首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   33261篇
  免费   4775篇
  国内免费   3102篇
电工技术   1055篇
技术理论   3篇
综合类   3091篇
化学工业   1010篇
金属工艺   701篇
机械仪表   1552篇
建筑科学   2348篇
矿业工程   11798篇
能源动力   766篇
轻工业   403篇
水利工程   888篇
石油天然气   454篇
武器工业   101篇
无线电   1802篇
一般工业技术   1098篇
冶金工业   2620篇
原子能技术   51篇
自动化技术   11397篇
  2024年   98篇
  2023年   354篇
  2022年   875篇
  2021年   1195篇
  2020年   1428篇
  2019年   907篇
  2018年   894篇
  2017年   979篇
  2016年   1129篇
  2015年   1300篇
  2014年   2255篇
  2013年   1898篇
  2012年   3021篇
  2011年   2876篇
  2010年   2281篇
  2009年   2424篇
  2008年   2504篇
  2007年   2622篇
  2006年   2308篇
  2005年   1972篇
  2004年   1674篇
  2003年   1515篇
  2002年   1070篇
  2001年   826篇
  2000年   668篇
  1999年   484篇
  1998年   345篇
  1997年   249篇
  1996年   212篇
  1995年   189篇
  1994年   158篇
  1993年   117篇
  1992年   75篇
  1991年   69篇
  1990年   32篇
  1989年   34篇
  1988年   26篇
  1987年   18篇
  1986年   12篇
  1985年   2篇
  1984年   10篇
  1983年   6篇
  1982年   6篇
  1981年   2篇
  1979年   2篇
  1977年   2篇
  1966年   2篇
  1959年   2篇
  1955年   1篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
文猛  张释如 《包装工程》2022,43(21):162-168
目的 为了解决目前三维数据隐藏算法不能兼顾无失真和盲提取的问题,提出一种新的完全无失真的三维网格模型数据隐藏盲算法。方法 首先使用混沌逻辑映射选择嵌入与提取模式,保证数据的安全性。然后利用面元素重排,完全不会造成三维模型失真的性质,通过不同嵌入模式规则对三角面元素进行重排,以嵌入秘密数据。接收端则可根据相应的提取模式规则提取秘密数据。结果 仿真结果与分析表明,该算法不会对三维模型造成任何失真,嵌入容量为每顶点2比特,且能抵抗仿射变换攻击、噪声攻击和平滑攻击等。结论 这种三维数据隐藏盲算法无失真,容量大、安全性高、鲁棒性强,适用于三维载体不容修改的情形,如军事、医学、秘密通信和版权保护等。  相似文献   
2.
本文分析了乌兰矿投产前期采矿现状及存在的主要问题,针对该矿所处蒙古国经济落后、投资风险大的现实状况,为避免生产中断、规避投资风险,早日回收前期投资考虑,采取了双斜坡道开拓、全尾胶结充填、高端壁空场嗣后充填采矿、多中段组合式连续开采等系列技术应对方案。大大降低了一次性投资规模及投资风险,前期投资得以快速回笼的同时,矿山产能也充分释放,确保了矿山的持续稳定,取得了较好的经济和社会效益。为海外地下近地表矿体开采矿山规避投资风险提供了很好的技术方案借鉴。  相似文献   
3.
High-efficiency filtration in residential forced-air heating, ventilation, and air conditioning (HVAC) systems protects equipment and can reduce exposure to particulate matter. Laboratory tests provide a measure of the nominal efficiency, but they may not accurately reflect the in situ efficiency of the filters because of variations in system conditions and changes in filter performance over time. The primary focus of this paper is to evaluate the effective filtration efficiency, which is inclusive of any loading and system impacts, in 21 occupied residential homes through in-duct concentration measurements. We considered the role of filter media by testing both electret and non-electret media, as well as the role of loading by considering new and used filters. The results show that filters with higher nominal efficiency generally had higher effective filtration efficiency in the same home. In terms of performance change, there is no significant difference in efficiency between initial and 3-month non-electret filters, but the efficiency of electret filters generally decreased over time. However, both nominal efficiency and performance change were vastly overshadowed by the wide variety in loading and system conditions across homes, making it hard to predict filter efficiency in a given home without in situ measurements.  相似文献   
4.
分析了排风扇前盖塑件的工艺特点,介绍了排风扇前盖注射成型模结构及模具的工作过程。  相似文献   
5.
