全文获取类型
收费全文 | 53772篇 |
免费 | 6850篇 |
国内免费 | 5041篇 |
专业分类
电工技术 | 5793篇 |
技术理论 | 10篇 |
综合类 | 7490篇 |
化学工业 | 1824篇 |
金属工艺 | 947篇 |
机械仪表 | 2778篇 |
建筑科学 | 3086篇 |
矿业工程 | 1555篇 |
能源动力 | 1002篇 |
轻工业 | 777篇 |
水利工程 | 1676篇 |
石油天然气 | 882篇 |
武器工业 | 1072篇 |
无线电 | 7814篇 |
一般工业技术 | 3267篇 |
冶金工业 | 1881篇 |
原子能技术 | 157篇 |
自动化技术 | 23652篇 |
出版年
2024年 | 278篇 |
2023年 | 771篇 |
2022年 | 1468篇 |
2021年 | 1716篇 |
2020年 | 1799篇 |
2019年 | 1446篇 |
2018年 | 1317篇 |
2017年 | 1686篇 |
2016年 | 1928篇 |
2015年 | 2230篇 |
2014年 | 3753篇 |
2013年 | 3456篇 |
2012年 | 4216篇 |
2011年 | 4305篇 |
2010年 | 3303篇 |
2009年 | 3642篇 |
2008年 | 3787篇 |
2007年 | 4132篇 |
2006年 | 3624篇 |
2005年 | 3162篇 |
2004年 | 2700篇 |
2003年 | 2346篇 |
2002年 | 1712篇 |
2001年 | 1403篇 |
2000年 | 1167篇 |
1999年 | 851篇 |
1998年 | 609篇 |
1997年 | 490篇 |
1996年 | 414篇 |
1995年 | 336篇 |
1994年 | 299篇 |
1993年 | 235篇 |
1992年 | 170篇 |
1991年 | 142篇 |
1990年 | 95篇 |
1989年 | 113篇 |
1988年 | 83篇 |
1987年 | 63篇 |
1986年 | 53篇 |
1985年 | 40篇 |
1984年 | 53篇 |
1983年 | 50篇 |
1982年 | 33篇 |
1981年 | 23篇 |
1980年 | 31篇 |
1979年 | 23篇 |
1977年 | 11篇 |
1965年 | 11篇 |
1964年 | 11篇 |
1963年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
41.
索荣华 《数字社区&智能家居》2013,(11):7013-7016
长期以来,宁夏司法警官职业学院各种信息通过Office软件来存储,处理,在信息的更新,共享,查询,版本控制上等方面存在很多问题,管理这些信息比较繁琐,并且信息很难共享,因此学院急需一套信息管理系统来管理这些信息。该文对宁夏司法警官职业学院学生信息管理系统的项目立项、用户需求征询、设计开发、测试实施做了一个比较全面的概述。 相似文献
42.
随着企业生产规模的扩大,其所掌控的资产也越来越多。信息作为企业重要的资产,其安全性正得到越来越多的企业的关注,很多企业为了保证自身信息的安全与保密性,也制订了自身的信息安全策略。然而,很多企业的信息安全策略常常形同虚设,没有发挥其应有的作用,甚至存在着严重的漏洞,为企业的健康发展埋下了不小的隐患。笔者结合自身多年的工作经验,就企业信息安全策略实施过程中存在的问题进行分析,并针对性的提出几点对策,希望对相关人士能有所帮助。 相似文献
43.
范爱荣 《网络安全技术与应用》2013,(12):102-102
信息技术的发展,使人们的学习和交流打破了过去的时空界限,为人类能力的提高和发挥作用带来了新的空间。通过信息技术与数学学科的整合,让数学更贴近生活,突破教学重点难点,提高了学生的发散性思维能力,让我们看到信息技术在教学中的重要性。 相似文献
44.
Abstract This article reports findings of a study of how leaders of virtual information systems development teams improve team trust and cooperation by managing adaptation of information and communications tools. Results indicate how Theory X (command and control) and Theory Y (facilitate and support) styles of leadership enable and hinder effective outcomes. 相似文献
45.
《国际互联网参考资料服务季刊》2013,18(1-2):189-208
SUMMARY University students-whether adult, distance learner, or traditional age-need access to university services and quick accurate answers to their questions beyond traditional “business” hours. Students' busy schedules and changing life patterns dictate that university services meet their needs. At DePaul University in Chicago, student focus groups repeatedly pointed to the need for one central place to get an answer or solve a problem. DePaul Central was created as an information and referral service to satisfy that student need, at the same capitalizing on the value of the librarian skill set. 相似文献
46.
Kathy Shields 《国际互联网参考资料服务季刊》2013,18(3-4):207-218
In Spring 2012, instruction librarians collaborated with first year composition (FYC) faculty to study students’ research habits as they related to writing. We collected process narratives from students in the introductory FYC course at the beginning and end of the fall semester, and a group of librarians and FYC faculty coded them together. Although we did not achieve one of our initial research goals, we still gained valuable insight into how our students perceive sources and the research process. We applied what we learned to create new instructional materials and developed a valuable relationship with FYC faculty. 相似文献
47.
《国际互联网参考资料服务季刊》2013,18(2):75-96
Multi-user Data base (MUD) technology, and its object-oriented descendant (MOO), is one of the most exciting tools to surface on the Internet, and offers libraries and librarians a unique opportunity to participate in creating user-friendly standardized interfaces to many of our most frequently used resources. These resources include those we access through the Internet already, using gopher, telnet, WWW, and FTP, and also those proprietary databases that we currently access through leased lines such as OCLC First Search, Prism, DIALOG, and many others. MOO technology is already being used successfully to create user-extensible collaborative professional environments for educators, astronomers, and computer network systems administrators. With the growing relevance of the Internet for libraries and other information professionals, it behooves the library community to engage those emerging technologies which will aloow us to interface most effectively with the Internet and its many resources, with the proprietary databases which we depend on, and with one another. 相似文献
48.
Academic librarians have shared their experiences with tablet computers, but few examine how librarians use tablets in their instruction design. While the education literature provides technology integration models, the nature of library instruction requires adapting these models to the library classroom. After reviewing literature related to tablets in library instruction and a number of technology integration frameworks, this article demonstrates an application of the Substitution, Augmentation, Modification, Redefinition framework to analyze observations of an iPad-equipped classroom at a university library. Demonstrating this use of a framework provides an approach to technology integration and continues the discussion about tablets’ potential to promote innovative pedagogy. 相似文献
49.
Michael Breaks 《New Review of Information Networking》2013,18(2):67-68
The process undertaken by an information seeker, in order to form relevance decisions regarding documents, is defined as “Document Triage.” To better facilitate users’ needs in their triage activities, interactive interfaces have begun to evolve within on-line academic repositories. In order to complement current work on interface design and interaction, and produce custom guidelines to inform the creation of triage interfaces, we examine how interfaces that alter the document presentation and structure affect information seekers’ visual and navigational attention. We present a set of heuristics for both creating and evaluating such interfaces. 相似文献
50.
随着网络技术在医院的应用,其安全性日益受到重视。首先结合军队医院信息系统网络应用的特点,从硬件系统、软件系统、环境因素、人为因素等方面分析该网络系统的安全性;最后研究该网络系统安全可能造成的威胁,并提出安全应对措施。 相似文献