首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5246篇
  免费   463篇
  国内免费   310篇
电工技术   90篇
综合类   403篇
化学工业   190篇
金属工艺   54篇
机械仪表   125篇
建筑科学   733篇
矿业工程   1523篇
能源动力   102篇
轻工业   58篇
水利工程   234篇
石油天然气   316篇
武器工业   9篇
无线电   261篇
一般工业技术   109篇
冶金工业   179篇
原子能技术   26篇
自动化技术   1607篇
  2024年   11篇
  2023年   69篇
  2022年   116篇
  2021年   117篇
  2020年   175篇
  2019年   131篇
  2018年   130篇
  2017年   131篇
  2016年   163篇
  2015年   163篇
  2014年   234篇
  2013年   240篇
  2012年   307篇
  2011年   423篇
  2010年   329篇
  2009年   307篇
  2008年   281篇
  2007年   365篇
  2006年   446篇
  2005年   345篇
  2004年   309篇
  2003年   300篇
  2002年   166篇
  2001年   116篇
  2000年   102篇
  1999年   132篇
  1998年   69篇
  1997年   47篇
  1996年   74篇
  1995年   35篇
  1994年   40篇
  1993年   49篇
  1992年   30篇
  1991年   13篇
  1990年   12篇
  1989年   4篇
  1988年   3篇
  1987年   4篇
  1986年   7篇
  1985年   5篇
  1984年   2篇
  1983年   4篇
  1981年   4篇
  1980年   2篇
  1979年   1篇
  1977年   2篇
  1976年   4篇
排序方式: 共有6019条查询结果,搜索用时 8 毫秒
81.
随着数据挖掘技术的不断发展,Web挖掘技术已经在社会上得到了广泛运用,但将此技术运用到高校德育管理决策中还比较少.基于远程教育技术和传统的德育管理手段,运用Web挖掘技术动态追踪学生历程信息,利用关联规则算法,提出高校德育管理决策系统的结构模型及其解决方案.  相似文献   
82.
针对电子商务数据异构的特点,研究用本体技术实现异构电子商务的集成平台.通过不同电子商务本体特征的挖掘和抽取,提出异构电子商务集成平台的本体模型构建方法.实现电子商务本体协同的"即插即用"互操作集成模型.  相似文献   
83.
隐私保护数据挖掘(PPDM)利用匿名化等方法使数据所有者在不泄露隐私信息的前提下,安全发布在数据挖掘中有效可用的数据集。k-匿名算法作为PPDM研究使用最广泛的算法之一,具有计算开销低、数据形变小、能抵御链接攻击等优点,但是在一些k-匿名算法研究中使用的数据可用性评估模型的权重设置不合理,导致算法选择的最优匿名数据集在后续的分类问题中分类准确率较低。提出一种使用互信息计算权重的互信息损失(MI Loss)评估模型。互信息反映变量间的关联关系,MI Loss评估模型根据准标识符和标签之间的互信息计算权重,并通过Loss公式得到各个准标识符的信息损失,将加权后的准标识符信息损失的和作为数据集的信息损失,以弥补评估模型的缺陷。实验结果证明,运用MI Loss评估模型指导k-匿名算法能够明显降低匿名数据集在后续分类中的可用性丢失,相较于Loss模型和Entropy Loss模型,该模型分类准确率提升了0.73%~3.00%。  相似文献   
84.
Selecting the incorrect control during the operation of underground bolting and drilling equipment causes serious injuries. Shape coding and the layout of dual control banks are two aspects of control design which require further examination. The aims of this research were: (i) to determine whether arbitrary shape coding was effective in reducing selection error rates in a virtual analogy of roof-bolting; and (ii) to determine whether any advantages exist for mirror or place layouts for dual control situations in this situation. Two experiments were conducted to address these questions. No benefits of arbitrary shape coding were evident while control location remained constant. When control location was altered, shape coding did provide a significant reduction in selection error rate. No differences between mirror or place arrangements were detected and this question remains open.  相似文献   
85.
