首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   61266篇
  免费   8225篇
  国内免费   5991篇
电工技术   5465篇
技术理论   10篇
综合类   6749篇
化学工业   1337篇
金属工艺   718篇
机械仪表   3784篇
建筑科学   2454篇
矿业工程   1552篇
能源动力   798篇
轻工业   732篇
水利工程   1439篇
石油天然气   2906篇
武器工业   796篇
无线电   9704篇
一般工业技术   3075篇
冶金工业   1085篇
原子能技术   747篇
自动化技术   32131篇
  2024年   135篇
  2023年   833篇
  2022年   1752篇
  2021年   2208篇
  2020年   2361篇
  2019年   1822篇
  2018年   1640篇
  2017年   2024篇
  2016年   2336篇
  2015年   2683篇
  2014年   4259篇
  2013年   3848篇
  2012年   4596篇
  2011年   5009篇
  2010年   3856篇
  2009年   3779篇
  2008年   4274篇
  2007年   4826篇
  2006年   4062篇
  2005年   3614篇
  2004年   3122篇
  2003年   2612篇
  2002年   2001篇
  2001年   1509篇
  2000年   1265篇
  1999年   922篇
  1998年   708篇
  1997年   589篇
  1996年   478篇
  1995年   436篇
  1994年   353篇
  1993年   256篇
  1992年   173篇
  1991年   183篇
  1990年   135篇
  1989年   109篇
  1988年   88篇
  1987年   67篇
  1986年   60篇
  1985年   88篇
  1984年   58篇
  1983年   71篇
  1982年   61篇
  1981年   39篇
  1980年   20篇
  1979年   36篇
  1978年   15篇
  1977年   21篇
  1976年   19篇
  1959年   8篇
排序方式: 共有10000条查询结果,搜索用时 78 毫秒
91.
The importance of cultural heritage for supporting the knowledge economy has promoted its digitisation and online publication. Many cultural heritage repositories have published millions of digitised items using semantic web technologies and Linked Data approaches. These repositories frequently use knowledge organisation systems to classify the resources, but the domain heterogeneity makes it difficult to know if they are the most suitable ones. This paper describes the process used to discover and profile the knowledge organisation systems used in the cultural heritage domain. Additionally, for those knowledge organisation systems with a thesaurus-like structure, a detailed quality analysis is performed. The results of this analysis can be used as a key factor for the selection of knowledge organisation systems in classification tasks.  相似文献   
92.
We are in the midst of a “Data Revolution” that is transforming our economy. This revolution is as large and profound as other major economic shifts from the introduction of the printing press to the Industrial Revolution. In this article, we compare the development of the field of Industrial Statistics as an outgrowth of the Machine Age to the development of the field of Data Science as an outgrowth of the Information Age. It is shown how the knowledge, skills, and abilities required for “Data Scientists” have evolved to support companies as they try to differentiate themselves in the Information Age. It is discussed how the unique skills that Industrial Statisticians possess can provide a transformative advantage to Data Scientists working in the Information Age. Advice is given on how to leverage Industrial Statistics in the midst of the Data Revolution so that we ethically and responsibly implement the tools of Data Science, address important problems, and inclusively educate future generations.  相似文献   
93.
As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation is facing more and more challenges. Currently, the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating, alternately, the aim at enhancing the security of data. The performances of the secure data aggregation protocols are the trade-off of several metrics, which involves the transmission/fusion, the energy efficiency and the security in Wireless Sensor Network (WSN). Unfortunately, there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN. In consideration of IWSN, we firstly review the security requirements and techniques in WSN data aggregation in this paper. Then, we give a holistic overview of the classical secure data aggregation protocols, which are divided into three categories: hop-by-hop encrypted data aggregation, end-to-end encrypted data aggregation and unencrypted secure data aggregation. Along this way, combining with the characteristics of industrial applications, we analyze the pros and cons of the existing security schemes in each category qualitatively, and realize that the security and the energy efficiency are suitable for IWSN. Finally, we make the conclusion about the techniques and approach in these categories, and highlight the future research directions of privacy preserving data aggregation in IWSN.  相似文献   
94.
在地质调查信息化与地质资料社会化服务工作不断发展的背景下,航空物探遥感地质资料的开发利用与保密管理工作矛盾日益凸显。本文以航空物探遥感资料定密为研究重点,总结了地质、测绘地理信息、海洋等工作领域的定密工作情况,基于对航空物探遥感地质资料分类结果提取了共性资料涉密要素/事项,根据保密法规的相关规定与要求,初步建立了以比例尺/空间精度、测绘地理信息要素、航空物探遥感专业要素为主的定密判定要素集,提出了航空物探遥感地质资料的定密工作原则与参考准则,以期为航空物探遥感地质信息共享服务提供必要的工作支撑。  相似文献   
95.
