首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20992篇
  免费   1400篇
  国内免费   1273篇
电工技术   905篇
技术理论   1篇
综合类   1224篇
化学工业   265篇
金属工艺   425篇
机械仪表   1594篇
建筑科学   478篇
矿业工程   377篇
能源动力   275篇
轻工业   139篇
水利工程   96篇
石油天然气   204篇
武器工业   222篇
无线电   3108篇
一般工业技术   861篇
冶金工业   334篇
原子能技术   259篇
自动化技术   12898篇
  2024年   21篇
  2023年   177篇
  2022年   245篇
  2021年   345篇
  2020年   382篇
  2019年   279篇
  2018年   324篇
  2017年   484篇
  2016年   550篇
  2015年   609篇
  2014年   1145篇
  2013年   1023篇
  2012年   1210篇
  2011年   1564篇
  2010年   1110篇
  2009年   1155篇
  2008年   1325篇
  2007年   1625篇
  2006年   1544篇
  2005年   1527篇
  2004年   1317篇
  2003年   1205篇
  2002年   922篇
  2001年   693篇
  2000年   526篇
  1999年   439篇
  1998年   322篇
  1997年   243篇
  1996年   243篇
  1995年   226篇
  1994年   147篇
  1993年   113篇
  1992年   72篇
  1991年   61篇
  1990年   54篇
  1989年   53篇
  1988年   43篇
  1987年   35篇
  1986年   36篇
  1985年   36篇
  1984年   36篇
  1983年   28篇
  1982年   24篇
  1981年   26篇
  1980年   17篇
  1979年   14篇
  1978年   18篇
  1977年   15篇
  1976年   31篇
  1975年   8篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
41.
Crashes at highway-rail grade crossings can result in severe injuries and fatalities to vehicle occupants. Using a crash database from the Federal Railroad Administration (N = 15,639 for 2004–2013), this study explores differences in safety outcomes from crashes between passive controls (Crossbucks and STOP signs) and active controls (flashing lights, gates, audible warnings and highway signals). To address missing data, an imputation model is developed, creating a complete dataset for estimation. Path analysis is used to quantify the direct and indirect associations of passive and active controls with pre-crash behaviors and crash outcomes in terms of injury severity. The framework untangles direct and indirect associations of controls by estimating two models, one for pre-crash driving behaviors (e.g., driving around active controls), and another model for injury severity. The results show that while the presence of gates is not directly associated with injury severity, the indirect effect through stopping behavior is statistically significant (95% confidence level) and substantial. Drivers are more likely to stop at gates that also have flashing lights and audible warnings, and stopping at gates is associated with lower injury severity. This indirect association lowers the chances of injury by 16%, compared with crashes at crossings without gates. Similar relationships between other controls and injury severity are explored. Generally, crashes occurring at active controls are less severe than crashes at passive controls. The results of study can be used to modify Crash Modification Factors (CMFs) to account for crash injury severity. The study contributes to enhancing the understanding of safety by incorporating pre-crash behaviors in a broader framework that quantifies correlates of crash injury severity at active and passive crossings.  相似文献   
42.
In this paper we demonstrate that it is possible to enrich query answering with a short data movie that gives insights to the original results of an OLAP query. Our method, implemented in an actual system, CineCubes, includes the following steps. The user submits a query over an underlying star schema. Taking this query as input, the system comes up with a set of queries complementing the information content of the original query, and executes them. For each of the query results, we execute a set of highlight extraction algorithms that identify interesting patterns and values in the data of the results. Then, the system visualizes the query results and accompanies this presentation with a text commenting on the result highlights. Moreover, via a text-to-speech conversion the system automatically produces audio for the constructed text. Each combination of visualization, text and audio practically constitutes a movie, which is wrapped as a PowerPoint presentation and returned to the user.  相似文献   
43.
