首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18162篇
  免费   2544篇
  国内免费   1833篇
电工技术   424篇
综合类   880篇
化学工业   268篇
金属工艺   108篇
机械仪表   291篇
建筑科学   105篇
矿业工程   57篇
能源动力   260篇
轻工业   111篇
水利工程   14篇
石油天然气   25篇
武器工业   16篇
无线电   3840篇
一般工业技术   678篇
冶金工业   41篇
原子能技术   28篇
自动化技术   15393篇
  2024年   82篇
  2023年   451篇
  2022年   867篇
  2021年   1075篇
  2020年   1135篇
  2019年   838篇
  2018年   952篇
  2017年   1819篇
  2016年   1829篇
  2015年   1431篇
  2014年   2040篇
  2013年   1297篇
  2012年   1610篇
  2011年   1434篇
  2010年   1068篇
  2009年   1138篇
  2008年   530篇
  2007年   806篇
  2006年   598篇
  2005年   331篇
  2004年   133篇
  2003年   162篇
  2002年   161篇
  2001年   165篇
  2000年   118篇
  1999年   111篇
  1998年   30篇
  1997年   47篇
  1996年   34篇
  1995年   33篇
  1994年   37篇
  1993年   21篇
  1992年   25篇
  1991年   28篇
  1990年   18篇
  1989年   23篇
  1988年   35篇
  1987年   3篇
  1986年   3篇
  1985年   1篇
  1984年   2篇
  1982年   2篇
  1981年   3篇
  1979年   4篇
  1978年   3篇
  1977年   2篇
  1976年   1篇
  1974年   2篇
  1972年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Machine learning algorithms have been widely used in mine fault diagnosis. The correct selection of the suitable algorithms is the key factor that affects the fault diagnosis. However, the impact of machine learning algorithms on the prediction performance of mine fault diagnosis models has not been fully evaluated. In this study, the windage alteration faults (WAFs) diagnosis models, which are based on K-nearest neighbor algorithm (KNN), multi-layer perceptron (MLP), support vector machine (SVM), and decision tree (DT), are constructed. Furthermore, the applicability of these four algorithms in the WAFs diagnosis is explored by a T-type ventilation network simulation experiment and the field empirical application research of Jinchuan No. 2 mine. The accuracy of the fault location diagnosis for the four models in both networks was 100%. In the simulation experiment, the mean absolute percentage error (MAPE) between the predicted values and the real values of the fault volume of the four models was 0.59%, 97.26%, 123.61%, and 8.78%, respectively. The MAPE for the field empirical application was 3.94%, 52.40%, 25.25%, and 7.15%, respectively. The results of the comprehensive evaluation of the fault location and fault volume diagnosis tests showed that the KNN model is the most suitable algorithm for the WAFs diagnosis, whereas the prediction performance of the DT model was the second-best. This study realizes the intelligent diagnosis of WAFs, and provides technical support for the realization of intelligent ventilation.  相似文献   
2.
Built-in applications built on a stand-alone device, TCP / IP network and interconnected are a need for high integration with other systems. The system provided through Web services interconnects service-oriented distributed architecture. The TCP / IP network is widely employed to integrate business applications. This integration is still not provided through the embedded application. The applications connected to the Internet are an especially difficult problem in embedded systems to interpret the sensor data. Real-time sensor function generates a training/classification result for IoT application selected, customized, or data structure design. It has an integrated hardware/software system to achieve the continuous training and real-time data analysis and re-training of Machine Learning (ML) algorithm. World of English native speakers on top of all, this is the database of words that have been separated from the local and non-collection English. It also reported a variety of methods that are used in the English vocabulary recognition system. Please check the study of learners of mediation based on the part of the corpus. Students, in writing, too much-advanced technology and general vocabulary. These students, publicly their discourse in and contributed to the professional corpus of "existence" I mentioned that there is a professional writer, is better. To stimulate the different means of integration, it evaluated several network technology today, discussing the balance between the use of shared with this integration in the adaptability and built-in the field of Web network technology of today.  相似文献   
3.
4.
