全文获取类型
收费全文 | 58703篇 |
免费 | 7610篇 |
国内免费 | 5625篇 |
专业分类
电工技术 | 3668篇 |
技术理论 | 12篇 |
综合类 | 7249篇 |
化学工业 | 1142篇 |
金属工艺 | 486篇 |
机械仪表 | 2226篇 |
建筑科学 | 3702篇 |
矿业工程 | 10336篇 |
能源动力 | 711篇 |
轻工业 | 675篇 |
水利工程 | 1287篇 |
石油天然气 | 597篇 |
武器工业 | 943篇 |
无线电 | 7032篇 |
一般工业技术 | 2371篇 |
冶金工业 | 2747篇 |
原子能技术 | 101篇 |
自动化技术 | 26653篇 |
出版年
2024年 | 196篇 |
2023年 | 595篇 |
2022年 | 1367篇 |
2021年 | 1788篇 |
2020年 | 2039篇 |
2019年 | 1398篇 |
2018年 | 1345篇 |
2017年 | 1646篇 |
2016年 | 1983篇 |
2015年 | 2252篇 |
2014年 | 4185篇 |
2013年 | 3707篇 |
2012年 | 4931篇 |
2011年 | 4845篇 |
2010年 | 3762篇 |
2009年 | 4152篇 |
2008年 | 4454篇 |
2007年 | 4745篇 |
2006年 | 4253篇 |
2005年 | 3706篇 |
2004年 | 3200篇 |
2003年 | 2873篇 |
2002年 | 1961篇 |
2001年 | 1555篇 |
2000年 | 1254篇 |
1999年 | 828篇 |
1998年 | 583篇 |
1997年 | 438篇 |
1996年 | 367篇 |
1995年 | 300篇 |
1994年 | 272篇 |
1993年 | 205篇 |
1992年 | 143篇 |
1991年 | 117篇 |
1990年 | 59篇 |
1989年 | 64篇 |
1988年 | 56篇 |
1987年 | 39篇 |
1986年 | 28篇 |
1985年 | 28篇 |
1984年 | 37篇 |
1983年 | 29篇 |
1982年 | 16篇 |
1981年 | 13篇 |
1980年 | 17篇 |
1979年 | 16篇 |
1977年 | 8篇 |
1965年 | 10篇 |
1964年 | 11篇 |
1961年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
11.
To realize joint optimization of spatial diversity and equalization combining in the intersymbol interference (ISI) channel, an iterative equalization combining algorithm is proposed. The proposed algorithm uses the coefficients of Turbo equalization to calculate the combination weights without estimating the signal to noise ratio in each diversity branch. The equalized symbols from different diversity branches are combined, and the extrinsic information output from the decoder is fed back to the equalizers, so as to exchange soft information between the equalizers and the decoder. The performance of the proposed algorithm is analyzed using the extrinsic information transfer (EXIT) chart and verified by simulations. Results show that our approach fully exploits time domain information from the multipath channel and spatial domain information from multi receiving antennas, which efficiently improve the performance of the receiver in the severe ISI channel. 相似文献
13.
Process mining techniques relate observed behavior (i.e., event logs) to modeled behavior (e.g., a BPMN model or a Petri net). Process models can be discovered from event logs and conformance checking techniques can be used to detect and diagnose differences between observed and modeled behavior. Existing process mining techniques can only uncover these differences, but the actual repair of the model is left to the user and is not supported. In this paper we investigate the problem of repairing a process model w.r.t. a log such that the resulting model can replay the log (i.e., conforms to it) and is as similar as possible to the original model. To solve the problem, we use an existing conformance checker that aligns the runs of the given process model to the traces in the log. Based on this information, we decompose the log into several sublogs of non-fitting subtraces. For each sublog, either a loop is discovered that can replay the sublog or a subprocess is derived that is then added to the original model at the appropriate location. The approach is implemented in the process mining toolkit ProM and has been validated on logs and models from several Dutch municipalities. 相似文献
14.
