首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   185592篇
  免费   24748篇
  国内免费   13985篇
电工技术   60296篇
技术理论   13篇
综合类   18559篇
化学工业   6050篇
金属工艺   3607篇
机械仪表   8550篇
建筑科学   8013篇
矿业工程   4563篇
能源动力   9794篇
轻工业   2415篇
水利工程   4578篇
石油天然气   2558篇
武器工业   1556篇
无线电   32162篇
一般工业技术   7050篇
冶金工业   3261篇
原子能技术   2339篇
自动化技术   48961篇
  2024年   1168篇
  2023年   3155篇
  2022年   6168篇
  2021年   6959篇
  2020年   7454篇
  2019年   5621篇
  2018年   4807篇
  2017年   6250篇
  2016年   6610篇
  2015年   7603篇
  2014年   13057篇
  2013年   10999篇
  2012年   14762篇
  2011年   15558篇
  2010年   11786篇
  2009年   12058篇
  2008年   12168篇
  2007年   13945篇
  2006年   12071篇
  2005年   10162篇
  2004年   8354篇
  2003年   7126篇
  2002年   5501篇
  2001年   4681篇
  2000年   3819篇
  1999年   2958篇
  1998年   2055篇
  1997年   1638篇
  1996年   1442篇
  1995年   1085篇
  1994年   888篇
  1993年   568篇
  1992年   434篇
  1991年   275篇
  1990年   221篇
  1989年   195篇
  1988年   132篇
  1987年   81篇
  1986年   69篇
  1985年   67篇
  1984年   77篇
  1983年   64篇
  1982年   77篇
  1981年   30篇
  1980年   16篇
  1979年   20篇
  1978年   15篇
  1977年   9篇
  1959年   18篇
  1951年   8篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
961.
为实现区域水网水量的高效调控,从水量、水生态、水质和闸坝管理等4个方面构建包含10个指标的闸坝优选评价指标体系,以廊坊市凤河-永定河区域水网为研究对象,计算区域内32座闸坝的综合关键指数并给出影响程度排序,采用水动力数学模型验证关键闸坝选取的合理性。结果表明:优选出的永丰闸和东张务闸是区域水网的关键闸坝,通过调节这两座闸坝的开度即可满足区域水网的生态需水和防洪排涝调度目标,保持区域水网较优的水力连通能力,提高区域水网水量调控效率。  相似文献   
962.
Analytical models used for latency estimation of Network-on-Chip (NoC) are not producing reliable accuracy. This makes these analytical models difficult to use in optimization of design space exploration. In this paper, we propose a learning based model using deep neural network (DNN) for latency predictions. Input features for DNN model are collected from analytical model as well as from Booksim simulator. Then this DNN model has been adopted in mapping optimization loop for predicting the best mapping of given application and NoC parameters combination. Our simulations show that using the proposed DNN model, prediction error is less than 12% for both synthetic and application specific traffic. More than 108 times speedup could be achieved using DPSO with DNN model compared to DPSO using Booksim simulator.  相似文献   
963.
This study reinvestigated one of the most fundamental problems in structure light depth sensing field: correspondence retrieval of features between patterns and images. We formulate the global optimum correspondence retrieval by maximizing a conditional probability of correspondence given observed features, which is depicted by a Bayesian network. Different from traditional “code-only” based correspondence retrieval methods, the proposed Bayesian network based method exploits the positional correlations of correspondences of neighboring features, namely, the correspondences of poorly detected features are estimated with the aid of the correspondences of well detected features. The method performs especially well on challenging scenes with rich depth variations, abrupt depth changes, edges, etc. Experiments show that the proposed method increase the correspondence accuracy by about 40% on challenging scenes, compared with traditional “code-only” based correspondence retrieval methods.  相似文献   
964.
Because the oceanaut plays a significant role in safety and capability during manned deep-diving scientific tasks, preventing oceanaut performance decline is of paramount importance. However, the factors responsible for oceanaut performance are almost entirely unexplored. To address the preceding issues, a quantitative method of fuzzy integrated Bayesian network (FIBN) was modeled within the limits of oceanaut operating procedures. To quantify the probabilities of the influencing factors, the probability of each node in the FIBN was calculated using integrated expert judgement, fuzzy logic theory, and Bayesian network. By considering a total of 28 factors related to oceanaut performance in the “Jiaolong” manned submersible, this study found that difficult sampling, long sampling times, cabin equipment failure, oceanaut physical decline, and declining decision-making ability are important factors that affect oceanaut performance. The FIBN proposed in our study fused the qualitative and quantitative methods and can be developed into a versatile tool for analysis of comprehensive systems that contain both static and dynamic factors.Relevance to industryThe results provide a powerful basis for the design of manned submersible and assignment of tasks to oceanauts, while the fuzzy integrated Bayesian network (FIBN) method proposed can be effectively applied to various quantitative assessment fields which direct researchers to deal with analysis problems of complex systems.  相似文献   
965.
In group assessment, the focus is on finding high‐authority experts to improve the reliability of assessment results. In this study, we propose an authority updating algorithm while considering the power and judgement reliability of an expert on the basis of social networks and post‐evaluations. A network power index is established and used to reflect the power of an expert while considering social networks. The measurement of the judgement reliability of an expert considers the post‐evaluation of the objects selected by experts, thereby more scientifically reflecting the reliability of experts. The analysis shows the following: although the social‐network structure influences the authority of experts, the influence weakens when the assessment group is a highly or even fully connected group; the network effect may increase the authority of some experts and reduce that of others, and it will weaken as the network connectivity increases; moreover, the judgement reliability and authority of an expert while considering post‐evaluation can encourage him/her to make fair assessments and strive to reduce his/her motivation and cognitive biases.  相似文献   
966.
