首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4409篇
  免费   162篇
  国内免费   5篇
电工技术   21篇
综合类   8篇
化学工业   1190篇
金属工艺   44篇
机械仪表   47篇
建筑科学   186篇
矿业工程   13篇
能源动力   67篇
轻工业   727篇
水利工程   27篇
石油天然气   9篇
无线电   125篇
一般工业技术   487篇
冶金工业   1086篇
原子能技术   24篇
自动化技术   515篇
  2023年   27篇
  2022年   189篇
  2021年   204篇
  2020年   82篇
  2019年   98篇
  2018年   108篇
  2017年   84篇
  2016年   100篇
  2015年   94篇
  2014年   134篇
  2013年   259篇
  2012年   173篇
  2011年   225篇
  2010年   190篇
  2009年   156篇
  2008年   212篇
  2007年   192篇
  2006年   149篇
  2005年   134篇
  2004年   119篇
  2003年   96篇
  2002年   120篇
  2001年   72篇
  2000年   66篇
  1999年   88篇
  1998年   79篇
  1997年   53篇
  1996年   73篇
  1995年   50篇
  1994年   55篇
  1993年   54篇
  1992年   61篇
  1990年   49篇
  1989年   69篇
  1988年   45篇
  1987年   51篇
  1986年   55篇
  1985年   53篇
  1984年   58篇
  1983年   45篇
  1982年   30篇
  1981年   47篇
  1980年   26篇
  1979年   23篇
  1978年   22篇
  1977年   23篇
  1976年   30篇
  1975年   26篇
  1973年   16篇
  1970年   17篇
排序方式: 共有4576条查询结果,搜索用时 0 毫秒
61.
The generative topographic mapping (GTM) has been proposed as a statistical model to represent high-dimensional data by a distribution induced by a sparse lattice of points in a low-dimensional latent space, such that visualization, compression, and data inspection become possible. The formulation in terms of a generative statistical model has the benefit that relevant parameters of the model can be determined automatically based on an expectation maximization scheme. Further, the model offers a large flexibility such as a direct out-of-sample extension and the possibility to obtain different degrees of granularity of the visualization without the need of additional training. Original GTM is restricted to Euclidean data points in a given Euclidean vector space. Often, data are not explicitly embedded in a Euclidean vector space, rather pairwise dissimilarities of data can be computed, i.e. the relations between data points are given rather than the data vectors themselves. We propose a method which extends the GTM to relational data and which allows us to achieve a sparse representation of data characterized by pairwise dissimilarities, in latent space. The method, relational GTM, is demonstrated on several benchmarks.  相似文献   
62.

Context

Adopting IT innovation in organizations is a complex decision process driven by technical, social and economic issues. Thus, those organizations that decide to adopt innovation take a decision of uncertain success of implementation, as the actual use of a new technology might not be the one expected. The misalignment between planned and effective use of innovation is called assimilation gap.

Objective

This research aims at defining a quantitative instrument for measuring the assimilation gap and applying it to the case of the adoption of OSS.

Method

In this paper, we use the theory of path dependence and increasing returns of Arthur. In particular, we model the use of software applications (planned or actual) by stochastic processes defined by the daily amounts of files created with the applications. We quantify the assimilation gap by comparing the resulting models by measures of proximity.

Results

We apply and validate our method to a real case study of introduction of OpenOffice. We have found a gap between the planned and the effective use despite well-defined directives to use the new OS technology. These findings suggest a need of strategy re-calibration that takes into account environmental factors and individual attitudes.

