全文获取类型
收费全文 | 26455篇 |
免费 | 3723篇 |
国内免费 | 2537篇 |
专业分类
电工技术 | 559篇 |
技术理论 | 2篇 |
综合类 | 2108篇 |
化学工业 | 912篇 |
金属工艺 | 475篇 |
机械仪表 | 655篇 |
建筑科学 | 1916篇 |
矿业工程 | 9659篇 |
能源动力 | 493篇 |
轻工业 | 698篇 |
水利工程 | 456篇 |
石油天然气 | 723篇 |
武器工业 | 133篇 |
无线电 | 1776篇 |
一般工业技术 | 896篇 |
冶金工业 | 1430篇 |
原子能技术 | 54篇 |
自动化技术 | 9770篇 |
出版年
2024年 | 59篇 |
2023年 | 430篇 |
2022年 | 990篇 |
2021年 | 1248篇 |
2020年 | 1360篇 |
2019年 | 874篇 |
2018年 | 830篇 |
2017年 | 863篇 |
2016年 | 980篇 |
2015年 | 1011篇 |
2014年 | 1734篇 |
2013年 | 1458篇 |
2012年 | 2210篇 |
2011年 | 2119篇 |
2010年 | 1639篇 |
2009年 | 1789篇 |
2008年 | 1854篇 |
2007年 | 1950篇 |
2006年 | 1720篇 |
2005年 | 1496篇 |
2004年 | 1275篇 |
2003年 | 1207篇 |
2002年 | 781篇 |
2001年 | 582篇 |
2000年 | 543篇 |
1999年 | 376篇 |
1998年 | 291篇 |
1997年 | 206篇 |
1996年 | 169篇 |
1995年 | 150篇 |
1994年 | 131篇 |
1993年 | 102篇 |
1992年 | 74篇 |
1991年 | 71篇 |
1990年 | 31篇 |
1989年 | 26篇 |
1988年 | 24篇 |
1987年 | 18篇 |
1986年 | 19篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1983年 | 3篇 |
1982年 | 3篇 |
1981年 | 9篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1976年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 78 毫秒
11.
12.
AbstractData mining techniques have been successfully utilized in different applications of significant fields, including medical research. With the wealth of data available within the health-care systems, there is a lack of practical analysis tools to discover hidden relationships and trends in data. The complexity of medical data that is unfavorable for most models is a considerable challenge in prediction. The ability of a model to perform accurately and efficiently in disease diagnosis is extremely significant. Thus, the model must be selected to fit the data better, such that the learning from previous data is most efficient, and the diagnosis of the disease is highly accurate. This work is motivated by the limited number of regression analysis tools for multivariate counts in the literature. We propose two regression models for count data based on flexible distributions, namely, the multinomial Beta-Liouville and multinomial scaled Dirichlet, and evaluated the proposed models in the problem of disease diagnosis. The performance is evaluated based on the accuracy of the prediction which depends on the nature and complexity of the dataset. Our results show the efficiency of the two proposed regression models where the prediction performance of both models is competitive to other previously used regression models for count data and to the best results in the literature. 相似文献
13.
Most real-world vehicle nodes can be structured into an interconnected network of vehicles. Through structuring these services and vehicle device interactions into multiple types, such internet of vehicles becomes multidimensional heterogeneous overlay networks. The heterogeneousness of the overlays makes it difficult for the overlay networks to coordinate with each other to improve their performance. Therefore, it poses an interesting but critical challenge to the effective analysis of heterogeneous virtual vehicular networks. A variety of virtual vehicular networks can be easily deployed onto the native network by applying the concept of SDN (Software Defined Networking). These virtual networks reflect their heterogeneousness due to their different performance goals, and they compete for the same physical resources of the underlying network, so that a sub-optimal performance of the virtual networks may be achieved. Therefore, we propose a Deep Reinforcement Learning (DRL) approach to make the virtual networks cooperate with each other through the SDN controller. A cooperative solution based on the asymmetric Nash bargaining is proposed for co-existing virtual networks to improve their performance. Moreover, the Markov Chain model and DRL resolution are introduced to leverage the heterogeneous performance goals of virtual networks. The implementation of the approach is introduced, and simulation results confirm the performance improvement of the latency sensitive, loss-rate sensitive and throughput sensitive heterogeneous vehicular networks using our cooperative solution. 相似文献
14.
为防止311盘区11-2^#层工作面掘进及采煤过程中造成近距离煤层的漏顶事故发生,通过优化工作面布置方式、掘进期间支护形式及参数,制定工作面开采期间的回采工艺及顶板管理措施,在生产实践过程中总结了一套安全可靠的极近距离煤层采掘技术,对近距离煤层开采有一定的指导意义。 相似文献
15.
