首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   36437篇
  免费   6608篇
  国内免费   4965篇
电工技术   3529篇
技术理论   4篇
综合类   3885篇
化学工业   1476篇
金属工艺   484篇
机械仪表   1762篇
建筑科学   1596篇
矿业工程   471篇
能源动力   646篇
轻工业   510篇
水利工程   545篇
石油天然气   524篇
武器工业   380篇
无线电   5383篇
一般工业技术   2289篇
冶金工业   2209篇
原子能技术   107篇
自动化技术   22210篇
  2024年   313篇
  2023年   2174篇
  2022年   3472篇
  2021年   3529篇
  2020年   2990篇
  2019年   2093篇
  2018年   1467篇
  2017年   1393篇
  2016年   1470篇
  2015年   1524篇
  2014年   2245篇
  2013年   2029篇
  2012年   2174篇
  2011年   2378篇
  2010年   2018篇
  2009年   1977篇
  2008年   1912篇
  2007年   1983篇
  2006年   1737篇
  2005年   1538篇
  2004年   1215篇
  2003年   1051篇
  2002年   905篇
  2001年   737篇
  2000年   667篇
  1999年   465篇
  1998年   399篇
  1997年   330篇
  1996年   295篇
  1995年   250篇
  1994年   193篇
  1993年   171篇
  1992年   147篇
  1991年   87篇
  1990年   74篇
  1989年   74篇
  1988年   53篇
  1987年   34篇
  1986年   50篇
  1984年   18篇
  1983年   18篇
  1982年   17篇
  1965年   24篇
  1964年   25篇
  1963年   23篇
  1961年   18篇
  1959年   16篇
  1958年   17篇
  1957年   22篇
  1955年   23篇
排序方式: 共有10000条查询结果,搜索用时 299 毫秒
11.
The development of data-driven artificial intelligence technology has given birth to a variety of big data applications. Data has become an essential factor to improve these applications. Federated learning, a privacy-preserving machine learning method, is proposed to leverage data from different data owners. It is typically used in conjunction with cryptographic methods, in which data owners train the global model by sharing encrypted model updates. However, data encryption makes it difficult to identify the quality of these model updates. Malicious data owners may launch attacks such as data poisoning and free-riding. To defend against such attacks, it is necessary to find an approach to audit encrypted model updates. In this paper, we propose a blockchain-based audit approach for encrypted gradients. It uses a behavior chain to record the encrypted gradients from data owners, and an audit chain to evaluate the gradients’ quality. Specifically, we propose a privacy-preserving homomorphic noise mechanism in which the noise of each gradient sums to zero after aggregation, ensuring the availability of aggregated gradient. In addition, we design a joint audit algorithm that can locate malicious data owners without decrypting individual gradients. Through security analysis and experimental evaluation, we demonstrate that our approach can defend against malicious gradient attacks in federated learning.  相似文献   
12.
Aiming at the performance degradation of the existing presentation attack detection methods due to the illumination variation, a two-stream vision transformers framework (TSViT) based on transfer learning in two complementary spaces is proposed in this paper. The face images of RGB color space and multi-scale retinex with color restoration (MSRCR) space are fed to TSViT to learn the distinguishing features of presentation attack detection. To effectively fuse features from two sources (RGB color space images and MSRCR images), a feature fusion method based on self-attention is built, which can effectively capture the complementarity of two features. Experiments and analysis on Oulu-NPU, CASIA-MFSD, and Replay-Attack databases show that it outperforms most existing methods in intra-database testing and achieves good generalization performance in cross-database testing.  相似文献   
13.
The supply of electrical energy is critical to convenient and comfortable living. However, people consume a large amount of energy, contributing to an energy crisis and global warming, and damaging some ecological cycles. Residential electricity consumption has greater elasticity than industrial and business consumption; it therefore has high energy-saving potential. This work establishes an automated platform, which provides information about residential electricity consumption in each city in Taiwan. Machine learning was used to forecast future residential electricity demand. A nature-inspired optimization method was applied to enhance the accuracy of the best machine learner, yielding an even better hybrid ensemble model. Performance measures indicate that the resulting model is accurate and provides effective information for reference. An automatic web-based system based on the model was combined with a web crawler and scheduled to run automatically to provide information on monthly residential electricity consumption in each county and city. By providing energy consumption information across the country, power providers and government can discuss policy and set different goals for energy use. The results of this study can facilitate the early implementation of energy-saving and carbon emission-reducing in cities and aid utility companies in establishing energy conservation guidelines.  相似文献   
14.
