首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   62781篇
  免费   8605篇
  国内免费   6297篇
电工技术   5338篇
技术理论   9篇
综合类   6950篇
化学工业   1662篇
金属工艺   903篇
机械仪表   3921篇
建筑科学   2620篇
矿业工程   1566篇
能源动力   850篇
轻工业   1257篇
水利工程   1445篇
石油天然气   3056篇
武器工业   840篇
无线电   9608篇
一般工业技术   3173篇
冶金工业   1067篇
原子能技术   810篇
自动化技术   32608篇
  2024年   162篇
  2023年   896篇
  2022年   1823篇
  2021年   2296篇
  2020年   2413篇
  2019年   1948篇
  2018年   1746篇
  2017年   2126篇
  2016年   2435篇
  2015年   2787篇
  2014年   4384篇
  2013年   3972篇
  2012年   4779篇
  2011年   5100篇
  2010年   3948篇
  2009年   3905篇
  2008年   4373篇
  2007年   4899篇
  2006年   4154篇
  2005年   3710篇
  2004年   3184篇
  2003年   2644篇
  2002年   2029篇
  2001年   1522篇
  2000年   1279篇
  1999年   920篇
  1998年   721篇
  1997年   597篇
  1996年   492篇
  1995年   465篇
  1994年   366篇
  1993年   262篇
  1992年   187篇
  1991年   188篇
  1990年   137篇
  1989年   112篇
  1988年   91篇
  1987年   71篇
  1986年   62篇
  1985年   89篇
  1984年   62篇
  1983年   73篇
  1982年   61篇
  1981年   40篇
  1980年   20篇
  1979年   34篇
  1978年   12篇
  1977年   21篇
  1976年   13篇
  1959年   8篇
排序方式: 共有10000条查询结果,搜索用时 140 毫秒
31.
Accurate chemical kinetics are essential for reactor design and operation. However, despite recent advances in “big data” approaches, availability of kinetic data is often limited in industrial practice. Herein, we present a comparative proof-of-concept study for kinetic parameter estimation from limited data. Cross-validation (CV) is implemented to nonlinear least-squares (LS) fitting and evaluated against Markov chain Monte Carlo (MCMC) and genetic algorithm (GA) routines using synthetic data generated from a simple model reaction. As expected, conventional LS is fastest but least accurate in predicting true kinetics. MCMC and GA are effective for larger data sets but tend to overfit to noise for limited data. LS-CV strongly outperforms these methods at much reduced computational cost, especially for significant noise. Our findings suggest that implementation of CV with conventional regression provides an efficient approach to kinetic parameter estimation with high accuracy, robustness against noise, and only minimal increase in complexity.  相似文献   
32.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors.  相似文献   
33.
Anup Bhat B  Harish SV  Geetha M 《ETRI Journal》2021,43(6):1024-1037
Mining high utility itemsets (HUIs) from transaction databases considers such factors as the unit profit and quantity of purchased items. Two-phase tree-based algorithms transform a database into compressed tree structures and generate candidate patterns through a recursive pattern-growth procedure. This procedure requires a lot of memory and time to construct conditional pattern trees. To address this issue, this study employs two compressed tree structures, namely, Utility Count Tree and String Utility Tree, to enumerate valid patterns and thus promote fast utility computation. Furthermore, the study presents an algorithm called single-phase utility computation (SPUC) that leverages these two tree structures to mine HUIs in a single phase by incorporating novel pruning strategies. Experiments conducted on both real and synthetic datasets demonstrate the superior performance of SPUC compared with IHUP, UP-Growth, and UP-Growth+ algorithms.  相似文献   
34.
An understanding of the similar and divergent metrics and methodologies underlying open government data benchmarks can reduce the risks of the potential misinterpretation and misuse of benchmarking outcomes by policymakers, politicians, and researchers. Hence, this study aims to compare the metrics and methodologies used to measure, benchmark, and rank governments' progress in open government data initiatives. Using a critical meta-analysis approach, we compare nine benchmarks with reference to meta-data, meta-methods, and meta-theories. This study finds that both existing open government data benchmarks and academic open data progress models use a great variety of metrics and methodologies, although open data impact is not usually measured. While several benchmarks’ methods have changed over time, and variables measured have been adjusted, we did not identify a similar pattern for academic open data progress models. This study contributes to open data research in three ways: 1) it reveals the strengths and weaknesses of existing open government data benchmarks and academic open data progress models; 2) it reveals that the selected open data benchmarks employ relatively similar measures as the theoretical open data progress models; and 3) it provides an updated overview of the different approaches used to measure open government data initiatives’ progress. Finally, this study offers two practical contributions: 1) it provides the basis for combining the strengths of benchmarks to create more comprehensive approaches for measuring governments’ progress in open data initiatives; and 2) it explains why particular countries are ranked in a certain way. This information is essential for governments and researchers to identify and propose effective measures to improve their open data initiatives.  相似文献   
35.
