首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   48766篇
  免费   5319篇
  国内免费   3911篇
电工技术   4407篇
技术理论   10篇
综合类   6505篇
化学工业   803篇
金属工艺   577篇
机械仪表   2912篇
建筑科学   2554篇
矿业工程   1337篇
能源动力   431篇
轻工业   600篇
水利工程   1219篇
石油天然气   1174篇
武器工业   1147篇
无线电   8152篇
一般工业技术   2304篇
冶金工业   1707篇
原子能技术   361篇
自动化技术   21796篇
  2024年   190篇
  2023年   500篇
  2022年   1008篇
  2021年   1237篇
  2020年   1372篇
  2019年   972篇
  2018年   912篇
  2017年   1308篇
  2016年   1544篇
  2015年   1849篇
  2014年   3466篇
  2013年   3092篇
  2012年   3954篇
  2011年   4079篇
  2010年   3024篇
  2009年   3194篇
  2008年   3470篇
  2007年   3833篇
  2006年   3468篇
  2005年   3094篇
  2004年   2622篇
  2003年   2309篇
  2002年   1648篇
  2001年   1306篇
  2000年   1042篇
  1999年   727篇
  1998年   513篇
  1997年   436篇
  1996年   332篇
  1995年   273篇
  1994年   255篇
  1993年   172篇
  1992年   120篇
  1991年   105篇
  1990年   70篇
  1989年   77篇
  1988年   65篇
  1987年   36篇
  1986年   34篇
  1985年   41篇
  1984年   43篇
  1983年   33篇
  1982年   20篇
  1981年   15篇
  1980年   19篇
  1979年   16篇
  1977年   8篇
  1965年   11篇
  1964年   12篇
  1961年   7篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
11.
Health information technology (IT) is a promising way to achieve safer medication management in the delivery of healthcare. However, human factors/ergonomics dictates that in order to make the complex, cognitive work of healthcare delivery safer, health IT must properly support human cognition. This means, for example, that new health IT must reduce, not increase, workload during safety-critical tasks. The present study was the first to quantitatively assess the short- and long-term impact of bar coded medication administration (BCMA) IT on nurses' mental workload as well as on perceived medication safety. One-hundred seventy registered nurses across 3 dissimilar clinical units at an academic, freestanding pediatric hospital in the Midwest US participated in surveys administered before, 3 months after, and 12 months after the hospital implemented BCMA. Nurses rated their external mental workload (interruptions, divided attention, being rushed) and internal mental workload (concentration, mental effort) during medication administration tasks as well as the likelihood of each of three medication safety events: medication administration errors, medication errors on the clinical unit, and clinical unit-level adverse drug events. Clinical unit differences were assessed. Findings generally confirmed the hypothesis that external but not internal mental workload was associated with the perceived likelihood of a medication safety event. Comparisons of mental workload from pre- to post-BCMA revealed statistically significant changes in the critical care unit only. Medication safety appeared to improve over the long term in the hematology/oncology unit only. In the critical care and medical/surgical units, medication safety exhibited short-term improvements that were eliminated over time. Changes in mental workload and medication safety, two classically microergonomic constructs, were deeply embedded in macroergonomic phenomena. These included the fit between the BCMA system and the nature of nursing work, the process of BCMA implementation, and BCMA interactions with concurrent changes occurring in the hospital. Findings raise questions about achieving sustainable performance improvement with health IT as well as the balance between micro- and macroergonomic approaches to studying technology change.Relevance to industryDesigners must consider how technology changes cognitive work, including mental workload. Hospitals and other implementers of technology must ensure that new technology fits its users, their tasks, and the context of use, which may entail tailoring implementation, for example, to specific clinical units. Evaluators must look over time to assess both changes in cognitive work and implementation issues. Healthcare practitioners must also recognize that new technology means a complex transformation to an already complex sociotechnical system, which calls for a macroergonomic approach to design and analysis.  相似文献   
12.
本文对运营商信息安全集中管控架构演进和信息安全管控策略面临的问题进行了深入分析,提出了信息安全集中管控架构的演进方向建议及对信息安全监控策略工作优化的若干意见。  相似文献   
13.
Computer‐Interpretable Guidelines (CIGs) are the dominant medium for the delivery of clinical decision support, given the evidence‐based nature of their source material. Therefore, these machine‐readable versions have the ability to improve practitioner performance and conformance to standards, with availability at the point and time of care. The formalisation of Clinical Practice Guideline knowledge in a machine‐readable format is a crucial task to make it suitable for the integration in Clinical Decision Support Systems. However, the current tools for this purpose reveal shortcomings with respect to their ease of use and the support offered during CIG acquisition and editing. In this work, we characterise the current landscape of CIG acquisition tools based on the properties of guideline visualisation, organisation, simplicity, automation, manipulation of knowledge elements, and guideline storage and dissemination. Additionally, we describe the CompGuide Editor, a tool for the acquisition of CIGs in the CompGuide model for Clinical Practice Guidelines that also allows the editing of previously encoded guidelines. The Editor guides the users throughout the process of guideline encoding and does not require proficiency in any programming language. The features of the CIG encoding process are revealed through a comparison with already established tools for CIG acquisition.  相似文献   
14.
