全文获取类型
收费全文 | 56165篇 |
免费 | 6773篇 |
国内免费 | 4906篇 |
专业分类
电工技术 | 5192篇 |
技术理论 | 15篇 |
综合类 | 7311篇 |
化学工业 | 883篇 |
金属工艺 | 372篇 |
机械仪表 | 2132篇 |
建筑科学 | 3284篇 |
矿业工程 | 1549篇 |
能源动力 | 636篇 |
轻工业 | 838篇 |
水利工程 | 1452篇 |
石油天然气 | 635篇 |
武器工业 | 997篇 |
无线电 | 9791篇 |
一般工业技术 | 2303篇 |
冶金工业 | 1637篇 |
原子能技术 | 121篇 |
自动化技术 | 28696篇 |
出版年
2024年 | 108篇 |
2023年 | 623篇 |
2022年 | 1234篇 |
2021年 | 1570篇 |
2020年 | 1695篇 |
2019年 | 1235篇 |
2018年 | 1121篇 |
2017年 | 1521篇 |
2016年 | 1787篇 |
2015年 | 2081篇 |
2014年 | 4347篇 |
2013年 | 3729篇 |
2012年 | 4714篇 |
2011年 | 4924篇 |
2010年 | 3766篇 |
2009年 | 4001篇 |
2008年 | 4230篇 |
2007年 | 4616篇 |
2006年 | 4084篇 |
2005年 | 3549篇 |
2004年 | 2961篇 |
2003年 | 2625篇 |
2002年 | 1792篇 |
2001年 | 1400篇 |
2000年 | 1073篇 |
1999年 | 669篇 |
1998年 | 447篇 |
1997年 | 345篇 |
1996年 | 292篇 |
1995年 | 223篇 |
1994年 | 207篇 |
1993年 | 149篇 |
1992年 | 107篇 |
1991年 | 83篇 |
1990年 | 52篇 |
1989年 | 59篇 |
1988年 | 47篇 |
1987年 | 27篇 |
1986年 | 28篇 |
1985年 | 45篇 |
1984年 | 52篇 |
1983年 | 43篇 |
1982年 | 28篇 |
1981年 | 18篇 |
1980年 | 19篇 |
1979年 | 17篇 |
1977年 | 8篇 |
1965年 | 10篇 |
1964年 | 11篇 |
1961年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
81.
82.
一种高误码(n,k,m)非系统卷积码盲识别算法 总被引:1,自引:1,他引:0
针对信息截获等领域中的卷积码盲识别问题,提出一种高误码 (n,k,m)非系统卷积码盲识别算法。首先建立可变的数据矩阵模型,对侦收到的数据进行相关预处理,以减小误码对识别的影响,提高算法的容错性能;再对预处理后的数据矩阵进行统计分析,识别出卷积码的各项参数,并提取各个数据矩阵的校验序列;进而利用校验序列构建线性方程组求解生成多项式矩阵组,通过设定筛选生成多项式矩阵的条件,筛选出非系统卷积码的生成多项式矩阵,最终完成对非系统卷积码的识别。仿真实验表明,该算法可以对高误码(n,k,m)非系统卷积码实现有效的盲识别。 相似文献
83.
Health information technology (IT) is a promising way to achieve safer medication management in the delivery of healthcare. However, human factors/ergonomics dictates that in order to make the complex, cognitive work of healthcare delivery safer, health IT must properly support human cognition. This means, for example, that new health IT must reduce, not increase, workload during safety-critical tasks. The present study was the first to quantitatively assess the short- and long-term impact of bar coded medication administration (BCMA) IT on nurses' mental workload as well as on perceived medication safety. One-hundred seventy registered nurses across 3 dissimilar clinical units at an academic, freestanding pediatric hospital in the Midwest US participated in surveys administered before, 3 months after, and 12 months after the hospital implemented BCMA. Nurses rated their external mental workload (interruptions, divided attention, being rushed) and internal mental workload (concentration, mental effort) during medication administration tasks as well as the likelihood of each of three medication safety events: medication administration errors, medication errors on the clinical unit, and clinical unit-level adverse drug events. Clinical unit differences were assessed. Findings generally confirmed the hypothesis that external but not internal mental workload was associated with the perceived likelihood of a medication safety event. Comparisons of mental workload from pre- to post-BCMA revealed statistically significant changes in the critical care unit only. Medication safety appeared to improve over the long term in the hematology/oncology unit only. In the critical care and medical/surgical units, medication safety exhibited short-term improvements that were eliminated over time. Changes in mental workload and medication safety, two classically microergonomic constructs, were deeply embedded in macroergonomic phenomena. These included the fit between the BCMA system and the nature of nursing work, the process of BCMA implementation, and BCMA interactions with concurrent changes occurring in the hospital. Findings raise questions about achieving sustainable performance improvement with health IT as well as the balance between micro- and macroergonomic approaches to studying technology change.Relevance to industryDesigners must consider how technology changes cognitive work, including mental workload. Hospitals and other implementers of technology must ensure that new technology fits its users, their tasks, and the context of use, which may entail tailoring implementation, for example, to specific clinical units. Evaluators must look over time to assess both changes in cognitive work and implementation issues. Healthcare practitioners must also recognize that new technology means a complex transformation to an already complex sociotechnical system, which calls for a macroergonomic approach to design and analysis. 相似文献
84.
