首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2469篇
  免费   52篇
  国内免费   68篇
电工技术   8篇
综合类   33篇
化学工业   52篇
金属工艺   8篇
机械仪表   19篇
建筑科学   128篇
矿业工程   8篇
能源动力   12篇
轻工业   51篇
水利工程   8篇
石油天然气   10篇
武器工业   2篇
无线电   90篇
一般工业技术   34篇
冶金工业   1238篇
原子能技术   5篇
自动化技术   883篇
  2020年   16篇
  2017年   20篇
  2016年   39篇
  2015年   27篇
  2014年   64篇
  2013年   64篇
  2012年   81篇
  2011年   109篇
  2010年   111篇
  2009年   154篇
  2008年   132篇
  2007年   176篇
  2006年   181篇
  2005年   125篇
  2004年   105篇
  2003年   106篇
  2002年   77篇
  2001年   54篇
  2000年   41篇
  1999年   25篇
  1998年   20篇
  1997年   24篇
  1995年   27篇
  1994年   15篇
  1992年   17篇
  1990年   20篇
  1989年   29篇
  1988年   26篇
  1987年   19篇
  1986年   43篇
  1985年   27篇
  1984年   21篇
  1982年   19篇
  1981年   30篇
  1979年   17篇
  1977年   17篇
  1976年   15篇
  1975年   17篇
  1973年   19篇
  1971年   25篇
  1970年   21篇
  1969年   23篇
  1968年   46篇
  1967年   15篇
  1966年   21篇
  1965年   32篇
  1964年   27篇
  1961年   15篇
  1958年   14篇
  1956年   18篇
排序方式: 共有2589条查询结果,搜索用时 31 毫秒
51.
通过对移动用户在位置、时间、业务需求即用户所处情景的综合挖掘分析,本文分三个步骤为移动用户提供当前情景下与用户当前业务需求相关性最强的业务信息以及下一情景下与当前情景下业务需求相关性最强的业务信息的主动推荐.  相似文献   
52.
发现频繁项集是关联规则挖掘中最基本、最重要的问题.提出了一种基于二进制表示的频繁项集挖掘算法,并利用二进制的性质快速产生候选项集并计算其支持度.算法总体性能在一定程度上得到了提高.  相似文献   
53.
In current society, artificial intelligence processing technology offers convenient video monitoring, but also raises the risk of privacy leakage. Theoretically, the data used in intelligent video processing methods may directly convey visual information containing private content. For the above problem, this paper uses a multi-layer visual privacy-protected (VPP) coding method to blur private content in the video at the visual level, while avoiding the loss of important visual features contained in the video as much as possible. And this provides a guarantee of the quality of the subsequent keyframe extraction step. Then a visual evaluation algorithm is proposed for assessing the quality of VPP-encoded video privacy protection. And the experiment shows that the results are consistent with those of subjective evaluation. In addition, for VPP-encoded video, we propose an unsupervised two-layer clustering keyframe extraction method with corresponding performance evaluation index. Finally, an association model is established to balance the privacy protection quality and the keyframe extraction performance.  相似文献   
54.
The Journal of Strategic Information Systems (JSIS) was first published December 1991 by Robert (Bob) D. Galliers, its Founding Editor-in-Chief (EiC). Early on Bob invited me to join the JSIS International Editorial Board1 (the Board then being more operational, with members serving as quasi-AEs, an arrangement we’ve reinstituted more recently). I became Pacific Asia Region Editor in 2003, with JSIS shifting from region editors to Senior Editors in 2007, in which role I served the journal through the end of 2018. Mid-2018 Bob and Sirkka (Sirkka Jarvenpaa joined as co-EiC in 2000) jointly decided it was time; and announced they would both step down from their co-EiC roles at the end of that year. In September 2018, I was endorsed by Bob and Sirkka, the Senior Editors and Elsevier, to succeed Bob and Sirkka and assume the role of Editor-in-Chief of JSIS commencing 1 January 2019. I served as Editor-in-Chief through 1 July 2021 after which Yolande Chan and I served as co-Editors-in-Chief. Now the end of 2022, I am stepping down from operational involvement with the journal. In this my final editorial I focus on my time as EiC, also reflecting on my almost 3 decades with the journal. I much appreciate being invited to write these brief ruminations and am honoured to be included amongst the journal’s Emeritus, along with the esteemed Robert Galliers and Sirkka Jarvenpaa.  相似文献   
55.
