首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   76615篇
  免费   15137篇
  国内免费   1280篇
电工技术   2212篇
技术理论   6篇
综合类   1955篇
化学工业   23975篇
金属工艺   2476篇
机械仪表   3005篇
建筑科学   4071篇
矿业工程   796篇
能源动力   2100篇
轻工业   9114篇
水利工程   801篇
石油天然气   2006篇
武器工业   160篇
无线电   11368篇
一般工业技术   16473篇
冶金工业   2876篇
原子能技术   455篇
自动化技术   9183篇
  2024年   121篇
  2023年   566篇
  2022年   953篇
  2021年   1521篇
  2020年   2311篇
  2019年   3877篇
  2018年   3971篇
  2017年   4339篇
  2016年   4829篇
  2015年   5043篇
  2014年   5469篇
  2013年   7039篇
  2012年   4904篇
  2011年   4926篇
  2010年   4807篇
  2009年   4670篇
  2008年   4107篇
  2007年   3710篇
  2006年   3446篇
  2005年   2962篇
  2004年   2564篇
  2003年   2603篇
  2002年   2550篇
  2001年   2301篇
  2000年   2026篇
  1999年   1502篇
  1998年   1141篇
  1997年   835篇
  1996年   711篇
  1995年   553篇
  1994年   526篇
  1993年   362篇
  1992年   303篇
  1991年   240篇
  1990年   189篇
  1989年   180篇
  1988年   141篇
  1987年   112篇
  1986年   106篇
  1985年   58篇
  1984年   71篇
  1983年   64篇
  1982年   34篇
  1981年   43篇
  1980年   29篇
  1979年   22篇
  1978年   22篇
  1977年   31篇
  1976年   58篇
  1975年   13篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
Identifying an unfamiliar caller's profession is important to protect citizens' personal safety and property. Owing to the limited data protection of various popular online services in some countries, such as taxi hailing and ordering takeouts, many users presently encounter an increasing number of phone calls from strangers. The situation may be aggravated when criminals pretend to be such service delivery staff, threatening the user individuals as well as the society. In addition, numerous people experience excessive digital marketing and fraudulent phone calls because of personal information leakage. However, previous works on malicious call detection only focused on binary classification, which does not work for the identification of multiple professions. We observed that web service requests issued from users' mobile phones might exhibit their application preferences, spatial and temporal patterns, and other profession-related information. This offers researchers and engineers a hint to identify unfamiliar callers. In fact, some previous works already leveraged raw data from mobile phones (which includes sensitive information) for personality studies. However, accessing users' mobile phone raw data may violate the more and more strict private data protection policies and regulations (e.g., General Data Protection Regulation). We observe that appropriate statistical methods can offer an effective means to eliminate private information and preserve personal characteristics, thus enabling the identification of the types of mobile phone callers without privacy concerns. In this paper, we develop CPFinder —- a system that exploits privacy-preserving mobile data to automatically identify callers who are divided into four categories of users: taxi drivers, delivery and takeouts staffs, telemarketers and fraudsters, and normal users (other professions). Our evaluation of an anonymized dataset of 1,282 users over a period of 3 months in Shanghai City shows that the CPFinder can achieve accuracies of more than 75.0% and 92.4% for multiclass and binary classifications, respectively.  相似文献   
992.
封春节  朱晓波  吴杨慧  傅晨  常惠玉  岳玉涛  顾文华 《红外与激光工程》2022,51(2):20210878-1-20210878-6
近年来,太赫兹技术快速发展,基于超表面的太赫兹器件受到广泛关注,并已应用于太赫兹成像、光谱和生物传感等诸多领域。但太赫兹超表面器件的制备复杂且成本高,而静电喷印技术无需掩模版,成本低、精度高且易于在异形曲面上制作。基于静电喷印技术设计和制备了太赫兹吸波器,并利用太赫兹时域光谱系统(THz-TDS)对样品进行了性能测试,实验与仿真结果基本相符,在0.098~0.353 THz频段内吸收大于90%。此外,还设计了太赫兹线极化转换器,在0.167~0.355 THz频段内的极化转换大于95%,相对带宽约72%,并分析了所设计样品的制备工艺条件,验证了静电喷印技术对于制备太赫兹极化转换器的可行性。研究成果表明,静电喷印技术在太赫兹超表面器件的制备中具有广泛的应用前景。  相似文献   
993.
The advantages of a cloud computing service are cost advantages, availability, scalability, flexibility, reduced time to market, and dynamic access to computing resources. Enterprises can improve the successful adoption rate of cloud computing services if they understand the critical factors. To find critical factors, this study first reviewed the literature and established a three-layer hierarchical factor table for adopting a cloud computing service based on the Technology-Organization-Environment framework. Then, a hybrid method that combines two multi-criteria decision-making tools—called the Fuzzy Analytic Network Process method and the concept of VlseKriterijumska Optimizacija I Kompromisno Resenje acceptable advantage—was used to objectively identify critical factors for the adoption of a cloud computing service, replacing the subjective decision of the authors. The results of this study determined five critical factors, namely data access security, information transmission security, senior management support, fallback cloud management, and employee acceptance. Finally, the paper presents the findings and implications of the study.  相似文献   
994.
The safety of patients and the quality of medical care provided to them are vital for their wellbeing. This study establishes a set of RFID (Radio Frequency Identification)-based systems of patient care based on physiological signals in the pursuit of a remote medical care system. The RFID-based positioning system allows medical staff to continuously observe the patient's health and location. The staff can thus respond to medical emergencies in time and appropriately care for the patient. When the COVID-19 pandemic broke out, the proposed system was used to provide timely information on the location and body temperature of patients who had been screened for the disease. The results of experiments and comparative analyses show that the proposed system is superior to competing systems in use. The use of remote monitoring technology makes user interface easier to provide high-quality medical services to remote areas with sparse populations, and enables better care of the elderly and patients with mobility issues. It can be found from the experiments of this research that the accuracy of the position sensor and the ability of package delivery are the best among the other related studies. The presentation of the graphical interface is also the most cordial among human-computer interaction and the operation is simple and clear.  相似文献   
995.
Wang  Bilin  Wang  Shengsheng  Zhang  Zhe  Zhao  Xin  Fu  Zihao 《Applied Intelligence》2022,52(12):14070-14084
Applied Intelligence - Unsupervised Domain Adaptation (UDA) aims to transfer knowledge from a label-rich source domain to an unlabeled target domain with a different but related distribution....  相似文献   
996.
Liang  Likeng  Hao  Tianyong  Zhan  Choujun  Qiu  Hong  Wang  Fu Lee  Yan  Jun  Weng  Heng  Qu  Yingying 《Neural computing & applications》2022,34(19):16311-16324
Neural Computing and Applications - Medical concept normalization aims to construct a semantic mapping between mentions and concepts and to uniformly represent mentions that belong to the same...  相似文献   
997.
998.
999.
1000.
Fungal endocarditis (FE) is commonly regarded as a rare but fatal disease. The incidence of infective endocarditis (IE) in hemodialysis (HD) patients is thought to be obviously higher than that in the general population. Moreover, IE occurs more likely in HD patients with catheters. With the increase of HD population and extensive use of catheters in HD patients, FE, as a special form of IE, may increase and bring new challenges to clinicians. We reported a case of FE associated with catheter infection in a 44‐year‐old woman on HD. The risk factors and treatment strategies of FE in HD patients were discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号