首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   177672篇
  免费   18010篇
  国内免费   11740篇
电工技术   13923篇
技术理论   2篇
综合类   16092篇
化学工业   24668篇
金属工艺   11234篇
机械仪表   11640篇
建筑科学   13114篇
矿业工程   5072篇
能源动力   4965篇
轻工业   16968篇
水利工程   4607篇
石油天然气   6529篇
武器工业   2001篇
无线电   21046篇
一般工业技术   18551篇
冶金工业   7740篇
原子能技术   2768篇
自动化技术   26502篇
  2024年   776篇
  2023年   2635篇
  2022年   5845篇
  2021年   7873篇
  2020年   5532篇
  2019年   4114篇
  2018年   4571篇
  2017年   5229篇
  2016年   4672篇
  2015年   6965篇
  2014年   9139篇
  2013年   11463篇
  2012年   13184篇
  2011年   14258篇
  2010年   13175篇
  2009年   12678篇
  2008年   13279篇
  2007年   12702篇
  2006年   11487篇
  2005年   9457篇
  2004年   6620篇
  2003年   4838篇
  2002年   4700篇
  2001年   4253篇
  2000年   3670篇
  1999年   2561篇
  1998年   1989篇
  1997年   1681篇
  1996年   1498篇
  1995年   1248篇
  1994年   965篇
  1993年   825篇
  1992年   659篇
  1991年   508篇
  1990年   434篇
  1989年   353篇
  1988年   286篇
  1987年   206篇
  1986年   171篇
  1985年   153篇
  1984年   114篇
  1983年   84篇
  1982年   76篇
  1981年   76篇
  1980年   77篇
  1979年   49篇
  1978年   35篇
  1977年   32篇
  1976年   56篇
  1959年   29篇
排序方式: 共有10000条查询结果,搜索用时 265 毫秒
991.
2020年6—7月,水阳江、青弋江、漳河流域(以下简称三江流域)遭受梅雨期10轮强降雨影响,水阳江干流连续出现3次洪峰过程,全线发生超保证水位洪水、青弋江干流全线发生超警戒水位洪水,水阳江流域遭遇1999年以来最大洪水,造成宣城市直接经济损失29.57亿元。系统梳理了三江流域2020年暴雨洪水的科学应对举措,分析了三江流域上游、中游、下游存在的问题,并依据“上蓄、中疏、下排”的系统治理思路,提出了相应的治理对策与建议,以进一步提升三江流域防洪排涝能力。  相似文献   
992.
The PTC-type BaTiO3 ceramics of similar microstructure are obtained by careful control of a sintering scheme. The defect chemistry of them is modified by varying the cooling rate and annealing conditons. In addition to applying Heywang and Jonker models for explaining the resistivity anomaly of these samples, the outward diffusion of oxygen vacancies (VO), which left excess barium vacancies (VBa) behind, is proposed to be the formation mechanism of surface states. The formation of defect complex consisting of a V O .. - Ba pair is assumed to be the cause of small diffusivity of VO in these materials. The phenomena, in which the slower cooling rate raises the resistivity of samples, is ascribed to the higher concentration of excess barium vacancies (VBa) contained in these samples. However, the maximum potential barrier height (max) of the samples is the same, irrespective of the amount of surface state concentration (N s) and is estimated to be max = 0.66eV, from the In (max)-1/T max plot.  相似文献   
993.
波片位相延迟的精确测量   总被引:3,自引:0,他引:3  
宋连科  李艺 《激光杂志》1990,11(4):178-180
  相似文献   
994.
An improved method for automatically reconstructing a three-dimensional object from serial cross sections is presented. The method improves the dynamic elastic contour interpolation technique. There are two major improvements: (1) in the case of branching that involves concave contours, instead of pairwise interpolation between the start contour and each goal contour, the goal image is considered globally and local constraints are imposed on the forces exerting upon the vertices; and (2) it takes the continuity of high-order derivatives into consideration and incorporates the schemes of spline theory, quadratic-variation-based surface interpolation, and finite-element-based multilevel surface interpolation to create smoother surfaces of the reconstructed object. Based on the output from the preliminary processing, two alternatives, a quadratic-variation-based surface interpolation algorithm and a finite-element-based multilevel surface interpolation algorithm, can be adopted to obtain the final surface representation  相似文献   
995.