Despite the planned installation and operations of the traditional IEEE 802.11 networks, they still experience degraded performance due to the number of inefficiencies. One of the main reasons is the received signal strength indicator (RSSI) association problem, in which the user remains connected to the access point (AP) unless the RSSI becomes too weak. In this paper, we propose a multi-criterion association (WiMA) scheme based on software defined networking (SDN) in Wi-Fi networks. An association solution based on multi-criterion such as AP load, RSSI, and channel occupancy is proposed to satisfy the quality of service (QoS). SDN having an overall view of the network takes the association and reassociation decisions making the handoffs smooth in throughput performance. To implement WiMA extensive simulations runs are carried out on Mininet-NS3-Wi-Fi network simulator. The performance evaluation shows that the WiMA significantly reduces the average number of retransmissions by 5%–30% and enhances the throughput by 20%–50%, hence maintaining user fairness and accommodating more wireless devices and traffic load in the network, when compared to traditional client-driven (CD) approach and state of the art Wi-Balance approach.  相似文献   
56.
Managerial decision-making processes often involve data of the time nature and need to understand complex temporal associations among events. Extending classical association rule mining approaches in consideration of time in order to obtain temporal information/knowledge is deemed important for decision support, which is nowadays one of the key issues in business intelligence. This paper presents the notion of multi-temporal patterns with four different temporal predicates, namely before, during, equal and overlap, and discusses a number of related properties, based on which a mining algorithm is designed. This enables us to effectively discover multi-temporal patterns in large-scale temporal databases by reducing the database scan in the generation of candidate patterns. The proposed approach is then applied to stock markets, aimed at exploring possible associative movements between the stock markets of Chinese mainland and Hong Kong so as to provide helpful knowledge for investment decisions.  相似文献   
57.
刘明生  孙树静 《计算机工程》2010,36(22):125-128
为克服传统信息安全风险评估模型在人为权重分配中的主观性,提出一种基于小波神经网络(WNN)和熵权-灰色关联(EGA)的信息安全风险定量评估模型。该模型利用WNN得到风险事件的风险值以及各个实体的风险统计状况,通过EGA得到该风险状况排序,并计算平均风险水平,从而有效评估信息系统的安全风险。  相似文献   
58.
In this paper we design and implement the pseudo session initiation protocol (p-SIP) server embedded in each mobile node to provide the ad-hoc voice over Internet protocol (VoIP) services. The implemented p-SIP server, being compatible with common VoIP user agents, integrates the standard SIP protocol with SIP presence to handle SIP signaling and discovery mechanism in the ad-hoc VoIP networks. The ad-hoc VoIP signaling and voice traffic performances are analyzed using E-model R rating value for up to six hops in the implemented test-bed. We also conduct the interference experiments to imitate the practical ad-hoc VoIP environment. The analyzed results demonstrate the realization of ad-hoc VoIP services by using p-SIP server.  相似文献   
59.
Given a real number sequence A=(a1,a2,…,an), an average lower bound L, and an average upper bound U, the Average-Constrained Maximum-Sum Segment problem is to locate a segment A(i,j)=(ai,ai+1,…,aj) that maximizes i?k?jak subject to . In this paper, we give an O(n)-time algorithm for the case where the average upper bound is ineffective, i.e., U=∞. On the other hand, we prove that the time complexity of the problem with an effective average upper bound is Ω(nlogn) even if the average lower bound is ineffective, i.e., L=−∞.  相似文献   
60.
Frequent pattern mining is an essential theme in data mining. Existing algorithms usually use a bottom-up search strategy. However, for very high dimensional data, this strategy cannot fully utilize the minimum support constraint to prune the rowset search space. In this paper, we propose a new method called top-down mining together with a novel row enumeration tree to make full use of the pruning power of the minimum support constraint. Furthermore, to efficiently check if a rowset is closed, we develop a method called the trace-based method. Based on these methods, an algorithm called TD-Close is designed for mining a complete set of frequent closed patterns. To enhance its performance further, we improve it by using new pruning strategies and new data structures that lead to a new algorithm TTD-Close. Our performance study shows that the top-down strategy is effective in cutting down search space and saving memory space, while the trace-based method facilitates the closeness-checking. As a result, the algorithm TTD-Close outperforms the bottom-up search algorithms such as Carpenter and FPclose in most cases. It also runs faster than TD-Close.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号