Significant antibacterial properties of non-thermal plasma (NTP) have converted this technology into a promising alternative to the widespread use of antibiotics in assisted reproduction. As substantial data available on the specific in vitro effects of NTP on male reproductive cells are currently missing, this study was designed to investigate selected quality parameters of human spermatozoa (n = 51) exposed to diffuse coplanar surface barrier discharge NTP for 0 s, 15 s, 30 s, 60 s and 90 s. Sperm motility characteristics, membrane integrity, mitochondrial activity, production of reactive oxygen species (ROS), DNA fragmentation and lipid peroxidation (LPO) were investigated immediately following exposure to NTP and 2 h post-NTP treatment. Exposure to NTP with a power input of 40 W for 15 s or 30 s was found to have no negative effects on the sperm structure or function. However, a prolonged NTP treatment impaired all the sperm quality markers in a time- and dose-dependent manner. The most likely mechanism of action of high NTP doses may be connected to ROS overproduction, leading to plasma membrane destabilization, LPO, mitochondrial failure and a subsequent loss of motility as well as DNA integrity. As such, our findings indicate that appropriate plasma exposure conditions need to be carefully selected in order to preserve the sperm vitality, should NTP be used in the practical management of bacteriospermia in the future.  相似文献   
36.
The importance of cultural heritage for supporting the knowledge economy has promoted its digitisation and online publication. Many cultural heritage repositories have published millions of digitised items using semantic web technologies and Linked Data approaches. These repositories frequently use knowledge organisation systems to classify the resources, but the domain heterogeneity makes it difficult to know if they are the most suitable ones. This paper describes the process used to discover and profile the knowledge organisation systems used in the cultural heritage domain. Additionally, for those knowledge organisation systems with a thesaurus-like structure, a detailed quality analysis is performed. The results of this analysis can be used as a key factor for the selection of knowledge organisation systems in classification tasks.  相似文献   
37.
从MR原始数据特性出发研究数据结构与字段,采用基于线状特性分析MR大数据的地铁用户识别过滤方法和位置定位方法,该方法经过验证能够有效输出地铁用户数据并定位在地图上,解决人工地铁测试效率低且测试片面的问题,实现基于大数据的自动化地铁网络评估,提供海量的有效定位数据用于地铁评估与分析。  相似文献   
38.
For rechargeable wireless sensor networks, limited energy storage capacity, dynamic energy supply, low and dynamic duty cycles cause that it is unpractical to maintain a fixed routing path for packets delivery permanently from a source to destination in a distributed scenario. Therefore, before data delivery, a sensor has to update its waking schedule continuously and share them to its neighbors, which lead to high energy expenditure for reestablishing path links frequently and low efficiency of energy utilization for collecting packets. In this work, we propose the maximum data generation rate routing protocol based on data flow controlling technology. For a sensor, it does not share its waking schedule to its neighbors and cache any waking schedules of other sensors. Hence, the energy consumption for time synchronization, location information and waking schedule shared will be reduced significantly. The saving energy can be used for improving data collection rate. Simulation shows our scheme is efficient to improve packets generation rate in rechargeable wireless sensor networks.  相似文献   
39.
In [1] a procedure for bias-free estimation of the autocorrelation function is introduced for equidistantly sampled data with randomly occurring samples being invalid. The method incorporates sample-and-hold interpolation of the missing data points. The occurring dynamic error of the primary estimate of the correlation function is treated by a deconvolution procedure with two parameters c0 and c1 with c0+2c1=1, which are the on-diagonal and the aside-diagonal parameters of a specific correction matrix (at all lag times except zero). The parameters c0 and c1 were obtained as a function of the probability α of a sample to be valid by numerical simulation. However, explicit expressions for the parameters c0(α)=12α+2α2 and c1(α)=1α1α2 can be derived, which might improve the usability of the deconvolution procedure in [1].  相似文献   
40.
周爱平  朱琛刚 《计算机应用》2019,39(8):2354-2358
持续流是隐蔽的网络攻击过程中显现的一种重要特征,它不产生大量流量且在较长周期内有规律地发生,给传统的检测方法带来极大挑战。针对网络攻击的隐蔽性、单监测点的重负荷和信息有限的问题,提出全网络持续流检测方法。首先,设计一种概要数据结构,并将其部署在每个监测点;其次,当网络流到达监测点时,提取流的概要信息并更新概要数据结构的一位;然后,在测量周期结束时,主监测点将来自其他监测点的概要信息进行综合;最后,提出流持续性的近似估计,通过一些简单计算为每个流构建一个位向量,利用概率统计方法估计流持续性,使用修正后的持续性估计检测持续流。通过真实的网络流量进行实验,结果表明,与长持续时间流检测算法(TLF)相比,所提方法的准确性提高了50%,误报率和漏报率分别降低了22%和20%,说明全网络持续流检测方法能够有效监测高速网络流量。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号