首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   148595篇
  免费   19482篇
  国内免费   10330篇
电工技术   12466篇
技术理论   2篇
综合类   11663篇
化学工业   17193篇
金属工艺   7382篇
机械仪表   14727篇
建筑科学   11088篇
矿业工程   5952篇
能源动力   2690篇
轻工业   11002篇
水利工程   2710篇
石油天然气   3079篇
武器工业   1263篇
无线电   15437篇
一般工业技术   13820篇
冶金工业   7640篇
原子能技术   1481篇
自动化技术   38812篇
  2024年   496篇
  2023年   3710篇
  2022年   6454篇
  2021年   8287篇
  2020年   6240篇
  2019年   4912篇
  2018年   4629篇
  2017年   5722篇
  2016年   7261篇
  2015年   8113篇
  2014年   10559篇
  2013年   9289篇
  2012年   10121篇
  2011年   9832篇
  2010年   7693篇
  2009年   7773篇
  2008年   7543篇
  2007年   9701篇
  2006年   9147篇
  2005年   7827篇
  2004年   5937篇
  2003年   5268篇
  2002年   4222篇
  2001年   3119篇
  2000年   2513篇
  1999年   2058篇
  1998年   1547篇
  1997年   1466篇
  1996年   1150篇
  1995年   936篇
  1994年   856篇
  1993年   671篇
  1992年   486篇
  1991年   362篇
  1990年   370篇
  1989年   292篇
  1988年   226篇
  1987年   163篇
  1986年   151篇
  1985年   107篇
  1984年   126篇
  1983年   85篇
  1982年   79篇
  1981年   63篇
  1980年   63篇
  1965年   50篇
  1964年   66篇
  1962年   80篇
  1959年   49篇
  1955年   54篇
排序方式: 共有10000条查询结果,搜索用时 17 毫秒
11.
Shapley值归因解释方法虽然能更准确量化解释结果, 但过高的计算复杂度严重影响了该方法的实用性. 本文引入KD树重新整理待解释模型的预测数据, 通过在KD树上插入虚节点, 使之满足TreeSHAP算法的使用条件, 在此基础上提出了KDSHAP方法. 该方法解除了TreeSHAP算法仅能解释树结构模型的限制, 将该算法计算Shapley值的高效性放宽到对所有的黑盒模型的解释中, 同时保证了计算准确度. 通过实验对比分析, KDSHAP方法的可靠性, 以及在解释高维输入模型时的适用性.  相似文献   
12.
The development of data-driven artificial intelligence technology has given birth to a variety of big data applications. Data has become an essential factor to improve these applications. Federated learning, a privacy-preserving machine learning method, is proposed to leverage data from different data owners. It is typically used in conjunction with cryptographic methods, in which data owners train the global model by sharing encrypted model updates. However, data encryption makes it difficult to identify the quality of these model updates. Malicious data owners may launch attacks such as data poisoning and free-riding. To defend against such attacks, it is necessary to find an approach to audit encrypted model updates. In this paper, we propose a blockchain-based audit approach for encrypted gradients. It uses a behavior chain to record the encrypted gradients from data owners, and an audit chain to evaluate the gradients’ quality. Specifically, we propose a privacy-preserving homomorphic noise mechanism in which the noise of each gradient sums to zero after aggregation, ensuring the availability of aggregated gradient. In addition, we design a joint audit algorithm that can locate malicious data owners without decrypting individual gradients. Through security analysis and experimental evaluation, we demonstrate that our approach can defend against malicious gradient attacks in federated learning.  相似文献   
13.
Aiming at the performance degradation of the existing presentation attack detection methods due to the illumination variation, a two-stream vision transformers framework (TSViT) based on transfer learning in two complementary spaces is proposed in this paper. The face images of RGB color space and multi-scale retinex with color restoration (MSRCR) space are fed to TSViT to learn the distinguishing features of presentation attack detection. To effectively fuse features from two sources (RGB color space images and MSRCR images), a feature fusion method based on self-attention is built, which can effectively capture the complementarity of two features. Experiments and analysis on Oulu-NPU, CASIA-MFSD, and Replay-Attack databases show that it outperforms most existing methods in intra-database testing and achieves good generalization performance in cross-database testing.  相似文献   
14.
