全文获取类型
收费全文 | 20992篇 |
免费 | 1400篇 |
国内免费 | 1273篇 |
专业分类
电工技术 | 905篇 |
技术理论 | 1篇 |
综合类 | 1224篇 |
化学工业 | 265篇 |
金属工艺 | 425篇 |
机械仪表 | 1594篇 |
建筑科学 | 478篇 |
矿业工程 | 377篇 |
能源动力 | 275篇 |
轻工业 | 139篇 |
水利工程 | 96篇 |
石油天然气 | 204篇 |
武器工业 | 222篇 |
无线电 | 3108篇 |
一般工业技术 | 861篇 |
冶金工业 | 334篇 |
原子能技术 | 259篇 |
自动化技术 | 12898篇 |
出版年
2024年 | 21篇 |
2023年 | 177篇 |
2022年 | 245篇 |
2021年 | 345篇 |
2020年 | 382篇 |
2019年 | 279篇 |
2018年 | 324篇 |
2017年 | 484篇 |
2016年 | 550篇 |
2015年 | 609篇 |
2014年 | 1145篇 |
2013年 | 1023篇 |
2012年 | 1210篇 |
2011年 | 1564篇 |
2010年 | 1110篇 |
2009年 | 1155篇 |
2008年 | 1325篇 |
2007年 | 1625篇 |
2006年 | 1544篇 |
2005年 | 1527篇 |
2004年 | 1317篇 |
2003年 | 1205篇 |
2002年 | 922篇 |
2001年 | 693篇 |
2000年 | 526篇 |
1999年 | 439篇 |
1998年 | 322篇 |
1997年 | 243篇 |
1996年 | 243篇 |
1995年 | 226篇 |
1994年 | 147篇 |
1993年 | 113篇 |
1992年 | 72篇 |
1991年 | 61篇 |
1990年 | 54篇 |
1989年 | 53篇 |
1988年 | 43篇 |
1987年 | 35篇 |
1986年 | 36篇 |
1985年 | 36篇 |
1984年 | 36篇 |
1983年 | 28篇 |
1982年 | 24篇 |
1981年 | 26篇 |
1980年 | 17篇 |
1979年 | 14篇 |
1978年 | 18篇 |
1977年 | 15篇 |
1976年 | 31篇 |
1975年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
41.
Crashes at highway-rail grade crossings can result in severe injuries and fatalities to vehicle occupants. Using a crash database from the Federal Railroad Administration (N = 15,639 for 2004–2013), this study explores differences in safety outcomes from crashes between passive controls (Crossbucks and STOP signs) and active controls (flashing lights, gates, audible warnings and highway signals). To address missing data, an imputation model is developed, creating a complete dataset for estimation. Path analysis is used to quantify the direct and indirect associations of passive and active controls with pre-crash behaviors and crash outcomes in terms of injury severity. The framework untangles direct and indirect associations of controls by estimating two models, one for pre-crash driving behaviors (e.g., driving around active controls), and another model for injury severity. The results show that while the presence of gates is not directly associated with injury severity, the indirect effect through stopping behavior is statistically significant (95% confidence level) and substantial. Drivers are more likely to stop at gates that also have flashing lights and audible warnings, and stopping at gates is associated with lower injury severity. This indirect association lowers the chances of injury by 16%, compared with crashes at crossings without gates. Similar relationships between other controls and injury severity are explored. Generally, crashes occurring at active controls are less severe than crashes at passive controls. The results of study can be used to modify Crash Modification Factors (CMFs) to account for crash injury severity. The study contributes to enhancing the understanding of safety by incorporating pre-crash behaviors in a broader framework that quantifies correlates of crash injury severity at active and passive crossings. 相似文献
42.
In this paper we demonstrate that it is possible to enrich query answering with a short data movie that gives insights to the original results of an OLAP query. Our method, implemented in an actual system, CineCubes, includes the following steps. The user submits a query over an underlying star schema. Taking this query as input, the system comes up with a set of queries complementing the information content of the original query, and executes them. For each of the query results, we execute a set of highlight extraction algorithms that identify interesting patterns and values in the data of the results. Then, the system visualizes the query results and accompanies this presentation with a text commenting on the result highlights. Moreover, via a text-to-speech conversion the system automatically produces audio for the constructed text. Each combination of visualization, text and audio practically constitutes a movie, which is wrapped as a PowerPoint presentation and returned to the user. 相似文献
43.
