首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5453篇
  免费   331篇
  国内免费   211篇
电工技术   70篇
技术理论   1篇
综合类   239篇
化学工业   82篇
金属工艺   59篇
机械仪表   99篇
建筑科学   699篇
矿业工程   32篇
能源动力   119篇
轻工业   70篇
水利工程   31篇
石油天然气   16篇
武器工业   8篇
无线电   819篇
一般工业技术   261篇
冶金工业   130篇
原子能技术   8篇
自动化技术   3252篇
  2025年   19篇
  2024年   52篇
  2023年   94篇
  2022年   106篇
  2021年   227篇
  2020年   223篇
  2019年   141篇
  2018年   200篇
  2017年   292篇
  2016年   420篇
  2015年   256篇
  2014年   429篇
  2013年   438篇
  2012年   358篇
  2011年   385篇
  2010年   287篇
  2009年   288篇
  2008年   281篇
  2007年   258篇
  2006年   236篇
  2005年   168篇
  2004年   105篇
  2003年   125篇
  2002年   101篇
  2001年   69篇
  2000年   62篇
  1999年   60篇
  1998年   47篇
  1997年   43篇
  1996年   36篇
  1995年   28篇
  1994年   23篇
  1993年   15篇
  1992年   14篇
  1991年   11篇
  1989年   6篇
  1988年   3篇
  1987年   7篇
  1986年   5篇
  1985年   11篇
  1984年   14篇
  1983年   7篇
  1982年   4篇
  1981年   4篇
  1968年   3篇
  1965年   3篇
  1962年   4篇
  1958年   2篇
  1955年   2篇
  1954年   3篇
排序方式: 共有5995条查询结果,搜索用时 0 毫秒
81.
    
Information and Communication Technology for Development (ICT4D) projects have shown a great promises in recent years. However, simply materializing of ICT4D projects is not enough for minimizing the prevalent digital divide in rural areas in developing countries. For the success of an Information and Communication Technology (ICT) intervention, it is important to consider the capabilities of users, who are responsible for converting ICT resources into outcome. While most of the ICT-related studies are focused on the adoption of actual technologies and influences of different internal and external factors on intervention outcomes, very few studies are focused on evaluating intervention outcomes and redesigning intervention strategies. In this study, I opted for using a conceptual framework following the Capability Approach that simultaneously identifies the influence factors for intervention outcome as well as evaluates the outcome based on Noble Laureate Amartya Sen’s five freedoms concept. A qualitative technique has been chosen to conduct the study. As part of the impact evaluation of an ICT4D intervention, a project known as Union Digital Centres (UDCs) in Bangladesh was selected. A total of ten themes are identified indicating that the outcome of the intervention is contributing to socio-economic and human development. However, the study has revealed that lack of capabilities of users (e.g. prior knowledge and financial inability) bar the UDC programs to fulfill their goals at highest level. This study would practically help the UDC policy makers to adjust the UDC intervention design by addressing the shortcomings of the users to yield higher UDC program outcome. Additionally, this study theoretically contributes in ICT adoption literature by showing that there is a mutual influence between users’ capabilities and ICT-related project outcomes. Finally, using specific case study (ICT4D project in Bangladesh), this study contextualizes Amartya Sen’s five freedoms concept in the ICT-specific context.  相似文献   
82.
    
Social networking sites have become a major venue for dissemination of- and discussions about science-related topics. On these platforms, message credibility assessment takes into account not only traditional cues (like scientific arguments and information source), but also new types of social cues. Of the latter, we focus on tie strength, a central component of social networking sites, which has an important role in information flow, and the role of which in the process of message credibility assessment has been so far overlooked. We also consider two important and relevant meta-cognitive measures: need for cognition and expertise perception. Applying an experimental design in Facebook (N = 324), our findings suggest that need for cognition weakens the positive associations between tie strength and perceived message credibility. Also, both expertise perception and tie strength have positive effect on perceived message credibility.  相似文献   
83.
Artificial Intelligence (AI) in the form of Deep Learning (DL) technology has diffused in the consumer domain in a unique way as compared to previous general-purpose technologies. DL has often spread by infusion, i.e., by being added to preexisting technologies that are already in use. We find that DL-algorithms for recommendations or ranking have been infused into all the 15 most popular mobile applications (apps) in the U.S. (as of May 2019). DL-infusion enables fast and vast diffusion. For example, when a DL-system was infused into YouTube, it almost immediately reached a third of the world's population. We argue that existing theories of innovation diffusion and adoption have limited relevance for DL-infusion, because it is a process that is driven by enterprises rather than individuals. We also discuss its social and ethical implications. First, consumers have a limited ability to detect and evaluate an infused technology. DL-infusion may thus help to explain why AI's presence in society has not been challenged by many. Second, the DL-providers are likely to face conflicts of interest, since consumer and supplier goals are not always aligned. Third, infusion is likely to be a particularly important diffusion process for DL-technologies as compared to other innovations, because they need large data sets to function well, which can be drawn from preexisting users. Related, it seems that larger technology companies comparatively benefit more from DL-infusion, because they already have many users. This suggests that the value drawn from DL is likely to follow a Matthew Effect of accumulated advantage online: many preexisting users provide a lot of behavioral data, which bring about better DL-driven features, which attract even more users, etc. Such a self-reinforcing process could limit the possibilities for new companies to compete. This way, the notion of DL-infusion may put light on the power shift that comes with the presence of AI in society.  相似文献   
84.
    
