全文获取类型
收费全文 | 61266篇 |
免费 | 8225篇 |
国内免费 | 5991篇 |
专业分类
电工技术 | 5465篇 |
技术理论 | 10篇 |
综合类 | 6749篇 |
化学工业 | 1337篇 |
金属工艺 | 718篇 |
机械仪表 | 3784篇 |
建筑科学 | 2454篇 |
矿业工程 | 1552篇 |
能源动力 | 798篇 |
轻工业 | 732篇 |
水利工程 | 1439篇 |
石油天然气 | 2906篇 |
武器工业 | 796篇 |
无线电 | 9704篇 |
一般工业技术 | 3075篇 |
冶金工业 | 1085篇 |
原子能技术 | 747篇 |
自动化技术 | 32131篇 |
出版年
2024年 | 135篇 |
2023年 | 833篇 |
2022年 | 1752篇 |
2021年 | 2208篇 |
2020年 | 2361篇 |
2019年 | 1822篇 |
2018年 | 1640篇 |
2017年 | 2024篇 |
2016年 | 2336篇 |
2015年 | 2683篇 |
2014年 | 4259篇 |
2013年 | 3848篇 |
2012年 | 4596篇 |
2011年 | 5009篇 |
2010年 | 3856篇 |
2009年 | 3779篇 |
2008年 | 4274篇 |
2007年 | 4826篇 |
2006年 | 4062篇 |
2005年 | 3614篇 |
2004年 | 3122篇 |
2003年 | 2612篇 |
2002年 | 2001篇 |
2001年 | 1509篇 |
2000年 | 1265篇 |
1999年 | 922篇 |
1998年 | 708篇 |
1997年 | 589篇 |
1996年 | 478篇 |
1995年 | 436篇 |
1994年 | 353篇 |
1993年 | 256篇 |
1992年 | 173篇 |
1991年 | 183篇 |
1990年 | 135篇 |
1989年 | 109篇 |
1988年 | 88篇 |
1987年 | 67篇 |
1986年 | 60篇 |
1985年 | 88篇 |
1984年 | 58篇 |
1983年 | 71篇 |
1982年 | 61篇 |
1981年 | 39篇 |
1980年 | 20篇 |
1979年 | 36篇 |
1978年 | 15篇 |
1977年 | 21篇 |
1976年 | 19篇 |
1959年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 78 毫秒
91.
The importance of cultural heritage for supporting the knowledge economy has promoted its digitisation and online publication. Many cultural heritage repositories have published millions of digitised items using semantic web technologies and Linked Data approaches. These repositories frequently use knowledge organisation systems to classify the resources, but the domain heterogeneity makes it difficult to know if they are the most suitable ones. This paper describes the process used to discover and profile the knowledge organisation systems used in the cultural heritage domain. Additionally, for those knowledge organisation systems with a thesaurus-like structure, a detailed quality analysis is performed. The results of this analysis can be used as a key factor for the selection of knowledge organisation systems in classification tasks. 相似文献
92.
L. Allison Jones-Farmer 《Quality Engineering》2019,31(2):205-211
We are in the midst of a “Data Revolution” that is transforming our economy. This revolution is as large and profound as other major economic shifts from the introduction of the printing press to the Industrial Revolution. In this article, we compare the development of the field of Industrial Statistics as an outgrowth of the Machine Age to the development of the field of Data Science as an outgrowth of the Information Age. It is shown how the knowledge, skills, and abilities required for “Data Scientists” have evolved to support companies as they try to differentiate themselves in the Information Age. It is discussed how the unique skills that Industrial Statisticians possess can provide a transformative advantage to Data Scientists working in the Information Age. Advice is given on how to leverage Industrial Statistics in the midst of the Data Revolution so that we ethically and responsibly implement the tools of Data Science, address important problems, and inclusively educate future generations. 相似文献
93.
Weidong Fang Wuxiong Zhang QianQian Zhao Xiaohong Ji Wei Chen Biruk Assefa 《计算机、材料和连续体(英文)》2019,61(2):583-599
As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation is facing more and more challenges. Currently, the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating, alternately, the aim at enhancing the security of data. The performances of the secure data aggregation protocols are the trade-off of several metrics, which involves the transmission/fusion, the energy efficiency and the security in Wireless Sensor Network (WSN). Unfortunately, there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN. In consideration of IWSN, we firstly review the security requirements and techniques in WSN data aggregation in this paper. Then, we give a holistic overview of the classical secure data aggregation protocols, which are divided into three categories: hop-by-hop encrypted data aggregation, end-to-end encrypted data aggregation and unencrypted secure data aggregation. Along this way, combining with the characteristics of industrial applications, we analyze the pros and cons of the existing security schemes in each category qualitatively, and realize that the security and the energy efficiency are suitable for IWSN. Finally, we make the conclusion about the techniques and approach in these categories, and highlight the future research directions of privacy preserving data aggregation in IWSN. 相似文献
94.
