首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15150篇
  免费   160篇
  国内免费   23篇
教育   10636篇
科学研究   1393篇
各国文化   211篇
体育   1363篇
综合类   12篇
文化理论   154篇
信息传播   1564篇
  2021年   107篇
  2020年   176篇
  2019年   281篇
  2018年   348篇
  2017年   418篇
  2016年   363篇
  2015年   251篇
  2014年   331篇
  2013年   3145篇
  2012年   317篇
  2011年   304篇
  2010年   264篇
  2009年   275篇
  2008年   316篇
  2007年   325篇
  2006年   282篇
  2005年   260篇
  2004年   252篇
  2003年   269篇
  2002年   237篇
  2001年   221篇
  2000年   237篇
  1999年   212篇
  1998年   137篇
  1997年   145篇
  1996年   181篇
  1995年   144篇
  1994年   173篇
  1993年   157篇
  1992年   223篇
  1991年   223篇
  1990年   216篇
  1989年   213篇
  1988年   183篇
  1987年   177篇
  1986年   206篇
  1985年   189篇
  1984年   169篇
  1983年   209篇
  1982年   176篇
  1981年   165篇
  1980年   159篇
  1979年   223篇
  1978年   187篇
  1977年   169篇
  1976年   152篇
  1975年   126篇
  1974年   120篇
  1973年   104篇
  1972年   107篇
排序方式: 共有10000条查询结果,搜索用时 453 毫秒
931.
This paper presents the results of a comparative cost study of the manual circulation system and experimental automated system in a university library in Nigeria. Two sets of data were collected: one on the existing manual circulation system and the other on the experimental automated system on an Apple II microcomputer. Eight different circulation activities were identified for evaluation for which the direct labor cost of circulating a book on each system was calculated. The experimental automated system was found to be less labor intensive than the manual system, although overall unit cost of book circulation on the automated system was higher than on the manual system ($0.59 and $0.49, respectively). Factors attributed to the higher unit cost on the automated system were the cost of equipment and the low circulation figure. However, the automated system was found to be more effective in providing up-to-date and accurate data required for the monitoring of the library stock.  相似文献   
932.
Domesticating Computers and the Internet   总被引:1,自引:0,他引:1  
The people who use computers and the ways they use them have changed substantially over the past 25 years. In the beginning highly educated people, mostly men, in technical professions used computers for work, but over time a much broader range of people are using computers for personal and domestic purposes. This trend is still continuing, and over a shorter time scale has been replicated with the use of the Internet. This paper uses data from four national surveys to document how personal computers and the Internet have become increasingly domesticated since 1995 and to explore the mechanisms for this shift. Now people log on more often from home than from places of employment and do so for pleasure and for personal purposes rather than for their jobs. Analyses comparing veteran Internet users to novices in 1998 and 2000 and analyses comparing the change in use within a single sample between 1995 and 1996 support two complementary explanations for how these technologies have become domesticated. Women, children, and less well-educated individuals are increasingly using computers and the Internet and have a more personal set of motives than well-educated men. In addition, the widespread diffusion of the PC and the Internet and the response of the computing industry to the diversity in consumers has led to a rich set of personal and domestic services.  相似文献   
933.
934.
Knowledge of window style, content, location, and grammatical structure may be used to classify documents as originating within a particular discipline or may be used to place a document on a theory vs practice spectrum. This distinction is also studied here using the type-token ratio to differentiate between sublanguages. The statistical significance of windows is computed, based on the presence of terms in titles, abstracts, citations, and section headers, as well as binary-independent and inverse-document-frequency weightings. The characteristics of windows are studied by examining their within-window density and the S concentration, the concentration of terms from various document fields (e.g. title, abstract) in the fulltext. The rate of window occurrences from the beginning to the end of document fulltext differs between academic fields. Different syntactic structures in sublanguages are examined, and their use is considered for discriminating between specific academic disciplines and, more generally, between theory vs practice or knowledge vs applications-oriented documents.  相似文献   
935.
Synchronous data transmission systems that transmit information over dispersive channels often employ adaptive equalization techniques in the processing of the received signals. Most equalizers presently used in communication systems are of the tapped delay line (TDL) type. In this paper, we propose a class of adaptive equalizers of which the TDL equalizer is a member. Another interesting member of this class is the Laguerre adaptive equalizer which is to be introduced in this paper. The configuration of the Laguerre equalizer is developed. It is found, as shown by the examples, that the Laguerre equalizer is more accurate, and is less sensitive to timing error than the conventional TDL equalizer.  相似文献   
936.
This paper deals with the experimental aspects of ultrasonic delay lines in liquid media and is a sequel to a previous paper treating the general theory of such devices.Delay devices employing ultrasonic propagation through liquids have proved satisfactory for delay times of the order of 3 milliseconds or less. Such devices can be made broadband and give excellent reproduction of pulse shape. The design considerations for such devices are discussed and illustrated by actual examples.  相似文献   
937.
In this paper, an algorithm is developed to apply Hann, Hamming, Blackman and related windows directly in the transform domain for the discrete cosine transform and discrete sine transform. These algorithms are useful in applications where windowing is required in order to minimize edge effects caused by implicit symmetries in the transform domain that are not replicated in the real-world data. Examples of such applications include data communication, adaptive system identification and filtering, real-time analysis of financial market data, etc. Software implementations in C language are also given.  相似文献   
938.
The problem factorizing (separating) the transfer function of a given SISO 3-D discrete system, ie of a system depending on three independent variables, is considered. The 3-D system is assumed to be available in its transfer function representation, which is converted to a canonical state-space model by a simple inspection procedure. Then applying state-feedback to this canonical model we choose the feedback matrix gain (under certain conditions) such that the transfer function of the closed-loop system has the desireed factorized form, ie a product of three 1-D transfer functions each one being dependent on a single variable. The method is illustrated by a nontrivial numerical example.  相似文献   
939.
超过7000万人感染HIV、2000万人死亡,艾滋病是医学史上最严重的流行病之一.  相似文献   
940.
Radio Frequency Identification (RFID) systems identify and track objects, animals and, in principle, people. The ability to gather information obtained by tracking consumer goods, government documents, monetary transactions and human beings raises a number of interesting and important privacy issues. Moreover, RFID systems pose an ensemble of other ethical challenges related to appropriate uses and users of such systems. This paper reviews a number of RFID applications with the intention of identifying the technology’s benefits and possible misuses. We offer an overview and discussion of the most important ethical issues concerning RFID, and describes and examine some methods of protecting privacy. Norman G. Einspruch serves as a consultant to several high-technology companies, one of which is in the RFID components and systems business.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号