Process mining techniques relate observed behavior (i.e., event logs) to modeled behavior (e.g., a BPMN model or a Petri net). Process models can be discovered from event logs and conformance checking techniques can be used to detect and diagnose differences between observed and modeled behavior. Existing process mining techniques can only uncover these differences, but the actual repair of the model is left to the user and is not supported. In this paper we investigate the problem of repairing a process model w.r.t. a log such that the resulting model can replay the log (i.e., conforms to it) and is as similar as possible to the original model. To solve the problem, we use an existing conformance checker that aligns the runs of the given process model to the traces in the log. Based on this information, we decompose the log into several sublogs of non-fitting subtraces. For each sublog, either a loop is discovered that can replay the sublog or a subprocess is derived that is then added to the original model at the appropriate location. The approach is implemented in the process mining toolkit ProM and has been validated on logs and models from several Dutch municipalities.  相似文献   
6.
Fault detection, isolation and optimal control have long been applied to industry. These techniques have proven various successful theoretical results and industrial applications. Fault diagnosis is considered as the merge of fault detection (that indicates if there is a fault) and fault isolation (that determines where the fault is), and it has important effects on the operation of complex dynamical systems specific to modern industry applications such as industrial electronics, business management systems, energy, and public sectors. Since the resources are always limited in real-world industrial applications, the solutions to optimally use them under various constraints are of high actuality. In this context, the optimal tuning of linear and nonlinear controllers is a systematic way to meet the performance specifications expressed as optimization problems that target the minimization of integral- or sum-type objective functions, where the tuning parameters of the controllers are the vector variables of the objective functions. The nature-inspired optimization algorithms give efficient solutions to such optimization problems. This paper presents an overview on recent developments in machine learning, data mining and evolving soft computing techniques for fault diagnosis and on nature-inspired optimal control. The generic theory is discussed along with illustrative industrial process applications that include a real liquid level control application, wind turbines and a nonlinear servo system. New research challenges with strong industrial impact are highlighted.  相似文献   
7.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors.  相似文献   
8.
Anup Bhat B  Harish SV  Geetha M 《ETRI Journal》2021,43(6):1024-1037
Mining high utility itemsets (HUIs) from transaction databases considers such factors as the unit profit and quantity of purchased items. Two-phase tree-based algorithms transform a database into compressed tree structures and generate candidate patterns through a recursive pattern-growth procedure. This procedure requires a lot of memory and time to construct conditional pattern trees. To address this issue, this study employs two compressed tree structures, namely, Utility Count Tree and String Utility Tree, to enumerate valid patterns and thus promote fast utility computation. Furthermore, the study presents an algorithm called single-phase utility computation (SPUC) that leverages these two tree structures to mine HUIs in a single phase by incorporating novel pruning strategies. Experiments conducted on both real and synthetic datasets demonstrate the superior performance of SPUC compared with IHUP, UP-Growth, and UP-Growth+ algorithms.  相似文献   
9.
The paper focuses on the adaptive relational association rule mining problem. Relational association rules represent a particular type of association rules which describe frequent relations that occur between the features characterizing the instances within a data set. We aim at re-mining an object set, previously mined, when the feature set characterizing the objects increases. An adaptive relational association rule method, based on the discovery of interesting relational association rules, is proposed. This method, called ARARM (Adaptive Relational Association Rule Mining) adapts the set of rules that was established by mining the data before the feature set changed, preserving the completeness. We aim to reach the result more efficiently than running the mining algorithm again from scratch on the feature-extended object set. Experiments testing the method's performance on several case studies are also reported. The obtained results highlight the efficiency of the ARARM method and confirm the potential of our proposal.  相似文献   
10.
The use of geothermal energy and its associated technologies has been increasing worldwide. However, there has been little paradigmatic research conducted in this area. This paper proposes a systematic methodology to research the development trends for the sustainable development of geothermal energy. A novel data analysis system was created to research the geothermal energy utilization trends, and a technological paradigm theory was adopted to explain the technological changes. A diffusion velocity model was used to simulate and forecast the geothermal power generation development in the diffusion phase. Simulation results showed that the development of installed capacity for geothermal generation had a strong inertia force along with the S-curve. Power generation from geothermal power sources reached a peak in 2008 and is estimated to be saturated by 2030. Geothermal energy technologies in hybrid power systems based on other renewable energy sources look to be more promising in the future.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号