首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20925篇
  免费   3243篇
  国内免费   2207篇
电工技术   439篇
技术理论   2篇
综合类   1814篇
化学工业   518篇
金属工艺   140篇
机械仪表   382篇
建筑科学   1325篇
矿业工程   9417篇
能源动力   395篇
轻工业   161篇
水利工程   216篇
石油天然气   102篇
武器工业   42篇
无线电   922篇
一般工业技术   495篇
冶金工业   1455篇
原子能技术   22篇
自动化技术   8528篇
  2024年   60篇
  2023年   211篇
  2022年   544篇
  2021年   785篇
  2020年   952篇
  2019年   625篇
  2018年   627篇
  2017年   668篇
  2016年   769篇
  2015年   836篇
  2014年   1457篇
  2013年   1216篇
  2012年   1906篇
  2011年   1780篇
  2010年   1380篇
  2009年   1536篇
  2008年   1652篇
  2007年   1717篇
  2006年   1507篇
  2005年   1292篇
  2004年   1111篇
  2003年   1035篇
  2002年   647篇
  2001年   469篇
  2000年   411篇
  1999年   280篇
  1998年   209篇
  1997年   135篇
  1996年   119篇
  1995年   107篇
  1994年   95篇
  1993年   72篇
  1992年   53篇
  1991年   45篇
  1990年   15篇
  1989年   13篇
  1988年   16篇
  1987年   14篇
  1986年   5篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1979年   1篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
本文分析了乌兰矿投产前期采矿现状及存在的主要问题,针对该矿所处蒙古国经济落后、投资风险大的现实状况,为避免生产中断、规避投资风险,早日回收前期投资考虑,采取了双斜坡道开拓、全尾胶结充填、高端壁空场嗣后充填采矿、多中段组合式连续开采等系列技术应对方案。大大降低了一次性投资规模及投资风险,前期投资得以快速回笼的同时,矿山产能也充分释放,确保了矿山的持续稳定,取得了较好的经济和社会效益。为海外地下近地表矿体开采矿山规避投资风险提供了很好的技术方案借鉴。  相似文献   
2.
Process mining techniques relate observed behavior (i.e., event logs) to modeled behavior (e.g., a BPMN model or a Petri net). Process models can be discovered from event logs and conformance checking techniques can be used to detect and diagnose differences between observed and modeled behavior. Existing process mining techniques can only uncover these differences, but the actual repair of the model is left to the user and is not supported. In this paper we investigate the problem of repairing a process model w.r.t. a log such that the resulting model can replay the log (i.e., conforms to it) and is as similar as possible to the original model. To solve the problem, we use an existing conformance checker that aligns the runs of the given process model to the traces in the log. Based on this information, we decompose the log into several sublogs of non-fitting subtraces. For each sublog, either a loop is discovered that can replay the sublog or a subprocess is derived that is then added to the original model at the appropriate location. The approach is implemented in the process mining toolkit ProM and has been validated on logs and models from several Dutch municipalities.  相似文献   
3.
Fault detection, isolation and optimal control have long been applied to industry. These techniques have proven various successful theoretical results and industrial applications. Fault diagnosis is considered as the merge of fault detection (that indicates if there is a fault) and fault isolation (that determines where the fault is), and it has important effects on the operation of complex dynamical systems specific to modern industry applications such as industrial electronics, business management systems, energy, and public sectors. Since the resources are always limited in real-world industrial applications, the solutions to optimally use them under various constraints are of high actuality. In this context, the optimal tuning of linear and nonlinear controllers is a systematic way to meet the performance specifications expressed as optimization problems that target the minimization of integral- or sum-type objective functions, where the tuning parameters of the controllers are the vector variables of the objective functions. The nature-inspired optimization algorithms give efficient solutions to such optimization problems. This paper presents an overview on recent developments in machine learning, data mining and evolving soft computing techniques for fault diagnosis and on nature-inspired optimal control. The generic theory is discussed along with illustrative industrial process applications that include a real liquid level control application, wind turbines and a nonlinear servo system. New research challenges with strong industrial impact are highlighted.  相似文献   
4.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors.  相似文献   
5.
