首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5759篇
  免费   270篇
  国内免费   302篇
工业技术   6331篇
  2024年   1篇
  2023年   40篇
  2022年   67篇
  2021年   109篇
  2020年   113篇
  2019年   65篇
  2018年   95篇
  2017年   159篇
  2016年   188篇
  2015年   192篇
  2014年   354篇
  2013年   286篇
  2012年   327篇
  2011年   416篇
  2010年   297篇
  2009年   349篇
  2008年   404篇
  2007年   446篇
  2006年   461篇
  2005年   396篇
  2004年   330篇
  2003年   333篇
  2002年   245篇
  2001年   162篇
  2000年   139篇
  1999年   113篇
  1998年   60篇
  1997年   45篇
  1996年   30篇
  1995年   35篇
  1994年   24篇
  1993年   17篇
  1992年   8篇
  1991年   9篇
  1990年   1篇
  1989年   8篇
  1988年   3篇
  1987年   1篇
  1984年   2篇
  1983年   1篇
排序方式: 共有6331条查询结果,搜索用时 843 毫秒
1.
在无线传感器网络中,大量感知数据汇集到sink节点的采集方法会导致sink节点附近的节点能量耗尽,造成能量空洞。针对该问题,利用移动的sink节点进行数据收集是一种解决方法,其中移动sink的路径规划成为一个重要的问题。提出了一个移动sink路径规划算法,将无线传感器中随机分布的节点划分为不同的子区域,寻找sink节点移动的最佳转向点,最终得到最优的移动路径,以实现无线传感器网络生命周期最大化。仿真实验表明,与现有方案相比,该算法能显著延长网络的生命周期。  相似文献   
2.
A small handful of recent studies have addressed a phenomenon known as “phantom vibration syndrome”. This refers to when phone users perceive their device to vibrate, indicating that a call or text is incoming, when in fact the phone did not vibrate at all. Though these studies show that most users do not find phantom vibration hallucinations to be very bothersome, they also find that a large majority of users experience this phenomenon. This paper explores what the striking prevalence of phantom vibration syndrome means for our contemporary relationships with technology. I begin with a review of the theories purporting to explain these data, which largely rely on particular understandings of the brain. Next I develop an alternative theory of phantom vibration syndrome based on insights from the philosophical tradition of phenomenology. This account considers the ways users develop bodily and perceptual habits regarding how the phone is understood and used. By critically contrasting these different theories, we can refine our questions about what the high prevalence of phantom vibration syndrome implies about our contemporary technological situation.  相似文献   
3.
The Indian telephony industry is a diverse platform for product and service in customer value perception. The present study organizes and synthesizes the varied research streams for developing a customer value delight (CVD) framework for marketing decisions like segmentation and targeting. The conceptual framework is developed by using ten-value predictor variables and customer delight through divergent viewpoints identified from previous studies. The significance of the segregation proposition is tested through discriminant analysis in three different dimension runs i.e. delight, gender, and marital category. The scholarship behind the study provides insight into an imperative issue of segregating customer delight by perceived value predictors in categories. The perceptual mapping and vector magnitude analysis of value predictors were performed to club customers in two categories of Mid-Town (low/moderate delight) and Extremes (high delight). The analysis rigorously supports the discriminating power of perceived price, perceived benefit, and self-congruity. The salience of study unlocks psychographic and demographic perceptual maps of customer delight with its perceived value predictors for strategic and tactful planning in the mobile industry.  相似文献   
4.
5.
This paper examines what influences trust in mobile social commerce environment. Drawing on trust-based acceptance model (i.e. cognitive and emotional trust) and online review features (i.e. profile photo, linguistic style, and reported experience), we examine how these factors affect trust in mobile social commerce. Hypotheses were tested using survey data. The results of our model showed that there are significant influences of profile photo, reported experience, cognitive, and emotional trust towards trust in ms-commerce. This work contributes to existing literature by examining the roles of previous trust in mobile payments and online reviews on trust in mobile social commerce.  相似文献   
6.
Few literature studies have investigated the relationships between different uses and gratifications (U&Gs) of mobile instant messaging (MIM) apps, continuation, and purchase intentions. To address this gap, the researchers aimed to examine the influence of the content, social, process, and technology U&Gs of MIM on continuation intentions toward MIMs, and purchase intentions toward virtual goods available on MIMs. A comprehensive research model was developed based on the U&G theory, which was tested using cross-sectional data from 309 Japanese MIM users. The study considered six different U&Gs of MIM as independent variables and purchase intentions towards stickers and continuation intentions towards MIM as dependent variables. The study results suggest that exposure U&G has a significant positive association with MIM sticker purchase intentions. The entertainment and affection U&G are positively associated with continuation intentions towards MIM use. The study contributes to the literature by investigating U&Gs that motivate MIM users to have both positive purchase intentions toward virtual goods, such as stickers, and continuation intentions toward MIMs. The study has significant theoretical and practical implications for both researchers and practitioners who are interested in virtual goods, the virtual economy, MIM apps, social media, new media, and the service economy.  相似文献   
7.
