D-system equilibrium under different supplier–manufacturer relationships. We justify experimentally the NPD performances of these supplier–manufacturer relationship configurations under workload impacts and provide managerial insights. 相似文献
996.
Sudip Misra P. Venkata Krishna Akhil Bhiwal Amardeep Singh Chawla Bernd E. Wolfinger Changhoon Lee 《The Journal of supercomputing》2012,62(1):4-23
Reliable routing of packets in a Mobile Ad Hoc Network (MANET) has always been a major concern. The open medium and the susceptibility of the nodes of being fault-prone make the design of protocols for these networks a challenging task. The faults in these networks, which occur either due to the failure of nodes or due to reorganization, can eventuate to packet loss. Such losses degrade the performance of the routing protocols running on them. In this paper, we propose a routing algorithm, named as learning automata based fault-tolerant routing algorithm (LAFTRA), which is capable of routing in the presence of faulty nodes in MANETs using multipath routing. We have used the theory of Learning Automata (LA) for optimizing the selection of paths, reducing the overhead in the network, and for learning about the faulty nodes present in the network. The proposed algorithm can be juxtaposed to any existing routing protocol in a MANET. The results of simulation of our protocol using network simulator 2 (ns-2) shows the increase in packet delivery ratio and decrease in overhead compared to the existing protocols. The proposed protocol gains an edge over FTAR, E2FT by nearly 2% and by more than 10% when compared with AODV in terms of packet delivery ratio with nearly 30% faulty nodes in the network. The overhead generated by our protocol is lesser by 1% as compared to FTAR and by nearly 17% as compared to E2FT when there are nearly 30% faulty nodes. 相似文献
997.
An enhanced Support Vector Machine classification framework by using Euclidean distance function for text document categorization 总被引:8,自引:8,他引:0
This paper presents the implementation of a new text document classification framework that uses the Support Vector Machine (SVM) approach in the training phase and the Euclidean distance function in the classification phase, coined as Euclidean-SVM. The SVM constructs a classifier by generating a decision surface, namely the optimal separating hyper-plane, to partition different categories of data points in the vector space. The concept of the optimal separating hyper-plane can be generalized for the non-linearly separable cases by introducing kernel functions to map the data points from the input space into a high dimensional feature space so that they could be separated by a linear hyper-plane. This characteristic causes the implementation of different kernel functions to have a high impact on the classification accuracy of the SVM. Other than the kernel functions, the value of soft margin parameter, C is another critical component in determining the performance of the SVM classifier. Hence, one of the critical problems of the conventional SVM classification framework is the necessity of determining the appropriate kernel function and the appropriate value of parameter C for different datasets of varying characteristics, in order to guarantee high accuracy of the classifier. In this paper, we introduce a distance measurement technique, using the Euclidean distance function to replace the optimal separating hyper-plane as the classification decision making function in the SVM. In our approach, the support vectors for each category are identified from the training data points during training phase using the SVM. In the classification phase, when a new data point is mapped into the original vector space, the average distances between the new data point and the support vectors from different categories are measured using the Euclidean distance function. The classification decision is made based on the category of support vectors which has the lowest average distance with the new data point, and this makes the classification decision irrespective of the efficacy of hyper-plane formed by applying the particular kernel function and soft margin parameter. We tested our proposed framework using several text datasets. The experimental results show that this approach makes the accuracy of the Euclidean-SVM text classifier to have a low impact on the implementation of kernel functions and soft margin parameter C. 相似文献
998.
Currently, embedded systems have been widely used for ubiquitous computing environments including digital setup boxes, mobile
phones, and USN (Ubiquitous Sensor Networks). The significance of security has been growing as it must be necessarily embedded
in all these systems. Up until now, many researchers have made efforts to verify the integrity of applied binaries downloaded
in embedded systems. The research of problem solving is organized into hardware methods and software-like methods. In this
research, the basic approach to solving problems from the software perspective was employed. From the software perspective,
unlike in the existing papers (Seshadri et al., Proc. the IEEE symposium on security and privacy, 2004; Seshadri et al., Proc. the symposium on operating systems principals, 2005) based on the standardized model (TTAS.KO-11.0054.
2006) publicized in Korea, there is no extra verifier and conduct for the verification function in the target system. Contrary
to the previous schemes (Jung et al. , 2008; Lee et al., LNCS, vol. 4808, pp. 346–355, 2007), verification results are stored in 1 validation check bit, instead of storing signature value for application binary files
in the i-node structure for the purpose of reducing run-time execution overhead. Consequently, the proposed scheme is more
efficient because it dramatically reduces overhead in storage space, and when it comes to computing, it performs one hash
algorithm for initial execution and thereafter compares 1 validation check bit only, instead of signature and hash algorithms
for every application binary. Furthermore, in cases where there are frequent changes in the i-node structure or file data
depending on the scheme application, the scheme can provide far more effective verification performance compared to the previous
schemes. 相似文献
999.
Sangseok Yun Bongjin Jun Daijin Kim Jaewoong Kim Sukhan Lee Mun-Taek Choi Munsang Kim Joong-Tae Park Jae-Bok Song 《Journal of Intelligent and Robotic Systems》2012,67(2):79-99
This paper describes a scheme for proactive human search for a designated person in an undiscovered indoor environment without human operation or intervention. In designing and developing human identification with prior information a new approach that is robust to illumination and distance variations in the indoor environment is proposed. In addition, a substantial exploration method with an octree structure, suitable for path planning in an office configuration, is employed. All these functionalities are integrated in a message- and component-based architecture for the efficient integration and control of the system. This approach is demonstrated by succeeding human search in the challenging robot mission of the 2009 Robot Grand Challenge Contest. 相似文献
1000.
Seok-Ho Yoon Jung-Hwan Shin Sang-Wook Kim Sunju Park Jae Bum Lee 《Information Sciences》2012,184(1):215-229
In the blogosphere, there exist posts relevant to a particular subject and blogs that show interest in the subject. In this paper, we define a set of such posts and blogs as a blog community and propose a method for extracting the blog community associated with a particular subject. The proposed method is based on the idea that the blogs who have performed actions (e.g., read, comment, trackback, scrap) to the posts of a particular subject are the ones with interest in the subject, and that the posts that have received actions from such blogs are the ones that contain the subject. The proposed method starts with a small number of manually-selected seed posts containing the subject. Then, the method selects the blogs that have performed actions to the seed posts over some threshold and the posts that have received actions over some threshold. Repeating these two steps gradually expands the blog community. This paper presents various techniques to improve the accuracy of the proposed method. The experimental results show that the proposed method exhibits a higher level of accuracy than the methods proposed in prior research. This paper also discusses business applications of the extracted community, such as target marketing, market monitoring, improving search results, finding power bloggers, and revitalization of the blogosphere. 相似文献