全文获取类型
收费全文 | 101574篇 |
免费 | 1779篇 |
国内免费 | 546篇 |
专业分类
电工技术 | 1074篇 |
综合类 | 2348篇 |
化学工业 | 15472篇 |
金属工艺 | 5305篇 |
机械仪表 | 3623篇 |
建筑科学 | 2533篇 |
矿业工程 | 598篇 |
能源动力 | 2473篇 |
轻工业 | 4731篇 |
水利工程 | 1404篇 |
石油天然气 | 429篇 |
武器工业 | 1篇 |
无线电 | 11416篇 |
一般工业技术 | 20243篇 |
冶金工业 | 3999篇 |
原子能技术 | 421篇 |
自动化技术 | 27829篇 |
出版年
2024年 | 103篇 |
2023年 | 421篇 |
2022年 | 1008篇 |
2021年 | 1170篇 |
2020年 | 925篇 |
2019年 | 955篇 |
2018年 | 15280篇 |
2017年 | 14042篇 |
2016年 | 10715篇 |
2015年 | 1193篇 |
2014年 | 1072篇 |
2013年 | 1710篇 |
2012年 | 4005篇 |
2011年 | 10331篇 |
2010年 | 9014篇 |
2009年 | 6295篇 |
2008年 | 7415篇 |
2007年 | 8267篇 |
2006年 | 589篇 |
2005年 | 1559篇 |
2004年 | 1389篇 |
2003年 | 1404篇 |
2002年 | 726篇 |
2001年 | 272篇 |
2000年 | 352篇 |
1999年 | 229篇 |
1998年 | 356篇 |
1997年 | 277篇 |
1996年 | 275篇 |
1995年 | 189篇 |
1994年 | 179篇 |
1993年 | 169篇 |
1992年 | 120篇 |
1991年 | 158篇 |
1990年 | 103篇 |
1989年 | 100篇 |
1988年 | 98篇 |
1987年 | 96篇 |
1986年 | 78篇 |
1985年 | 92篇 |
1984年 | 80篇 |
1983年 | 78篇 |
1982年 | 64篇 |
1981年 | 73篇 |
1980年 | 50篇 |
1968年 | 46篇 |
1966年 | 43篇 |
1965年 | 46篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
981.
This article presents an in-depth qualitative study using a phenomenological approach to understand loneliness among elderly individuals in Malaysia. The objective of the study was to understand how the Malaysian elderly perceive and understand social isolation as well as loneliness, with the aim of identifying the factors that cause emotional loneliness among the elderly in nursing homes. In addition, this study also explored their coping strategies when dealing with loneliness. Semi-structured interviews were conducted with ten elderly participants from two different nursing homes in Kuala Lumpur and Selangor with representatives from the three major ethnic groups of Malaysia. Based on the results, there are several factors that cause the elderly to feel lonely – health factors, lack of family ties, and the lack of communication and cognitive factors, such as memory and perception. It was also found that internal (expectations and optimism) and external (work and activities) coping strategies play major roles in overcoming loneliness. In conclusion, some recommendations are made to respective party families and the government to consider when developing plans to help the elderly overcome loneliness, which could strengthen the family and social support system in Malaysia. 相似文献
982.
This research focused on determining the sociocultural factors that build the social perception of the social roles of senior citizens in Chile in the 2002–2012 period. For this purpose, public opinion was studied in newspapers El Mercurio and La Cuarta. Specialized opinion included the Senior Citizen Program of Pontificia Universidad Católica de Chile, the National Service for Senior Citizens, the Social Observatory for Aging and Old Age of Universidad de Chile, and the Society of Geriatrics and Gerontology of Chile. A comprehensive methodology was used, along with a bibliographical four-stage design. The following ten sociocultural factors were identified: Health and Quality of Life, Studies and Data, Social Images of Aging, Gerontological Concepts and Sociopolitical Participation, Gerontological Policies, Plans and Principles, Aging, Production and Gender, Institutionalization, Demographic Growth, Gerontological Training, and Exclusion and Old Age. This work suggests modifying the conceptual premise that emphasizes the inexistence of a social role for elderly people with a vision centered on the heterogeneity of social roles under permanent sociocultural construction. 相似文献
983.
Yanrong Lu Lixiang Li Haipeng Peng Yixian Yang 《Peer-to-Peer Networking and Applications》2016,9(2):449-459
The Session Initiation Protocol (SIP) as the core signaling protocol for multimedia services is receiving much attention. Authentication is becoming increasingly crucial issue when a user asks to use SIP services. Many authentication schemes for the SIP have been proposed. Very recently, Zhang et al. has presented an authentication scheme for SIP and claimed their scheme could overcome various attacks while maintaining efficiency. In this research, we illustrate that their scheme is susceptible to the insider attack and does not provide proper mutual authentication. We then propose a modified secure mutual authentication scheme to conquer the security flaws in Zhang et al.’s scheme. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Zhang et al.’s scheme. In addition, the performance analysis shows that our scheme has better efficiency in comparison with other related ECC-based authentication schemes for SIP. 相似文献
984.
In this paper, we use the concept of prospective age to illuminate patterns of aging by gender, and education in Europe. We find that, within countries, the patterns of aging of men and women with high education are comparatively similar to one another, but that the patterns of aging are quite dissimilar for men and women in the low education group. Across countries the patterns of aging become more similar as education levels increase. Thus, when we look across educational strata, we find increasing convergence in the pattern of aging both across countries and by gender within countries. The distinctive patterns of aging in the Eastern European countries are largely associated with the comparatively rapid aging of men in the low education category. If aging patterns by education persist, improvements in the education composition of Eastern European countries would result in the patterns of aging there becoming more similar to those in Western European countries. 相似文献
985.