Public-private partnership (PPP) projects have been widely applied in infrastructure construction. A suitable risk distribution strategy is crucial for promoting negotiations between the government and investors. The government usually provides guarantees to investors to distribute risk. However, an excessive guarantee increases the government's financial burden, whereas an insufficient guarantee reduces the confidence of the investors participating in the project. In a minimum revenue guarantee (MRG), the government subsidizes the investors the difference between the actual revenue and the government guarantee line if there is a loss. In PPP power plant and highway projects, investors' revenues come from two sources: government guarantees and the project company's self-sale. To support project companies and to optimize the projects' benefits, the government should set a reasonable benchmark for purchase amounts. Based on the traditional principal-agent model, this paper introduces the reciprocal preference theory to analyze the risk-sharing ratio most suitable for the government. Then, an optimal incentive mechanism is established to guarantee the project's income. The results indicate that by setting a different guarantee strategy for different participants, the government can utilize reciprocal preference to incentivize investors to exert more effort during a partnership and avoid moral hazard.  相似文献   
96.
朱小杰  赵子豪  杜一 《计算机应用》2020,40(6):1638-1647
复杂流程的大数据处理多依托于流水线系统,但大数据处理的流水线系统在易用性、功能复用性、扩展性以及处理性能等方面存在不足。针对上述问题,为提高大数据处理环境的构建与开发效率,优化处理流程,提出了一种模型驱动的大数据流水线框架PiFlow。首先,将大数据处理过程抽象为有向无环图;然后,开发一系列组件用于构建数据处理流水线,并设计了流水线任务执行机制。同时,为规范和简化流水线框架的描述,设计了基于模型驱动的大数据流水线描述语言——PiFlowDL,该语言以模块化、层次化的方式对大数据处理任务进行描述。PiFlow以所见即所得(WYSIWYG)的方式配置流水线,集成了状态监控、模板配置、组件集成等功能,与Apache NiFi相比有2~7倍的性能提升。  相似文献   
97.
反应堆堆芯核设计涉及大量方案的搜索与详细计算,缩短方案搜索时间有利于提高核设计效率。数据挖掘技术通过对大量数据进行学习与模式识别,可实现核设计方案物理参数的快速预测,更快地筛选出可行的备选堆芯方案。本文基于数据挖掘的决策树4种算法:C4.5、RepTree、Random Forest及Random Tree,在计算时以燃料富集度、含可燃毒物燃料棒数量及含量作为自变量,以寿期内keff不均匀系数偏差(KUCD)、径向功率不均匀系数偏差(RPNCD)、径向中子通量不均匀系数偏差(RFNCD)、堆芯寿期(CL)作为目标函数,构成目标函数符合度(CPF),利用大量已知核设计参数的组件及堆芯设计方案作为数据挖掘训练集,构建数据挖掘模型,并用于对未知核设计参数的组件方案集合(测试集)进行CPF快速预测。结果表明,4种算法利用训练集构建数据挖掘模型的时间在0.6 s以内,各算法的交叉验证精度均在0.7以上,其中C4.5算法对CPF预测精度最高;对测试集方案的核设计参数预测中,单个方案的预测时间均在0.9 s以内,而Random Forest算法对CPF等于4的预测效果最好。  相似文献   
98.
In phase I of statistical process control (SPC), control charts are often used as outlier detection methods to assess process stability. Many of these methods require estimation of the covariance matrix, are computationally infeasible, or have not been studied when the dimension of the data, p, is large. We propose the one-class peeling (OCP) method, a flexible framework that combines statistical and machine learning methods to detect multiple outliers in multivariate data. The OCP method can be applied to phase I of SPC, does not require covariance estimation, and is well suited to high-dimensional data sets with a high percentage of outliers. Our empirical evaluation suggests that the OCP method performs well in high dimensions and is computationally more efficient and robust than existing methodologies. We motivate and illustrate the use of the OCP method in a phase I SPC application on a N=354, p=1917 dimensional data set containing Wikipedia search results for National Football League (NFL) players, teams, coaches, and managers. The example data set and R functions, OCP.R and OCPLimit.R, to compute the respective OCP distances and thresholds are available in the supplementary materials.  相似文献   
99.
在经济不断迅猛发展的形势下,新时代的经济形式催生出一些多元化企业和职业,信息技术的不断发展使数据信息成为最具价值的财富。在信息传播极其迅速的今天,工程造价在数据信息时代下的管理模式也不断更新变化,以适应多元化的工程项目形式。因此信息数据的大量搜集和相关研究受到了各大科研机构和各类企业的高度关注。  相似文献   
100.
云计算是分布式计算技术的一种,其最基本的概念是透过网络将庞大的计算处理程序自动分拆成无数个较小的子程序,再交由多部服务器所组成的庞大系统经搜寻、计算分析之后将处理结果回传给用户。云计算中的数据泄漏已经成为云计算的巨大威胁,据不完全统计数据,仅在2019年1年,大约有超40亿条信息被泄露。这些信息涵盖科技、医疗、政府、金融、教育、制造等十几个领域数百个行业,数据泄露已经成为云计算中数据安全的巨大威胁。主要提出了一种多级加密算法,能更好地保护云计算中的数据,并能以极小的成本在云计算中得到应用。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号