首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   77124篇
  免费   9153篇
  国内免费   6557篇
工业技术   92834篇
  2024年   205篇
  2023年   967篇
  2022年   2004篇
  2021年   2629篇
  2020年   2726篇
  2019年   2151篇
  2018年   1950篇
  2017年   2424篇
  2016年   2716篇
  2015年   3118篇
  2014年   5224篇
  2013年   4890篇
  2012年   5733篇
  2011年   6019篇
  2010年   4579篇
  2009年   4568篇
  2008年   4904篇
  2007年   5660篇
  2006年   4965篇
  2005年   4396篇
  2004年   3867篇
  2003年   3287篇
  2002年   2681篇
  2001年   2161篇
  2000年   1778篇
  1999年   1371篇
  1998年   1025篇
  1997年   867篇
  1996年   727篇
  1995年   660篇
  1994年   511篇
  1993年   379篇
  1992年   266篇
  1991年   263篇
  1990年   184篇
  1989年   164篇
  1988年   114篇
  1987年   90篇
  1986年   71篇
  1985年   86篇
  1984年   63篇
  1983年   78篇
  1982年   66篇
  1981年   45篇
  1980年   23篇
  1979年   40篇
  1978年   12篇
  1977年   20篇
  1976年   14篇
  1959年   8篇
排序方式: 共有10000条查询结果,搜索用时 361 毫秒
31.
32.
33.
To quantify the evacuation process, evacuation practitioners use engineering egress data describing the occupant movement characteristics. These data are typically based to young and fit populations. However, the movement abilities of occupants who might be involved in evacuations are becoming more variable—with the building populations of today typically including increasing numbers of individuals: with impairments or who are otherwise elderly or generally less mobile. Thus, there will be an increasing proportion of building occupants with reduced ability to egress. For safe evacuation, there is therefore a need to provide valid engineering egress data considering pedestrians with disabilities. Gwynne and Boyce recently compiled a series of data sets related to the evacuation process to support practitioner activities in the chapter Engineering Data in the SFPE Handbook of Fire Protection Engineering. This paper supplements these data sets by providing information on and presenting data obtained from additional research related to the premovement and horizontal movement of participants with physical‐, cognitive‐, or age‐related disabilities. The aim is to provide an overview of currently available data sets related to, and key factors affecting the egress performance of, mixed ability populations which could be used to guide fire safety engineering decisions in the context of building design.  相似文献   
34.
针对高可靠度机载多余度EWIS各组成部分寿命服从指数分布但参数未知的情况,提出采用无失效数据可靠度分析方法评估EWIS的可靠度水平。通过Monte-Carlo仿真方法对连接形式为“先并联、后串联”EWIS各组成部分寿命进行抽样,利用“最小最大值”方法获得系统寿命的抽样值,用概率纸检验法初步判断EWIS寿命是否服从威布尔分布,再用Pearson拟合优度检验法判断EWIS寿命是否服从威布尔分布。结合无故障飞行时间的样本值与EWIS寿命服从威布尔分布的假设,采用无失效数据分析方法评估EWIS的可靠度水平。研究方法对机载多余度EWIS无失效数据可靠度分析有一定的贡献。  相似文献   
35.
Process object is the instance of process. Vertexes and edges are in the graph of process object. There are different types of the object itself and the associations between object. For the large-scale data, there are many changes reflected. Recently, how to find appropriate real-time data for process object becomes a hot research topic. Data sampling is a kind of finding c hanges o f p rocess o bjects. There i s r equirements f or s ampling to be adaptive to underlying distribution of data stream. In this paper, we have proposed a adaptive data sampling mechanism to find a ppropriate d ata t o m odeling. F irst o f all, we use concept drift to make the partition of the life cycle of process object. Then, entity community detection is proposed to find changes. Finally, we propose stream-based real-time optimization of data sampling. Contributions of this paper are concept drift, community detection, and stream-based real-time computing. Experiments show the effectiveness and feasibility of our proposed adaptive data sampling mechanism for process object.  相似文献   
36.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors.  相似文献   
37.
