首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   75463篇
  免费   8178篇
  国内免费   6072篇
电工技术   5758篇
技术理论   18篇
综合类   10693篇
化学工业   3485篇
金属工艺   1282篇
机械仪表   4253篇
建筑科学   5837篇
矿业工程   2376篇
能源动力   1654篇
轻工业   1033篇
水利工程   2099篇
石油天然气   1396篇
武器工业   1469篇
无线电   9625篇
一般工业技术   6394篇
冶金工业   3640篇
原子能技术   413篇
自动化技术   28288篇
  2024年   303篇
  2023年   1020篇
  2022年   1620篇
  2021年   2029篇
  2020年   2294篇
  2019年   1879篇
  2018年   1871篇
  2017年   2297篇
  2016年   2642篇
  2015年   2840篇
  2014年   4867篇
  2013年   5110篇
  2012年   5354篇
  2011年   5793篇
  2010年   4484篇
  2009年   4857篇
  2008年   5148篇
  2007年   5496篇
  2006年   5018篇
  2005年   4378篇
  2004年   3664篇
  2003年   3168篇
  2002年   2483篇
  2001年   1988篇
  2000年   1632篇
  1999年   1265篇
  1998年   930篇
  1997年   800篇
  1996年   672篇
  1995年   610篇
  1994年   511篇
  1993年   418篇
  1992年   356篇
  1991年   255篇
  1990年   201篇
  1989年   216篇
  1988年   171篇
  1987年   94篇
  1986年   119篇
  1985年   97篇
  1984年   100篇
  1983年   74篇
  1982年   68篇
  1981年   54篇
  1980年   46篇
  1979年   44篇
  1978年   33篇
  1977年   33篇
  1964年   36篇
  1955年   36篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
The problem of detecting a subspace signal embedded in subspace Gaussian interference and thermal noise is studied in this paper. In this problem, both the signal-independent and signal-dependent interferences are assumed to be present, therefore the overall interference subspace covers the signal subspace. The approach of this paper extends previous works involving either of those two kinds of interferences. A set of secondary data containing only interference plus noise is employed to estimate the interference covariance matrix and the noise power. Three new detectors are designed via the generalized likelihood ratio (GLR), Rao and Wald tests, respectively. Their probabilities of false alarms (PFAs) and detections are analytically derived. The PFAs show that the new detectors have the constant false alarm rate (CFAR) property against the interference and noise. Numerical results show that the new detectors outperform their counterparts for the studied problem. Furthermore, the new detectors are less sensitive to the secondary data size and to the mismatched subspace signal than some other detectors, such as the GLR detector (GLRD), the adaptive matched filter (AMF), the adaptive subspace detector (ASD), etc.  相似文献   
2.
Massive Open Online Courses (MOOCs) are becoming an essential source of information for both students and teachers. Noticeably, MOOCs have to adapt to the fast development of new technologies; they also have to satisfy the current generation of online students. The current MOOCs’ Management Systems, such as Coursera, Udacity, edX, etc., use content management platforms where content are organized in a hierarchical structure. We envision a new generation of MOOCs that support interpretability with formal semantics by using the SemanticWeb and the online social networks. Semantic technologies support more flexible information management than that offered by the current MOOCs’ platforms. Annotated information about courses, video lectures, assignments, students, teachers, etc., can be composed from heterogeneous sources, including contributions from the communities in the forum space. These annotations, combined with legacy data, build foundations for more efficient information discovery in MOOCs’ platforms. In this article we review various Collaborative Semantic Filtering technologies for building Semantic MOOCs’ management system, then, we present a prototype of a semantic middle-sized platform implemented at Western Kentucky University that answers these aforementioned requirements.  相似文献   
3.
ContextEnterprise software systems (e.g., enterprise resource planning software) are often deployed in different contexts (e.g., different organizations or different business units or branches of one organization). However, even though organizations, business units or branches have the same or similar business goals, they may differ in how they achieve these goals. Thus, many enterprise software systems are subject to variability and adapted depending on the context in which they are used.ObjectiveOur goal is to provide a snapshot of variability in large scale enterprise software systems. We aim at understanding the types of variability that occur in large industrial enterprise software systems. Furthermore, we aim at identifying how variability is handled in such systems.MethodWe performed an exploratory case study in two large software organizations, involving two large enterprise software systems. Data were collected through interviews and document analysis. Data were analyzed following a grounded theory approach.ResultsWe identified seven types of variability (e.g., functionality, infrastructure) and eight mechanisms to handle variability (e.g., add-ons, code switches).ConclusionsWe provide generic types for classifying variability in enterprise software systems, and reusable mechanisms for handling such variability. Some variability types and handling mechanisms for enterprise software systems found in the real world extend existing concepts and theories. Others confirm findings from previous research literature on variability in software in general and are therefore not specific to enterprise software systems. Our findings also offer a theoretical foundation for describing variability handling in practice. Future work needs to provide more evaluations of the theoretical foundations, and refine variability handling mechanisms into more detailed practices.  相似文献   
4.
