全文获取类型
收费全文 | 8160篇 |
免费 | 537篇 |
国内免费 | 592篇 |
专业分类
电工技术 | 146篇 |
技术理论 | 13篇 |
综合类 | 1168篇 |
化学工业 | 125篇 |
金属工艺 | 32篇 |
机械仪表 | 53篇 |
建筑科学 | 1230篇 |
矿业工程 | 141篇 |
能源动力 | 54篇 |
轻工业 | 157篇 |
水利工程 | 179篇 |
石油天然气 | 25篇 |
武器工业 | 3篇 |
无线电 | 397篇 |
一般工业技术 | 478篇 |
冶金工业 | 2897篇 |
自动化技术 | 2191篇 |
出版年
2024年 | 30篇 |
2023年 | 110篇 |
2022年 | 165篇 |
2021年 | 268篇 |
2020年 | 306篇 |
2019年 | 289篇 |
2018年 | 285篇 |
2017年 | 309篇 |
2016年 | 341篇 |
2015年 | 376篇 |
2014年 | 504篇 |
2013年 | 607篇 |
2012年 | 419篇 |
2011年 | 559篇 |
2010年 | 496篇 |
2009年 | 492篇 |
2008年 | 460篇 |
2007年 | 425篇 |
2006年 | 422篇 |
2005年 | 385篇 |
2004年 | 324篇 |
2003年 | 301篇 |
2002年 | 248篇 |
2001年 | 224篇 |
2000年 | 74篇 |
1999年 | 55篇 |
1998年 | 25篇 |
1997年 | 22篇 |
1994年 | 19篇 |
1993年 | 18篇 |
1992年 | 19篇 |
1990年 | 25篇 |
1989年 | 19篇 |
1988年 | 24篇 |
1987年 | 20篇 |
1986年 | 18篇 |
1984年 | 17篇 |
1966年 | 26篇 |
1965年 | 28篇 |
1964年 | 56篇 |
1963年 | 46篇 |
1962年 | 18篇 |
1961年 | 43篇 |
1960年 | 22篇 |
1959年 | 30篇 |
1958年 | 22篇 |
1957年 | 33篇 |
1956年 | 24篇 |
1955年 | 45篇 |
1954年 | 28篇 |
排序方式: 共有9289条查询结果,搜索用时 15 毫秒
41.
Members of health social networks may be susceptible to privacy leaks by the amount of information they leave behind. The threat to privacy increases when members of these networks reuse their pseudonyms in other social networks. The risk of re‐identifying users from such networks requires quantitative estimates to evaluate its magnitude. The estimates will enable managers and members of health social communities to take corrective measures. We introduce a new re‐identification attack, the social network attack, that takes advantage of the fact that users reuse their pseudonyms. To demonstrate the attack, we establish links between MedHelp and Twitter (two popular social networks) based on matching pseudonyms. We used Bayesian networks to model the re‐identification risk and used stylometric techniques to identify the strength of the links. On the basis of our model 7‐11. 8% of the MedHelp members in the sample population who reused their pseudonyms in Twitter were re‐identifiable compared with 1% who did not. The risk estimates were measured at the 5% risk threshold. Our model was able to re‐identify users with a sensitivity of 41% and specificity of 96%. The potential for re‐identification increases as more data is accumulated from these profiles, which makes the threat of re‐identification more serious. 相似文献
42.
《Robotics and Autonomous Systems》2014,62(3):392-399
Communication between socially assistive robots and humans might be facilitated by intuitively understandable mechanisms. To investigate the effects of some key nonverbal gestures on a human’s own engagement and robot engagement experienced by humans, participants read a series of instructions to a robot that responded with nods, blinks, changes in gaze direction, or a combination of these. Unbeknown to the participants, the robot had no form of speech processing or gesture recognition, but simply measured speech volume levels, responding with gestures whenever a lull in sound was detected. As measured by visual analogue scales, engagement of participants was not differentially affected by the different responses of the robot. However, their perception of the robot’s engagement in the task, its likability and its understanding of the instructions depended on the gesture presented, with nodding being the most effective response. Participants who self-reported greater robotics knowledge reported higher overall engagement and greater success at developing a relationship with the robot. However, self-reported robotics knowledge did not differentially affect the impact of robot gestures. This suggests that greater familiarity with robotics may help to maximise positive experiences for humans involved in human–robot interactions without affecting the impact of the type of signal sent by the robot. 相似文献
43.