For rechargeable wireless sensor networks, limited energy storage capacity, dynamic energy supply, low and dynamic duty cycles cause that it is unpractical to maintain a fixed routing path for packets delivery permanently from a source to destination in a distributed scenario. Therefore, before data delivery, a sensor has to update its waking schedule continuously and share them to its neighbors, which lead to high energy expenditure for reestablishing path links frequently and low efficiency of energy utilization for collecting packets. In this work, we propose the maximum data generation rate routing protocol based on data flow controlling technology. For a sensor, it does not share its waking schedule to its neighbors and cache any waking schedules of other sensors. Hence, the energy consumption for time synchronization, location information and waking schedule shared will be reduced significantly. The saving energy can be used for improving data collection rate. Simulation shows our scheme is efficient to improve packets generation rate in rechargeable wireless sensor networks.  相似文献   
38.
Any knowledge extraction relies (possibly implicitly) on a hypothesis about the modelled-data dependence. The extracted knowledge ultimately serves to a decision-making (DM). DM always faces uncertainty and this makes probabilistic modelling adequate. The inspected black-box modeling deals with “universal” approximators of the relevant probabilistic model. Finite mixtures with components in the exponential family are often exploited. Their attractiveness stems from their flexibility, the cluster interpretability of components and the existence of algorithms for processing high-dimensional data streams. They are even used in dynamic cases with mutually dependent data records while regression and auto-regression mixture components serve to the dependence modeling. These dynamic models, however, mostly assume data-independent component weights, that is, memoryless transitions between dynamic mixture components. Such mixtures are not universal approximators of dynamic probabilistic models. Formally, this follows from the fact that the set of finite probabilistic mixtures is not closed with respect to the conditioning, which is the key estimation and predictive operation. The paper overcomes this drawback by using ratios of finite mixtures as universally approximating dynamic parametric models. The paper motivates them, elaborates their approximate Bayesian recursive estimation and reveals their application potential.  相似文献   
39.
Anup Bhat B  Harish SV  Geetha M 《ETRI Journal》2021,43(6):1024-1037
Mining high utility itemsets (HUIs) from transaction databases considers such factors as the unit profit and quantity of purchased items. Two-phase tree-based algorithms transform a database into compressed tree structures and generate candidate patterns through a recursive pattern-growth procedure. This procedure requires a lot of memory and time to construct conditional pattern trees. To address this issue, this study employs two compressed tree structures, namely, Utility Count Tree and String Utility Tree, to enumerate valid patterns and thus promote fast utility computation. Furthermore, the study presents an algorithm called single-phase utility computation (SPUC) that leverages these two tree structures to mine HUIs in a single phase by incorporating novel pruning strategies. Experiments conducted on both real and synthetic datasets demonstrate the superior performance of SPUC compared with IHUP, UP-Growth, and UP-Growth+ algorithms.  相似文献   
40.
Bismuth doped La2-xBixNiO4+δ (x = 0, 0.02 and 0.04) oxides are investigated as SOFC cathodes. The effects of Bi doping on the phase structure, thermal expansion, electrical conduction behavior as well as electrochemical performance are studied. All the samples exist as a tetragonal Ruddlesden-Popper structure. Bi-doped LBNO-0.02 and LBNO-0.04 have good chemical and thermal compatibility with LSGM electrolyte. The average TEC over 20–900°С was 13.4 × 10?6 and 14.2 × 10?6 K?1 for LBNO-0.02 and LBNO-0.04, respectively. The electrical conductivity was decreasing with the rise of Bi doping content. EIS measurement indicates Bi doping can decrease the ASR values. At 750 °C, the obtained ASR for LBNO-0.04 is 0.18 Ωcm2, which is 56% lower than that of the sample without Bi doping, suggesting Bi doping is beneficial to the electrochemical catalytic activity of LBNO cathodes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号