首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   48493篇
  免费   5256篇
  国内免费   4335篇
电工技术   3786篇
技术理论   14篇
综合类   6310篇
化学工业   745篇
金属工艺   426篇
机械仪表   2286篇
建筑科学   2616篇
矿业工程   1216篇
能源动力   375篇
轻工业   606篇
水利工程   1138篇
石油天然气   551篇
武器工业   954篇
无线电   8803篇
一般工业技术   2266篇
冶金工业   1663篇
原子能技术   94篇
自动化技术   24235篇
  2024年   209篇
  2023年   597篇
  2022年   1159篇
  2021年   1471篇
  2020年   1610篇
  2019年   1078篇
  2018年   1015篇
  2017年   1419篇
  2016年   1635篇
  2015年   1812篇
  2014年   3429篇
  2013年   3184篇
  2012年   3815篇
  2011年   3804篇
  2010年   2881篇
  2009年   3039篇
  2008年   3271篇
  2007年   3571篇
  2006年   3264篇
  2005年   2910篇
  2004年   2586篇
  2003年   2361篇
  2002年   1839篇
  2001年   1588篇
  2000年   1274篇
  1999年   851篇
  1998年   523篇
  1997年   372篇
  1996年   287篇
  1995年   223篇
  1994年   202篇
  1993年   142篇
  1992年   98篇
  1991年   77篇
  1990年   47篇
  1989年   60篇
  1988年   45篇
  1987年   30篇
  1986年   27篇
  1985年   33篇
  1984年   37篇
  1983年   32篇
  1982年   25篇
  1981年   21篇
  1980年   20篇
  1979年   16篇
  1977年   8篇
  1965年   10篇
  1964年   11篇
  1961年   7篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
The recent trend of integration among new network services such as the long-term evolution (LTE) based on internet protocol (IP) needs reputable analyses and prediction information on the internet traffic. The IP along with increased internet traffics due to expanding new service platforms such as smartphones will reflect policies such as network QoS according to new services. The establishment of monitoring methods and analysis plans is thus required for the development of internet traffics that will analyze their status and predict their future. The paper with the speed of Internet traffic model is developed for monitoring the state of the experiment and verified. The problem is that the proposed service Internet service provider (ISP) to resolve the conflict between the occurrences can be considerably Internet traffic and that the state of data may be helpful in understanding. The paper advancement policy to reflect the network traffic volume of Internet services and users irradiation with increased traffic due to the development and management of the analysis was carried out experimental measurements.  相似文献   
2.
Massive Open Online Courses (MOOCs) are becoming an essential source of information for both students and teachers. Noticeably, MOOCs have to adapt to the fast development of new technologies; they also have to satisfy the current generation of online students. The current MOOCs’ Management Systems, such as Coursera, Udacity, edX, etc., use content management platforms where content are organized in a hierarchical structure. We envision a new generation of MOOCs that support interpretability with formal semantics by using the SemanticWeb and the online social networks. Semantic technologies support more flexible information management than that offered by the current MOOCs’ platforms. Annotated information about courses, video lectures, assignments, students, teachers, etc., can be composed from heterogeneous sources, including contributions from the communities in the forum space. These annotations, combined with legacy data, build foundations for more efficient information discovery in MOOCs’ platforms. In this article we review various Collaborative Semantic Filtering technologies for building Semantic MOOCs’ management system, then, we present a prototype of a semantic middle-sized platform implemented at Western Kentucky University that answers these aforementioned requirements.  相似文献   
3.
To realize joint optimization of spatial diversity and equalization combining in the intersymbol interference (ISI) channel, an iterative equalization combining algorithm is proposed. The proposed algorithm uses the coefficients of Turbo equalization to calculate the combination weights without estimating the signal to noise ratio in each diversity branch. The equalized symbols from different diversity branches are combined, and the extrinsic information output from the decoder is fed back to the equalizers, so as to exchange soft information between the equalizers and the decoder. The performance of the proposed algorithm is analyzed using the extrinsic information transfer (EXIT) chart and verified by simulations. Results show that our approach fully exploits time domain information from the multipath channel and spatial domain information from multi receiving antennas, which efficiently improve the performance of the receiver in the severe ISI channel.  相似文献   
4.
5.
