首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   17338篇
  免费   1189篇
  国内免费   599篇
电工技术   277篇
综合类   335篇
化学工业   255篇
金属工艺   103篇
机械仪表   248篇
建筑科学   109篇
矿业工程   38篇
能源动力   307篇
轻工业   69篇
水利工程   18篇
石油天然气   22篇
武器工业   4篇
无线电   3392篇
一般工业技术   762篇
冶金工业   26篇
原子能技术   23篇
自动化技术   13138篇
  2024年   36篇
  2023年   295篇
  2022年   529篇
  2021年   742篇
  2020年   690篇
  2019年   540篇
  2018年   648篇
  2017年   1621篇
  2016年   1599篇
  2015年   1187篇
  2014年   1902篇
  2013年   1145篇
  2012年   1107篇
  2011年   1067篇
  2010年   943篇
  2009年   1079篇
  2008年   541篇
  2007年   798篇
  2006年   697篇
  2005年   388篇
  2004年   184篇
  2003年   209篇
  2002年   231篇
  2001年   201篇
  2000年   143篇
  1999年   140篇
  1998年   55篇
  1997年   77篇
  1996年   44篇
  1995年   46篇
  1994年   47篇
  1993年   29篇
  1992年   29篇
  1991年   32篇
  1990年   23篇
  1989年   20篇
  1988年   38篇
  1987年   3篇
  1986年   1篇
  1985年   3篇
  1984年   4篇
  1983年   2篇
  1982年   2篇
  1981年   2篇
  1979年   4篇
  1978年   2篇
  1971年   1篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
Machine learning algorithms have been widely used in mine fault diagnosis. The correct selection of the suitable algorithms is the key factor that affects the fault diagnosis. However, the impact of machine learning algorithms on the prediction performance of mine fault diagnosis models has not been fully evaluated. In this study, the windage alteration faults (WAFs) diagnosis models, which are based on K-nearest neighbor algorithm (KNN), multi-layer perceptron (MLP), support vector machine (SVM), and decision tree (DT), are constructed. Furthermore, the applicability of these four algorithms in the WAFs diagnosis is explored by a T-type ventilation network simulation experiment and the field empirical application research of Jinchuan No. 2 mine. The accuracy of the fault location diagnosis for the four models in both networks was 100%. In the simulation experiment, the mean absolute percentage error (MAPE) between the predicted values and the real values of the fault volume of the four models was 0.59%, 97.26%, 123.61%, and 8.78%, respectively. The MAPE for the field empirical application was 3.94%, 52.40%, 25.25%, and 7.15%, respectively. The results of the comprehensive evaluation of the fault location and fault volume diagnosis tests showed that the KNN model is the most suitable algorithm for the WAFs diagnosis, whereas the prediction performance of the DT model was the second-best. This study realizes the intelligent diagnosis of WAFs, and provides technical support for the realization of intelligent ventilation.  相似文献   
2.
Built-in applications built on a stand-alone device, TCP / IP network and interconnected are a need for high integration with other systems. The system provided through Web services interconnects service-oriented distributed architecture. The TCP / IP network is widely employed to integrate business applications. This integration is still not provided through the embedded application. The applications connected to the Internet are an especially difficult problem in embedded systems to interpret the sensor data. Real-time sensor function generates a training/classification result for IoT application selected, customized, or data structure design. It has an integrated hardware/software system to achieve the continuous training and real-time data analysis and re-training of Machine Learning (ML) algorithm. World of English native speakers on top of all, this is the database of words that have been separated from the local and non-collection English. It also reported a variety of methods that are used in the English vocabulary recognition system. Please check the study of learners of mediation based on the part of the corpus. Students, in writing, too much-advanced technology and general vocabulary. These students, publicly their discourse in and contributed to the professional corpus of "existence" I mentioned that there is a professional writer, is better. To stimulate the different means of integration, it evaluated several network technology today, discussing the balance between the use of shared with this integration in the adaptability and built-in the field of Web network technology of today.  相似文献   
3.
