首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   57455篇
  免费   7601篇
  国内免费   5623篇
电工技术   5036篇
技术理论   9篇
综合类   6318篇
化学工业   1305篇
金属工艺   684篇
机械仪表   3575篇
建筑科学   2250篇
矿业工程   1515篇
能源动力   744篇
轻工业   710篇
水利工程   1356篇
石油天然气   2882篇
武器工业   784篇
无线电   8877篇
一般工业技术   2793篇
冶金工业   1015篇
原子能技术   736篇
自动化技术   30090篇
  2024年   127篇
  2023年   787篇
  2022年   1640篇
  2021年   2084篇
  2020年   2196篇
  2019年   1713篇
  2018年   1538篇
  2017年   1893篇
  2016年   2148篇
  2015年   2482篇
  2014年   3970篇
  2013年   3577篇
  2012年   4271篇
  2011年   4594篇
  2010年   3563篇
  2009年   3517篇
  2008年   3980篇
  2007年   4499篇
  2006年   3798篇
  2005年   3431篇
  2004年   2955篇
  2003年   2482篇
  2002年   1898篇
  2001年   1442篇
  2000年   1215篇
  1999年   881篇
  1998年   680篇
  1997年   569篇
  1996年   461篇
  1995年   431篇
  1994年   340篇
  1993年   246篇
  1992年   171篇
  1991年   175篇
  1990年   132篇
  1989年   106篇
  1988年   85篇
  1987年   67篇
  1986年   58篇
  1985年   85篇
  1984年   58篇
  1983年   71篇
  1982年   60篇
  1981年   37篇
  1980年   20篇
  1979年   34篇
  1978年   12篇
  1977年   20篇
  1976年   13篇
  1959年   7篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
Histograms are convenient non-parametric density estimators, which continue to be used ubiquitously. Summary quantities estimated from histogram-based probability density models depend on the choice of the number of bins. We introduce a straightforward data-based method of determining the optimal number of bins in a uniform bin-width histogram. By assigning a multinomial likelihood and a non-informative prior, we derive the posterior probability for the number of bins in a piecewise-constant density model given the data. In addition, we estimate the mean and standard deviations of the resulting bin heights, examine the effects of small sample sizes and digitized data, and demonstrate the application to multi-dimensional histograms.  相似文献   
82.
Science of science has become a popular topic that attracts great attentions from the research community. The development of data analytics technologies and the readily available scholarly data enable the exploration of data-driven prediction, which plays a pivotal role in finding the trend of scientific impact. In this paper, we analyse methods and applications in data-driven prediction in the science of science, and discuss their significance. First, we introduce the background and review the current state of the science of science. Second, we review data-driven prediction based on paper citation count, and investigate research issues in this area. Then, we discuss methods to predict scholar impact, and we analyse different approaches to promote the scholarly collaboration in the collaboration network. This paper also discusses open issues and existing challenges, and suggests potential research directions.  相似文献   
83.
程诚  任佳 《信息与控制》2019,48(4):429-436
卷积神经网络(convolutional neural networks, CNN)是一种广泛用于分析视觉图像的分类方法.由于数值数据存在着非线性、耦合性等复杂的空间关系,因此基于CNN的数值型数据的研究较少.本文的目的是找到一种可行的方法,将CNN的应用领域扩展到数值数据.于是提出了一种基于雷达图表示的数值型数据的CNN分类方法(Radar-CNN).该算法首先将数值数据表示成雷达图形式,然后将其输入CNN中构建分类模型.为了进一步研究特征尺度和序列对性能的影响,提出了两种改进算法Rank Radar-CNN和SFS Radar-CNN.为了验证所提算法的有效性,引入TE化工过程数据集进行实验测试并比较,实验结果表明Radar-CNN及其改进算法具有优异的性能.  相似文献   
84.
面对电信承载网连接的日益增长的海量终端设备,运营商需要结合网络拓扑对终端设备产生的数据进行高效的汇聚统计、异常分析、故障定位处理等操作。针对已有系统存在的操作困难、分析效率低等问题,设计与实现了一个面向电信承载网的高效监控系统,提供实时与离线数据分析和多维可视化分析的能力。对网管、认证、终端等系统及设备采集的数据进行结构化存储,对采集的数据进行拓扑相关性和时间序列方法分析,根据分析结果实现基于动态阈值控制的异常实时告警、定位等操作,并提供多维度可视化分析对网络状态进行实时监控。实际应用结果表明,该系统性能优异,具有良好交互性,能较好地满足承载网运维人员业务分析需求。  相似文献   
85.
