全文获取类型
收费全文 | 76615篇 |
免费 | 15137篇 |
国内免费 | 1280篇 |
专业分类
电工技术 | 2212篇 |
技术理论 | 6篇 |
综合类 | 1955篇 |
化学工业 | 23975篇 |
金属工艺 | 2476篇 |
机械仪表 | 3005篇 |
建筑科学 | 4071篇 |
矿业工程 | 796篇 |
能源动力 | 2100篇 |
轻工业 | 9114篇 |
水利工程 | 801篇 |
石油天然气 | 2006篇 |
武器工业 | 160篇 |
无线电 | 11368篇 |
一般工业技术 | 16473篇 |
冶金工业 | 2876篇 |
原子能技术 | 455篇 |
自动化技术 | 9183篇 |
出版年
2024年 | 121篇 |
2023年 | 566篇 |
2022年 | 953篇 |
2021年 | 1521篇 |
2020年 | 2311篇 |
2019年 | 3877篇 |
2018年 | 3971篇 |
2017年 | 4339篇 |
2016年 | 4829篇 |
2015年 | 5043篇 |
2014年 | 5469篇 |
2013年 | 7039篇 |
2012年 | 4904篇 |
2011年 | 4926篇 |
2010年 | 4807篇 |
2009年 | 4670篇 |
2008年 | 4107篇 |
2007年 | 3710篇 |
2006年 | 3446篇 |
2005年 | 2962篇 |
2004年 | 2564篇 |
2003年 | 2603篇 |
2002年 | 2550篇 |
2001年 | 2301篇 |
2000年 | 2026篇 |
1999年 | 1502篇 |
1998年 | 1141篇 |
1997年 | 835篇 |
1996年 | 711篇 |
1995年 | 553篇 |
1994年 | 526篇 |
1993年 | 362篇 |
1992年 | 303篇 |
1991年 | 240篇 |
1990年 | 189篇 |
1989年 | 180篇 |
1988年 | 141篇 |
1987年 | 112篇 |
1986年 | 106篇 |
1985年 | 58篇 |
1984年 | 71篇 |
1983年 | 64篇 |
1982年 | 34篇 |
1981年 | 43篇 |
1980年 | 29篇 |
1979年 | 22篇 |
1978年 | 22篇 |
1977年 | 31篇 |
1976年 | 58篇 |
1975年 | 13篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
Jiaquan Zhang Hui Chen Xiaoming Yao Xiaoming Fu 《Digital Communications & Networks》2022,8(3):324-332
Identifying an unfamiliar caller's profession is important to protect citizens' personal safety and property. Owing to the limited data protection of various popular online services in some countries, such as taxi hailing and ordering takeouts, many users presently encounter an increasing number of phone calls from strangers. The situation may be aggravated when criminals pretend to be such service delivery staff, threatening the user individuals as well as the society. In addition, numerous people experience excessive digital marketing and fraudulent phone calls because of personal information leakage. However, previous works on malicious call detection only focused on binary classification, which does not work for the identification of multiple professions. We observed that web service requests issued from users' mobile phones might exhibit their application preferences, spatial and temporal patterns, and other profession-related information. This offers researchers and engineers a hint to identify unfamiliar callers. In fact, some previous works already leveraged raw data from mobile phones (which includes sensitive information) for personality studies. However, accessing users' mobile phone raw data may violate the more and more strict private data protection policies and regulations (e.g., General Data Protection Regulation). We observe that appropriate statistical methods can offer an effective means to eliminate private information and preserve personal characteristics, thus enabling the identification of the types of mobile phone callers without privacy concerns. In this paper, we develop CPFinder —- a system that exploits privacy-preserving mobile data to automatically identify callers who are divided into four categories of users: taxi drivers, delivery and takeouts staffs, telemarketers and fraudsters, and normal users (other professions). Our evaluation of an anonymized dataset of 1,282 users over a period of 3 months in Shanghai City shows that the CPFinder can achieve accuracies of more than 75.0% and 92.4% for multiclass and binary classifications, respectively. 相似文献
992.
