首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   314286篇
  免费   41324篇
  国内免费   35914篇
电工技术   28808篇
技术理论   16篇
综合类   29630篇
化学工业   50203篇
金属工艺   11702篇
机械仪表   20808篇
建筑科学   20696篇
矿业工程   6430篇
能源动力   11693篇
轻工业   18584篇
水利工程   10564篇
石油天然气   11149篇
武器工业   3826篇
无线电   40391篇
一般工业技术   31765篇
冶金工业   8617篇
原子能技术   4491篇
自动化技术   82151篇
  2024年   1731篇
  2023年   5434篇
  2022年   9988篇
  2021年   11499篇
  2020年   11475篇
  2019年   10272篇
  2018年   9691篇
  2017年   12610篇
  2016年   14088篇
  2015年   15364篇
  2014年   17106篇
  2013年   20690篇
  2012年   23245篇
  2011年   25802篇
  2010年   19215篇
  2009年   19382篇
  2008年   20587篇
  2007年   23049篇
  2006年   21209篇
  2005年   18370篇
  2004年   15263篇
  2003年   12522篇
  2002年   9695篇
  2001年   7636篇
  2000年   6511篇
  1999年   5222篇
  1998年   4362篇
  1997年   3545篇
  1996年   3035篇
  1995年   2571篇
  1994年   2200篇
  1993年   1599篇
  1992年   1309篇
  1991年   1049篇
  1990年   864篇
  1989年   672篇
  1988年   470篇
  1987年   296篇
  1986年   263篇
  1985年   318篇
  1984年   296篇
  1983年   181篇
  1982年   258篇
  1981年   128篇
  1980年   142篇
  1979年   69篇
  1978年   31篇
  1977年   30篇
  1974年   17篇
  1959年   35篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
111.
We present an optimization-based unsupervised approach to automatic document summarization. In the proposed approach, text summarization is modeled as a Boolean programming problem. This model generally attempts to optimize three properties, namely, (1) relevance: summary should contain informative textual units that are relevant to the user; (2) redundancy: summaries should not contain multiple textual units that convey the same information; and (3) length: summary is bounded in length. The approach proposed in this paper is applicable to both tasks: single- and multi-document summarization. In both tasks, documents are split into sentences in preprocessing. We select some salient sentences from document(s) to generate a summary. Finally, the summary is generated by threading all the selected sentences in the order that they appear in the original document(s). We implemented our model on multi-document summarization task. When comparing our methods to several existing summarization methods on an open DUC2005 and DUC2007 data sets, we found that our method improves the summarization results significantly. This is because, first, when extracting summary sentences, this method not only focuses on the relevance scores of sentences to the whole sentence collection, but also the topic representative of sentences. Second, when generating a summary, this method also deals with the problem of repetition of information. The methods were evaluated using ROUGE-1, ROUGE-2 and ROUGE-SU4 metrics. In this paper, we also demonstrate that the summarization result depends on the similarity measure. Results of the experiment showed that combination of symmetric and asymmetric similarity measures yields better result than their use separately.  相似文献   
112.
In this paper, a model taking into account the effects of carrier loss mechanisms has been developed. The model simulates the photovoltaic properties of the graphene/n-type silicon Schottky barrier solar cells (G/n-Si_SBSC), and it can reproduce the experimentally determined parameters of the G/n-Si_SBSC. To overcome the low efficiencies of G/n-Si_SBSC, their performances have been optimized by modifying the work function of graphene and Si properties, accounted for variation of its thickness and doping level. The obtained results show that the work function of graphene has the major impact on the device performance. Also, the temperature dependence of the G/n-Si_SBSC performance is investigated.  相似文献   
113.
114.
This work is devoted to the stress–strain state of isotropic double curved shell with defect system. The construction is weakened by two non-through thickness (internal) cracks of different length and by a circular hole located between cracks. In this study we use the line-spring model. Within the framework of this model cracks are modeled as mathematical cuts of shell’s middle surface. This leads to a two-dimensional problem. The problem is reduced to a system of eight boundary integral equations. To ensure the uniqueness of solution an additional equation is added. In the numerical solution of the problem special quadrature formulas for singular integrals of Cauchy type and the finite difference method are applied. The influence of defects on each other for double curved shell has been investigated. The given theoretical results can be used for the calculation of structural elements with holes, cracks on the strength and fracture toughness in various branches of engineering.  相似文献   
115.
A method for simultaneous measurement of the thickness and density for Glass Fiber-Reinforced Polymer (GFRP) laminate plates with ultrasonic waves in C-Scan mode is presented in the form of maps. The method uses three different signals in immersion pulse-echo C-Scan mode. The maps obtained based on the density show the heterogeneity of the material at high resolution at the pixel level (1 × 1 mm2) and therefore they represent an efficient tool to assess and evaluate the damage of the composite structures after manufacturing and after an applied mechanical loading.  相似文献   
116.
117.
ARIMA is seldom used in supply chains in practice. There are several reasons, not the least of which is the small sample size of available data, which restricts the usage of the model. Keeping in mind this restriction, we discuss in this paper a state-space ARIMA model with a single source of error and show how it can be efficiently used in the supply-chain context, especially in cases when only two seasonal cycles of data are available. We propose a new order selection algorithm for the model and compare its performance with the conventional ARIMA on real data. We show that the proposed model performs well in terms of both accuracy and computational time in comparison with other ARIMA implementations, which makes it efficient in the supply-chain context.  相似文献   
118.
The environmental performance of 316L grade stainless steel, in the form of tensile specimens containing a single corrosion pit with various aspect ratios, under cyclic loading in aerated chloride solutions is investigated in this study. Results from environmental tests were compared and contrasted with those obtained using finite element analysis (FEA). Fractography of the failed specimens obtained from experiments revealed that fatigue crack initiation took place at the base of the shallow pit. The crack initiation shifted towards the shoulder and the mouth of the pit for pits of increasing depth. This process is well predicted by FEA, as the strain contour maps show that strain is the highest around the centric strip of the pit. However, for shallow pits, local strain is uniformly distributed around that strip but begins to concentrate more towards the shoulder and the mouth region for increasingly deep pits.  相似文献   
119.
为解决共享交通下的共乘用户群体发现效率低、准确率不高问题,依据R-树原理建立GeoOD-Tree索引,并在此基础上提出以最大化共乘率为目标的群体发现策略。首先,对原始时空轨迹数据进行特征提取与标定处理,挖掘有效出行起讫点(OD)轨迹;其次,针对用户起讫点轨迹的特征,建立GeoOD-Tree索引进行有效的存储管理;最后,给出以最大化共乘行程为目标的群体发现模型,并运用K最近邻(KNN)查询对搜索空间剪枝压缩,提高群体发现效率。采用西安市近12000辆出租车营运轨迹数据,选取动态时间规整(DTW)等典型算法与所提算法在查询效率与准确率上进行性能对比分析。与DTW算法相比,所提算法的准确率提高了10.12%,查询效率提高了约15倍。实验结果表明提出的群体发现策略能有效提高共乘用户群体发现的准确率和效率,可有效提升共乘出行方式的出行率。  相似文献   
120.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号