首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5274篇
  免费   51篇
  国内免费   1篇
电工技术   83篇
综合类   1篇
化学工业   403篇
金属工艺   21篇
机械仪表   37篇
建筑科学   46篇
矿业工程   2篇
能源动力   25篇
轻工业   105篇
水利工程   9篇
石油天然气   5篇
无线电   328篇
一般工业技术   390篇
冶金工业   3286篇
原子能技术   29篇
自动化技术   556篇
  2021年   26篇
  2020年   17篇
  2019年   27篇
  2018年   26篇
  2017年   30篇
  2016年   17篇
  2015年   27篇
  2014年   22篇
  2013年   133篇
  2012年   63篇
  2011年   78篇
  2010年   84篇
  2009年   85篇
  2008年   94篇
  2007年   71篇
  2006年   81篇
  2005年   67篇
  2004年   47篇
  2003年   77篇
  2002年   76篇
  2001年   67篇
  2000年   57篇
  1999年   155篇
  1998年   967篇
  1997年   548篇
  1996年   351篇
  1995年   243篇
  1994年   195篇
  1993年   242篇
  1992年   76篇
  1991年   68篇
  1990年   88篇
  1989年   72篇
  1988年   74篇
  1987年   55篇
  1986年   76篇
  1985年   76篇
  1984年   40篇
  1983年   53篇
  1982年   48篇
  1981年   49篇
  1980年   48篇
  1979年   27篇
  1978年   44篇
  1977年   79篇
  1976年   153篇
  1975年   24篇
  1974年   30篇
  1972年   20篇
  1970年   17篇
排序方式: 共有5326条查询结果,搜索用时 13 毫秒
21.
22.
Trisomy 21 develops as a result of nondisjunction of two homologous chromosomes during either the first or second meiotic division. One of the more important consequences of these genetic alterations is the predictable, although variable disturbance in the architecture of the craniofacial region [1]. Postnatal craniofacial morphology has been extensively studied in Down's syndrome (DS). However, little information is available on human prenatal development of the head and face in such patients. The time at which changes in craniofacial phenotype first emerge in Down's syndrome fetuses and at which physical growth begins to diverge from normal is unknown. To explore these questions, we compared prenatal craniofacial growth in 50 Down's syndrome fetuses with that of 555 fetuses judged to be "typical for body weight and age" using the method of log-linear allometry [2].  相似文献   
23.
BACKGROUND: Like other areas of health care, critical care faces increasing pressure to improve the quality while reducing the cost of care. Strategies drawn from the literature and the authors' experiences are presented. STRATEGIES AND OPPORTUNITIES FOR IMPROVEMENTS: Ten process- or structure-related areas are targeted as strategically important focuses of improvement: (1) restructuring administrative lines to better suit key processes; (2) physician leadership in critical care units; (3) management training for critical care managers; (4) triage; (5) multidisciplinary critical care; (6) standardization of care; (7) developing alternatives to critical care units; (8) timeliness of care delivery; (9) appropriate use of critical care resources; and (10) tracking quality improvement. TIMELINESS OF CARE DELIVERY: Whatever the root cause(s) of unnecessary delays, the result is inefficient use of critical care resources-and ultimately either a need for more resources or longer wait times. Innovations designed to reduce wait times and waste, such as the establishment of a microchemistry stat laboratory, may prove valuable. APPROPRIATE USE OF CRITICAL CARE RESOURCES: Possible strategies for the appropriate use of critical care resources include better selection of well-informed patients who undergo procedures. Reduction in variation among physicians and organizations in providing therapies will also likely lead to a reduction in some high-risk procedures offering little or no benefit, and therefore a reduction in need for critical care services. Better preparation of patients and families should also make end-of-life decisions easier when questions of "futility" arise. Better information on outcomes and cost-effectiveness and consensus on withdrawal of critical care treatments represent two additional strategies.  相似文献   
24.
In this paper we present new edge detection algorithms which are motivated by recent developments on edge-adapted reconstruction techniques [F. Aràndiga, A. Cohen, R. Donat, N. Dyn, B. Matei, Approximation of piecewise smooth functions and images by edge-adapted (ENO-EA) nonlinear multiresolution techniques, Appl. Comput. Harmon. Anal. 24 (2) (2008) 225–250]. They are based on comparing local quantities rather than on filtering and thresholding. This comparison process is invariant under certain transformations that model light changes in the image, hence we obtain edge detection algorithms which are insensitive to changes in illumination.  相似文献   
25.
Chipping     
Networks dominate today’s computing environment and commercial technical protection is lagging behind attack technology. As a result, protection programme success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.  相似文献   
26.
Fred Cohen 《Network Security》2000,2000(11):16-18
Networks dominate today's computing landscape and commercial technical protection is lagging behind attack technology. As a result, protection programme success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.  相似文献   
27.
We show that it is possible to collect data that are useful for collaborative filtering (CF) using an autonomous Web spider. In CF, entities are recommended to a new user based on the stated preferences of other, similar users. We describe a CF spider that collects from the Web lists of semantically related entities. These lists can then be used by existing CF algorithms by encoding them as ‘pseudo-users'. Importantly, the spider can collect useful data without pre-programmed knowledge about the format of particular pages or particular sites. Instead, the CF spider uses commercial Web-search engines to find pages likely to contain lists in the domain of interest, and then applies previously proposed heuristics to extract lists from these pages. We show that data collected by this spider are nearly as effective for CF as data collected from real users, and more effective than data collected by two plausible hand-programmed spiders. In some cases, autonomously spidered data can also be combined with actual user data to improve performance.  相似文献   
28.
29.
30.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号