Multimedia Tools and Applications - The video surveillance activity generates a vast amount of data, which can be processed to detect miscreants. The task of identifying and recognizing an object...  相似文献   
4.
This editorial paper provides an overview of new advances on hardware security challenges and promising solutions for real world applications. It first presents the increasing hardware vulnerabilities with the emergence of diverse computing platforms. Then, it details the technical challenges, research opportunities, and potential solutions to cyber-attacks on -physical- devices.  相似文献   
5.
Wei  Shaowei  Yu  Guoxian  Wang  Jun  Domeniconi  Carlotta  Zhang  Xiangliang 《Machine Learning》2021,110(6):1505-1526
Machine Learning - Traditional clustering algorithms focus on a single clustering result; as such, they cannot explore potential diverse patterns of complex real world data. To deal with this...  相似文献   
6.
Small group detection and tracking in crowd scenes are basis for high level crowd analysis tasks. However, it suffers from the ambiguities in generating proper groups and in handling dynamic changes of group configurations. In this paper, we propose a novel delay decision-making based method for addressing the above problems, motivated by the idea that these ambiguities can be solved using rich temporal context. Specifically, given individual detections, small group hypotheses are generated. Then candidate group hypotheses across consecutive frames and their potential associations are built in a tree. By seeking for the best non-conflicting subset from the hypothesis tree, small groups are determined and simultaneously their trajectories are got. So this framework is called joint detection and tracking. This joint framework reduces the ambiguities in small group decision and tracking by looking ahead for several frames. However, it results in the unmanageable solution space because the number of track hypotheses grows exponentially over time. To solve this problem, effective pruning strategies are developed, which can keep the solution space manageable and also improve the credibility of small groups. Experiments on public datasets demonstrate the effectiveness of our method. The method achieves the state-of-the-art performance even in noisy crowd scenes.  相似文献   
7.
Abstract

Data mining techniques have been successfully utilized in different applications of significant fields, including medical research. With the wealth of data available within the health-care systems, there is a lack of practical analysis tools to discover hidden relationships and trends in data. The complexity of medical data that is unfavorable for most models is a considerable challenge in prediction. The ability of a model to perform accurately and efficiently in disease diagnosis is extremely significant. Thus, the model must be selected to fit the data better, such that the learning from previous data is most efficient, and the diagnosis of the disease is highly accurate. This work is motivated by the limited number of regression analysis tools for multivariate counts in the literature. We propose two regression models for count data based on flexible distributions, namely, the multinomial Beta-Liouville and multinomial scaled Dirichlet, and evaluated the proposed models in the problem of disease diagnosis. The performance is evaluated based on the accuracy of the prediction which depends on the nature and complexity of the dataset. Our results show the efficiency of the two proposed regression models where the prediction performance of both models is competitive to other previously used regression models for count data and to the best results in the literature.  相似文献   
8.
By leveraging the secret data coding using the remainder storage based exploiting modification direction (RSBEMD), and the pixel change operation recording based on multi-segment left and right histogram shifting, a novel reversible data hiding (RHD) scheme is proposed in this paper. The secret data are first encoded by some specific pixel change operations to the pixels in groups. After that, multi-segment left and right histogram shifting based on threshold manipulation is implemented for recording the pixel change operations. Furthermore, a multiple embedding policy based on chess board prediction (CBP) and threshold manipulation is put forward, and the threshold can be adjusted to achieve adaptive data hiding. Experimental results and analysis show that it is reversible and can achieve good performance in capacity and imperceptibility compared with the existing methods.  相似文献   
9.
Chen  Meng  Yu  Xiaohui  Liu  Yang 《World Wide Web》2019,22(6):2901-2920
World Wide Web - The wide spread use of positioning and photographing devices gives rise to a deluge of traffic trajectory data (e.g., vehicle passage records and taxi trajectory data), with each...  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号