To realize joint optimization of spatial diversity and equalization combining in the intersymbol interference (ISI) channel, an iterative equalization combining algorithm is proposed. The proposed algorithm uses the coefficients of Turbo equalization to calculate the combination weights without estimating the signal to noise ratio in each diversity branch. The equalized symbols from different diversity branches are combined, and the extrinsic information output from the decoder is fed back to the equalizers, so as to exchange soft information between the equalizers and the decoder. The performance of the proposed algorithm is analyzed using the extrinsic information transfer (EXIT) chart and verified by simulations. Results show that our approach fully exploits time domain information from the multipath channel and spatial domain information from multi receiving antennas, which efficiently improve the performance of the receiver in the severe ISI channel.  相似文献   
5.
6.
Social media-based screening is a well-known practice to both recruiters and job seekers. Little is known, however, about how job seekers present themselves on social media, i.e. ‘self-disclosure’, for employment purposes. This study builds on the theories of hyperpersonal computer-mediated communication, self-efficacy and social exchange to examine job seekers’ professional online image concerns, social media self-efficacy, and perceptions of social media effectiveness in the job search as predictors of inappropriate and career-oriented self-disclosures on these media. Findings from a sample of 3374 Italian respondents showed that career-oriented self-disclosure was predicted by all three factors, whereas inappropriate self-disclosure was only predicted by social media self-efficacy. Furthermore, the relationship between professional online image concerns and inappropriate self-disclosure was moderated by age, education and work experience, but not by gender. Theoretical and practical implications are discussed, and directions for future research are suggested.  相似文献   
7.
Health information technology (IT) is a promising way to achieve safer medication management in the delivery of healthcare. However, human factors/ergonomics dictates that in order to make the complex, cognitive work of healthcare delivery safer, health IT must properly support human cognition. This means, for example, that new health IT must reduce, not increase, workload during safety-critical tasks. The present study was the first to quantitatively assess the short- and long-term impact of bar coded medication administration (BCMA) IT on nurses' mental workload as well as on perceived medication safety. One-hundred seventy registered nurses across 3 dissimilar clinical units at an academic, freestanding pediatric hospital in the Midwest US participated in surveys administered before, 3 months after, and 12 months after the hospital implemented BCMA. Nurses rated their external mental workload (interruptions, divided attention, being rushed) and internal mental workload (concentration, mental effort) during medication administration tasks as well as the likelihood of each of three medication safety events: medication administration errors, medication errors on the clinical unit, and clinical unit-level adverse drug events. Clinical unit differences were assessed. Findings generally confirmed the hypothesis that external but not internal mental workload was associated with the perceived likelihood of a medication safety event. Comparisons of mental workload from pre- to post-BCMA revealed statistically significant changes in the critical care unit only. Medication safety appeared to improve over the long term in the hematology/oncology unit only. In the critical care and medical/surgical units, medication safety exhibited short-term improvements that were eliminated over time. Changes in mental workload and medication safety, two classically microergonomic constructs, were deeply embedded in macroergonomic phenomena. These included the fit between the BCMA system and the nature of nursing work, the process of BCMA implementation, and BCMA interactions with concurrent changes occurring in the hospital. Findings raise questions about achieving sustainable performance improvement with health IT as well as the balance between micro- and macroergonomic approaches to studying technology change.Relevance to industryDesigners must consider how technology changes cognitive work, including mental workload. Hospitals and other implementers of technology must ensure that new technology fits its users, their tasks, and the context of use, which may entail tailoring implementation, for example, to specific clinical units. Evaluators must look over time to assess both changes in cognitive work and implementation issues. Healthcare practitioners must also recognize that new technology means a complex transformation to an already complex sociotechnical system, which calls for a macroergonomic approach to design and analysis.  相似文献   
8.
本文对运营商信息安全集中管控架构演进和信息安全管控策略面临的问题进行了深入分析,提出了信息安全集中管控架构的演进方向建议及对信息安全监控策略工作优化的若干意见。  相似文献   
9.
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号