Forecasting stock prices using deep learning models suffers from problems such as low accuracy, slow convergence, and complex network structures. This study developed an echo state network (ESN) model to mitigate such problems. We compared our ESN with a long short-term memory (LSTM) network by forecasting the stock data of Kweichow Moutai, a leading enterprise in China’s liquor industry. By analyzing data for 120, 240, and 300 days, we generated forecast data for the next 40, 80, and 100 days, respectively, using both ESN and LSTM. In terms of accuracy, ESN had the unique advantage of capturing nonlinear data. Mean absolute error (MAE) was used to present the accuracy results. The MAEs of the data forecast by ESN were 0.024, 0.024, and 0.025, which were, respectively, 0.065, 0.007, and 0.009 less than those of LSTM. In terms of convergence, ESN has a reservoir state-space structure, which makes it perform faster than other models. Root-mean-square error (RMSE) was used to present the convergence time. In our experiment, the RMSEs of ESN were 0.22, 0.27, and 0.26, which were, respectively, 0.08, 0.01, and 0.12 less than those of LSTM. In terms of network structure, ESN consists only of input, reservoir, and output spaces, making it a much simpler model than the others. The proposed ESN was found to be an effective model that, compared to others, converges faster, forecasts more accurately, and builds time-series analyses more easily.  相似文献   
996.
Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between nodes of the attack graph in the conversion process, a related algorithm is proposed to generate the B_NAG model. Finally, to analyze the reachability of paths in B_NAG, the measuring indexs such as node attack complexity and node state transition are defined, and an iterative algorithm for obtaining the probability of reaching the target node is presented. On this basis, the posterior probability of related nodes can be calculated. A simulation environment is set up to evaluate the effectiveness of the B_NAG model. The experimental results indicate that the B_NAG model is realistic and effective in evaluating vulnerabilities of computer networks and can accurately highlight the degree of vulnerability in a chaotic relationship.  相似文献   
997.
Generative adversarial networks (GANs) are paid more attention to dealing with the end-to-end speech enhancement in recent years. Various GAN-based enhancement methods are presented to improve the quality of reconstructed speech. However, the performance of these GAN-based methods is worse than those of masking-based methods. To tackle this problem, we propose speech enhancement method with a residual dense generative adversarial network (RDGAN) contributing to map the log-power spectrum (LPS) of degraded speech to the clean one. In detail, a residual dense block (RDB) architecture is designed to better estimate the LPS of clean speech, which can extract rich local features of LPS through densely connected convolution layers. Meanwhile, sequential RDB connections are incorporated on various scales of LPS. It significantly increases the feature learning flexibility and robustness in the time-frequency domain. Simulations show that the proposed method achieves attractive speech enhancement performance in various acoustic environments. Specifically, in the untrained acoustic test with limited priors, e.g., unmatched signal-to-noise ratio (SNR) and unmatched noise category, RDGAN can still outperform the existing GAN-based methods and masking-based method in the measures of PESQ and other evaluation indexes. It indicates that our method is more generalized in untrained conditions.  相似文献   
998.
Bai  Qingchun  Wei  Kai  Zhou  Jie  Xiong  Chao  Wu  Yuanbin  Lin  Xin  He  Liang 《The Journal of supercomputing》2021,77(9):9474-9493
The Journal of Supercomputing - Sentiment analysis in Danmaku video interaction aims at measuring public mood in respect of the video, which is helpful for the potential applications in behavioral...  相似文献   
999.
Yao  Lin  Chen  Zhenyu  Hu  Haibo  Wu  Guowei  Wu  Bin 《Distributed and Parallel Databases》2021,39(3):785-811
Distributed and Parallel Databases - The widely application of positioning technology has made collecting the movement of people feasible for knowledge-based decision. Data in its original form...  相似文献   
1000.
Applied Intelligence - High utility itemset mining is a popular pattern mining task, which aims at revealing all sets of items that yield a high profit in a transaction database. Although this task...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号