首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6299篇
  免费   373篇
  国内免费   28篇
电工技术   129篇
综合类   17篇
化学工业   1745篇
金属工艺   184篇
机械仪表   230篇
建筑科学   181篇
矿业工程   3篇
能源动力   486篇
轻工业   735篇
水利工程   72篇
石油天然气   56篇
武器工业   1篇
无线电   627篇
一般工业技术   1161篇
冶金工业   291篇
原子能技术   35篇
自动化技术   747篇
  2024年   15篇
  2023年   121篇
  2022年   244篇
  2021年   406篇
  2020年   268篇
  2019年   292篇
  2018年   345篇
  2017年   309篇
  2016年   335篇
  2015年   232篇
  2014年   338篇
  2013年   641篇
  2012年   453篇
  2011年   480篇
  2010年   310篇
  2009年   253篇
  2008年   182篇
  2007年   161篇
  2006年   139篇
  2005年   99篇
  2004年   82篇
  2003年   100篇
  2002年   74篇
  2001年   75篇
  2000年   81篇
  1999年   43篇
  1998年   88篇
  1997年   55篇
  1996年   56篇
  1995年   53篇
  1994年   41篇
  1993年   39篇
  1992年   11篇
  1991年   21篇
  1990年   24篇
  1989年   16篇
  1988年   31篇
  1987年   25篇
  1986年   23篇
  1985年   18篇
  1984年   20篇
  1983年   13篇
  1982年   12篇
  1981年   10篇
  1979年   9篇
  1978年   8篇
  1977年   7篇
  1976年   8篇
  1975年   7篇
  1974年   7篇
排序方式: 共有6700条查询结果,搜索用时 78 毫秒
961.
Clone has emerged as a controversial term in software engineering research and practice. The impact of clones is of great importance from software maintenance perspectives. Stability is a well investigated term in assessing the impacts of clones on software maintenance. If code clones appear to exhibit a higher instability (i.e., higher change-proneness) than non-cloned code, then we can expect that code clones require higher maintenance effort and cost than non-cloned code. A number of studies have been done on the comparative stability of cloned and non-cloned code. However, these studies could not come to a consensus. While some studies show that code clones are more stable than non-cloned code, the other studies provide empirical evidence of higher instability of code clones. The possible reasons behind these contradictory findings are that different studies investigated different aspects of stability using different clone detection tools on different subject systems using different experimental setups. Also, the subject systems were not of wide varieties. Emphasizing these issues (with several others mentioned in the motivation) we have conducted a comprehensive empirical study where we have - (i) implemented and investigated seven existing methodologies that explored different aspects of stability, (ii) used two clone detection tools (NiCad and CCFinderX) to implement each of these seven methodologies, and (iii) investigated the stability of three types (Type-1, Type-2, Type-3) of clones. Our investigation on 12 diverse subject systems covering three programming languages (Java, C, C#) with a list of 8 stability assessment metrics suggest that (i) cloned code is often more unstable (change-prone) than non-cloned code in the maintenance phase, (ii) both Type 1 and Type 3 clones appear to exhibit higher instability than Type 2 clones, (iii) clones in Java and C programming languages are more change-prone than the clones in C#, and (iv) changes to the clones in procedural programming languages seem to be more dispersed than the changes to the clones in object oriented languages. We also systematically replicated the original studies with their original settings and found mostly equivalent results as of the original studies. We believe that our findings are important for prioritizing code clones from management perspectives.  相似文献   
962.
We study a recommendation system problem, in which the system must be able to cover as many users’ preferences as possible while these preferences change over time. This problem can be formulated as a variation of the maximum coverage problem; specifically we introduced a novel problem of Online k-Hitting Set, where the number of sets and elements within the sets can change dynamically. When the number of distinctive elements is large, an exhaustive search for even a fixed number of elements is known to be computationally expensive. Even the static problem is known to be NP-hard (Hochba, ACM SIGACT News 28(2):40–52, 1997) and many known algorithms tend to have exponential growth in complexity. We propose a novel graph based UCB1 algorithm that effectively minimizes the number of elements to consider, thereby reducing the search space greatly. The algorithm utilizes a new rewarding scheme to choose items that satisfy more users by balancing coverage and diversity as it construct a relational graph between items to recommend. Experiments show that the new graph based algorithm performs better than existing techniques such as Ranked Bandit (Radlinski et al. 2008) and Independent Bandits (Kohli et al. 2013) in terms of satisfying diverse types of users while minimizing computational complexity.  相似文献   
963.
Stemming is the basic operation in Natural language processing (NLP) to remove derivational and inflectional affixes without performing a morphological analysis. This practice is essential to extract the root or stem. In NLP domains, the stemmer is used to improve the process of information retrieval (IR), text classifications (TC), text mining (TM) and related applications. In particular, Urdu stemmers utilize only uni-gram words from the input text by ignoring bigrams, trigrams, and n-gram words. To improve the process and efficiency of stemming, bigrams and trigram words must be included. Despite this fact, there are a few developed methods for Urdu stemmers in the past studies. Therefore, in this paper, we proposed an improved Urdu stemmer, using hybrid approach divided into multi-step operation, to deal with unigram, bigram, and trigram features as well. To evaluate the proposed Urdu stemming method, we have used two corpora; word corpus and text corpus. Moreover, two different evaluation metrics have been applied to measure the performance of the proposed algorithm. The proposed algorithm achieved an accuracy of 92.97% and compression rate of 55%. These experimental results indicate that the proposed system can be used to increase the effectiveness and efficiency of the Urdu stemmer for better information retrieval and text mining applications.  相似文献   
964.
With the development and wide adoption of industrial wireless sensor networks to support various domain applications, the boundary detection of continuous objects has become an important research challenge, where improving the accuracy of boundary area while reducing the energy consumption are the first-class citizens to be considered. To address this research challenge, this article proposes a two-stage boundary face detection mechanism, where sensor nodes are duty-cycled and to be deployed in a dense fashion. When the occurrence of potential events are recognized using the initially activated sensor nodes, the boundary faces of continuous objects are constructed through adopting planarization algorithms. Thereafter, sensor nodes contained in certain boundary faces are examined, where their sensory data are estimated using spatial interpolation methods. Certain sensor nodes are selected to be woken up, only when their sensory data suggest that they should be more appropriate candidates of boundary sensor nodes. Consequently, the size of boundary faces is reduced, and this coarse-to-fine refinement procedure iterates, until all sensor nodes contained in the boundary faces have been examined. Experimental evaluation result shows that the boundary area can be refined significantly and be more precise, where the half of the initial boundary face area should be reduced in most situations.  相似文献   
965.
Wireless Networks - By removing the orthogonal use of radio-resources, non-orthogonal multiple access (NOMA) has been introduced to improve the spectral efficiency of fifth generation (5G) and...  相似文献   
966.