近年来,太赫兹技术快速发展,基于超表面的太赫兹器件受到广泛关注,并已应用于太赫兹成像、光谱和生物传感等诸多领域。但太赫兹超表面器件的制备复杂且成本高,而静电喷印技术无需掩模版,成本低、精度高且易于在异形曲面上制作。基于静电喷印技术设计和制备了太赫兹吸波器,并利用太赫兹时域光谱系统(THz-TDS)对样品进行了性能测试,实验与仿真结果基本相符,在0.098~0.353 THz频段内吸收大于90%。此外,还设计了太赫兹线极化转换器,在0.167~0.355 THz频段内的极化转换大于95%,相对带宽约72%,并分析了所设计样品的制备工艺条件,验证了静电喷印技术对于制备太赫兹极化转换器的可行性。研究成果表明,静电喷印技术在太赫兹超表面器件的制备中具有广泛的应用前景。 相似文献
993.
The advantages of a cloud computing service are cost advantages, availability, scalability, flexibility, reduced time to market, and dynamic access to computing resources. Enterprises can improve the successful adoption rate of cloud computing services if they understand the critical factors. To find critical factors, this study first reviewed the literature and established a three-layer hierarchical factor table for adopting a cloud computing service based on the Technology-Organization-Environment framework. Then, a hybrid method that combines two multi-criteria decision-making tools—called the Fuzzy Analytic Network Process method and the concept of VlseKriterijumska Optimizacija I Kompromisno Resenje acceptable advantage—was used to objectively identify critical factors for the adoption of a cloud computing service, replacing the subjective decision of the authors. The results of this study determined five critical factors, namely data access security, information transmission security, senior management support, fallback cloud management, and employee acceptance. Finally, the paper presents the findings and implications of the study. 相似文献
994.
The safety of patients and the quality of medical care provided to them are vital for their wellbeing. This study establishes a set of RFID (Radio Frequency Identification)-based systems of patient care based on physiological signals in the pursuit of a remote medical care system. The RFID-based positioning system allows medical staff to continuously observe the patient's health and location. The staff can thus respond to medical emergencies in time and appropriately care for the patient. When the COVID-19 pandemic broke out, the proposed system was used to provide timely information on the location and body temperature of patients who had been screened for the disease. The results of experiments and comparative analyses show that the proposed system is superior to competing systems in use. The use of remote monitoring technology makes user interface easier to provide high-quality medical services to remote areas with sparse populations, and enables better care of the elderly and patients with mobility issues. It can be found from the experiments of this research that the accuracy of the position sensor and the ability of package delivery are the best among the other related studies. The presentation of the graphical interface is also the most cordial among human-computer interaction and the operation is simple and clear. 相似文献
995.
Wang Bilin Wang Shengsheng Zhang Zhe Zhao Xin Fu Zihao 《Applied Intelligence》2022,52(12):14070-14084
Applied Intelligence - Unsupervised Domain Adaptation (UDA) aims to transfer knowledge from a label-rich source domain to an unlabeled target domain with a different but related distribution.... 相似文献
996.
Liang Likeng Hao Tianyong Zhan Choujun Qiu Hong Wang Fu Lee Yan Jun Weng Heng Qu Yingying 《Neural computing & applications》2022,34(19):16311-16324
Neural Computing and Applications - Medical concept normalization aims to construct a semantic mapping between mentions and concepts and to uniformly represent mentions that belong to the same... 相似文献
997.
Composite Materials Based on Shape‐Memory Ti2NiCu Alloy for Frontier Micro‐ and Nanomechanical Applications 下载免费PDF全文
998.
999.
1000.
Catheter‐related fungal endocarditis caused by Candida parapsilosis in a hemodialysis patient 下载免费PDF全文
Ying Shu Shaobin Yu Ling Zha Ping Fu Tianlei Cui 《Hemodialysis international. International Symposium on Home Hemodialysis》2017,21(4):E66-E68
Fungal endocarditis (FE) is commonly regarded as a rare but fatal disease. The incidence of infective endocarditis (IE) in hemodialysis (HD) patients is thought to be obviously higher than that in the general population. Moreover, IE occurs more likely in HD patients with catheters. With the increase of HD population and extensive use of catheters in HD patients, FE, as a special form of IE, may increase and bring new challenges to clinicians. We reported a case of FE associated with catheter infection in a 44‐year‐old woman on HD. The risk factors and treatment strategies of FE in HD patients were discussed. 相似文献