Health information technology (IT) is a promising way to achieve safer medication management in the delivery of healthcare. However, human factors/ergonomics dictates that in order to make the complex, cognitive work of healthcare delivery safer, health IT must properly support human cognition. This means, for example, that new health IT must reduce, not increase, workload during safety-critical tasks. The present study was the first to quantitatively assess the short- and long-term impact of bar coded medication administration (BCMA) IT on nurses' mental workload as well as on perceived medication safety. One-hundred seventy registered nurses across 3 dissimilar clinical units at an academic, freestanding pediatric hospital in the Midwest US participated in surveys administered before, 3 months after, and 12 months after the hospital implemented BCMA. Nurses rated their external mental workload (interruptions, divided attention, being rushed) and internal mental workload (concentration, mental effort) during medication administration tasks as well as the likelihood of each of three medication safety events: medication administration errors, medication errors on the clinical unit, and clinical unit-level adverse drug events. Clinical unit differences were assessed. Findings generally confirmed the hypothesis that external but not internal mental workload was associated with the perceived likelihood of a medication safety event. Comparisons of mental workload from pre- to post-BCMA revealed statistically significant changes in the critical care unit only. Medication safety appeared to improve over the long term in the hematology/oncology unit only. In the critical care and medical/surgical units, medication safety exhibited short-term improvements that were eliminated over time. Changes in mental workload and medication safety, two classically microergonomic constructs, were deeply embedded in macroergonomic phenomena. These included the fit between the BCMA system and the nature of nursing work, the process of BCMA implementation, and BCMA interactions with concurrent changes occurring in the hospital. Findings raise questions about achieving sustainable performance improvement with health IT as well as the balance between micro- and macroergonomic approaches to studying technology change.Relevance to industryDesigners must consider how technology changes cognitive work, including mental workload. Hospitals and other implementers of technology must ensure that new technology fits its users, their tasks, and the context of use, which may entail tailoring implementation, for example, to specific clinical units. Evaluators must look over time to assess both changes in cognitive work and implementation issues. Healthcare practitioners must also recognize that new technology means a complex transformation to an already complex sociotechnical system, which calls for a macroergonomic approach to design and analysis. 相似文献
15.
本文对运营商信息安全集中管控架构演进和信息安全管控策略面临的问题进行了深入分析,提出了信息安全集中管控架构的演进方向建议及对信息安全监控策略工作优化的若干意见。 相似文献
16.
Fault detection, isolation and optimal control have long been applied to industry. These techniques have proven various successful theoretical results and industrial applications. Fault diagnosis is considered as the merge of fault detection (that indicates if there is a fault) and fault isolation (that determines where the fault is), and it has important effects on the operation of complex dynamical systems specific to modern industry applications such as industrial electronics, business management systems, energy, and public sectors. Since the resources are always limited in real-world industrial applications, the solutions to optimally use them under various constraints are of high actuality. In this context, the optimal tuning of linear and nonlinear controllers is a systematic way to meet the performance specifications expressed as optimization problems that target the minimization of integral- or sum-type objective functions, where the tuning parameters of the controllers are the vector variables of the objective functions. The nature-inspired optimization algorithms give efficient solutions to such optimization problems. This paper presents an overview on recent developments in machine learning, data mining and evolving soft computing techniques for fault diagnosis and on nature-inspired optimal control. The generic theory is discussed along with illustrative industrial process applications that include a real liquid level control application, wind turbines and a nonlinear servo system. New research challenges with strong industrial impact are highlighted. 相似文献
17.
Bin Zhang Xuesong Jiang Fei Shen Xueming He Yong Fang Qiuhui Hu 《International Journal of Food Science & Technology》2021,56(6):2588-2595
This work intends to develop an online experimental system for screening of deoxynivalenol (DON) contamination in whole wheat meals by visible/near-infrared (Vis/NIR) spectroscopy and computer vision coupling technology. Spectral and image information of samples with various DON levels was collected at speed of 0.15 m s−1 on a conveyor belt. The two-type data were then integrated and subjected to chemometric analysis. Discriminant analysis showed that samples could be classified by setting 1000 μg kg−1 as the cut-off value. The best correct classified rate obtained in prediction was 93.55% based on fusion of spectral and image features, with reduced prediction uncertainty as compared to single feature. However, quantification of DON by quantitative analysis was not successful due to poor model performance. These results indicate that, although not accurate enough to provide conclusive result, this coupling technology could be adopted for rapid screening of DON contamination in cereals and feeds during processing. 相似文献
18.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors. 相似文献
19.
相似用户挖掘是提高社交网络服务质量的重要途径,在面向大数据的社交网络时代,准确的相似用户挖掘对于用户和互联网企业等都有重要的意义,而根据用户自己的兴趣话题挖掘的相似用户更符合相似用户的要求。提出了一种基于用户兴趣话题进行相似用户挖掘的方法。该方法首先使用TextRank话题提取方法对用户进行兴趣话题提取,再对用户发表内容进行训练,计算出所有词之间的相似度。提出CP(Corresponding Position similarity)、CPW(Corresponding Position Weighted similarity)、AP(All Position similarity)、APW(All Position Weighted similarity)四种用户兴趣话题词相似度计算方法,通过用户和相似用户间关注、粉丝重合率验证相似用户挖掘效果,APW similarity的相似用户的关注/粉丝重合百分比为1.687%,优于提出的其他三种算法,分别提高了26.3%、2.8%、12.4%,并且比传统的文本相似度方法Jaccard相似度、编辑距离算法、余弦相似度分别提高了20.4%、21.2%、45.0%。因此APW方法可以更加有效地挖掘出用户的相似用户。 相似文献