首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   62835篇
  免费   8227篇
  国内免费   6424篇
电工技术   5622篇
技术理论   9篇
综合类   6847篇
化学工业   1769篇
金属工艺   726篇
机械仪表   3730篇
建筑科学   2511篇
矿业工程   1609篇
能源动力   853篇
轻工业   981篇
水利工程   1458篇
石油天然气   3066篇
武器工业   833篇
无线电   9446篇
一般工业技术   3211篇
冶金工业   1280篇
原子能技术   828篇
自动化技术   32707篇
  2024年   337篇
  2023年   936篇
  2022年   1889篇
  2021年   2324篇
  2020年   2460篇
  2019年   1961篇
  2018年   1781篇
  2017年   2156篇
  2016年   2413篇
  2015年   2738篇
  2014年   4301篇
  2013年   3955篇
  2012年   4589篇
  2011年   4941篇
  2010年   3833篇
  2009年   3823篇
  2008年   4294篇
  2007年   4844篇
  2006年   4119篇
  2005年   3690篇
  2004年   3171篇
  2003年   2636篇
  2002年   2044篇
  2001年   1540篇
  2000年   1324篇
  1999年   964篇
  1998年   745篇
  1997年   626篇
  1996年   518篇
  1995年   469篇
  1994年   370篇
  1993年   274篇
  1992年   192篇
  1991年   192篇
  1990年   146篇
  1989年   116篇
  1988年   94篇
  1987年   72篇
  1986年   64篇
  1985年   90篇
  1984年   64篇
  1983年   76篇
  1982年   65篇
  1981年   38篇
  1980年   23篇
  1979年   38篇
  1978年   13篇
  1977年   22篇
  1976年   14篇
  1964年   11篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
11.
探索采用数据可视化技术分析儿童用品TBT通报数据,以可视化图形图像呈现通报热点并揭示趋势信息,提出对策与建议,助力为儿童用品产业升级、TBT预警数据分析和信息传播工作提供新思路,提高中小企业的国外市场准入机会。  相似文献   
12.
本文以云杉八齿小蠹Ips typographus Linnaeus为例,经标本选取,观察虫体整体形态,绘制整体结构草图,电子显微镜观察局部、得到局部数字图像,分别建立虫体每一部分的高精度细节。把模型每部分拼装在一起组成整体模型,构建出了云杉八齿小蠹三维虚拟昆虫数字化模型。  相似文献   
13.
This paper analyzes the problems existing in the teaching of data structure course, and puts forward the reform from the as- pects of strengthening basic programming, visualized explanation of abstract theory, combination of C++, Java programming, ratio- nal use of online platform, and stratification of exercises, aiming at improving students' practical ability, learning interest and self- confidence.  相似文献   
14.
In the first critical assessment of knowledge economy dynamic paths in Africa and the Middle East, but for a few exceptions, we find overwhelming support for diminishing cross-country disparities in knowledge-based economy dimensions. The paper employs all the four components of the World Bank's Knowledge Economy Index (KEI): economic incentives, innovation, education, and information infrastructure. The main finding suggests that sub-Saharan African (SSA) and the Middle East and North African (MENA) countries with low levels of KE dynamics and catching-up their counterparts of higher KE levels. We provide the speeds of integration and time necessary to achieve full (100%) integration. Policy implications are also discussed.  相似文献   
15.
16.
17.
18.
Process object is the instance of process. Vertexes and edges are in the graph of process object. There are different types of the object itself and the associations between object. For the large-scale data, there are many changes reflected. Recently, how to find appropriate real-time data for process object becomes a hot research topic. Data sampling is a kind of finding c hanges o f p rocess o bjects. There i s r equirements f or s ampling to be adaptive to underlying distribution of data stream. In this paper, we have proposed a adaptive data sampling mechanism to find a ppropriate d ata t o m odeling. F irst o f all, we use concept drift to make the partition of the life cycle of process object. Then, entity community detection is proposed to find changes. Finally, we propose stream-based real-time optimization of data sampling. Contributions of this paper are concept drift, community detection, and stream-based real-time computing. Experiments show the effectiveness and feasibility of our proposed adaptive data sampling mechanism for process object.  相似文献   
19.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors.  相似文献   
20.
Electromagnetic signal emitted by satellite communication (satcom) transmitters are used to identify specific individual uplink satcom terminals sharing the common transponder in real environment, which is known as specific emitter identification (SEI) that allows for early indications and warning (I&W) of the targets carrying satcom furnishment and furthermore the real time electromagnetic situation awareness in military operations. In this paper, the authors are the first to propose the identification of specific transmitters of satcom by using probabilistic neural networks (PNN) to reach the goal of target recognition. We have been devoted to the examination by exploring the feasibility of utilizing the Hilbert transform to signal preprocessing, applying the discrete wavelet transform to feature extraction, and employing the PNN to perform the classification of stationary signals. There are a total of 1000 sampling time series with binary phase shift keying (BPSK) modulation originated by five types of satcom transmitters in the test. The established PNNs classifier implements the data testing and finally yields satisfactory accuracy at 8 dB(±1 dB) carrier to noise ratio, which indicates the feasibility of our method, and even the keen insight of its application in military.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号