Anup Bhat B  Harish SV  Geetha M 《ETRI Journal》2021,43(6):1024-1037
Mining high utility itemsets (HUIs) from transaction databases considers such factors as the unit profit and quantity of purchased items. Two-phase tree-based algorithms transform a database into compressed tree structures and generate candidate patterns through a recursive pattern-growth procedure. This procedure requires a lot of memory and time to construct conditional pattern trees. To address this issue, this study employs two compressed tree structures, namely, Utility Count Tree and String Utility Tree, to enumerate valid patterns and thus promote fast utility computation. Furthermore, the study presents an algorithm called single-phase utility computation (SPUC) that leverages these two tree structures to mine HUIs in a single phase by incorporating novel pruning strategies. Experiments conducted on both real and synthetic datasets demonstrate the superior performance of SPUC compared with IHUP, UP-Growth, and UP-Growth+ algorithms.  相似文献   
6.
The paper focuses on the adaptive relational association rule mining problem. Relational association rules represent a particular type of association rules which describe frequent relations that occur between the features characterizing the instances within a data set. We aim at re-mining an object set, previously mined, when the feature set characterizing the objects increases. An adaptive relational association rule method, based on the discovery of interesting relational association rules, is proposed. This method, called ARARM (Adaptive Relational Association Rule Mining) adapts the set of rules that was established by mining the data before the feature set changed, preserving the completeness. We aim to reach the result more efficiently than running the mining algorithm again from scratch on the feature-extended object set. Experiments testing the method's performance on several case studies are also reported. The obtained results highlight the efficiency of the ARARM method and confirm the potential of our proposal.  相似文献   
7.
The use of geothermal energy and its associated technologies has been increasing worldwide. However, there has been little paradigmatic research conducted in this area. This paper proposes a systematic methodology to research the development trends for the sustainable development of geothermal energy. A novel data analysis system was created to research the geothermal energy utilization trends, and a technological paradigm theory was adopted to explain the technological changes. A diffusion velocity model was used to simulate and forecast the geothermal power generation development in the diffusion phase. Simulation results showed that the development of installed capacity for geothermal generation had a strong inertia force along with the S-curve. Power generation from geothermal power sources reached a peak in 2008 and is estimated to be saturated by 2030. Geothermal energy technologies in hybrid power systems based on other renewable energy sources look to be more promising in the future.  相似文献   
8.
针对新桥煤矿2301综采工作面机载喷雾系统喷雾效果差、喷雾耗水量大造成煤质含水量超标、喷嘴雾化程度不高、喷嘴容易发生堵塞等问题,提出了高压喷雾系统设计方案,选择了1.2mm的锥形引射喷嘴和1.5mm的扇形引射喷嘴。采用固定水泵供水方式,结合工作面实际情况,计算出喷雾总用水量247.5L/min,提高了喷雾射程,提升了除尘效果。  相似文献   
9.
10.
如何在海量不确定数据集中提高频繁模式挖掘性能是目前研究的热点.传统算法大多是以期望、概率或者权重等单一指标为数据项集支持度,在大数据背景下,同时考虑概率和权重支持度的算法难以兼顾其执行效率.为此,本文提出一种基于Spark的不确定数据集频繁模式挖掘算法(UWEFP),首先,为了同时兼顾数据项的概率和权重,计算一项集的最大概率权重值并进行剪枝;然后,为了减少对数据集的多次扫描,结合Spark框架的优点,设计了一种具有FP-tree特征的新颖的UWEFP-tree结构进行模式树的构建及挖掘;最后在Spark环境下,以UCI数据集进行实验验证.实验结果表明本文的方法在保证挖掘结果的同时,提高了效率.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号