Feeling thermometer questions are widely used in political science research to estimate people’s attitudes and feelings toward a political object, like a political figure or an organization. Given the popularity of the feeling thermometer question in population surveys, more work is needed to explore the measurement of this question type. This study examines the data collection mode effect on feeling thermometers. Using the 2012 American National Election Studies, we find that the measurement of feeling thermometers is not exactly comparable between face-to-face and Web surveys. Face-to-face respondents tend to provide warmer feelings, while Web respondents give relatively more reliable responses in comparison. In both survey modes, respondents are most likely to select the response options that are verbally labeled although the effect is more striking in face-to-face than Web survey. The item nonresponse between these two modes does not differ in a meaningful way. This study ends by discussing future research directions on feeling thermometer questions.  相似文献   
44.
Computer-Supported Collaborative Learning (CSCL) is concerned with how Information and Communication Technology (ICT) might facilitate learning in groups which can be co-located or distributed over a network of computers such as Internet. CSCL supports effective learning by means of communication of ideas and information among learners, collaborative access of essential documents, and feedback from instructors and peers on learning activities. As the cloud technologies are increasingly becoming popular and collaborative learning is evolving, new directions for development of collaborative learning tools deployed on cloud are proposed. Development of such learning tools requires access to substantial data stored in the cloud. Ensuring efficient access to such data is hindered by the high latencies of wide-area networks underlying the cloud infrastructures. To improve learners’ experience by accelerating data access, important files can be replicated so a group of learners can access data from nearby locations. Since a cloud environment is highly dynamic, resource availability, network latency, and learner requests may change. In this paper, we present the advantages of collaborative learning and focus on the importance of data replication in the design of such a dynamic cloud-based system that a collaborative learning portal uses. To this end, we introduce a highly distributed replication technique that determines optimal data locations to improve access performance by minimizing replication overhead (access and update). The problem is formulated using dynamic programming. Experimental results demonstrate the usefulness of the proposed collaborative learning system used by institutions in geographically distributed locations.  相似文献   
45.
ContextMemory safety errors such as buffer overflow vulnerabilities are one of the most serious classes of security threats. Detecting and removing such security errors are important tasks of software testing for improving the quality and reliability of software in practice.ObjectiveThis paper presents a goal-oriented testing approach for effectively and efficiently exploring security vulnerability errors. A goal is a potential safety violation and the testing approach is to automatically generate test inputs to uncover the violation.MethodWe use type inference analysis to diagnose potential safety violations and dynamic symbolic execution to perform test input generation. A major challenge facing dynamic symbolic execution in such application is the combinatorial explosion of the path space. To address this fundamental scalability issue, we employ data dependence analysis to identify a root cause leading to the execution of the goal and propose a path exploration algorithm to guide dynamic symbolic execution for effectively discovering the goal.ResultsTo evaluate the effectiveness of our proposed approach, we conducted experiments against 23 buffer overflow vulnerabilities. We observed a significant improvement of our proposed algorithm over two widely adopted search algorithms. Specifically, our algorithm discovered security vulnerability errors within a matter of a few seconds, whereas the two baseline algorithms failed even after 30 min of testing on a number of test subjects.ConclusionThe experimental results highlight the potential of utilizing data dependence analysis to address the combinatorial path space explosion issue faced by dynamic symbolic execution for effective security testing.  相似文献   
46.
叶宇 《室内设计》2019,(1):13-21
本文面对智慧城市和新城市科学 迅速发展的背景,立足新时期城市设计转型 需求,针对新近涌现出的以机器学习、虚拟 现实、计算机可视化等为代表的多种新技术 和以街景数据、兴趣点数据、位置服务数据 等为代表的多源城市数据开展讨论。继而对 其所带来的城市设计新可能进行了探讨和展 望,并对于相关典型工具和代表性案例进行 了介绍。这些伴随新城市科学涌现的数据和 技术不仅能够为城市设计在场地分析、设计 开展和方案评估上带来工作方式的革新,而 且有望进一步明确城市设计的专属技术体 系,并以此推动城市设计的领域构建。  相似文献   
47.
