首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   56165篇
  免费   6773篇
  国内免费   4906篇
电工技术   5192篇
技术理论   15篇
综合类   7311篇
化学工业   883篇
金属工艺   372篇
机械仪表   2132篇
建筑科学   3284篇
矿业工程   1549篇
能源动力   636篇
轻工业   838篇
水利工程   1452篇
石油天然气   635篇
武器工业   997篇
无线电   9791篇
一般工业技术   2303篇
冶金工业   1637篇
原子能技术   121篇
自动化技术   28696篇
  2024年   108篇
  2023年   623篇
  2022年   1234篇
  2021年   1570篇
  2020年   1695篇
  2019年   1235篇
  2018年   1121篇
  2017年   1521篇
  2016年   1787篇
  2015年   2081篇
  2014年   4347篇
  2013年   3729篇
  2012年   4714篇
  2011年   4924篇
  2010年   3766篇
  2009年   4001篇
  2008年   4230篇
  2007年   4616篇
  2006年   4084篇
  2005年   3549篇
  2004年   2961篇
  2003年   2625篇
  2002年   1792篇
  2001年   1400篇
  2000年   1073篇
  1999年   669篇
  1998年   447篇
  1997年   345篇
  1996年   292篇
  1995年   223篇
  1994年   207篇
  1993年   149篇
  1992年   107篇
  1991年   83篇
  1990年   52篇
  1989年   59篇
  1988年   47篇
  1987年   27篇
  1986年   28篇
  1985年   45篇
  1984年   52篇
  1983年   43篇
  1982年   28篇
  1981年   18篇
  1980年   19篇
  1979年   17篇
  1977年   8篇
  1965年   10篇
  1964年   11篇
  1961年   7篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
81.
《云南化工》2020,(1):35-38
根据公司生产控制系统现状和发展需要,分析和探讨建立公司生产信息管理系统(PIMS)的软硬件基本构成和主要方法,并对以隔离网关、实时数据库、能源计量管理等为基础的生产信息管理系统关键技术进行研究和测试。  相似文献   
82.
一种高误码(n,k,m)非系统卷积码盲识别算法   总被引:1,自引:1,他引:0  
针对信息截获等领域中的卷积码盲识别问题,提出一种高误码 (n,k,m)非系统卷积码盲识别算法。首先建立可变的数据矩阵模型,对侦收到的数据进行相关预处理,以减小误码对识别的影响,提高算法的容错性能;再对预处理后的数据矩阵进行统计分析,识别出卷积码的各项参数,并提取各个数据矩阵的校验序列;进而利用校验序列构建线性方程组求解生成多项式矩阵组,通过设定筛选生成多项式矩阵的条件,筛选出非系统卷积码的生成多项式矩阵,最终完成对非系统卷积码的识别。仿真实验表明,该算法可以对高误码(n,k,m)非系统卷积码实现有效的盲识别。  相似文献   
83.
Health information technology (IT) is a promising way to achieve safer medication management in the delivery of healthcare. However, human factors/ergonomics dictates that in order to make the complex, cognitive work of healthcare delivery safer, health IT must properly support human cognition. This means, for example, that new health IT must reduce, not increase, workload during safety-critical tasks. The present study was the first to quantitatively assess the short- and long-term impact of bar coded medication administration (BCMA) IT on nurses' mental workload as well as on perceived medication safety. One-hundred seventy registered nurses across 3 dissimilar clinical units at an academic, freestanding pediatric hospital in the Midwest US participated in surveys administered before, 3 months after, and 12 months after the hospital implemented BCMA. Nurses rated their external mental workload (interruptions, divided attention, being rushed) and internal mental workload (concentration, mental effort) during medication administration tasks as well as the likelihood of each of three medication safety events: medication administration errors, medication errors on the clinical unit, and clinical unit-level adverse drug events. Clinical unit differences were assessed. Findings generally confirmed the hypothesis that external but not internal mental workload was associated with the perceived likelihood of a medication safety event. Comparisons of mental workload from pre- to post-BCMA revealed statistically significant changes in the critical care unit only. Medication safety appeared to improve over the long term in the hematology/oncology unit only. In the critical care and medical/surgical units, medication safety exhibited short-term improvements that were eliminated over time. Changes in mental workload and medication safety, two classically microergonomic constructs, were deeply embedded in macroergonomic phenomena. These included the fit between the BCMA system and the nature of nursing work, the process of BCMA implementation, and BCMA interactions with concurrent changes occurring in the hospital. Findings raise questions about achieving sustainable performance improvement with health IT as well as the balance between micro- and macroergonomic approaches to studying technology change.Relevance to industryDesigners must consider how technology changes cognitive work, including mental workload. Hospitals and other implementers of technology must ensure that new technology fits its users, their tasks, and the context of use, which may entail tailoring implementation, for example, to specific clinical units. Evaluators must look over time to assess both changes in cognitive work and implementation issues. Healthcare practitioners must also recognize that new technology means a complex transformation to an already complex sociotechnical system, which calls for a macroergonomic approach to design and analysis.  相似文献   
84.