在地质调查信息化与地质资料社会化服务工作不断发展的背景下,航空物探遥感地质资料的开发利用与保密管理工作矛盾日益凸显。本文以航空物探遥感资料定密为研究重点,总结了地质、测绘地理信息、海洋等工作领域的定密工作情况,基于对航空物探遥感地质资料分类结果提取了共性资料涉密要素/事项,根据保密法规的相关规定与要求,初步建立了以比例尺/空间精度、测绘地理信息要素、航空物探遥感专业要素为主的定密判定要素集,提出了航空物探遥感地质资料的定密工作原则与参考准则,以期为航空物探遥感地质信息共享服务提供必要的工作支撑。 相似文献
95.
Public-private partnership (PPP) projects have been widely applied in infrastructure construction. A suitable risk distribution strategy is crucial for promoting negotiations between the government and investors. The government usually provides guarantees to investors to distribute risk. However, an excessive guarantee increases the government's financial burden, whereas an insufficient guarantee reduces the confidence of the investors participating in the project. In a minimum revenue guarantee (MRG), the government subsidizes the investors the difference between the actual revenue and the government guarantee line if there is a loss. In PPP power plant and highway projects, investors' revenues come from two sources: government guarantees and the project company's self-sale. To support project companies and to optimize the projects' benefits, the government should set a reasonable benchmark for purchase amounts. Based on the traditional principal-agent model, this paper introduces the reciprocal preference theory to analyze the risk-sharing ratio most suitable for the government. Then, an optimal incentive mechanism is established to guarantee the project's income. The results indicate that by setting a different guarantee strategy for different participants, the government can utilize reciprocal preference to incentivize investors to exert more effort during a partnership and avoid moral hazard. 相似文献
96.
复杂流程的大数据处理多依托于流水线系统,但大数据处理的流水线系统在易用性、功能复用性、扩展性以及处理性能等方面存在不足。针对上述问题,为提高大数据处理环境的构建与开发效率,优化处理流程,提出了一种模型驱动的大数据流水线框架PiFlow。首先,将大数据处理过程抽象为有向无环图;然后,开发一系列组件用于构建数据处理流水线,并设计了流水线任务执行机制。同时,为规范和简化流水线框架的描述,设计了基于模型驱动的大数据流水线描述语言——PiFlowDL,该语言以模块化、层次化的方式对大数据处理任务进行描述。PiFlow以所见即所得(WYSIWYG)的方式配置流水线,集成了状态监控、模板配置、组件集成等功能,与Apache NiFi相比有2~7倍的性能提升。 相似文献
97.
反应堆堆芯核设计涉及大量方案的搜索与详细计算,缩短方案搜索时间有利于提高核设计效率。数据挖掘技术通过对大量数据进行学习与模式识别,可实现核设计方案物理参数的快速预测,更快地筛选出可行的备选堆芯方案。本文基于数据挖掘的决策树4种算法:C4.5、RepTree、Random Forest及Random Tree,在计算时以燃料富集度、含可燃毒物燃料棒数量及含量作为自变量,以寿期内keff不均匀系数偏差(KUCD)、径向功率不均匀系数偏差(RPNCD)、径向中子通量不均匀系数偏差(RFNCD)、堆芯寿期(CL)作为目标函数,构成目标函数符合度(CPF),利用大量已知核设计参数的组件及堆芯设计方案作为数据挖掘训练集,构建数据挖掘模型,并用于对未知核设计参数的组件方案集合(测试集)进行CPF快速预测。结果表明,4种算法利用训练集构建数据挖掘模型的时间在0.6 s以内,各算法的交叉验证精度均在0.7以上,其中C4.5算法对CPF预测精度最高;对测试集方案的核设计参数预测中,单个方案的预测时间均在0.9 s以内,而Random Forest算法对CPF等于4的预测效果最好。 相似文献
98.
Waldyn G. Martinez Maria L. Weese L. Allison Jones-Farmer 《Quality and Reliability Engineering International》2020,36(4):1272-1295
In phase I of statistical process control (SPC), control charts are often used as outlier detection methods to assess process stability. Many of these methods require estimation of the covariance matrix, are computationally infeasible, or have not been studied when the dimension of the data, , is large. We propose the one-class peeling (OCP) method, a flexible framework that combines statistical and machine learning methods to detect multiple outliers in multivariate data. The OCP method can be applied to phase I of SPC, does not require covariance estimation, and is well suited to high-dimensional data sets with a high percentage of outliers. Our empirical evaluation suggests that the OCP method performs well in high dimensions and is computationally more efficient and robust than existing methodologies. We motivate and illustrate the use of the OCP method in a phase I SPC application on a , dimensional data set containing Wikipedia search results for National Football League (NFL) players, teams, coaches, and managers. The example data set and R functions, OCP.R and OCPLimit.R, to compute the respective OCP distances and thresholds are available in the supplementary materials. 相似文献
99.
100.
云计算是分布式计算技术的一种,其最基本的概念是透过网络将庞大的计算处理程序自动分拆成无数个较小的子程序,再交由多部服务器所组成的庞大系统经搜寻、计算分析之后将处理结果回传给用户。云计算中的数据泄漏已经成为云计算的巨大威胁,据不完全统计数据,仅在2019年1年,大约有超40亿条信息被泄露。这些信息涵盖科技、医疗、政府、金融、教育、制造等十几个领域数百个行业,数据泄露已经成为云计算中数据安全的巨大威胁。主要提出了一种多级加密算法,能更好地保护云计算中的数据,并能以极小的成本在云计算中得到应用。 相似文献