Health information technology (IT) is a promising way to achieve safer medication management in the delivery of healthcare. However, human factors/ergonomics dictates that in order to make the complex, cognitive work of healthcare delivery safer, health IT must properly support human cognition. This means, for example, that new health IT must reduce, not increase, workload during safety-critical tasks. The present study was the first to quantitatively assess the short- and long-term impact of bar coded medication administration (BCMA) IT on nurses' mental workload as well as on perceived medication safety. One-hundred seventy registered nurses across 3 dissimilar clinical units at an academic, freestanding pediatric hospital in the Midwest US participated in surveys administered before, 3 months after, and 12 months after the hospital implemented BCMA. Nurses rated their external mental workload (interruptions, divided attention, being rushed) and internal mental workload (concentration, mental effort) during medication administration tasks as well as the likelihood of each of three medication safety events: medication administration errors, medication errors on the clinical unit, and clinical unit-level adverse drug events. Clinical unit differences were assessed. Findings generally confirmed the hypothesis that external but not internal mental workload was associated with the perceived likelihood of a medication safety event. Comparisons of mental workload from pre- to post-BCMA revealed statistically significant changes in the critical care unit only. Medication safety appeared to improve over the long term in the hematology/oncology unit only. In the critical care and medical/surgical units, medication safety exhibited short-term improvements that were eliminated over time. Changes in mental workload and medication safety, two classically microergonomic constructs, were deeply embedded in macroergonomic phenomena. These included the fit between the BCMA system and the nature of nursing work, the process of BCMA implementation, and BCMA interactions with concurrent changes occurring in the hospital. Findings raise questions about achieving sustainable performance improvement with health IT as well as the balance between micro- and macroergonomic approaches to studying technology change.Relevance to industryDesigners must consider how technology changes cognitive work, including mental workload. Hospitals and other implementers of technology must ensure that new technology fits its users, their tasks, and the context of use, which may entail tailoring implementation, for example, to specific clinical units. Evaluators must look over time to assess both changes in cognitive work and implementation issues. Healthcare practitioners must also recognize that new technology means a complex transformation to an already complex sociotechnical system, which calls for a macroergonomic approach to design and analysis.  相似文献   
6.
本文对运营商信息安全集中管控架构演进和信息安全管控策略面临的问题进行了深入分析,提出了信息安全集中管控架构的演进方向建议及对信息安全监控策略工作优化的若干意见。  相似文献   
7.
针对现有混合入侵检测模型仅定性选取特征而导致检测精度较低的问题,同时为了充分结合误用检测模型和异常检测模型的优势,提出一种采用信息增益率的混合入侵检测模型.首先,利用信息增益率定量地选择特征子集,最大程度地保留样本信息;其次,采用余弦时变粒子群算法确定支持向量机参数构建误用检测模型,使其更好地平衡粒子在全局和局部的搜索能力,然后,选取灰狼算法确定单类支持向量机参数构建异常检测模型,以此来提高对最优参数的搜索效率和精细程度,综合提高混合入侵检测模型对攻击的检测效果;最后,通过两种数据集进行仿真实验,验证了所提混合入侵检测模型具有较好的检测性能.  相似文献   
8.
This study explored adolescents’ opinions about how Internet use supports the achievement of their developmental tasks. Qualitative data were collected in focus groups interviews with 127 Italian Internet users (11–20) attending middle and high schools. Discussions were recorded, transcribed and analyzed using content analysis. Results showed that the Internet plays important functions in identity formation, personal autonomy, and relationships outside the family. It allows teens to develop their own interests, to identify with others and, at the same time, differentiate from others. The Internet is also an arena in which adolescents develop and practice autonomy. The Internet can be a source of conflict with parents, because of parents’ concerns about Internet use. However, the Internet can also be a meeting ground with parents. Finally, participants indicated the Internet is used to form close relationships with peers. Gender and age differences are discussed. Although the study is cross-sectional and relies only on adolescent report, findings illustrate how the conceptual framework of developmental goals may be helpful for understanding how the Internet can affect adolescents’ lives.  相似文献   
9.
Professional search in patent repositories poses several unique challenges. One key requirement is to search the entire affected space of concepts, following well-defined procedures to ensure traceability of results obtained. Several techniques have been introduced to enhance query generation, preferably via automated query term expansion, to improve retrieval effectiveness. Currently, these approaches are mostly limited to computing additional query terms from patent documents based on statistical measures. For conceptual search to solve the limitation of traditional keyword search standard dictionaries are used to provide synonyms and keyword phrases for query refinement. Studies show that these are insufficient in such highly specialized domains. In this paper, we present an approach to extract keyword phrases from query logs created during the validation procedure of the patent applications. This creates valuable domain-specific lexical databases for several specific patent classes that can be used to both expand as well as limit the scope of a patent search. This provides a more powerful means to guide a professional searcher through the search process. We evaluate the lexical databases based on real query sessions of patent examiners.  相似文献   
10.
Many e-commerce companies collect users’ personal data for marketing purposes despite privacy concerns. Information-collecting companies often offer a monetary reward to users to alleviate privacy concerns and ease the collection of personal information. This study focused on the negative effects of monetary rewards on both information privacy concerns (IPC) and information disclosure. A survey approach was used to collect data and 370 final responses were analysed using a two-way analysis of variance and a binomial logistic regression model. The results show that monetary rewards increase IPC when an information-collecting company requires sensitive information. Additional results indicate that building trust is a more effective way of collecting personal data. This study identifies how organisations can best execute information-collection activities and contributes additional insights for academia and practitioners.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号