Feeling thermometer questions are widely used in political science research to estimate people’s attitudes and feelings toward a political object, like a political figure or an organization. Given the popularity of the feeling thermometer question in population surveys, more work is needed to explore the measurement of this question type. This study examines the data collection mode effect on feeling thermometers. Using the 2012 American National Election Studies, we find that the measurement of feeling thermometers is not exactly comparable between face-to-face and Web surveys. Face-to-face respondents tend to provide warmer feelings, while Web respondents give relatively more reliable responses in comparison. In both survey modes, respondents are most likely to select the response options that are verbally labeled although the effect is more striking in face-to-face than Web survey. The item nonresponse between these two modes does not differ in a meaningful way. This study ends by discussing future research directions on feeling thermometer questions. 相似文献
44.
Computer-Supported Collaborative Learning (CSCL) is concerned with how Information and Communication Technology (ICT) might facilitate learning in groups which can be co-located or distributed over a network of computers such as Internet. CSCL supports effective learning by means of communication of ideas and information among learners, collaborative access of essential documents, and feedback from instructors and peers on learning activities. As the cloud technologies are increasingly becoming popular and collaborative learning is evolving, new directions for development of collaborative learning tools deployed on cloud are proposed. Development of such learning tools requires access to substantial data stored in the cloud. Ensuring efficient access to such data is hindered by the high latencies of wide-area networks underlying the cloud infrastructures. To improve learners’ experience by accelerating data access, important files can be replicated so a group of learners can access data from nearby locations. Since a cloud environment is highly dynamic, resource availability, network latency, and learner requests may change. In this paper, we present the advantages of collaborative learning and focus on the importance of data replication in the design of such a dynamic cloud-based system that a collaborative learning portal uses. To this end, we introduce a highly distributed replication technique that determines optimal data locations to improve access performance by minimizing replication overhead (access and update). The problem is formulated using dynamic programming. Experimental results demonstrate the usefulness of the proposed collaborative learning system used by institutions in geographically distributed locations. 相似文献
45.
ContextMemory safety errors such as buffer overflow vulnerabilities are one of the most serious classes of security threats. Detecting and removing such security errors are important tasks of software testing for improving the quality and reliability of software in practice.ObjectiveThis paper presents a goal-oriented testing approach for effectively and efficiently exploring security vulnerability errors. A goal is a potential safety violation and the testing approach is to automatically generate test inputs to uncover the violation.MethodWe use type inference analysis to diagnose potential safety violations and dynamic symbolic execution to perform test input generation. A major challenge facing dynamic symbolic execution in such application is the combinatorial explosion of the path space. To address this fundamental scalability issue, we employ data dependence analysis to identify a root cause leading to the execution of the goal and propose a path exploration algorithm to guide dynamic symbolic execution for effectively discovering the goal.ResultsTo evaluate the effectiveness of our proposed approach, we conducted experiments against 23 buffer overflow vulnerabilities. We observed a significant improvement of our proposed algorithm over two widely adopted search algorithms. Specifically, our algorithm discovered security vulnerability errors within a matter of a few seconds, whereas the two baseline algorithms failed even after 30 min of testing on a number of test subjects.ConclusionThe experimental results highlight the potential of utilizing data dependence analysis to address the combinatorial path space explosion issue faced by dynamic symbolic execution for effective security testing. 相似文献
46.
本文面对智慧城市和新城市科学
迅速发展的背景,立足新时期城市设计转型
需求,针对新近涌现出的以机器学习、虚拟
现实、计算机可视化等为代表的多种新技术
和以街景数据、兴趣点数据、位置服务数据
等为代表的多源城市数据开展讨论。继而对
其所带来的城市设计新可能进行了探讨和展
望,并对于相关典型工具和代表性案例进行
了介绍。这些伴随新城市科学涌现的数据和
技术不仅能够为城市设计在场地分析、设计
开展和方案评估上带来工作方式的革新,而
且有望进一步明确城市设计的专属技术体
系,并以此推动城市设计的领域构建。 相似文献
47.