The supply of electrical energy is critical to convenient and comfortable living. However, people consume a large amount of energy, contributing to an energy crisis and global warming, and damaging some ecological cycles. Residential electricity consumption has greater elasticity than industrial and business consumption; it therefore has high energy-saving potential. This work establishes an automated platform, which provides information about residential electricity consumption in each city in Taiwan. Machine learning was used to forecast future residential electricity demand. A nature-inspired optimization method was applied to enhance the accuracy of the best machine learner, yielding an even better hybrid ensemble model. Performance measures indicate that the resulting model is accurate and provides effective information for reference. An automatic web-based system based on the model was combined with a web crawler and scheduled to run automatically to provide information on monthly residential electricity consumption in each county and city. By providing energy consumption information across the country, power providers and government can discuss policy and set different goals for energy use. The results of this study can facilitate the early implementation of energy-saving and carbon emission-reducing in cities and aid utility companies in establishing energy conservation guidelines.  相似文献   
15.
In this study, sea bream, sea bass, anchovy and trout were captured and recorded using a digital camera during refrigerated storage for 7 days. In addition, their total viable counts (TVC) were determined on a daily basis. Based on the TVC, each fish was classified as ‘fresh’ when it was <5 log cfu per g, and as ‘not fresh’ when it was >7 log cfu per g. They were uploaded on a web-based machine learning software called Teachable Machine (TM), which was trained about the pupils and heads of the fish. In addition, images of each species from different angles were uploaded to the software in order to ensure the recognition of fish species by TM. The data of the study indicated that the TM was able to distinguish fish species with high accuracy rates and achieved over 86% success in estimating the freshness of the fish species tested.  相似文献   
16.
益生菌可在肠道定植从而发挥抗炎或抗氧化活性,有利于宿主肠道健康。本实验研究了从新疆传统发酵乳制品中分离得到的8?株植物乳杆菌对大肠杆菌侵袭和过氧化氢刺激肠上皮细胞HT-29的保护作用。结果表明:在8?株植物乳杆菌中,植物乳杆菌35具有最高的黏附能力。植物乳杆菌35可通过取代、竞争、排阻的方式抑制大肠杆菌对HT-29细胞的黏附,抑制率分别为42.60%、59.17%、60.19%。植物乳杆菌35及其多糖可抑制大肠杆菌刺激HT-29细胞产生白细胞介素-8;同时保护HT-29细胞免受过氧化氢的损伤,增加超氧化物歧化酶、谷胱甘肽过氧化物酶活力水平并降低丙二醛含量。结论:植物乳杆菌35及其粗胞外多糖具有抑制大肠杆菌O157诱导的炎症性肠病的潜力。  相似文献   
17.
目的:探讨姜黄素的主要肠道代谢物四氢姜黄素(tetrahydrocurcumin,THC)对血小板活化和聚集的影响及其可能的分子机制。方法:在体外实验中,用不同浓度的THC(0、0.5、1、10 μmol/L)提前与健康人纯化血小板共同孵育40 min,然后加入凝血酶激活血小板2 min,用流式细胞术测定血小板表面CD62P和CD63的表达量,用酶联免疫吸附法测定血小板释放血小板因子-4(platelet factor-4,PF4)和趋化因子配体-5(chemokine ligand 5,CCL5)水平,用血小板聚集仪检测血小板释放ATP水平和血小板最大聚集率,用Western blot蛋白免疫印迹法检测血小板磷酸肌醇-3-激酶(phosphoinositide 3-kinase,PI3K)和Akt蛋白的磷酸化水平。结果:与模型组(血小板悬液中加入0.05%二甲基亚砜)相比,THC能抑制凝血酶诱导的血小板表面CD62P和CD63的表达,抑制PF4、CCL5和ATP的释放,降低血小板最大聚集率,下调PI3K和Akt蛋白的磷酸化水平,且呈浓度依赖效应,其中10 μmol/L的浓度下作用效果显著(P<0.01、P<0.001)。PI3K的特异性激动剂740 Y-P可部分逆转THC对PF4和CCL5释放和血小板聚集的抑制作用(P<0.05、P<0.01)。结论:THC具有显著抑制血小板活化和聚集的作用,其机制可能是THC可下调PI3K/Akt介导的信号通路。  相似文献   
18.
19.
为应对"三软"煤层综放沿空掘巷围岩稳定性差的问题,通过数值模拟分析、揭示"三软"煤层中锚杆、锚索载荷变化规律及其与围岩变形相互作用关系,为"三软"煤层沿空掘巷锚网支护参数优化提供理论依据,改善了巷道支护状况,降低相邻工作面间保护煤柱压煤率,提高矿井经济效益和社会效益。  相似文献   
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号