比喻是一种利用事物之间的相似点建立关系的修辞方式。明喻是比喻中最常见的形式,具有明显的喻词,例如"像",用于关联本体和喻体。近年来高考语文散文类鉴赏题中多有考查明喻句的试题,为了解答此类鉴赏题,需要识别比喻句中的本体和喻体要素。该文提出了基于词性特征的明喻识别及要素抽取方法。首先将句子中词向量化表示与词性特征向量化表示进行融合,将融合后的向量输入到BiLSTM中进行训练,然后利用CRF解码出全局最优标注序列;最后得到明喻识别和要素抽取的结果。公开数据集上的实验结果表明,该方法优于已有的单任务方法;同时也将该文方法应用于北京高考语文鉴赏题中比喻句的识别与要素抽取,验证了方法的可行性。  相似文献   
5.
This editorial paper provides an overview of new advances on hardware security challenges and promising solutions for real world applications. It first presents the increasing hardware vulnerabilities with the emergence of diverse computing platforms. Then, it details the technical challenges, research opportunities, and potential solutions to cyber-attacks on -physical- devices.  相似文献   
6.
The ways in which environmental priorities are framed are varied and influenced by political forces. One technological advance--the proliferation of government open data portals (ODPs)--has the potential to improve governance through facilitating access to data. Yet it is also known that the data hosted on ODPs may simply reflect the goals and interests of multiple levels of political power. In this article, I use traditional statistical correlation and regression techniques along with newer natural language processing and machine learning algorithms to analyze the corpus of datasets hosted on government ODPs (total: 49,066) to extract patterns that relate scales of governance and political liberalism/conservatism to the priorities and meaning attached to environmental issues. I find that state-level and municipal-level ODPs host different categories of environmental datasets, with municipal-level ODPs generally hosting more datasets pertaining to services and amenities and state-level ODPs hosting more datasets pertaining to resource protection and extraction. Stronger trends were observed for the influences of political conservatism/liberalism among state-level ODPs than for municipal-level ODPs.  相似文献   
7.
Wei  Shaowei  Yu  Guoxian  Wang  Jun  Domeniconi  Carlotta  Zhang  Xiangliang 《Machine Learning》2021,110(6):1505-1526
Machine Learning - Traditional clustering algorithms focus on a single clustering result; as such, they cannot explore potential diverse patterns of complex real world data. To deal with this...  相似文献   
8.
Small group detection and tracking in crowd scenes are basis for high level crowd analysis tasks. However, it suffers from the ambiguities in generating proper groups and in handling dynamic changes of group configurations. In this paper, we propose a novel delay decision-making based method for addressing the above problems, motivated by the idea that these ambiguities can be solved using rich temporal context. Specifically, given individual detections, small group hypotheses are generated. Then candidate group hypotheses across consecutive frames and their potential associations are built in a tree. By seeking for the best non-conflicting subset from the hypothesis tree, small groups are determined and simultaneously their trajectories are got. So this framework is called joint detection and tracking. This joint framework reduces the ambiguities in small group decision and tracking by looking ahead for several frames. However, it results in the unmanageable solution space because the number of track hypotheses grows exponentially over time. To solve this problem, effective pruning strategies are developed, which can keep the solution space manageable and also improve the credibility of small groups. Experiments on public datasets demonstrate the effectiveness of our method. The method achieves the state-of-the-art performance even in noisy crowd scenes.  相似文献   
9.
By leveraging the secret data coding using the remainder storage based exploiting modification direction (RSBEMD), and the pixel change operation recording based on multi-segment left and right histogram shifting, a novel reversible data hiding (RHD) scheme is proposed in this paper. The secret data are first encoded by some specific pixel change operations to the pixels in groups. After that, multi-segment left and right histogram shifting based on threshold manipulation is implemented for recording the pixel change operations. Furthermore, a multiple embedding policy based on chess board prediction (CBP) and threshold manipulation is put forward, and the threshold can be adjusted to achieve adaptive data hiding. Experimental results and analysis show that it is reversible and can achieve good performance in capacity and imperceptibility compared with the existing methods.  相似文献   
10.
Chen  Meng  Yu  Xiaohui  Liu  Yang 《World Wide Web》2019,22(6):2901-2920
World Wide Web - The wide spread use of positioning and photographing devices gives rise to a deluge of traffic trajectory data (e.g., vehicle passage records and taxi trajectory data), with each...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号