You-bo Liu Jun-yong Liu Gareth Taylor Ting-jian Liu Jing Gou Xi Zhang 《浙江大学学报:C卷英文版》2016,17(11):1107-1121
The operational environment of today’s smart grids is becoming more complicated than ever before. A number of factors, including renewable penetration, marketization, cyber security, and hazards of nature, bring challenges and even threats to control centers. New techniques are anticipated to help dispatchers become aware of the accurate situations as they manipulate and navigate the situations as quickly as possible. To address the issues, we first introduce the background for this topic as well as the emerging technical demands of situational awareness in the dispatcher’s environment. The general concepts and technical requirements of situational awareness are then summarized, aimed at offering an overview for readers to understand the state-of-the-art progress in this area. In addition, we discuss the importance of integrating the architecture of support tools in accordance with the dispatcher’s thought process, which in fact guides correct and swift reactions in real-time operations. Finally, the prospects for situational awareness architecture are investigated with the goal of presenting situational awareness modules in an advanced and visualized manner. 相似文献
986.
With shrinking technology, the increase in variability of process, voltage, and temperature (PVT) parameters significantly impacts the yield analysis and optimization for chip designs. Previous yield estimation algorithms have been limited to predicting either timing or power yield. However, neglecting the correlation between power and delay will result in significant yield loss. Most of these approaches also suffer from high computational complexity and long runtime. We suggest a novel bi-objective optimization framework based on Chebyshev affine arithmetic (CAA) and the adaptive weighted sum (AWS) method. Both power and timing yield are set as objective functions in this framework. The two objectives are optimized simultaneously to maintain the correlation between them. The proposed method first predicts the guaranteed probability bounds for leakage and delay distributions under the assumption of arbitrary correlations. Then a power-delay bi-objective optimization model is formulated by computation of cumulative distribution function (CDF) bounds. Finally, the AWS method is applied for power-delay optimization to generate a well-distributed set of Pareto-optimal solutions. Experimental results on ISCAS benchmark circuits show that the proposed bi-objective framework is capable of providing sufficient trade-off information between power and timing yield. 相似文献
987.
Most automatic steering systems for large tractors are designed with hydraulic systems that run on either constant flow or constant pressure. Such designs are limited in adaptability and applicability. Moreover, their control valves can unload in the neutral position and eventually lead to serious hydraulic leakage over long operation periods. In response to the problems noted above, a multifunctional automatic hydraulic steering circuit is presented. The system design is composed of a 5-way-3- position proportional directional valve, two pilot-controlled check valves, a pressure-compensated directional valve, a pressurecompensated flow regulator valve, a load shuttle valve, and a check valve, among other components. It is adaptable to most open-center systems with constant flow supply and closed-center systems with load feedback. The design maintains the lowest pressure under load feedback and stays at the neutral position during unloading, thus meeting the requirements for steering. The steering controller is based on proportional-integral-derivative (PID) running on a 51-microcontroller-unit master control chip. An experimental platform is developed to establish the basic characteristics of the system subject to stepwise inputs and sinusoidal tracking. Test results show that the system design demonstrates excellent control accuracy, fast response, and negligible leak during long operation periods. 相似文献
988.
Mesh parameterization is one of the fundamental operations in computer graphics (CG) and computeraided design (CAD). In this paper, we propose a novel local/global parameterization approach, ARAP++, for singleand multi-boundary triangular meshes. It is an extension of the as-rigid-as-possible (ARAP) approach, which stitches together 1-ring patches instead of individual triangles. To optimize the spring energy, we introduce a linear iterative scheme which employs convex combination weights and a fitting Jacobian matrix corresponding to a prescribed family of transformations. Our algorithm is simple, efficient, and robust. The geometric properties (angle and area) of the original model can also be preserved by appropriately prescribing the singular values of the fitting matrix. To reduce the area and stretch distortions for high-curvature models, a stretch operator is introduced. Numerical results demonstrate that ARAP++ outperforms several state-of-the-art methods in terms of controlling the distortions of angle, area, and stretch. Furthermore, it achieves a better visualization performance for several applications, such as texture mapping and surface remeshing. 相似文献
989.
Social tagging systems are widely applied in Web 2.0. Many users use these systems to create, organize, manage, and share Internet resources freely. However, many ambiguous and uncontrolled tags produced by social tagging systems not only worsen users’ experience, but also restrict resources’ retrieval efficiency. Tag clustering can aggregate tags with similar semantics together, and help mitigate the above problems. In this paper, we first present a common co-occurrence group similarity based approach, which employs the ternary relation among users, resources, and tags to measure the semantic relevance between tags. Then we propose a spectral clustering method to address the high dimensionality and sparsity of the annotating data. Finally, experimental results show that the proposed method is useful and efficient. 相似文献
990.
Meiyu Huang Yiqiang Chen Bo-Wei Chen Junfa Liu Seungmin Rho Wen Ji 《Peer-to-Peer Networking and Applications》2016,9(5):864-875
With the proliferation of healthcare data, the cloud mining technology for E-health services and applications has become a hot research topic. While on the other hand, these rapidly evolving cloud mining technologies and their deployment in healthcare systems also pose potential threats to patient’s data privacy. In order to solve the privacy problem in the cloud mining technique, this paper proposes a semi-supervised privacy-preserving clustering algorithm. By employing a small amount of supervised information, the method first learns a Large Margin Nearest Cluster metric using convex optimization. Then according to the trained metric, the method imposes multiplicative perturbation on the original data, which can change the distribution shape of the original data and thus protect the privacy information as well as ensuring high data usability. The experimental results on the brain fiber dataset provided by the 2009 PBC demonstrated that the proposed method could not only protect data privacy towards secure attacks, but improve the clustering purity. 相似文献