Nowadays, despite the ever increasing need of people for staying “connected” at any time and everywhere, in many areas of the world data connection is extremely expensive or even absent. The Global System for Mobile Communication (GSM) network virtually covers all the populated areas of the world and on average, the entire world population have a handheld device capable of accessing at least the GSM services. Therefore, it makes sense to consider the Short Message Service (SMS) as the most popular wireless data service for such devices. In this work, we exploit the SMS as mechanism for data transfer, especially in scenarios where there is no other network coverage than GSM, such as in rural areas and developing regions. In particular, we propose a framework, based on the SMS as transport facility, which enables secure end-to-end data communication in a ubiquitous and pervasive manner. Moreover, we investigated how, by using compression techniques, the overall processing and transmission efforts needed for secure data communication can be effectively reduced, with the obvious consequences also in terms of energy consumption on the involved devices. Finally, we successfully tested the effectiveness of the proposed framework within the context of a proof of concept implementation. 相似文献
85.
社会经济的快速发展促进了科学技术水平的显著提升,社会生产生活各个领域当中对计算机网络的应用程度不断提升,当前,网络已经成为了人们日常生活与工作的重要组成部分。为此,加强对网络安全等因素影响研究就显得格外重要。网络环境关系着用户的使用质量,更加影响人们的工作效率,加强对网络安全技术的研究时解决相关问题的核心内容。本文针对网络安全威胁因素以及常见的网络安全技术进行了简要分析。 相似文献
86.
87.
Massive Open Online Courses (MOOCs) are becoming an essential source of information for both students and teachers. Noticeably, MOOCs have to adapt to the fast development of new technologies; they also have to satisfy the current generation of online students. The current MOOCs’ Management Systems, such as Coursera, Udacity, edX, etc., use content management platforms where content are organized in a hierarchical structure. We envision a new generation of MOOCs that support interpretability with formal semantics by using the SemanticWeb and the online social networks. Semantic technologies support more flexible information management than that offered by the current MOOCs’ platforms. Annotated information about courses, video lectures, assignments, students, teachers, etc., can be composed from heterogeneous sources, including contributions from the communities in the forum space. These annotations, combined with legacy data, build foundations for more efficient information discovery in MOOCs’ platforms. In this article we review various Collaborative Semantic Filtering technologies for building Semantic MOOCs’ management system, then, we present a prototype of a semantic middle-sized platform implemented at Western Kentucky University that answers these aforementioned requirements. 相似文献
88.
To realize joint optimization of spatial diversity and equalization combining in the intersymbol interference (ISI) channel, an iterative equalization combining algorithm is proposed. The proposed algorithm uses the coefficients of Turbo equalization to calculate the combination weights without estimating the signal to noise ratio in each diversity branch. The equalized symbols from different diversity branches are combined, and the extrinsic information output from the decoder is fed back to the equalizers, so as to exchange soft information between the equalizers and the decoder. The performance of the proposed algorithm is analyzed using the extrinsic information transfer (EXIT) chart and verified by simulations. Results show that our approach fully exploits time domain information from the multipath channel and spatial domain information from multi receiving antennas, which efficiently improve the performance of the receiver in the severe ISI channel. 相似文献
89.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved. 相似文献