Conclusions

The theory of path dependence is a valid instrument to model the assimilation gap provided information on strategy toward innovation and quantitative data on actual use are available.  相似文献   
63.
Six different methods to calculate the Strain Index (SI) scores for jobs with multiple forces/tasks were developed. Exposure data of 733 subjects from 12 different worksites were used to calculate these SI scores. Results show that using different SI computation methods could result in different SI scores, hence different risk level classifications. However, some simpler methods generated SI scores were comparable to the more complicated composite SI method. Despite differences in the scores between the six different SI computation methods, Spearman rank-order correlation coefficients of 0.61-0.97 were found between the methods. With some confidence, ergonomic practitioners may use simpler methods, depending on their specificity requirement in job evaluations and available resources. Some SI computation methods may tend to over-estimate job risk levels, while others may tend to under-estimate job risk levels, due to different ways used in obtaining the various SI parameters and computations.  相似文献   
64.
Component-based approaches are becoming more and more popular to support Internet-based application development. Different component modeling approaches, however, can be adopted, obtaining different abstraction levels (either conceptual or operational). In this paper we present a component-based architecture for the design of e-applications, and discuss the concept of wrapper components as building blocks for the development of e-services, where these services are based on legacy systems. We discuss their characteristics and their applicability in Internet-based application development. Received: 30 October 2000 / Accepted: 9 January 2001 Published online: 28 June 2001  相似文献   
65.
An industry consortium focused on ensuring that all PCs are secure for electronic business transactions has announced the release of its first version specification. The Trusted Computing Platform Alliance (TCPA), backed by founding members Compaq, Microsoft, Hewlett-Packard, IBM and Intel, said that the specification will adopt the combination of a hardware and a software approach, which includes a security chip that encrypts data whether filed locally, or sent over the Internet by E-mail.  相似文献   
66.
The frequent occurrence of implicitly thrown exceptions poses one of the challenges present in a Java compiler. Not only do these implicitly thrown exceptions directly affect the performance by requiring explicit checks, they also indirectly impact the performance by restricting code movement in order to satisfy the precise exception model in Java. In particular, instruction scheduling is one transformation that is restricted by implicitly thrown exceptions due to the heavy reliance on reordering instructions to exploit maximum hardware performance. The goal of this study is two-fold: first, investigate the degree to which implicitly thrown exceptions in Java hinder instruction scheduling, and second, find new techniques for allowing more efficient execution of Java programs containing implicitly thrown exceptions. Experimental results show that with aggressive scheduling techniques, such as superblock scheduling, the negative performance impact can be greatly reduced.  相似文献   
67.
Two samples of naturally occurring pyrite were treated with acetyl acetone, silanes, humic acids, lignin-NaOH mixture, and oxalic acid. The corrosion rate of pyrite was observed to decrease significantly due to the surface treatment by the chemicals used in this study. Surface characterization methods indicate that phenyl triacetoxy silane forms a passive coating a few Angstroms thick on the pyrite, thus preventing its dissolution in 1M H2SO4.  相似文献   
68.
Through investigating the reactions of commercial farmers to land and water reforms in the Trichardtsdal-Ofcolaco area, Limpopo Province, Olifants Basin, South Africa, from 1997 to 2006, it is shown that water claims are key to land redistribution processes, and that commercial farmers make strategic use of arguments for nature conservation and ecological stewardship to defend their claims to water. Given these observations, caution is warranted with respect to the implementation of land and water reforms as separate policy packages; it may be more effective to design water and conservation policies as an integral part of land reform programmes.  相似文献   
69.
This study examined the question, ‘What is the impact of a digital math intervention on secondary ELL students’ mathematical capabilities and perceptions of their future possibilities?’ The hypothesis was that through its direct effect on increasing students’ math ability and its indirect effect on increasing students’ perceived math self-efficacy, the digital intervention affects students’ perceptions of their functionings and future possibilities. A path analysis, with qualitative data nested into the design, was used to analyze the conceptualized relationships. The study was conducted with 50 ninth-and-10th-grade Hispanic students in a Colorado high school, over 6 months. The primary finding was that through its direct effect on increasing students’ math ability and its indirect effect on increasing students’ perceived math self-efficacy, the digital intervention improved students’ perceptions of their functionings and future possibilities. What this study specifically underscores is the importance of taking a coherent and purposeful approach toward the design of digital student-directed educational technology, especially for ELL students who may have specific learning needs.  相似文献   
70.
The authors explored the possibility that there are different neural consequences, beyond the primary site of brain damage, following perirhinal cortex (PRh) lesions made in different ways. Fos expression was used as a marker for neuronal activation and compared across the forebrains of rats that underwent the different types of surgery. Electrolytic and excitotoxic PRh lesions produced dramatic increases in Fos expression in the cortex, and excitotoxic and aspiration PRh lesions increased Fos expression in the dentate gyrus. These data are consistent with the hypothesis that different lesion methods have separable effects on neural function in regions outside the lesion site that could account for inconsistencies in the literature regarding the behavioral effects of PRh lesions on tests of spatial memory. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号