首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4451篇
  免费   204篇
  国内免费   86篇
电工技术   26篇
综合类   188篇
化学工业   86篇
金属工艺   11篇
机械仪表   37篇
建筑科学   681篇
矿业工程   35篇
能源动力   105篇
轻工业   75篇
水利工程   21篇
石油天然气   46篇
无线电   524篇
一般工业技术   229篇
冶金工业   134篇
原子能技术   8篇
自动化技术   2535篇
  2023年   50篇
  2022年   56篇
  2021年   160篇
  2020年   168篇
  2019年   87篇
  2018年   140篇
  2017年   252篇
  2016年   415篇
  2015年   252篇
  2014年   392篇
  2013年   356篇
  2012年   297篇
  2011年   284篇
  2010年   262篇
  2009年   234篇
  2008年   244篇
  2007年   193篇
  2006年   174篇
  2005年   111篇
  2004年   84篇
  2003年   108篇
  2002年   67篇
  2001年   61篇
  2000年   39篇
  1999年   43篇
  1998年   24篇
  1997年   21篇
  1996年   17篇
  1995年   19篇
  1994年   12篇
  1993年   13篇
  1992年   13篇
  1991年   9篇
  1989年   7篇
  1987年   3篇
  1986年   4篇
  1985年   5篇
  1984年   5篇
  1983年   3篇
  1978年   3篇
  1977年   3篇
  1974年   3篇
  1972年   3篇
  1970年   3篇
  1968年   3篇
  1965年   3篇
  1962年   4篇
  1958年   2篇
  1955年   2篇
  1954年   3篇
排序方式: 共有4741条查询结果,搜索用时 31 毫秒
101.
现代战争模拟研究的新方向:社会仿真   总被引:1,自引:0,他引:1  
随着世界社会经济和科技水平的不断发展,特别是现代信息技术的发展,社会因素对战争的影响越来越突出,因此,战争模拟应该把视野扩展到传统研究之外的社会领域.主要阐述社会仿真概念的基本内涵,建模仿真基本方法,然后重点介绍社会仿真研究领域的基础设施建模研究、大规模群体行为建模研究以及国内外典型的大规模社会仿真系统,最后,介绍在该领域开展的部分研究工作,并指出我国在该领域展开研究工作的重要意义.  相似文献   
102.
视频分析技术的研究和应用   总被引:1,自引:0,他引:1  
通过对视频分析关键技术的探讨及国内外研究小组科研成果的分析.揭示了视频编码技术、视频对象分割技术、基于内容检索技术、流媒体传输技术之间的内在联系以及各自的技术要点、难点.通过介绍视频分析技术在视频监控中的应用,展望了该技术在多个领域的广阔的应用前景.  相似文献   
103.
The authors reassert the need for methodological changes in depression research appearing in the Journal of Personality and Social Psychology and other personality and social psychology journals. In this rejoinder the authors update their earlier literature review (H. Tennen, J. Hall, & G. Affleck; see record 1995-31710-001) and respond to the commentaries by P C. Kendall and E. C. Flannery-Schroeder (see record 1995-31700-001) and G. Weary, J. A. Edwards, and J. A. Jacobson (see record 1995-31713-001). The authors notice that G. Weary et al.'s own findings demonstrate the need to change how depression is measured and participants are assigned to experimental groups. The authors also challenge G. Weary et al.'s contention that structured interviews are limited because they require interviewer judgments, and they urge personality and social psychologists to learn more about these interviews. Finally, G. Weary et al.'s suspicion that depression research guidelines reflect professional parochialism is disputed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
104.
This study modelled the rational factors that predict fake news sharing behaviour. It also tested the moderating role of social media literacy skills. The focus was on social media users in Nigeria. An online survey was conducted to gather the responses from participants across Nigerian geopolitical zones. Structural equation modelling (SEM) Smart PLS 3.6 was used to analyse the data. We found that information sharing, the news finds me perception, trust in social media and status-seeking lead to fake news sharing among social media users in Nigeria. Specifically, trust in social media and status-seeking had a greater effect on fake news sharing behaviour. We also found that social media literacy skills significantly moderate the relationship between information sharing, status-seeking, the news finds me perception, trust in social media and fake news sharing in such a way that the effects/relationships are stronger among those with low social media literacy skills. This outcome contributes to theory and practice which was highlighted in the concluding aspect of this study.  相似文献   
105.
Social Internet of Vehicles (SIoV) falls under the umbrella of social Internet of Things (IoT), where vehicles are socially connected to other vehicles and roadside units that can reliably share information and services with other social entities by leveraging the capabilities of 5G technology, which brings new opportunities and challenges, e.g., collaborative power trading can address the mileage anxiety of electric vehicles. However, it relies on a trusted central party for scheduling, which introduces performance bottlenecks and cannot be set up in a distributed network, in addition, the lack of transparency in state-of-the-art Vehicle-to-Vehicle (V2V) power trading schemes can introduce further trust issues. In this paper, we propose a blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social vehicular networks that uses a distributed market mechanism to introduce trusted power trading and avoids the dependence on a centralized dispatch center. Based on the game theory, we design the pricing and trading matching mechanism for V2V power trading to obtain maximum social welfare. We use blockchain to record power trading data for trusted pricing and use smart contracts for transaction matching. The simulation results verify the effectiveness of the proposed scheme in improving social welfare and reducing the load on the grid.  相似文献   
106.
