首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   79063篇
  免费   9344篇
  国内免费   6899篇
电工技术   6773篇
技术理论   11篇
综合类   8100篇
化学工业   4594篇
金属工艺   1341篇
机械仪表   5165篇
建筑科学   3697篇
矿业工程   2046篇
能源动力   2606篇
轻工业   1330篇
水利工程   1742篇
石油天然气   4182篇
武器工业   1073篇
无线电   11166篇
一般工业技术   4193篇
冶金工业   1654篇
原子能技术   1117篇
自动化技术   34516篇
  2024年   280篇
  2023年   1173篇
  2022年   2282篇
  2021年   2878篇
  2020年   2958篇
  2019年   2245篇
  2018年   2050篇
  2017年   2514篇
  2016年   2883篇
  2015年   3261篇
  2014年   5564篇
  2013年   4934篇
  2012年   6191篇
  2011年   6389篇
  2010年   4870篇
  2009年   4794篇
  2008年   5141篇
  2007年   5921篇
  2006年   4978篇
  2005年   4497篇
  2004年   3865篇
  2003年   3240篇
  2002年   2460篇
  2001年   1883篇
  2000年   1612篇
  1999年   1185篇
  1998年   900篇
  1997年   765篇
  1996年   630篇
  1995年   567篇
  1994年   441篇
  1993年   317篇
  1992年   235篇
  1991年   230篇
  1990年   174篇
  1989年   137篇
  1988年   121篇
  1987年   96篇
  1986年   81篇
  1985年   106篇
  1984年   83篇
  1983年   86篇
  1982年   66篇
  1981年   38篇
  1980年   22篇
  1979年   36篇
  1978年   13篇
  1977年   20篇
  1976年   13篇
  1959年   8篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
31.
Traditionally, in supervised machine learning, (a significant) part of the available data (usually 50%-80%) is used for training and the rest—for validation. In many problems, however, the data are highly imbalanced in regard to different classes or does not have good coverage of the feasible data space which, in turn, creates problems in validation and usage phase. In this paper, we propose a technique for synthesizing feasible and likely data to help balance the classes as well as to boost the performance in terms of confusion matrix as well as overall. The idea, in a nutshell, is to synthesize data samples in close vicinity to the actual data samples specifically for the less represented (minority) classes. This has also implications to the so-called fairness of machine learning. In this paper, we propose a specific method for synthesizing data in a way to balance the classes and boost the performance, especially of the minority classes. It is generic and can be applied to different base algorithms, for example, support vector machines, k-nearest neighbour classifiers deep neural, rule-based classifiers, decision trees, and so forth. The results demonstrated that (a) a significantly more balanced (and fair) classification results can be achieved and (b) that the overall performance as well as the performance per class measured by confusion matrix can be boosted. In addition, this approach can be very valuable for the cases when the number of actual available labelled data is small which itself is one of the problems of the contemporary machine learning.  相似文献   
32.
By leveraging the secret data coding using the remainder storage based exploiting modification direction (RSBEMD), and the pixel change operation recording based on multi-segment left and right histogram shifting, a novel reversible data hiding (RHD) scheme is proposed in this paper. The secret data are first encoded by some specific pixel change operations to the pixels in groups. After that, multi-segment left and right histogram shifting based on threshold manipulation is implemented for recording the pixel change operations. Furthermore, a multiple embedding policy based on chess board prediction (CBP) and threshold manipulation is put forward, and the threshold can be adjusted to achieve adaptive data hiding. Experimental results and analysis show that it is reversible and can achieve good performance in capacity and imperceptibility compared with the existing methods.  相似文献   
33.
探索采用数据可视化技术分析儿童用品TBT通报数据,以可视化图形图像呈现通报热点并揭示趋势信息,提出对策与建议,助力为儿童用品产业升级、TBT预警数据分析和信息传播工作提供新思路,提高中小企业的国外市场准入机会。  相似文献   
34.
本文以云杉八齿小蠹Ips typographus Linnaeus为例,经标本选取,观察虫体整体形态,绘制整体结构草图,电子显微镜观察局部、得到局部数字图像,分别建立虫体每一部分的高精度细节。把模型每部分拼装在一起组成整体模型,构建出了云杉八齿小蠹三维虚拟昆虫数字化模型。  相似文献   
35.
36.
Several three-party password authenticated key exchange (3-PAKE) protocols have recently been proposed for heterogeneous wireless sensor networks (HWSN). These are efficient and designed to address security concerns in ad-hoc sensor network applications for a global Internet of Things framework, where a user may request access to sensitive information collected by resource-constrained sensors in clusters managed by gateway nodes. In this paper we first analyze three recently proposed 3-PAKE protocols and discuss their vulnerabilities. Then, based on Radio Frequency Identification technologies we propose a novel 3-PAKE protocol for HWSN applications, with two extensions for additional security features, that is provably secure, efficient and flexible.  相似文献   
37.
This paper analyzes the problems existing in the teaching of data structure course, and puts forward the reform from the as- pects of strengthening basic programming, visualized explanation of abstract theory, combination of C++, Java programming, ratio- nal use of online platform, and stratification of exercises, aiming at improving students' practical ability, learning interest and self- confidence.  相似文献   
38.
In the first critical assessment of knowledge economy dynamic paths in Africa and the Middle East, but for a few exceptions, we find overwhelming support for diminishing cross-country disparities in knowledge-based economy dimensions. The paper employs all the four components of the World Bank's Knowledge Economy Index (KEI): economic incentives, innovation, education, and information infrastructure. The main finding suggests that sub-Saharan African (SSA) and the Middle East and North African (MENA) countries with low levels of KE dynamics and catching-up their counterparts of higher KE levels. We provide the speeds of integration and time necessary to achieve full (100%) integration. Policy implications are also discussed.  相似文献   
39.
现今国内的数字集群网络发展存在局限性、差异性,还远没有达到“网”状分布的程度,因此,共网数字集群发展空间巨大、前景广阔。通过列举共网数字集群系统在龙嘉国际机场和长春雷锋车队的成功应用案例,探讨了我国共网数字集群系统应用的可行性和必要性。  相似文献   
40.
Site-specific seismic hazard analysis is crucial for designing earthquake resistance structures, particularly in seismically active regions. Shear wave velocity ( V S) is a key parameter in such analysis, although the economy and other factors restrict its direct field measurement in many cases. Various V S–SPT– N correlations are routinely incorporated in seismic hazard analysis to estimate the value of V S. However, many uncertainties question the reliability of these estimated V S values. This paper comes up with a statistical approach to take care of such uncertainties involved in V S calculations. The measured SPT– N values from all the critical boreholes were converted into statistical parameters and passed through various correlations to estimate V S at different depths. The effect of different soil layers in the boreholes on the Vs estimation was also taken into account. Further, the average shear wave velocity of the top 30 m soil cover ( V S30) is estimated after accounting for various epistemic and aleatoric uncertainties. The scattering nature of the V S values estimated using different V SN correlations was reduced significantly with the application of the methodology. Study results further clearly demonstrated the potential of the approach to eliminate various uncertainties involved in the estimation of V S30 using general and soil-specific correlations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号