全文获取类型
收费全文 | 79063篇 |
免费 | 9344篇 |
国内免费 | 6899篇 |
专业分类
电工技术 | 6773篇 |
技术理论 | 11篇 |
综合类 | 8100篇 |
化学工业 | 4594篇 |
金属工艺 | 1341篇 |
机械仪表 | 5165篇 |
建筑科学 | 3697篇 |
矿业工程 | 2046篇 |
能源动力 | 2606篇 |
轻工业 | 1330篇 |
水利工程 | 1742篇 |
石油天然气 | 4182篇 |
武器工业 | 1073篇 |
无线电 | 11166篇 |
一般工业技术 | 4193篇 |
冶金工业 | 1654篇 |
原子能技术 | 1117篇 |
自动化技术 | 34516篇 |
出版年
2024年 | 280篇 |
2023年 | 1173篇 |
2022年 | 2282篇 |
2021年 | 2878篇 |
2020年 | 2958篇 |
2019年 | 2245篇 |
2018年 | 2050篇 |
2017年 | 2514篇 |
2016年 | 2883篇 |
2015年 | 3261篇 |
2014年 | 5564篇 |
2013年 | 4934篇 |
2012年 | 6191篇 |
2011年 | 6389篇 |
2010年 | 4870篇 |
2009年 | 4794篇 |
2008年 | 5141篇 |
2007年 | 5921篇 |
2006年 | 4978篇 |
2005年 | 4497篇 |
2004年 | 3865篇 |
2003年 | 3240篇 |
2002年 | 2460篇 |
2001年 | 1883篇 |
2000年 | 1612篇 |
1999年 | 1185篇 |
1998年 | 900篇 |
1997年 | 765篇 |
1996年 | 630篇 |
1995年 | 567篇 |
1994年 | 441篇 |
1993年 | 317篇 |
1992年 | 235篇 |
1991年 | 230篇 |
1990年 | 174篇 |
1989年 | 137篇 |
1988年 | 121篇 |
1987年 | 96篇 |
1986年 | 81篇 |
1985年 | 106篇 |
1984年 | 83篇 |
1983年 | 86篇 |
1982年 | 66篇 |
1981年 | 38篇 |
1980年 | 22篇 |
1979年 | 36篇 |
1978年 | 13篇 |
1977年 | 20篇 |
1976年 | 13篇 |
1959年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
31.
Traditionally, in supervised machine learning, (a significant) part of the available data (usually 50%-80%) is used for training and the rest—for validation. In many problems, however, the data are highly imbalanced in regard to different classes or does not have good coverage of the feasible data space which, in turn, creates problems in validation and usage phase. In this paper, we propose a technique for synthesizing feasible and likely data to help balance the classes as well as to boost the performance in terms of confusion matrix as well as overall. The idea, in a nutshell, is to synthesize data samples in close vicinity to the actual data samples specifically for the less represented (minority) classes. This has also implications to the so-called fairness of machine learning. In this paper, we propose a specific method for synthesizing data in a way to balance the classes and boost the performance, especially of the minority classes. It is generic and can be applied to different base algorithms, for example, support vector machines, k-nearest neighbour classifiers deep neural, rule-based classifiers, decision trees, and so forth. The results demonstrated that (a) a significantly more balanced (and fair) classification results can be achieved and (b) that the overall performance as well as the performance per class measured by confusion matrix can be boosted. In addition, this approach can be very valuable for the cases when the number of actual available labelled data is small which itself is one of the problems of the contemporary machine learning. 相似文献
32.
By leveraging the secret data coding using the remainder storage based exploiting modification direction (RSBEMD), and the pixel change operation recording based on multi-segment left and right histogram shifting, a novel reversible data hiding (RHD) scheme is proposed in this paper. The secret data are first encoded by some specific pixel change operations to the pixels in groups. After that, multi-segment left and right histogram shifting based on threshold manipulation is implemented for recording the pixel change operations. Furthermore, a multiple embedding policy based on chess board prediction (CBP) and threshold manipulation is put forward, and the threshold can be adjusted to achieve adaptive data hiding. Experimental results and analysis show that it is reversible and can achieve good performance in capacity and imperceptibility compared with the existing methods. 相似文献
33.
34.
本文以云杉八齿小蠹Ips typographus Linnaeus为例,经标本选取,观察虫体整体形态,绘制整体结构草图,电子显微镜观察局部、得到局部数字图像,分别建立虫体每一部分的高精度细节。把模型每部分拼装在一起组成整体模型,构建出了云杉八齿小蠹三维虚拟昆虫数字化模型。 相似文献
35.
36.
Several three-party password authenticated key exchange (3-PAKE) protocols have recently been proposed for heterogeneous wireless sensor networks (HWSN). These are efficient and designed to address security concerns in ad-hoc sensor network applications for a global Internet of Things framework, where a user may request access to sensitive information collected by resource-constrained sensors in clusters managed by gateway nodes. In this paper we first analyze three recently proposed 3-PAKE protocols and discuss their vulnerabilities. Then, based on Radio Frequency Identification technologies we propose a novel 3-PAKE protocol for HWSN applications, with two extensions for additional security features, that is provably secure, efficient and flexible. 相似文献
37.
This paper analyzes the problems existing in the teaching of data structure course, and puts forward the reform from the as-
pects of strengthening basic programming, visualized explanation of abstract theory, combination of C++, Java programming, ratio-
nal use of online platform, and stratification of exercises, aiming at improving students' practical ability, learning interest and self-
confidence. 相似文献
38.
In the first critical assessment of knowledge economy dynamic paths in Africa and the Middle East, but for a few exceptions, we find overwhelming support for diminishing cross-country disparities in knowledge-based economy dimensions. The paper employs all the four components of the World Bank's Knowledge Economy Index (KEI): economic incentives, innovation, education, and information infrastructure. The main finding suggests that sub-Saharan African (SSA) and the Middle East and North African (MENA) countries with low levels of KE dynamics and catching-up their counterparts of higher KE levels. We provide the speeds of integration and time necessary to achieve full (100%) integration. Policy implications are also discussed. 相似文献
39.
现今国内的数字集群网络发展存在局限性、差异性,还远没有达到“网”状分布的程度,因此,共网数字集群发展空间巨大、前景广阔。通过列举共网数字集群系统在龙嘉国际机场和长春雷锋车队的成功应用案例,探讨了我国共网数字集群系统应用的可行性和必要性。 相似文献
40.
Site-specific seismic hazard analysis is crucial for designing earthquake resistance structures, particularly in seismically active regions. Shear wave velocity ( V S) is a key parameter in such analysis, although the economy and other factors restrict its direct field measurement in many cases. Various V S–SPT– N correlations are routinely incorporated in seismic hazard analysis to estimate the value of V S. However, many uncertainties question the reliability of these estimated V S values. This paper comes up with a statistical approach to take care of such uncertainties involved in V S calculations. The measured SPT– N values from all the critical boreholes were converted into statistical parameters and passed through various correlations to estimate V S at different depths. The effect of different soil layers in the boreholes on the Vs estimation was also taken into account. Further, the average shear wave velocity of the top 30 m soil cover ( V S30) is estimated after accounting for various epistemic and aleatoric uncertainties. The scattering nature of the V S values estimated using different V S– N correlations was reduced significantly with the application of the methodology. Study results further clearly demonstrated the potential of the approach to eliminate various uncertainties involved in the estimation of V S30 using general and soil-specific correlations. 相似文献