首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8160篇
  免费   537篇
  国内免费   592篇
电工技术   146篇
技术理论   13篇
综合类   1168篇
化学工业   125篇
金属工艺   32篇
机械仪表   53篇
建筑科学   1230篇
矿业工程   141篇
能源动力   54篇
轻工业   157篇
水利工程   179篇
石油天然气   25篇
武器工业   3篇
无线电   397篇
一般工业技术   478篇
冶金工业   2897篇
自动化技术   2191篇
  2024年   30篇
  2023年   110篇
  2022年   165篇
  2021年   268篇
  2020年   306篇
  2019年   289篇
  2018年   285篇
  2017年   309篇
  2016年   341篇
  2015年   376篇
  2014年   504篇
  2013年   607篇
  2012年   419篇
  2011年   559篇
  2010年   496篇
  2009年   492篇
  2008年   460篇
  2007年   425篇
  2006年   422篇
  2005年   385篇
  2004年   324篇
  2003年   301篇
  2002年   248篇
  2001年   224篇
  2000年   74篇
  1999年   55篇
  1998年   25篇
  1997年   22篇
  1994年   19篇
  1993年   18篇
  1992年   19篇
  1990年   25篇
  1989年   19篇
  1988年   24篇
  1987年   20篇
  1986年   18篇
  1984年   17篇
  1966年   26篇
  1965年   28篇
  1964年   56篇
  1963年   46篇
  1962年   18篇
  1961年   43篇
  1960年   22篇
  1959年   30篇
  1958年   22篇
  1957年   33篇
  1956年   24篇
  1955年   45篇
  1954年   28篇
排序方式: 共有9289条查询结果,搜索用时 15 毫秒
41.
Members of health social networks may be susceptible to privacy leaks by the amount of information they leave behind. The threat to privacy increases when members of these networks reuse their pseudonyms in other social networks. The risk of re‐identifying users from such networks requires quantitative estimates to evaluate its magnitude. The estimates will enable managers and members of health social communities to take corrective measures. We introduce a new re‐identification attack, the social network attack, that takes advantage of the fact that users reuse their pseudonyms. To demonstrate the attack, we establish links between MedHelp and Twitter (two popular social networks) based on matching pseudonyms. We used Bayesian networks to model the re‐identification risk and used stylometric techniques to identify the strength of the links. On the basis of our model 7‐11. 8% of the MedHelp members in the sample population who reused their pseudonyms in Twitter were re‐identifiable compared with 1% who did not. The risk estimates were measured at the 5% risk threshold. Our model was able to re‐identify users with a sensitivity of 41% and specificity of 96%. The potential for re‐identification increases as more data is accumulated from these profiles, which makes the threat of re‐identification more serious.  相似文献   
42.
Communication between socially assistive robots and humans might be facilitated by intuitively understandable mechanisms. To investigate the effects of some key nonverbal gestures on a human’s own engagement and robot engagement experienced by humans, participants read a series of instructions to a robot that responded with nods, blinks, changes in gaze direction, or a combination of these. Unbeknown to the participants, the robot had no form of speech processing or gesture recognition, but simply measured speech volume levels, responding with gestures whenever a lull in sound was detected. As measured by visual analogue scales, engagement of participants was not differentially affected by the different responses of the robot. However, their perception of the robot’s engagement in the task, its likability and its understanding of the instructions depended on the gesture presented, with nodding being the most effective response. Participants who self-reported greater robotics knowledge reported higher overall engagement and greater success at developing a relationship with the robot. However, self-reported robotics knowledge did not differentially affect the impact of robot gestures. This suggests that greater familiarity with robotics may help to maximise positive experiences for humans involved in human–robot interactions without affecting the impact of the type of signal sent by the robot.  相似文献   
43.
Consumer complaints on online social network quickly become online groups complaints through many people’s aggregation and looking on, interaction and word-of-mouth communication. Therefore, assessing and managing online complain influence has become a new problem for enterprise to listen to and manage online group complaints. This paper analyzed the complaint information feature of consumer group on online social network, from three-dimensional perspective of complaint text’s quality, transmission timeliness and user interaction degree. We built the influence measure model of online complaint theme based on entropy weight model by monitoring and analyzing real-time the static and dynamic properties of complaint information, explored the measure method of complaint theme influence, employed empirical method to verify the validity and provided scientific decision-making tools and methods for enterprise listening to and managing online group complains.  相似文献   
44.