This work intends to develop an online experimental system for screening of deoxynivalenol (DON) contamination in whole wheat meals by visible/near-infrared (Vis/NIR) spectroscopy and computer vision coupling technology. Spectral and image information of samples with various DON levels was collected at speed of 0.15 m s−1 on a conveyor belt. The two-type data were then integrated and subjected to chemometric analysis. Discriminant analysis showed that samples could be classified by setting 1000 μg kg−1 as the cut-off value. The best correct classified rate obtained in prediction was 93.55% based on fusion of spectral and image features, with reduced prediction uncertainty as compared to single feature. However, quantification of DON by quantitative analysis was not successful due to poor model performance. These results indicate that, although not accurate enough to provide conclusive result, this coupling technology could be adopted for rapid screening of DON contamination in cereals and feeds during processing.  相似文献   
15.
16.
This work aims to improve the existing monitoring systems MS for two grid-connected PV stations GCPVS of URERMS ADRAR, to eliminate its limitations. This improvement consists of developing an MS which is used for two PV stations with different configurations. This MS contains new LabVIEW-based monitoring software for visualizing real-time measured data and evaluating GCPVS performance. In addition, it illustrates the 2D and 3D real-time relationships of PV system parameters, which allow us to understand the dynamic behavior of PV system components. This developed monitoring software synchronizes also the various data acquisition units DAU of GCPVS, allowing simultaneous data access.To perform a reliable performance analysis and a comparative study of different GCPVS based on accurate measurements, the sensor's calibration is performed with its DAU. The MS autonomy is ensured by integrating developed PV-UPS. A graphical user interface is provided for the evaluation of PV-UPS performance.  相似文献   
17.
The rate of penetration (ROP) model is of great importance in achieving a high efficiency in the complex geological drilling process. In this paper, a novel two-level intelligent modeling method is proposed for the ROP considering the drilling characteristics of data incompleteness, couplings, and strong nonlinearities. Firstly, a piecewise cubic Hermite interpolation method is introduced to complete the lost drilling data. Then, a formation drillability (FD) fusion submodel is established by using Nadaboost extreme learning machine (Nadaboost-ELM) algorithm, and the mutual information method is used to obtain the parameters, strongly correlated with the ROP. Finally, a ROP submodel is established by a neural network with radial basis function optimized by the improved particle swarm optimization (RBFNN-IPSO). This two-level ROP model is applied to a real drilling process and the proposed method shows the best performance in ROP prediction as compared with conventional methods. The proposed ROP model provides the basis for intelligent optimization and control in the complex geological drilling process.  相似文献   
18.
针对现有混合入侵检测模型仅定性选取特征而导致检测精度较低的问题,同时为了充分结合误用检测模型和异常检测模型的优势,提出一种采用信息增益率的混合入侵检测模型.首先,利用信息增益率定量地选择特征子集,最大程度地保留样本信息;其次,采用余弦时变粒子群算法确定支持向量机参数构建误用检测模型,使其更好地平衡粒子在全局和局部的搜索能力,然后,选取灰狼算法确定单类支持向量机参数构建异常检测模型,以此来提高对最优参数的搜索效率和精细程度,综合提高混合入侵检测模型对攻击的检测效果;最后,通过两种数据集进行仿真实验,验证了所提混合入侵检测模型具有较好的检测性能.  相似文献   
19.
Information‐Centric Networking (ICN) has been accepted to overcome some weaknesses of the current Internet architecture, showing that “what is being exchanged” is more important than “who are exchanging information.” Given the inadequate considerations on Quality of Service (QoS) and energy saving in ICN routing, we propose in this paper a routing algorithm to enhance the two aspects. At first, on one hand, Cauchy distribution is used as a fuzzy model to evaluate users' QoS requirements, such as bandwidth, delay, and error rate; on the other hand, we formulate energy saving problem to evaluate the green quality of routing algorithm. Then, we design a link selection approach by considering QoS and energy saving, which belongs to a multi‐objective decision problem resolved by intelligent drops algorithm. Finally, we implement the proposed algorithm and compare it with the famous adaptive forwarding mechanism in terms of some significant metrics, and the experimental results reveal that the proposed algorithm is more efficient.  相似文献   
20.
Many e-commerce companies collect users’ personal data for marketing purposes despite privacy concerns. Information-collecting companies often offer a monetary reward to users to alleviate privacy concerns and ease the collection of personal information. This study focused on the negative effects of monetary rewards on both information privacy concerns (IPC) and information disclosure. A survey approach was used to collect data and 370 final responses were analysed using a two-way analysis of variance and a binomial logistic regression model. The results show that monetary rewards increase IPC when an information-collecting company requires sensitive information. Additional results indicate that building trust is a more effective way of collecting personal data. This study identifies how organisations can best execute information-collection activities and contributes additional insights for academia and practitioners.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号