In this study, sea bream, sea bass, anchovy and trout were captured and recorded using a digital camera during refrigerated storage for 7 days. In addition, their total viable counts (TVC) were determined on a daily basis. Based on the TVC, each fish was classified as ‘fresh’ when it was <5 log cfu per g, and as ‘not fresh’ when it was >7 log cfu per g. They were uploaded on a web-based machine learning software called Teachable Machine (TM), which was trained about the pupils and heads of the fish. In addition, images of each species from different angles were uploaded to the software in order to ensure the recognition of fish species by TM. The data of the study indicated that the TM was able to distinguish fish species with high accuracy rates and achieved over 86% success in estimating the freshness of the fish species tested.  相似文献   
15.
16.
王维  雷静 《声学技术》2022,41(5):724-728
近年来,通过优化飞行程序降低机场飞机噪声影响成为机场环境保护的重要研究方向。文章首先建立了基于飞机“噪声-功率-距离”数据的噪声计算模型,介绍了平均飞行航迹以及连续爬升运行(Continuous Climb Opera-tion, CCO)离场程序的相关理论,最后以大型国际机场为实例,使用飞机平均飞行航迹进行噪声预测,运用综合噪声模型计算出噪声影响面积并绘制噪声影响等值线图,比较了CCO离场相对常规的标准仪表离场(Standard Instru-ment Departure, SID)的降噪效果。结果表明,CCO离场程序可有效降低机场噪声影响,在高噪声级影响区域的降噪效果更佳。  相似文献   
17.
18.
Geogrids embedded in fill materials are checked against pullout failure through standard pullout testing methodology. The test determines the pullout interaction coefficient which is critical in fixing the embedment length of geogrids in mechanically stabilized earth walls. This paper proposes prediction of pullout interaction coefficient using data driven machine learning regression algorithms. The study primarily focusses on using extreme gradient boosting (XGBoost) method for prediction. A data set containing 220 test results from the literature has been used for training and testing. Predicted results of XGBoost have been compared with the results of random forest (RF) ensemble learning based algorithm. The predictions of XGBoost model indicates 85% accuracy and that of RF model shows 77% accuracy, indicating significantly superior and robust prediction through XGBoost above RF model. The importance analysis indicates that normal stress is the most significant factor that influences the pullout interaction coefficients. Subsequently pullout tests have been performed on geogrid embedded in four different fill materials at three normal stresses. The proposed XGBoost model gives 90% accuracy in prediction of pullout interaction coefficient compared to laboratory test results. Finally, an open-source graphical user interface based on the XGBoost model has been created for preliminary estimation of the pullout interaction coefficient of geogrid at different test conditions.  相似文献   
19.
In this paper, we strive to propose a self-interpretable framework, termed PrimitiveTree, that incorporates deep visual primitives condensed from deep features with a conventional decision tree, bridging the gap between deep features extracted from deep neural networks (DNNs) and trees’ transparent decision-making processes. Specifically, we utilize a codebook, which embeds the continuous deep features into a finite discrete space (deep visual primitives) to distill the most common semantic information. The decision tree adopts the spatial location information and the mapped primitives to present the decision-making process of the deep features in a tree hierarchy. Moreover, the trained interpretable PrimitiveTree can inversely explain the constituents of the deep features, highlighting the most critical and semantic-rich image patches attributing to the final predictions of the given DNN. Extensive experiments and visualization results validate the effectiveness and interpretability of our method.  相似文献   
20.
In this article, an adaptive denoising method is suggested to accurate investigate the optical and structural features of polymeric fibers from noisy phase shifting microinterferograms. The mixed class of noise that may produce in the phase-shifting interferometric techniques is established. To our knowledge, this is an early study considered the mixing noises that may occur in microinterferograms. The suggested method utilized the convolution neural networks to detect the noise class and then denoising, it according to its class. Four convolution neural networks (Googlenet, VGG-19, Alexnet, and Alexnet–SVM) are refined to perform the automatic classification process for the noise class in the established data set. The network with the highest validation and testing accuracy of these networks is considered to apply the suggested method on realistic noisy microinterferograms for polymeric fibers, polypropylene and antimicrobial polyethylene terephthalate)/titanium dioxide, recoded using interference microscope. Also, the suggested method is applied on noisy microinterferograms include crazing and nanocomposite material. The demodulated phase maps and the three-dimensional birefringence profiles are calculated for tested fibers according to the suggested method. The obtained results are compared with the published data for these fibers and found to be in good agreements.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号