Entity linking is a fundamental task in natural language processing. The task of entity linking with knowledge graphs aims at linking mentions in text to their correct entities in a knowledge graph like DBpedia or YAGO2. Most of existing methods rely on hand‐designed features to model the contexts of mentions and entities, which are sparse and hard to calibrate. In this paper, we present a neural model that first combines co‐attention mechanism with graph convolutional network for entity linking with knowledge graphs, which extracts features of mentions and entities from their contexts automatically. Specifically, given the context of a mention and one of its candidate entities' context, we introduce the co‐attention mechanism to learn the relatedness between the mention context and the candidate entity context, and build the mention representation in consideration of such relatedness. Moreover, we propose a context‐aware graph convolutional network for entity representation, which takes both the graph structure of the candidate entity and its relatedness with the mention context into consideration. Experimental results show that our model consistently outperforms the baseline methods on five widely used datasets.  相似文献   
967.
Forecasting stock prices using deep learning models suffers from problems such as low accuracy, slow convergence, and complex network structures. This study developed an echo state network (ESN) model to mitigate such problems. We compared our ESN with a long short-term memory (LSTM) network by forecasting the stock data of Kweichow Moutai, a leading enterprise in China’s liquor industry. By analyzing data for 120, 240, and 300 days, we generated forecast data for the next 40, 80, and 100 days, respectively, using both ESN and LSTM. In terms of accuracy, ESN had the unique advantage of capturing nonlinear data. Mean absolute error (MAE) was used to present the accuracy results. The MAEs of the data forecast by ESN were 0.024, 0.024, and 0.025, which were, respectively, 0.065, 0.007, and 0.009 less than those of LSTM. In terms of convergence, ESN has a reservoir state-space structure, which makes it perform faster than other models. Root-mean-square error (RMSE) was used to present the convergence time. In our experiment, the RMSEs of ESN were 0.22, 0.27, and 0.26, which were, respectively, 0.08, 0.01, and 0.12 less than those of LSTM. In terms of network structure, ESN consists only of input, reservoir, and output spaces, making it a much simpler model than the others. The proposed ESN was found to be an effective model that, compared to others, converges faster, forecasts more accurately, and builds time-series analyses more easily.  相似文献   
968.
When wireless sensor networks (WSN) are deployed in the vegetable greenhouse with dynamic connectivity and interference environment, it is necessary to increase the node transmit power to ensure the communication quality, which leads to serious network interference. To offset the negative impact, the transmit power of other nodes must also be increased. The result is that the network becomes worse and worse, and node energy is wasted a lot. Taking into account the irregular connection range in the cucumber greenhouse WSN, we measured the transmission characteristics of wireless signals under the 2.4 Ghz operating frequency. For improving network layout in the greenhouse, a semi-empirical prediction model of signal loss is then studied based on the measured data. Compared with other models, the average relative error of this semi-empirical signal loss model is only 2.3%. Finally, by combining the improved network topology algorithm and tabu search, this paper studies a greenhouse WSN layout that can reduce path loss, save energy, and ensure communication quality. Given the limitation of node-degree constraint in traditional network layout algorithms, the improved algorithm applies the forwarding constraint to balance network energy consumption and constructs asymmetric network communication links. Experimental results show that this research can realize the energy consumption optimization of WSN layout in the greenhouse.  相似文献   
969.
Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between nodes of the attack graph in the conversion process, a related algorithm is proposed to generate the B_NAG model. Finally, to analyze the reachability of paths in B_NAG, the measuring indexs such as node attack complexity and node state transition are defined, and an iterative algorithm for obtaining the probability of reaching the target node is presented. On this basis, the posterior probability of related nodes can be calculated. A simulation environment is set up to evaluate the effectiveness of the B_NAG model. The experimental results indicate that the B_NAG model is realistic and effective in evaluating vulnerabilities of computer networks and can accurately highlight the degree of vulnerability in a chaotic relationship.  相似文献   
970.
A considerable number of applications are running over IP networks. This increased the contention on the network resource, which ultimately results in congestion. Active queue management (AQM) aims to reduce the serious consequences of network congestion in the router buffer and its negative effects on network performance. AQM methods implement different techniques in accordance with congestion indicators, such as queue length and average queue length. The performance of the network is evaluated using delay, loss, and throughput. The gap between congestion indicators and network performance measurements leads to the decline in network performance. In this study, delay and loss predictions are used as congestion indicators in a novel stochastic approach for AQM. The proposed method estimates the congestion in the router buffer and then uses the indicators to calculate the dropping probability, which is responsible for managing the router buffer. The experimental results, based on two sets of experiments, have shown that the proposed method outperformed the existing benchmark algorithms including RED, ERED and BLUE algorithms. For instance, in the first experiment, the proposed method resides in the third-place in terms of delay when compared to the benchmark algorithms. In addition, the proposed method outperformed the benchmark algorithms in terms of packet loss, packet dropping, and packet retransmission. Overall, the proposed method outperformed the benchmark algorithms because it preserves packet loss while maintaining reasonable queuing delay.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号