索勃  李战怀  陈群  王忠 《软件学报》2014,25(3):547-559
随着社交网络和微博等互联网应用的逐渐流行,其用户规模在迅速膨胀.在这些大规模网络中,社区发现可以为个性化服务推荐和产品推广提供重要依据.不同于传统的网络,这些新型网络的节点之间除了拓扑结构外,还进行频繁的信息交互.信息流动使得这些网络具有方向性和动态性等特征.传统的社区发现方法由于没有考虑到这些新的特征,并不适用于这些新型网络.在传染病动力学理论的基础上,从节点间信息流动的角度,提出一种动态社区发现方法.该方法通过对信息流动的分析来发现联系紧密、兴趣相近的节点集合,以实现动态的社区发现.在真实数据集上的实验结果表明:相对于传统的社区发现方法,所提出的方法能够更准确地发现社区,并且更能体现网络中社区的动态变化.  相似文献   
45.
Student academic underachievement is a concern of paramount importance in Europe, where around 15% of the students in the last high school courses do not achieve the minimum knowledge academic requirement. In this paper, we propose a model based on a system of differential equations to study the dynamics of the students’ academic performance in the German region of the North Rhine-Westphalia. This approach is supported by the idea that both good and bad study habits, are a mixture of personal decisions and influence of classmates. This model allows us to forecast the student academic performance by means of confidence intervals over the next few years.  相似文献   
46.
Information diffusion in large-scale networks has been studied to identify the users influence. The influence has been targeted as a key feature either to reach large populations or influencing public opinion. Through the use of micro-blogs, such as Twitter, global influencers have been identified and ranked based on message propagation (retweets). In this paper, a new application is presented, which allows to find first and classify then the local influence on Twitter: who have influenced you and who have been influenced by you. Until now, social structures of tweets’ original authors that have been either retweeted or marked as favourites are unobservable. Throughout this application, these structures can be discovered and they reveal the existence of communities formed by users of similar profile (that are connected among them) interrelated with other similar profile users’ communities.  相似文献   
47.
Engagement in virtual worlds has become pervasive, particularly among the young. At the same time, the number of virtual environments has increased rapidly. Due to intensifying competition, promoting sustained usage, i.e. continuance, has become a top priority for virtual world operators. Prior research has shown that network externalities play a key role in the adoption of communication technologies. However, a small amount of research has examined the role of network externalities in continued IT usage in general or with respect to the virtual world participation in particular. To fill in this gap, we examine how perceived network externalities affect the continuance of social virtual worlds. To this end, we introduce the concept of perceived aggregate network exposure (PANE). We extend the original information systems (IS) continuance model with perceived enjoyment and position PANE as a moderator. We test the model with data collected from 2134 Finnish Habbo Hotel users and employ structural equation modelling in the analysis. The results demonstrate that PANE moderates the influence of motivational factors on continued use intention and satisfaction.  相似文献   
48.
三峡库区已完成了百万移民的搬迁安置,进入了移民安稳致富的新阶段,库区社会和谐稳定对促进库区经济社会健康发展和实现全面建成小康社会的目标具有重要作用。本研究重点关注和谐库区建设思路及评价指标体系构建:一方面,从理论层面,重点论述与库区和谐社会相关的理论认识成果;另一方面,从实际管理运用层面,构建了库区和谐评价指标体系,可为移民动态管理提供有力的技术支撑。  相似文献   
49.
Social media are often argued to change political communication, decreasing the distance between politicians and citizens, and increasing citizens' influence on policymaking. This paper presents findings from a study of how the Norwegian Labour Party uses social media, focusing on the community platform MyLabourParty. Interviews with politicians and a survey with citizens as respondents were conducted to examine the experiences of online political discussions. Findings show that citizens and politicians expect MyLabourParty to strengthen citizen participation. Yet, citizens still experience communication asymmetry and politicians may find it challenging to participate to the extent citizens expect. Means for bridging the gap between expectations and experiences are called for, in particular redefinition of the offering, changes of user‐practices, and system improvements.  相似文献   
50.
The present study examines the tele‐cocooning hypothesis in the context of general trust using a nationally representative survey of Japanese youth. We find that although frequency of texting is positively correlated with general trust, this correlation is spuriously caused by how heavy mobile texters interpret the words “most people” in the general trust measurement. Heavy users assume that “most people” only refers to friends, family, and others going to the same school. When the effect of the “most people” assumption is controlled, the positive association between texting and general trust disappears. Further exploration of the data shows that heavy texting nevertheless has negative implications for social tolerance and social caution, both of which are theoretically proximate to general trust.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号