Some countries have replaced face-to-face education with distance education in response to the coronavirus. This form of distance education differs from conventional distance education: being suddenly, unreadily and forcefully implemented, invading schooling and constituting a globally discussed phenomenon. This article builds a conceptual framework for this education, addressing the question: What are the ramifications of implementing distance education amid coronavirus? It targets Arab culture, although globalisation and the media may have harmonised any substantial cross-cultural variations. Various ramifications have emerged through analysing social-media posts, online classes and interviews. Concerning social and cultural ramifications, some may, for ideological considerations, tolerate, support, reject or subvert this education through campaigning, rumour and humour. Regarding pedagogical and psychological ramifications, unreadiness and incompetence may compromise education. Additionally, staying home may entail problems (pandemic-related stress, anxiety, depression, domestic violence, divorce and pregnancy), preventing students and teachers from learning and teaching. Concerning procedural and logistical ramifications, some Arab contexts may be digitally readier than non-Arab contexts. Additionally, stakeholders may intensify efforts to profit, ethically or unethically, from the over-demand for this education. Distance education is one of several social distancing initiatives, which Arabs have welcomed despite their well-rooted social closeness, bonding to debond, forming unorthodox ‘distanceship’.  相似文献   
85.
    
Should we deploy social robots in care settings? This question, asked from a policy standpoint, requires that we understand the potential benefits and downsides of deploying social robots in care situations. Potential benefits could include increased efficiency, increased welfare, physiological and psychological benefits, and experienced satisfaction. There are, however, important objections to the use of social robots in care. These include the possibility that relations with robots can potentially displace human contact, that these relations could be harmful, that robot care is undignified and disrespectful, and that social robots are deceptive. I propose a framework for evaluating all these arguments in terms of three aspects of care: structure, process, and outcome. I then highlight the main ethical considerations that have to be made in order to untangle the web of pros and cons of social robots in care as these pros and cons are related the trade-offs regarding quantity and quality of care, process and outcome, and objective and subjective outcomes.  相似文献   
86.
    
Maker communities have been widely popularized during the last decade throughout the development of numerous shared spaces in the form of makerspaces, fab labs and hackerspaces across the globe. This phenomenon has drawn the attention of many stakeholders interested in establishing bridges with them for exploring their innovation potential. However, synergies between producer innovation and free innovation paradigms remain quite uncertain. To meet this gap, the authors provide an analysis of the 22 collaborative innovations between makers and manufacturers funded by the OPENMAKER project as well as relevant empirical evidence gathered throughout 126 semi-structured interviews. The findings of this contribution stress the misalignment of makers and manufacturers in society as well as their different values and motivations around innovation, and the lack of shared spaces. At the same time, the paper highlights the benefits that the interaction between these two communities could have for meeting societal challenges, increasing social welfare and speeding up innovation processes if proper incentives and conditions are orchestrated. In this sense, we propose a set of considerations and implications based on the empirical material gathered, for providing future directions for innovation policies and research agendas.  相似文献   
87.
    
The combination of nonorthogonal multiple access (NOMA) and multiple input and multiple output (MIMO) systems is considered a promising approach for 5G mobile communication networks. In addition, techniques such as user selection and beamforming could be applied to improve some parameters of system performance. In this context, we propose a joint user selection, adaptive power allocation, and beamforming algorithm for the downlink of massive MIMO NOMA systems in order to maximize the throughput of users. To this end, we present a novel optimal beamforming solution scheme based on the adaptive computation of signal power values to maximize system throughput, considering the less interfering users. To evaluate the performance of the proposed algorithm, simulations were performed considering different power allocation algorithms.  相似文献   
88.
    
Mobile devices with social media applications are the prevalent user equipment to generate and consume digital hate content. The objective of this paper is to propose a mobile edge computing architecture for regulating and reducing hate content at the user's level. In this regard, the profiling of hate content is obtained from the results of multiple studies by quantitative and qualitative analyses. Profiling resulted in different categories of hate content caused by gender, religion, race, and disability. Based on this information, an architectural framework is developed to regulate and reduce hate content at the user's level in the mobile computing environment. The proposed architecture will be a novel idea to reduce hate content generation and its impact.  相似文献   
89.
    
Topic modeling is a popular analytical tool for evaluating data. Numerous methods of topic modeling have been developed which consider many kinds of relationships and restrictions within datasets; however, these methods are not frequently employed. Instead many researchers gravitate to Latent Dirichlet Analysis, which although flexible and adaptive, is not always suited for modeling more complex data relationships. We present different topic modeling approaches capable of dealing with correlation between topics, the changes of topics over time, as well as the ability to handle short texts such as encountered in social media or sparse text data. We also briefly review the algorithms which are used to optimize and infer parameters in topic modeling, which is essential to producing meaningful results regardless of method. We believe this review will encourage more diversity when performing topic modeling and help determine what topic modeling method best suits the user needs.  相似文献   
90.
    
ABSTRACT

The growing importance of social media in conflicts and crises is accompanied by an ever-increasing research interest in the crisis informatics field in order to identify potential benefits and develop measures against the technology’s abuse. This special issue sets out to give an overview of current research on the use of social media in conflicts and crises. In doing so, it focuses on both good and malicious aspects of social media and includes a variety of papers of conceptual, theoretical and empirical nature. In six sections, the special issue presents an overview of the field, analytical methods, technical challenges, current advancements and the accepted papers before concluding. Specific topics range from cyber deception over information trustworthiness to mining and near-real-time processing of social media data.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号