全文获取类型
收费全文 | 5274篇 |
免费 | 51篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 83篇 |
综合类 | 1篇 |
化学工业 | 403篇 |
金属工艺 | 21篇 |
机械仪表 | 37篇 |
建筑科学 | 46篇 |
矿业工程 | 2篇 |
能源动力 | 25篇 |
轻工业 | 105篇 |
水利工程 | 9篇 |
石油天然气 | 5篇 |
无线电 | 328篇 |
一般工业技术 | 390篇 |
冶金工业 | 3286篇 |
原子能技术 | 29篇 |
自动化技术 | 556篇 |
出版年
2021年 | 26篇 |
2020年 | 17篇 |
2019年 | 27篇 |
2018年 | 26篇 |
2017年 | 30篇 |
2016年 | 17篇 |
2015年 | 27篇 |
2014年 | 22篇 |
2013年 | 133篇 |
2012年 | 63篇 |
2011年 | 78篇 |
2010年 | 84篇 |
2009年 | 85篇 |
2008年 | 94篇 |
2007年 | 71篇 |
2006年 | 81篇 |
2005年 | 67篇 |
2004年 | 47篇 |
2003年 | 77篇 |
2002年 | 76篇 |
2001年 | 67篇 |
2000年 | 57篇 |
1999年 | 155篇 |
1998年 | 967篇 |
1997年 | 548篇 |
1996年 | 351篇 |
1995年 | 243篇 |
1994年 | 195篇 |
1993年 | 242篇 |
1992年 | 76篇 |
1991年 | 68篇 |
1990年 | 88篇 |
1989年 | 72篇 |
1988年 | 74篇 |
1987年 | 55篇 |
1986年 | 76篇 |
1985年 | 76篇 |
1984年 | 40篇 |
1983年 | 53篇 |
1982年 | 48篇 |
1981年 | 49篇 |
1980年 | 48篇 |
1979年 | 27篇 |
1978年 | 44篇 |
1977年 | 79篇 |
1976年 | 153篇 |
1975年 | 24篇 |
1974年 | 30篇 |
1972年 | 20篇 |
1970年 | 17篇 |
排序方式: 共有5326条查询结果,搜索用时 13 毫秒
21.
22.
SR Cohen ML Corrigan FL Bookstein CA Trotman A Burdi M Barr 《Canadian Metallurgical Quarterly》1995,6(3):184-189
Trisomy 21 develops as a result of nondisjunction of two homologous chromosomes during either the first or second meiotic division. One of the more important consequences of these genetic alterations is the predictable, although variable disturbance in the architecture of the craniofacial region [1]. Postnatal craniofacial morphology has been extensively studied in Down's syndrome (DS). However, little information is available on human prenatal development of the head and face in such patients. The time at which changes in craniofacial phenotype first emerge in Down's syndrome fetuses and at which physical growth begins to diverge from normal is unknown. To explore these questions, we compared prenatal craniofacial growth in 50 Down's syndrome fetuses with that of 555 fetuses judged to be "typical for body weight and age" using the method of log-linear allometry [2]. 相似文献
23.
BACKGROUND: Like other areas of health care, critical care faces increasing pressure to improve the quality while reducing the cost of care. Strategies drawn from the literature and the authors' experiences are presented. STRATEGIES AND OPPORTUNITIES FOR IMPROVEMENTS: Ten process- or structure-related areas are targeted as strategically important focuses of improvement: (1) restructuring administrative lines to better suit key processes; (2) physician leadership in critical care units; (3) management training for critical care managers; (4) triage; (5) multidisciplinary critical care; (6) standardization of care; (7) developing alternatives to critical care units; (8) timeliness of care delivery; (9) appropriate use of critical care resources; and (10) tracking quality improvement. TIMELINESS OF CARE DELIVERY: Whatever the root cause(s) of unnecessary delays, the result is inefficient use of critical care resources-and ultimately either a need for more resources or longer wait times. Innovations designed to reduce wait times and waste, such as the establishment of a microchemistry stat laboratory, may prove valuable. APPROPRIATE USE OF CRITICAL CARE RESOURCES: Possible strategies for the appropriate use of critical care resources include better selection of well-informed patients who undergo procedures. Reduction in variation among physicians and organizations in providing therapies will also likely lead to a reduction in some high-risk procedures offering little or no benefit, and therefore a reduction in need for critical care services. Better preparation of patients and families should also make end-of-life decisions easier when questions of "futility" arise. Better information on outcomes and cost-effectiveness and consensus on withdrawal of critical care treatments represent two additional strategies. 相似文献
24.
In this paper we present new edge detection algorithms which are motivated by recent developments on edge-adapted reconstruction techniques [F. Aràndiga, A. Cohen, R. Donat, N. Dyn, B. Matei, Approximation of piecewise smooth functions and images by edge-adapted (ENO-EA) nonlinear multiresolution techniques, Appl. Comput. Harmon. Anal. 24 (2) (2008) 225–250]. They are based on comparing local quantities rather than on filtering and thresholding. This comparison process is invariant under certain transformations that model light changes in the image, hence we obtain edge detection algorithms which are insensitive to changes in illumination. 相似文献
25.
Fred Cohen 《Network Security》2000,2000(9):16-17
Networks dominate today’s computing environment and commercial technical protection is lagging behind attack technology. As a result, protection programme success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
26.
Fred Cohen 《Network Security》2000,2000(11):16-18
Networks dominate today's computing landscape and commercial technical protection is lagging behind attack technology. As a result, protection programme success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
27.
We show that it is possible to collect data that are useful for collaborative filtering (CF) using an autonomous Web spider. In CF, entities are recommended to a new user based on the stated preferences of other, similar users. We describe a CF spider that collects from the Web lists of semantically related entities. These lists can then be used by existing CF algorithms by encoding them as ‘pseudo-users'. Importantly, the spider can collect useful data without pre-programmed knowledge about the format of particular pages or particular sites. Instead, the CF spider uses commercial Web-search engines to find pages likely to contain lists in the domain of interest, and then applies previously proposed heuristics to extract lists from these pages. We show that data collected by this spider are nearly as effective for CF as data collected from real users, and more effective than data collected by two plausible hand-programmed spiders. In some cases, autonomously spidered data can also be combined with actual user data to improve performance. 相似文献
28.
29.
30.