首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   58950篇
  免费   7478篇
  国内免费   5826篇
工业技术   72254篇
  2024年   232篇
  2023年   799篇
  2022年   1673篇
  2021年   2096篇
  2020年   2200篇
  2019年   1722篇
  2018年   1545篇
  2017年   1909篇
  2016年   2171篇
  2015年   2506篇
  2014年   4034篇
  2013年   3618篇
  2012年   4362篇
  2011年   4706篇
  2010年   3646篇
  2009年   3611篇
  2008年   4062篇
  2007年   4628篇
  2006年   3928篇
  2005年   3507篇
  2004年   3020篇
  2003年   2541篇
  2002年   1942篇
  2001年   1487篇
  2000年   1274篇
  1999年   919篇
  1998年   707篇
  1997年   600篇
  1996年   495篇
  1995年   437篇
  1994年   348篇
  1993年   250篇
  1992年   173篇
  1991年   178篇
  1990年   133篇
  1989年   107篇
  1988年   85篇
  1987年   67篇
  1986年   58篇
  1985年   85篇
  1984年   58篇
  1983年   71篇
  1982年   60篇
  1981年   37篇
  1980年   20篇
  1979年   34篇
  1978年   12篇
  1977年   20篇
  1976年   13篇
  1959年   7篇
排序方式: 共有10000条查询结果,搜索用时 296 毫秒
21.
22.
To quantify the evacuation process, evacuation practitioners use engineering egress data describing the occupant movement characteristics. These data are typically based to young and fit populations. However, the movement abilities of occupants who might be involved in evacuations are becoming more variable—with the building populations of today typically including increasing numbers of individuals: with impairments or who are otherwise elderly or generally less mobile. Thus, there will be an increasing proportion of building occupants with reduced ability to egress. For safe evacuation, there is therefore a need to provide valid engineering egress data considering pedestrians with disabilities. Gwynne and Boyce recently compiled a series of data sets related to the evacuation process to support practitioner activities in the chapter Engineering Data in the SFPE Handbook of Fire Protection Engineering. This paper supplements these data sets by providing information on and presenting data obtained from additional research related to the premovement and horizontal movement of participants with physical‐, cognitive‐, or age‐related disabilities. The aim is to provide an overview of currently available data sets related to, and key factors affecting the egress performance of, mixed ability populations which could be used to guide fire safety engineering decisions in the context of building design.  相似文献   
23.
针对高可靠度机载多余度EWIS各组成部分寿命服从指数分布但参数未知的情况,提出采用无失效数据可靠度分析方法评估EWIS的可靠度水平。通过Monte-Carlo仿真方法对连接形式为“先并联、后串联”EWIS各组成部分寿命进行抽样,利用“最小最大值”方法获得系统寿命的抽样值,用概率纸检验法初步判断EWIS寿命是否服从威布尔分布,再用Pearson拟合优度检验法判断EWIS寿命是否服从威布尔分布。结合无故障飞行时间的样本值与EWIS寿命服从威布尔分布的假设,采用无失效数据分析方法评估EWIS的可靠度水平。研究方法对机载多余度EWIS无失效数据可靠度分析有一定的贡献。  相似文献   
24.
Process object is the instance of process. Vertexes and edges are in the graph of process object. There are different types of the object itself and the associations between object. For the large-scale data, there are many changes reflected. Recently, how to find appropriate real-time data for process object becomes a hot research topic. Data sampling is a kind of finding c hanges o f p rocess o bjects. There i s r equirements f or s ampling to be adaptive to underlying distribution of data stream. In this paper, we have proposed a adaptive data sampling mechanism to find a ppropriate d ata t o m odeling. F irst o f all, we use concept drift to make the partition of the life cycle of process object. Then, entity community detection is proposed to find changes. Finally, we propose stream-based real-time optimization of data sampling. Contributions of this paper are concept drift, community detection, and stream-based real-time computing. Experiments show the effectiveness and feasibility of our proposed adaptive data sampling mechanism for process object.  相似文献   
25.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors.  相似文献   
26.