为了缓解矿井采掘接替紧张局面,宏阳煤矿采用沿空留巷技术,对12102运输顺槽采取顶板超前采面打设锚索梁、顶板超前预裂爆破,留巷段采用“钢梁+单体液压支柱”的方式进行巷道支护。该技术现场应用后,减少了巷道掘进工程量,减少了煤炭损失,增加了经济效益,降低了职工劳动强度,有利于采掘接替。 相似文献
16.
Karim Gharbi Louise Matthews James Bron Ron Roberts Alan Tinch Michael Stear 《Journal of the Royal Society Interface》2015,12(110)
Sea lice threaten the welfare of farmed Atlantic salmon and the sustainability of fish farming across the world. Chemical treatments are the major method of control but drug resistance means that alternatives are urgently needed. Selective breeding can be a cheap and effective alternative. Here, we combine experimental trials and diagnostics to provide a practical protocol for quantifying resistance to sea lice. We then combined quantitative genetics with epidemiological modelling to make the first prediction of the response to selection, quantified in terms of reduced need for chemical treatments. We infected over 1400 young fish with Lepeophtheirus salmonis, the most important species in the Northern Hemisphere. Mechanisms of resistance were expressed early in infection. Consequently, the number of lice per fish and the ranking of families were very similar at 7 and 17 days post infection, providing a stable window for assessing susceptibility to infection. The heritability of lice numbers within this time window was moderately high at 0.3, confirming that selective breeding is viable. We combined an epidemiological model of sea lice infection and control on a salmon farm with genetic variation in susceptibility among individuals. We simulated 10 generations of selective breeding and examined the frequency of treatments needed to control infection. Our model predicted that substantially fewer chemical treatments are needed to control lice outbreaks in selected populations and chemical treatment could be unnecessary after 10 generations of selection. Selective breeding for sea lice resistance should reduce the impact of sea lice on fish health and thus substantially improve the sustainability of Atlantic salmon production. 相似文献
17.
Process mining techniques relate observed behavior (i.e., event logs) to modeled behavior (e.g., a BPMN model or a Petri net). Process models can be discovered from event logs and conformance checking techniques can be used to detect and diagnose differences between observed and modeled behavior. Existing process mining techniques can only uncover these differences, but the actual repair of the model is left to the user and is not supported. In this paper we investigate the problem of repairing a process model w.r.t. a log such that the resulting model can replay the log (i.e., conforms to it) and is as similar as possible to the original model. To solve the problem, we use an existing conformance checker that aligns the runs of the given process model to the traces in the log. Based on this information, we decompose the log into several sublogs of non-fitting subtraces. For each sublog, either a loop is discovered that can replay the sublog or a subprocess is derived that is then added to the original model at the appropriate location. The approach is implemented in the process mining toolkit ProM and has been validated on logs and models from several Dutch municipalities. 相似文献
18.
Fault detection, isolation and optimal control have long been applied to industry. These techniques have proven various successful theoretical results and industrial applications. Fault diagnosis is considered as the merge of fault detection (that indicates if there is a fault) and fault isolation (that determines where the fault is), and it has important effects on the operation of complex dynamical systems specific to modern industry applications such as industrial electronics, business management systems, energy, and public sectors. Since the resources are always limited in real-world industrial applications, the solutions to optimally use them under various constraints are of high actuality. In this context, the optimal tuning of linear and nonlinear controllers is a systematic way to meet the performance specifications expressed as optimization problems that target the minimization of integral- or sum-type objective functions, where the tuning parameters of the controllers are the vector variables of the objective functions. The nature-inspired optimization algorithms give efficient solutions to such optimization problems. This paper presents an overview on recent developments in machine learning, data mining and evolving soft computing techniques for fault diagnosis and on nature-inspired optimal control. The generic theory is discussed along with illustrative industrial process applications that include a real liquid level control application, wind turbines and a nonlinear servo system. New research challenges with strong industrial impact are highlighted. 相似文献
19.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors. 相似文献
20.
相似用户挖掘是提高社交网络服务质量的重要途径,在面向大数据的社交网络时代,准确的相似用户挖掘对于用户和互联网企业等都有重要的意义,而根据用户自己的兴趣话题挖掘的相似用户更符合相似用户的要求。提出了一种基于用户兴趣话题进行相似用户挖掘的方法。该方法首先使用TextRank话题提取方法对用户进行兴趣话题提取,再对用户发表内容进行训练,计算出所有词之间的相似度。提出CP(Corresponding Position similarity)、CPW(Corresponding Position Weighted similarity)、AP(All Position similarity)、APW(All Position Weighted similarity)四种用户兴趣话题词相似度计算方法,通过用户和相似用户间关注、粉丝重合率验证相似用户挖掘效果,APW similarity的相似用户的关注/粉丝重合百分比为1.687%,优于提出的其他三种算法,分别提高了26.3%、2.8%、12.4%,并且比传统的文本相似度方法Jaccard相似度、编辑距离算法、余弦相似度分别提高了20.4%、21.2%、45.0%。因此APW方法可以更加有效地挖掘出用户的相似用户。 相似文献