In recent times, a phishing attack has become one of the most prominent attacks faced by internet users, governments, and service-providing organizations. In a phishing attack, the attacker(s) collects the client’s sensitive data (i.e., user account login details, credit/debit card numbers, etc.) by using spoofed emails or fake websites. Phishing websites are common entry points of online social engineering attacks, including numerous frauds on the websites. In such types of attacks, the attacker(s) create website pages by copying the behavior of legitimate websites and sends URL(s) to the targeted victims through spam messages, texts, or social networking. To provide a thorough understanding of phishing attack(s), this paper provides a literature review of Artificial Intelligence (AI) techniques: Machine Learning, Deep Learning, Hybrid Learning, and Scenario-based techniques for phishing attack detection. This paper also presents the comparison of different studies detecting the phishing attack for each AI technique and examines the qualities and shortcomings of these methodologies. Furthermore, this paper provides a comprehensive set of current challenges of phishing attacks and future research direction in this domain.

  相似文献   
967.
The ongoing coronavirus disease 2019 (COVID-19) pandemic highlights the importance of developing effective virus targeting strategies to treat and prevent viral infections. Since virus particles are nanoscale entities, nanomaterial design strategies are ideally suited to create advanced materials that can interact with and mimic virus particles. In this progress report, the latest advances in biomimetic nanomaterials are critically discussed for combating viral infections, including in the areas of nanomaterial-enhanced viral replication inhibitors, biomimetic virus particle capture schemes, and nanoparticle vaccines. Particular focus is placed on nanomaterial design concepts and material innovations that can be readily developed to thwart future viral threats. Pertinent nanomaterial examples from the COVID-19 situation are also covered along with discussion of human clinical trial efforts underway that might lead to next-generation antiviral therapies and vaccines.  相似文献   
968.
Multimedia Tools and Applications - Digital image has a significant importance in many fields in human life such as, in medicine, photography, biology, astronomy, industry and defense. Thus, it...  相似文献   
969.

This paper elaborates the empirical evidence of a usability evaluation of a VR and non-VR virtual tour application for a living museum. The System Usability Scale (SUS) was used in between participants experiments (Group 1: non-VR version and Group 2: VR version) with 40 participants. The results show that the mean scores of all components for the VR version are higher compared to the non-VR version, overall SUS score (72.10 vs 68.10), usability score (75.50 vs 71.70), and learnability (58.40 vs 57.00). Further analysis using a two-tailed independent t test showed no difference between the non-VR and VR versions. Additionally, no significant difference was observed between the groups in the context of gender, nationality, and prior experience (other VR tour applications) for overall SUS score, usability score, and learnability score. Α two-tailed independent t test indicated no significant difference in the usability score between participants with VR experience and no VR experience. However, a significant difference was found between participants with VR experience and no VR experience for both SUS score (t(38) = 2.17, p = 0.037) and learnability score (t(38) = 2.40, p = 0.021). The independent t test results indicated a significant difference between participant with and without previous visits to SCV for the usability score (t(38) = −2.31, p = 0.027), while there was no significant differences observed in other components. It can be concluded that both versions passed based on the SUS score. However, the sub-scale usability and learnability scores indicated some usability issue.

  相似文献   
970.
Field spectroscopy is a rapid and non-destructive analytical technique that may be used for assessing plant stress and disease. The objective of this study was to develop spectral indices for detection of Ganoderma disease in oil palm seedlings. The reflectance spectra of oil palm seedlings from three levels of Ganoderma disease severity were acquired using a spectroradiometer. Denoizing and data transformation using first derivative analysis was conducted on the original reflectance spectra. Then, comparative statistical analysis was used to select significant wavelength from transformed data. Wavelength pairs of spectral indices were selected using optimum index factor. The spectral indices were produced using the wavelength ratios and a modified simple ratio method. The relationship analysis between spectral indices and total leaf chlorophyll (TLC) was conducted using regression technique. The results suggested that six spectral indices are suitable for the early detection of Ganoderma disease in oil palm seedlings. Final results after regression with TLC showed that Ratio 3 is the best spectral index for the early detection of Ganoderma infection in oil palm seedlings. For future works, this can be used for the development of robust spectral indices for Ganoderma disease detection in young and mature oil palm using airborne hyperspectral imaging.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号