首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   233138篇
  免费   18313篇
  国内免费   9545篇
工业技术   260996篇
  2024年   1049篇
  2023年   3749篇
  2022年   6800篇
  2021年   9261篇
  2020年   6768篇
  2019年   5790篇
  2018年   6324篇
  2017年   7130篇
  2016年   6472篇
  2015年   8453篇
  2014年   11028篇
  2013年   13958篇
  2012年   14167篇
  2011年   15950篇
  2010年   13600篇
  2009年   13232篇
  2008年   12606篇
  2007年   12122篇
  2006年   12359篇
  2005年   10872篇
  2004年   7488篇
  2003年   6744篇
  2002年   6339篇
  2001年   5669篇
  2000年   5516篇
  1999年   6099篇
  1998年   5598篇
  1997年   4598篇
  1996年   4154篇
  1995年   3469篇
  1994年   2888篇
  1993年   2299篇
  1992年   1774篇
  1991年   1312篇
  1990年   1051篇
  1989年   913篇
  1988年   713篇
  1987年   513篇
  1986年   402篇
  1985年   342篇
  1984年   220篇
  1983年   206篇
  1982年   168篇
  1981年   152篇
  1980年   137篇
  1979年   101篇
  1978年   63篇
  1977年   63篇
  1976年   77篇
  1975年   38篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
自2001年高校扩大招生以来,高校的学生也逐年增加,这就给高校的学籍管理带来了更加信繁杂的管理。这就为学校学籍管理系统提出了更加高的性能要求。所以,结合现有的技术,开发一款性能稳定、数据安全、高效的学籍管理系统就显的格外重要,本文结合我校的实际学籍管理工作,对学籍管理系统进行了分析,并提出了解决方案。  相似文献   
992.
Yao  Shuang  Chen  Nengcheng  Du  Wenying  Wang  Chao  Chen  Cuizhen 《Water Resources Management》2021,35(6):1991-2006

Recently many runoff models based on cellular automaton (CA) have been developed to simulate floods; however, the existing models cannot be readily applied to complex urban environments. This study proposes a novel rainfall-runoff model based on CA (RRCA) to simulate inundation. Its main contributions include a fine runoff generation process that considers 12 urban scenarios rather than a single land use type and the confluence process determined by the new transition rules considering water supply and demand (WS-WD transition rules). RRCA was compared with another CA based flood model (E2DCA). With the benchmark model, the results showed that there was good agreement, with an R-squared greater than 0.9, and that RRCA was more sensitive to waterlogging levels than E2DCA. Furthermore, the simulated vegetation interception, infiltration and drainage processes had varying degrees of impact on waterlogging. Corresponding measures can be taken in urban flood management according to the identification of areas experiencing drainage difficulties.

  相似文献   
993.
在我国的电力发展过程中,变压器对输电系统具有举足轻重的作用,因此及时发现变压器潜伏性故障对于变压器的正常运行显得尤为重要。变压器油色谱在线监测装置就可以及时发现变压器本体内部存在的潜在故障,对变压器的安全运行起到很好的监视作用。但前提是油色谱在线监测装置运行及数据正常,才能正确分析变压器存在的故障。对油色谱在线监测装置运行过程中出现的故障现象进行描述,针对出现的现象进行深入分析,有效避免主变事故的发生,最终保证变压器长期安全稳定运行。  相似文献   
994.
The corrosion behaviour of-SiC in V2O5 melt has been investigated at elevated temperatures. The corrosion products on the surface of the specimen are removed using HF. The morphologies are also examined. From the observations of bubble formation in the scale and the temperature dependence of the corrosion rate, a kinetic mechanism is proposed. Based on the consistency of the plotted data with the proposed equation and high values of surface reaction rate constant, a diffusion controlling process has been developed.  相似文献   
995.
我们用扫描电镜观察肠道杆菌种(Enterobacteriaceae)中的四种细菌,大肠埃希氏杆菌(Escherichiacoli),普通变形杆菌(Proteus vulgaris),伤寒沙门氏菌(Salmonella typhi)和福氏志贺氏菌(Shigella Flexneri)。未处理的菌落标本,菌落表面都可形成一层厚薄不同的表膜(Surface film)。四种细菌菌落的表膜,形状不一,千姿百态。适当处理后的菌落标本,则可显示菌体的本来面目。四种细菌菌体在菌落表面的分布和排列,也是各不相同,千差万别。本文根据扫描电镜的观察,对四种不同菌落进行了讨论。  相似文献   
996.