Modern power system is unprecedentedly vulnerable and the society is exposed to higher blackout risks. Therefore restoration is a key issue to power systems. Reasonable backbone-network reconfiguration is necessary for re-establishing the network and restoring loads quickly. In order to speed up network reconfiguration under security constraints, a group decision support system (GDSS) is developed. A unified data platform based on data warehouse is constructed to resolve inconsistencies of data, information and models. A three-stage restoration strategy and a two-layer restoration path searching method are proposed to establish restoration schemes. Multiple attribute decision-making is implemented to evaluate alternatives and consider various attributes about restoration speed and system security comprehensively. Group decision-making provides an aggregated cardinal ranking of candidate restoration schemes. The GDSS uses expert rules for qualitative analysis and numerical computation programs for quantitative analysis, and it can resolve the semi-structured decision problem of network reconfiguration efficiently. Restoration plan of Shandong power grid is developed with the proposed method and it has been adopted by State Grid Shandong Electric Power Company. Performance results of Shandong power grid of China demonstrate the feasibility and flexibility of the method.  相似文献   
48.
Metro shield construction will inevitably cause changes in the stress and strain state of the surrounding soil, resulting in stratum deformation and surface settlement (SS), which will seriously endanger the safety of nearby buildings, roads and underground pipe networks. Therefore, in the design and construction stage, optimizing the shield construction parameters (SCP) is the key to reducing the SS rate and increasing the safe driving speed (DS). However, optimization of existing SCP are challenged by the need to construct a unified multiobjective model for optimization that are efficient, convenient, and widely applicable. This paper innovatively proposes a hybrid intelligence framework that combines random forest (RF) and non-dominant classification genetic algorithm II (NSGA-II), which overcomes the shortcomings of time-consuming and high cost for the establishment and verification of traditional prediction models. First, RF is used to rank the importance of 10 influencing factors, and the nonlinear mapping relationship between the main SCP and the two objectives is constructed as the fitness function of the NSGA-II algorithm. Second, a multiobjective optimization framework for RF-NSGA-II is established, based on which the optimal Pareto front is calculated, and reasonable optimized control ranges for the SCP are obtained. Finally, a case study in the Wuhan Rail Transit Line 6 project is examined. The results show that the SS is reduced by 12.5% and the DS is increased by 2.5% with the proposed framework. Meanwhile, the prediction results are compared with the back-propagation neural network (BPNN), support vector machine (SVM), and gradient boosting decision tree (GBDT). The findings indicate that the RF-NSGA-II framework can not only meet the requirements of SS and DS calculation, but also used as a support tool for real-time optimization and control of SCP.  相似文献   
49.
This in silico toxicogenomic study aims to explore the relationship between phthalates and bisphenol A (BPA) co-exposure and obesity, as well as its comorbid conditions, in order to construct a possible set of genomic biomarkers. The Comparative Toxicogenomics Database (CTD; http://ctd.mdibl.org) was used as the main data mining tool, along with GeneMania (https://genemania.org), ToppGene Suite (https://toppgene.cchmc.org) and DisGeNET (http://www.disgenet.org). Among the phthalates, bis(2-ethylhexyl) phthalate (DEHP) and dibutyl phthalate (DBP) were chosen as the most frequently curated phthalates in CTD, which also share similar mechanisms of toxicity. DEHP, DBP and BPA interacted with 84, 90 and 194 obesity-related genes/proteins, involved in 67, 65 and 116 pathways, respectively. Among these, 53 genes/proteins and 42 pathways were common to all three substances. 31 genes/proteins had matching interactions for all three investigated substances, while more than half of these genes/proteins (56.49%) were in co-expression. 7 of the common genes/proteins (6 relevant to humans: CCL2, IL6, LPL, PPARG, SERPINE1, and TNF) were identified in all the investigated obesity comorbidities, while PPARG and LPL were most closely linked to obesity. These genes/proteins could serve as a target for further in vitro and in vivo studies of molecular mechanisms of DEHP, DBP and BPA mixture obesogenic properties. Analysis reported here should be applicable to any mixture of environmental chemicals and any disease present in CTD.  相似文献   
50.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号