《Expert systems with applications》2014,41(13):6039-6046
Consumer complaints on online social network quickly become online groups complaints through many people’s aggregation and looking on, interaction and word-of-mouth communication. Therefore, assessing and managing online complain influence has become a new problem for enterprise to listen to and manage online group complaints. This paper analyzed the complaint information feature of consumer group on online social network, from three-dimensional perspective of complaint text’s quality, transmission timeliness and user interaction degree. We built the influence measure model of online complaint theme based on entropy weight model by monitoring and analyzing real-time the static and dynamic properties of complaint information, explored the measure method of complaint theme influence, employed empirical method to verify the validity and provided scientific decision-making tools and methods for enterprise listening to and managing online group complains. 相似文献
44.
随着社交网络和微博等互联网应用的逐渐流行,其用户规模在迅速膨胀.在这些大规模网络中,社区发现可以为个性化服务推荐和产品推广提供重要依据.不同于传统的网络,这些新型网络的节点之间除了拓扑结构外,还进行频繁的信息交互.信息流动使得这些网络具有方向性和动态性等特征.传统的社区发现方法由于没有考虑到这些新的特征,并不适用于这些新型网络.在传染病动力学理论的基础上,从节点间信息流动的角度,提出一种动态社区发现方法.该方法通过对信息流动的分析来发现联系紧密、兴趣相近的节点集合,以实现动态的社区发现.在真实数据集上的实验结果表明:相对于传统的社区发现方法,所提出的方法能够更准确地发现社区,并且更能体现网络中社区的动态变化. 相似文献
45.
Student academic underachievement is a concern of paramount importance in Europe, where around 15% of the students in the last high school courses do not achieve the minimum knowledge academic requirement. In this paper, we propose a model based on a system of differential equations to study the dynamics of the students’ academic performance in the German region of the North Rhine-Westphalia. This approach is supported by the idea that both good and bad study habits, are a mixture of personal decisions and influence of classmates. This model allows us to forecast the student academic performance by means of confidence intervals over the next few years. 相似文献
46.
Information diffusion in large-scale networks has been studied to identify the users influence. The influence has been targeted as a key feature either to reach large populations or influencing public opinion. Through the use of micro-blogs, such as Twitter, global influencers have been identified and ranked based on message propagation (retweets). In this paper, a new application is presented, which allows to find first and classify then the local influence on Twitter: who have influenced you and who have been influenced by you. Until now, social structures of tweets’ original authors that have been either retweeted or marked as favourites are unobservable. Throughout this application, these structures can be discovered and they reveal the existence of communities formed by users of similar profile (that are connected among them) interrelated with other similar profile users’ communities. 相似文献
47.
Engagement in virtual worlds has become pervasive, particularly among the young. At the same time, the number of virtual environments has increased rapidly. Due to intensifying competition, promoting sustained usage, i.e. continuance, has become a top priority for virtual world operators. Prior research has shown that network externalities play a key role in the adoption of communication technologies. However, a small amount of research has examined the role of network externalities in continued IT usage in general or with respect to the virtual world participation in particular. To fill in this gap, we examine how perceived network externalities affect the continuance of social virtual worlds. To this end, we introduce the concept of perceived aggregate network exposure (PANE). We extend the original information systems (IS) continuance model with perceived enjoyment and position PANE as a moderator. We test the model with data collected from 2134 Finnish Habbo Hotel users and employ structural equation modelling in the analysis. The results demonstrate that PANE moderates the influence of motivational factors on continued use intention and satisfaction. 相似文献
48.
49.
Marika Lüders Asbjørn Følstad Espen Waldal 《Journal of Computer-Mediated Communication》2014,19(3):446-462
Social media are often argued to change political communication, decreasing the distance between politicians and citizens, and increasing citizens' influence on policymaking. This paper presents findings from a study of how the Norwegian Labour Party uses social media, focusing on the community platform MyLabourParty. Interviews with politicians and a survey with citizens as respondents were conducted to examine the experiences of online political discussions. Findings show that citizens and politicians expect MyLabourParty to strengthen citizen participation. Yet, citizens still experience communication asymmetry and politicians may find it challenging to participate to the extent citizens expect. Means for bridging the gap between expectations and experiences are called for, in particular redefinition of the offering, changes of user‐practices, and system improvements. 相似文献
50.
The present study examines the tele‐cocooning hypothesis in the context of general trust using a nationally representative survey of Japanese youth. We find that although frequency of texting is positively correlated with general trust, this correlation is spuriously caused by how heavy mobile texters interpret the words “most people” in the general trust measurement. Heavy users assume that “most people” only refers to friends, family, and others going to the same school. When the effect of the “most people” assumption is controlled, the positive association between texting and general trust disappears. Further exploration of the data shows that heavy texting nevertheless has negative implications for social tolerance and social caution, both of which are theoretically proximate to general trust. 相似文献