For rechargeable wireless sensor networks, limited energy storage capacity, dynamic energy supply, low and dynamic duty cycles cause that it is unpractical to maintain a fixed routing path for packets delivery permanently from a source to destination in a distributed scenario. Therefore, before data delivery, a sensor has to update its waking schedule continuously and share them to its neighbors, which lead to high energy expenditure for reestablishing path links frequently and low efficiency of energy utilization for collecting packets. In this work, we propose the maximum data generation rate routing protocol based on data flow controlling technology. For a sensor, it does not share its waking schedule to its neighbors and cache any waking schedules of other sensors. Hence, the energy consumption for time synchronization, location information and waking schedule shared will be reduced significantly. The saving energy can be used for improving data collection rate. Simulation shows our scheme is efficient to improve packets generation rate in rechargeable wireless sensor networks.  相似文献   
27.
Any knowledge extraction relies (possibly implicitly) on a hypothesis about the modelled-data dependence. The extracted knowledge ultimately serves to a decision-making (DM). DM always faces uncertainty and this makes probabilistic modelling adequate. The inspected black-box modeling deals with “universal” approximators of the relevant probabilistic model. Finite mixtures with components in the exponential family are often exploited. Their attractiveness stems from their flexibility, the cluster interpretability of components and the existence of algorithms for processing high-dimensional data streams. They are even used in dynamic cases with mutually dependent data records while regression and auto-regression mixture components serve to the dependence modeling. These dynamic models, however, mostly assume data-independent component weights, that is, memoryless transitions between dynamic mixture components. Such mixtures are not universal approximators of dynamic probabilistic models. Formally, this follows from the fact that the set of finite probabilistic mixtures is not closed with respect to the conditioning, which is the key estimation and predictive operation. The paper overcomes this drawback by using ratios of finite mixtures as universally approximating dynamic parametric models. The paper motivates them, elaborates their approximate Bayesian recursive estimation and reveals their application potential.  相似文献   
28.
Anup Bhat B  Harish SV  Geetha M 《ETRI Journal》2021,43(6):1024-1037
Mining high utility itemsets (HUIs) from transaction databases considers such factors as the unit profit and quantity of purchased items. Two-phase tree-based algorithms transform a database into compressed tree structures and generate candidate patterns through a recursive pattern-growth procedure. This procedure requires a lot of memory and time to construct conditional pattern trees. To address this issue, this study employs two compressed tree structures, namely, Utility Count Tree and String Utility Tree, to enumerate valid patterns and thus promote fast utility computation. Furthermore, the study presents an algorithm called single-phase utility computation (SPUC) that leverages these two tree structures to mine HUIs in a single phase by incorporating novel pruning strategies. Experiments conducted on both real and synthetic datasets demonstrate the superior performance of SPUC compared with IHUP, UP-Growth, and UP-Growth+ algorithms.  相似文献   
29.
机载光电雷达受平台及大气环境影响较大,而它机试飞能有效规避研制风险,是产品研制的必经阶段。本文介绍了机载光电雷达它机试飞试验系统组成、试验流程和数据处理等内容。经工程验证,实施过程满足任务需求,对其他光电系统的它机及本机试飞具有参考价值。  相似文献   
30.
面对电信承载网连接的日益增长的海量终端设备,运营商需要结合网络拓扑对终端设备产生的数据进行高效的汇聚统计、异常分析、故障定位处理等操作。针对已有系统存在的操作困难、分析效率低等问题,设计与实现了一个面向电信承载网的高效监控系统,提供实时与离线数据分析和多维可视化分析的能力。对网管、认证、终端等系统及设备采集的数据进行结构化存储,对采集的数据进行拓扑相关性和时间序列方法分析,根据分析结果实现基于动态阈值控制的异常实时告警、定位等操作,并提供多维度可视化分析对网络状态进行实时监控。实际应用结果表明,该系统性能优异,具有良好交互性,能较好地满足承载网运维人员业务分析需求。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号