Nowadays, despite the ever increasing need of people for staying “connected” at any time and everywhere, in many areas of the world data connection is extremely expensive or even absent. The Global System for Mobile Communication (GSM) network virtually covers all the populated areas of the world and on average, the entire world population have a handheld device capable of accessing at least the GSM services. Therefore, it makes sense to consider the Short Message Service (SMS) as the most popular wireless data service for such devices. In this work, we exploit the SMS as mechanism for data transfer, especially in scenarios where there is no other network coverage than GSM, such as in rural areas and developing regions. In particular, we propose a framework, based on the SMS as transport facility, which enables secure end-to-end data communication in a ubiquitous and pervasive manner. Moreover, we investigated how, by using compression techniques, the overall processing and transmission efforts needed for secure data communication can be effectively reduced, with the obvious consequences also in terms of energy consumption on the involved devices. Finally, we successfully tested the effectiveness of the proposed framework within the context of a proof of concept implementation.  相似文献   
85.
社会经济的快速发展促进了科学技术水平的显著提升,社会生产生活各个领域当中对计算机网络的应用程度不断提升,当前,网络已经成为了人们日常生活与工作的重要组成部分。为此,加强对网络安全等因素影响研究就显得格外重要。网络环境关系着用户的使用质量,更加影响人们的工作效率,加强对网络安全技术的研究时解决相关问题的核心内容。本文针对网络安全威胁因素以及常见的网络安全技术进行了简要分析。  相似文献   
86.
87.
Massive Open Online Courses (MOOCs) are becoming an essential source of information for both students and teachers. Noticeably, MOOCs have to adapt to the fast development of new technologies; they also have to satisfy the current generation of online students. The current MOOCs’ Management Systems, such as Coursera, Udacity, edX, etc., use content management platforms where content are organized in a hierarchical structure. We envision a new generation of MOOCs that support interpretability with formal semantics by using the SemanticWeb and the online social networks. Semantic technologies support more flexible information management than that offered by the current MOOCs’ platforms. Annotated information about courses, video lectures, assignments, students, teachers, etc., can be composed from heterogeneous sources, including contributions from the communities in the forum space. These annotations, combined with legacy data, build foundations for more efficient information discovery in MOOCs’ platforms. In this article we review various Collaborative Semantic Filtering technologies for building Semantic MOOCs’ management system, then, we present a prototype of a semantic middle-sized platform implemented at Western Kentucky University that answers these aforementioned requirements.  相似文献   
88.
To realize joint optimization of spatial diversity and equalization combining in the intersymbol interference (ISI) channel, an iterative equalization combining algorithm is proposed. The proposed algorithm uses the coefficients of Turbo equalization to calculate the combination weights without estimating the signal to noise ratio in each diversity branch. The equalized symbols from different diversity branches are combined, and the extrinsic information output from the decoder is fed back to the equalizers, so as to exchange soft information between the equalizers and the decoder. The performance of the proposed algorithm is analyzed using the extrinsic information transfer (EXIT) chart and verified by simulations. Results show that our approach fully exploits time domain information from the multipath channel and spatial domain information from multi receiving antennas, which efficiently improve the performance of the receiver in the severe ISI channel.  相似文献   
89.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved.  相似文献   
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号