The assessment of the social impacts of road traffic is usually based on objective indicators or on expert judgement, without input from the affected communities. This paper considers the perceptions and priorities of local residents about traffic impacts and possible mitigation measures, using as a case study a rural area that will be affected by traffic associated with the construction of a nuclear power station. The study consisted of a qualitative phase followed by a stated preference survey. Econometric models were used to measure the relative priority of different impacts and mitigation measures. The most impactful aspects were noise, vibration and increased car or bus travel times. The most preferred measures were night-time restrictions to HGVs, parking restrictions and safety measures for pedestrians and cyclists. There were significant differences in preferences according to residence location, gender, employment status and household composition. The results provide information about aspects that tend to be aggregated in existing assessment frameworks, separating the reduction in the utility of some activities (like walking and driving) and the suppression of those activities.  相似文献   
107.
Social media plays an increasingly prominent role in the interaction between impact assessments and society. Impact assessment is thus becoming part of social networks that are claimed to be able to improve interaction between actors in impact assessment processes. By investigating the use of social media in impact assessment and planning processes of national linear infrastructure development, we explore how social media impinge on participatory practices and how the potential of social media is realized in the current use related to public participation processes. The study focuses on experiences among national developers working in road, rail, electricity, gas, and metro infrastructures in Denmark. The article shows that the current use of social media in public participatory practices is limited to branding and on-way communication and that the increasing use of social media in linear infrastructure planning gives rise to a variety of concerns among developers that are related to especially organizational cultures, perception of the target groups, and prioritization of resources.  相似文献   
108.
《工程(英文)》2018,4(1):94-102
Although many different views of social media coexist in the field of information systems (IS), such theories are usually not introduced in a consistent framework based on philosophical foundations. This paper introduces the dimensions of lifeworld and consideration of others. The concept of lifeworld includes Descartes’ rationality and Heidegger’s historicity, and consideration of others is based on instrumentalism and Heidegger’s “being-with.” These philosophical foundations elaborate a framework where different archetypal theories applied to social media may be compared: Goffman’s presentation of self, Bourdieu’s social capital, Sartre’s existential project, and Heidegger’s “shared-world.” While Goffman has become a frequent reference in social media, the three other references are innovative in IS research. The concepts of these four theories of social media are compared with empirical findings in IS literature. While some of these concepts match the empirical findings, some other concepts have not yet been investigated in the use of social media, suggesting future research directions.  相似文献   
109.
Implanted microchips can store users' medical, financial, and other personal information, and provide users with easy and quick access to various locations and items. While adopted for their convenience outside of the healthcare sector, these invasive, semi-permanent implantable devices create augmented bodies that can be subject to ubiquitous surveillance. Situating human microchip implantations within surveillance literature, we draw from neoliberal perspectives of surveillance to examine augmented bodies, particularly as sources for market activity and as subjects of social control and sorting when these bodies are used as access control mechanisms, payment methods, and tracking means in employment, residential, commercial, and transportation sectors. History has demonstrated time and time again how unfettered technology applications and uses have led to real and/or perceived misuse by private and public sectors. Through the lens of function creep, we identify a pattern of expansion of applications and uses of technology beyond those originally intended across new technologies, such as DNA genetic genealogy databases, IoT wearables, and COVID-19 contact tracing apps, and provide illustrative examples of function creep, particularly the use of these technologies in criminal investigations and prosecutions despite not being intended or marketed for such use. By demonstrating the lack of clearly defined boundaries in the applications and uses of various new technologies and their associated data, and the ways they were misused, we demonstrate how human microchip implantations are headed on a similar path. The current and potential future uses of this technology raise concerns about the absence of regulation, law, and policy barring or limiting its application and use in specific sectors, and the impact of this technology on users’ security, data protection, and privacy. Undeniably, the present and potential future functions, applications, uses, and extensions of human microchip implantations in various sectors warrant a proactive examination of their security, privacy, and data protection consequences and the implementation of proactive policies to regulate new and currently unregulated uses of this technology and its associated data within these sectors.  相似文献   
110.
由文本至口形的媒体变换技术的研究   总被引:1,自引:0,他引:1  
杨丹宁  郭峰 《电子学报》1996,24(1):122-125
本文根据汉语的发音特点,提出了由基本音素口形参数和预先建立的口形模型来生成各种音节相应的正面口形图象的方法,从而完成由文本至口形的媒体变换,首先我们建立变形物体运动模型,然后由此构造一个口唇的动态发音模型,最后采用纹理映射技术,由基本音素口形参数和动态发音模型合成正面发音口形的图象。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号