Yu  Zhi  Shi  Xiuzhi  Zhou  Jian  Rao  Dijun  Chen  Xin  Dong  Wenming  Miao  Xiaohu  Ipangelwa  Timo 《Engineering with Computers》2021,37(2):991-1006
Engineering with Computers - The indirect and accurate determination of blast-induced rock movement has important significance in the reduction of ore loss and dilution and in the protection of...  相似文献   
997.
Entity linking is a fundamental task in natural language processing. The task of entity linking with knowledge graphs aims at linking mentions in text to their correct entities in a knowledge graph like DBpedia or YAGO2. Most of existing methods rely on hand‐designed features to model the contexts of mentions and entities, which are sparse and hard to calibrate. In this paper, we present a neural model that first combines co‐attention mechanism with graph convolutional network for entity linking with knowledge graphs, which extracts features of mentions and entities from their contexts automatically. Specifically, given the context of a mention and one of its candidate entities' context, we introduce the co‐attention mechanism to learn the relatedness between the mention context and the candidate entity context, and build the mention representation in consideration of such relatedness. Moreover, we propose a context‐aware graph convolutional network for entity representation, which takes both the graph structure of the candidate entity and its relatedness with the mention context into consideration. Experimental results show that our model consistently outperforms the baseline methods on five widely used datasets.  相似文献   
998.
In this study, we investigated the validity of a stealth assessment of physics understanding in an educational game, as well as the effectiveness of different game-level delivery methods and various in-game supports on learning. Using a game called Physics Playground, we randomly assigned 263 ninth- to eleventh-grade students into four groups: adaptive, linear, free choice and no-treatment control. Each condition had access to the same in-game learning supports during gameplay. Results showed that: (a) the stealth assessment estimates of physics understanding were valid—significantly correlating with the external physics test scores; (b) there was no significant effect of game-level delivery method on students' learning; and (c) physics animations were the most effective (among eight supports tested) in predicting both learning outcome and in-game performance (e.g. number of game levels solved). We included student enjoyment, gender and ethnicity in our analyses as moderators to further investigate the research questions.  相似文献   
999.
Forecasting stock prices using deep learning models suffers from problems such as low accuracy, slow convergence, and complex network structures. This study developed an echo state network (ESN) model to mitigate such problems. We compared our ESN with a long short-term memory (LSTM) network by forecasting the stock data of Kweichow Moutai, a leading enterprise in China’s liquor industry. By analyzing data for 120, 240, and 300 days, we generated forecast data for the next 40, 80, and 100 days, respectively, using both ESN and LSTM. In terms of accuracy, ESN had the unique advantage of capturing nonlinear data. Mean absolute error (MAE) was used to present the accuracy results. The MAEs of the data forecast by ESN were 0.024, 0.024, and 0.025, which were, respectively, 0.065, 0.007, and 0.009 less than those of LSTM. In terms of convergence, ESN has a reservoir state-space structure, which makes it perform faster than other models. Root-mean-square error (RMSE) was used to present the convergence time. In our experiment, the RMSEs of ESN were 0.22, 0.27, and 0.26, which were, respectively, 0.08, 0.01, and 0.12 less than those of LSTM. In terms of network structure, ESN consists only of input, reservoir, and output spaces, making it a much simpler model than the others. The proposed ESN was found to be an effective model that, compared to others, converges faster, forecasts more accurately, and builds time-series analyses more easily.  相似文献   
1000.
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased network traffic markedly. Over the past few decades, network traffic identification has been a research hotspot in the field of network management and security monitoring. However, as more network services use encryption technology, network traffic identification faces many challenges. Although classic machine learning methods can solve many problems that cannot be solved by port- and payload-based methods, manually extract features that are frequently updated is time-consuming and labor-intensive. Deep learning has good automatic feature learning capabilities and is an ideal method for network traffic identification, particularly encrypted traffic identification; Existing recognition methods based on deep learning primarily use supervised learning methods and rely on many labeled samples. However, in real scenarios, labeled samples are often difficult to obtain. This paper adjusts the structure of the auxiliary classification generation adversarial network (ACGAN) so that it can use unlabeled samples for training, and use the wasserstein distance instead of the original cross entropy as the loss function to achieve semisupervised learning. Experimental results show that the identification accuracy of ISCX and USTC data sets using the proposed method yields markedly better performance when the number of labeled samples is small compared to that of convolutional neural network (CNN) based classifier.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号