The automatic design of controllers for mobile robots usually requires two stages. In the first stage, sensorial data are preprocessed or transformed into high level and meaningful values of variables which are usually defined from expert knowledge. In the second stage, a machine learning technique is applied to obtain a controller that maps these high level variables to the control commands that are actually sent to the robot. This paper describes an algorithm that is able to embed the preprocessing stage into the learning stage in order to get controllers directly starting from sensorial raw data with no expert knowledge involved. Due to the high dimensionality of the sensorial data, this approach uses Quantified Fuzzy Rules (QFRs), that are able to transform low-level input variables into high-level input variables, reducing the dimensionality through summarization. The proposed learning algorithm, called Iterative Quantified Fuzzy Rule Learning (IQFRL), is based on genetic programming. IQFRL is able to learn rules with different structures, and can manage linguistic variables with multiple granularities. The algorithm has been tested with the implementation of the wall-following behavior both in several realistic simulated environments with different complexity and on a Pioneer 3-AT robot in two real environments. Results have been compared with several well-known learning algorithms combined with different data preprocessing techniques, showing that IQFRL exhibits a better and statistically significant performance. Moreover, three real world applications for which IQFRL plays a central role are also presented: path and object tracking with static and moving obstacles avoidance.  相似文献   
8.
江西省防汛PDA应用系统设计   总被引:1,自引:0,他引:1  
防汛PDA系统采用B/S和C/S相结合的构架方式,通过GPRS网络平台,能够清晰而灵活的显示出各种防汛工作所需的信息,为防汛工作者提供了全方位的移动指挥办公手段.  相似文献   
9.
The present study investigates the impact of different key solutions of mobile phones on users' effectiveness and efficiency using the devices. In the first experiment, 36 children (9 - 14 years) and in the second experiment 45 young adults (19 - 33 years) completed four common phone tasks twice consecutively on three simulated phones that had identical menus, but different key solutions. An approach was undertaken to quantify the complexity of keys in three models, incorporating different factors contributing to the keys' complexity (number of key options, number of modes and number of modes with a semantically dissimilar meaning), in order to predict users' performance decrements. As a further main factor, the degree of the users' locus of control (LOC) was measured and interactions with performance outcomes were studied. As dependent measures, the number of inefficient keystrokes, the number of tasks solved and the processing time were determined. Results showed a significant effect of control key solutions on users' efficiency and effectiveness for both children and young adults. Moreover, children's LOC values significantly interacted with performance: children with low LOC values showed the lowest performance and no learnability, especially when using keys with a high complexity. From the three factors contributing to the complexity of keys, keys exerting different functions with semantically inconsistent meanings had the worst effect on performance. It is concluded that in mobile user interface design keys with semantically inconsistent meanings should be generally avoided.  相似文献   
10.
Efficient multicast search under delay and bandwidth constraints   总被引:1,自引:0,他引:1  
The issue of a multicast search for a group of users is discussed in this study. Given the condition that the search is over only after all the users in the group are found, this problem is called the Conference Call Search (CCS) problem. The goal is to design efficient CCS strategies under delay and bandwidth constraints. While the problem of tracking a single user has been addressed by many studies, to the best of our knowledge, this study is one of the first attempts to reduce the search cost for multiple users. Moreover, as oppose to the single user tracking, for which one can always reduce the expected search delay by increasing the expected search cost, for a multicast search the dependency between the delay and the search cost is more complicated, as demonstrated in this study. We identify the key factors affecting the search efficiency, and the dependency between them and the search delay. Our analysis shows that under tight bandwidth constraints, the CCS problem is NP-hard. We therefore propose a search method that is not optimal, but has a low computational complexity. In addition, the proposed strategy yields a low search delay as well as a low search cost. The performance of the proposed search strategy is superior to the implementation of an optimal single user search on a group of users. Amotz Bar-Noy received the B.Sc. degree in 1981 in Mathematics and Computer Science and the Ph.D. degree in 1987 in Computer Science, both from the Hebrew University, Israel. From October 1987 to September 1989 he was a post-doc fellow in Stanford University, California. From October 1989 to August 1996 he was a Research Staff Member with IBM T. J. Watson Research Center, New York. From February 1995 to September 2001 he was an associate Professor with the Electrical Engineering-Systems department of Tel Aviv University, Israel. From September 1999 to December 2001 he was with AT research labs in New Jersey. Since February 2002 he is a Professor with the Computer and Information Science Department of Brooklyn College - CUNY, Brooklyn New York. Zohar Naor received the Ph.D. degree in Computer Science from Tel Aviv University, Tel Aviv, Israel, in 2000. Since 2003 he is with the University of Haifa, Israel. His areas of interests include wireless networks, resource management of computer networks, mobility, search strategies, and multiple access protocols.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号