In this paper, the problem of mining complex temporal patterns in the context of multivariate time series is considered. A new method called the Fast Temporal Pattern Mining with Extended Vertical Lists is introduced. The method is based on an extension of the level‐wise property, which requires a more complex pattern to start at positions within a record where all of the subpatterns of the pattern start. The approach is built around a novel data structure called the Extended Vertical List that tracks positions of the first state of the pattern inside records and links them to appropriate positions of a specific subpattern of the pattern called the prefix. Extensive computational results indicate that the new method performs significantly faster than the previous version of the algorithm for Temporal Pattern Mining; however, the increase in speed comes at the expense of increased memory usage.  相似文献   
86.
The amount and variety of digital data currently being generated, stored and analyzed, including images, videos, and time series, have brought challenges to data administrators, analysts and developers, who struggle to comply with the expectations of both data owners and end users. The majority of the applications demand searching complex data by taking advantage of queries that analyze different aspects of the data, and need the answers in a timely manner. Content-based similarity retrieval techniques are well-suited to handle large databases, because they enable performing queries and analyses using features automatically extracted from the data, without users’ intervention. In this paper, we review and discuss the challenges posed to the database and related communities in order to provide techniques and tools that can meet the variety and veracity characteristics of big and complex data, while also considering the aspects of semantical preservation and completeness of the data. Examples and results obtained over a two-decade-long experience with real applications are presented and discussed.  相似文献   
87.
The importance of cultural heritage for supporting the knowledge economy has promoted its digitisation and online publication. Many cultural heritage repositories have published millions of digitised items using semantic web technologies and Linked Data approaches. These repositories frequently use knowledge organisation systems to classify the resources, but the domain heterogeneity makes it difficult to know if they are the most suitable ones. This paper describes the process used to discover and profile the knowledge organisation systems used in the cultural heritage domain. Additionally, for those knowledge organisation systems with a thesaurus-like structure, a detailed quality analysis is performed. The results of this analysis can be used as a key factor for the selection of knowledge organisation systems in classification tasks.  相似文献   
88.
We are in the midst of a “Data Revolution” that is transforming our economy. This revolution is as large and profound as other major economic shifts from the introduction of the printing press to the Industrial Revolution. In this article, we compare the development of the field of Industrial Statistics as an outgrowth of the Machine Age to the development of the field of Data Science as an outgrowth of the Information Age. It is shown how the knowledge, skills, and abilities required for “Data Scientists” have evolved to support companies as they try to differentiate themselves in the Information Age. It is discussed how the unique skills that Industrial Statisticians possess can provide a transformative advantage to Data Scientists working in the Information Age. Advice is given on how to leverage Industrial Statistics in the midst of the Data Revolution so that we ethically and responsibly implement the tools of Data Science, address important problems, and inclusively educate future generations.  相似文献   
89.
As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation is facing more and more challenges. Currently, the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating, alternately, the aim at enhancing the security of data. The performances of the secure data aggregation protocols are the trade-off of several metrics, which involves the transmission/fusion, the energy efficiency and the security in Wireless Sensor Network (WSN). Unfortunately, there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN. In consideration of IWSN, we firstly review the security requirements and techniques in WSN data aggregation in this paper. Then, we give a holistic overview of the classical secure data aggregation protocols, which are divided into three categories: hop-by-hop encrypted data aggregation, end-to-end encrypted data aggregation and unencrypted secure data aggregation. Along this way, combining with the characteristics of industrial applications, we analyze the pros and cons of the existing security schemes in each category qualitatively, and realize that the security and the energy efficiency are suitable for IWSN. Finally, we make the conclusion about the techniques and approach in these categories, and highlight the future research directions of privacy preserving data aggregation in IWSN.  相似文献   
90.
在地质调查信息化与地质资料社会化服务工作不断发展的背景下,航空物探遥感地质资料的开发利用与保密管理工作矛盾日益凸显。本文以航空物探遥感资料定密为研究重点,总结了地质、测绘地理信息、海洋等工作领域的定密工作情况,基于对航空物探遥感地质资料分类结果提取了共性资料涉密要素/事项,根据保密法规的相关规定与要求,初步建立了以比例尺/空间精度、测绘地理信息要素、航空物探遥感专业要素为主的定密判定要素集,提出了航空物探遥感地质资料的定密工作原则与参考准则,以期为航空物探遥感地质信息共享服务提供必要的工作支撑。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号