Modern power system is unprecedentedly vulnerable and the society is exposed to higher blackout risks. Therefore restoration is a key issue to power systems. Reasonable backbone-network reconfiguration is necessary for re-establishing the network and restoring loads quickly. In order to speed up network reconfiguration under security constraints, a group decision support system (GDSS) is developed. A unified data platform based on data warehouse is constructed to resolve inconsistencies of data, information and models. A three-stage restoration strategy and a two-layer restoration path searching method are proposed to establish restoration schemes. Multiple attribute decision-making is implemented to evaluate alternatives and consider various attributes about restoration speed and system security comprehensively. Group decision-making provides an aggregated cardinal ranking of candidate restoration schemes. The GDSS uses expert rules for qualitative analysis and numerical computation programs for quantitative analysis, and it can resolve the semi-structured decision problem of network reconfiguration efficiently. Restoration plan of Shandong power grid is developed with the proposed method and it has been adopted by State Grid Shandong Electric Power Company. Performance results of Shandong power grid of China demonstrate the feasibility and flexibility of the method. 相似文献
48.
Metro shield construction will inevitably cause changes in the stress and strain state of the surrounding soil, resulting in stratum deformation and surface settlement (SS), which will seriously endanger the safety of nearby buildings, roads and underground pipe networks. Therefore, in the design and construction stage, optimizing the shield construction parameters (SCP) is the key to reducing the SS rate and increasing the safe driving speed (DS). However, optimization of existing SCP are challenged by the need to construct a unified multiobjective model for optimization that are efficient, convenient, and widely applicable. This paper innovatively proposes a hybrid intelligence framework that combines random forest (RF) and non-dominant classification genetic algorithm II (NSGA-II), which overcomes the shortcomings of time-consuming and high cost for the establishment and verification of traditional prediction models. First, RF is used to rank the importance of 10 influencing factors, and the nonlinear mapping relationship between the main SCP and the two objectives is constructed as the fitness function of the NSGA-II algorithm. Second, a multiobjective optimization framework for RF-NSGA-II is established, based on which the optimal Pareto front is calculated, and reasonable optimized control ranges for the SCP are obtained. Finally, a case study in the Wuhan Rail Transit Line 6 project is examined. The results show that the SS is reduced by 12.5% and the DS is increased by 2.5% with the proposed framework. Meanwhile, the prediction results are compared with the back-propagation neural network (BPNN), support vector machine (SVM), and gradient boosting decision tree (GBDT). The findings indicate that the RF-NSGA-II framework can not only meet the requirements of SS and DS calculation, but also used as a support tool for real-time optimization and control of SCP. 相似文献
49.
KATARINA BARALIć KATARINA ŽIVANčEVIć DRAGICA BoŽIĆ DANYEL JENNEN ALEKSANDRA BUHA DJORDJEVIC EVICA ANTONIJEVIć MILJAKOVIć DANIJELA ĐUKIć-ĆOSIć 《Biocell》2022,46(2):519-533
This in silico toxicogenomic study aims to explore the relationship between phthalates and bisphenol A (BPA) co-exposure and obesity, as well as its comorbid conditions, in order to construct a possible set of genomic biomarkers. The Comparative Toxicogenomics Database (CTD; http://ctd.mdibl.org) was used as the main data mining tool, along with GeneMania (https://genemania.org), ToppGene Suite (https://toppgene.cchmc.org) and DisGeNET (http://www.disgenet.org). Among the phthalates, bis(2-ethylhexyl) phthalate (DEHP) and dibutyl phthalate (DBP) were chosen as the most frequently curated phthalates in CTD, which also share similar mechanisms of toxicity. DEHP, DBP and BPA interacted with 84, 90 and 194 obesity-related genes/proteins, involved in 67, 65 and 116 pathways, respectively. Among these, 53 genes/proteins and 42 pathways were common to all three substances. 31 genes/proteins had matching interactions for all three investigated substances, while more than half of these genes/proteins (56.49%) were in co-expression. 7 of the common genes/proteins (6 relevant to humans: CCL2, IL6, LPL, PPARG, SERPINE1, and TNF) were identified in all the investigated obesity comorbidities, while PPARG and LPL were most closely linked to obesity. These genes/proteins could serve as a target for further in vitro and in vivo studies of molecular mechanisms of DEHP, DBP and BPA mixture obesogenic properties. Analysis reported here should be applicable to any mixture of environmental chemicals and any disease present in CTD. 相似文献
50.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability. 相似文献