The amount of sleep obtained between shifts is influenced by numerous factors including the length of work and rest periods, the timing of the rest period relative to the endogenous circadian cycle and personal choices about the use of non-work time. The current study utilised a real-world live-in mining environment to examine the amount of sleep obtained when access to normal domestic, family and social activities was restricted. Participants were 29 mining operators (26 male, average age 37.4 ± 6.8 years) who recorded sleep, work and fatigue information and wore an activity monitor for a cycle of seven day shifts and seven night shifts (both 12 h) followed by either seven or fourteen days off. During the two weeks of work participants lived on-site. Total sleep time was significantly less (p < 0.01) while on-site on both day (6.1 ± 1.0 h) and night shifts (5.7 ± 1.5 h) than days off (7.4 ± 1.4 h). Further, night shift sleep was significantly shorter than day-shift sleep (p < 0.01). Assessment of subjective fatigue ratings showed that the sleep associated with both days off and night shifts had a greater recovery value than sleep associated with day shifts (p < 0.01). While on-site, participants obtained only 6 h of sleep indicating that the absence of competing domestic, family and social activities did not convert to more sleep. Factors including shift start times and circadian influences appear to have been more important.  相似文献   
86.
3G用户在WLANs间的快速认证方法   总被引:1,自引:1,他引:0       下载免费PDF全文
王赜  刘文菊  柯永振 《计算机工程》2010,36(10):170-172
EAP-AKA协议可以实现用户和3G网络的双向认证,但缺乏对无线局域网(WLAN)接入网络的认证和用户主密钥的更新机制,并且3G用户在WLAN间漫游时代价较高。针对上述问题,利用身份加密技术和门票技术改进EAP-AKA协议,设计无需3G网络参与的WLAN间快速漫游协议,实现对WLAN接入网络的认证和主密钥更新。  相似文献   
87.
88.
Most work on pattern mining focuses on simple data structures such as itemsets and sequences of itemsets. However, a lot of recent applications dealing with complex data like chemical compounds, protein structures, XML and Web log databases and social networks, require much more sophisticated data structures such as trees and graphs. In these contexts, interesting patterns involve not only frequent object values (labels) appearing in the graphs (or trees) but also frequent specific topologies found in these structures. Recently, several techniques for tree and graph mining have been proposed in the literature. In this paper, we focus on constraint-based tree pattern mining. We propose to use tree automata as a mechanism to specify user constraints over tree patterns. We present the algorithm CoBMiner which allows user constraints specified by a tree automata to be incorporated in the mining process. An extensive set of experiments executed over synthetic and real data (XML documents and Web usage logs) allows us to conclude that incorporating constraints during the mining process is far more effective than filtering the interesting patterns after the mining process.  相似文献   
89.
CAN总线网络层协议栈开发测试   总被引:1,自引:0,他引:1       下载免费PDF全文
韩鑫  鲍可进 《计算机工程》2011,37(15):232-234,237
对ISO15765协议进行分析,依据协议在基于MC9S12DP512芯片的整车控制器上完成CAN网络层协议栈的开发,给出开发过程。在VC环境下开发测试程序,对协议栈进行测试。结果表明,实现的CAN网络层协议栈符合ISO15765协议的规定,可满足车辆故障诊断系统等具体应用中系统对CAN网络层通信的需求。  相似文献   
90.
We use the cylindrical algebraic decomposition algorithms implemented in Mathematica to produce procedures to analytically compute integrals over polynomially defined regions and their boundaries in two and three dimensions. Using these results, we can implement the divergence theorem in three dimensions or the Green's theorems in two dimensions. These theorems are of central importance in the applications of multidimensional integration. They also provide a strong correctness test for the implementation of our results in a computer algebra system. The resulting software can solve many of the two and some of the three dimensional integration problems in vector calculus textbooks. The three dimensional results are being extended. The results in this paper are being included in an automated student assistant for vector calculus.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号