全文获取类型
收费全文 | 1725篇 |
免费 | 371篇 |
国内免费 | 329篇 |
专业分类
电工技术 | 94篇 |
综合类 | 181篇 |
化学工业 | 99篇 |
金属工艺 | 20篇 |
机械仪表 | 78篇 |
建筑科学 | 8篇 |
矿业工程 | 63篇 |
能源动力 | 18篇 |
轻工业 | 17篇 |
水利工程 | 3篇 |
石油天然气 | 5篇 |
武器工业 | 10篇 |
无线电 | 262篇 |
一般工业技术 | 115篇 |
冶金工业 | 17篇 |
原子能技术 | 1篇 |
自动化技术 | 1434篇 |
出版年
2024年 | 1篇 |
2023年 | 35篇 |
2022年 | 48篇 |
2021年 | 64篇 |
2020年 | 80篇 |
2019年 | 66篇 |
2018年 | 66篇 |
2017年 | 90篇 |
2016年 | 81篇 |
2015年 | 119篇 |
2014年 | 140篇 |
2013年 | 136篇 |
2012年 | 153篇 |
2011年 | 181篇 |
2010年 | 120篇 |
2009年 | 138篇 |
2008年 | 152篇 |
2007年 | 169篇 |
2006年 | 136篇 |
2005年 | 115篇 |
2004年 | 77篇 |
2003年 | 48篇 |
2002年 | 49篇 |
2001年 | 26篇 |
2000年 | 22篇 |
1999年 | 29篇 |
1998年 | 20篇 |
1997年 | 11篇 |
1996年 | 9篇 |
1995年 | 10篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 6篇 |
1988年 | 4篇 |
1987年 | 1篇 |
1984年 | 4篇 |
1983年 | 5篇 |
1981年 | 1篇 |
1980年 | 3篇 |
1977年 | 1篇 |
排序方式: 共有2425条查询结果,搜索用时 15 毫秒
101.
102.
O. PostolacheAuthor Vitae H. Geirinhas Ramos Author VitaeA. Lopes Ribeiro Author Vitae 《Computer Standards & Interfaces》2011,33(2):191-200
This work presents an eddy-current testing system based on a giant magnetoresistive (GMR) sensing device. Non-destructive tests in aluminum plates are applied in order to extract information about possible defects: cracks, holes and other mechanical damages. Eddy-current testing (ECT) presents major benefits such as low cost, high checking speed, robustness and high sensitivity to large classes of defects. Coil based architecture probes or coil-magnetoresistive probes are usually used in ECT. In our application the GMR sensor is used to detect a magnetic field component parallel to a plate surface, when an excitation field perpendicular to the plate is imposed. A neural network processing architecture, including a multilayer perceptron and a competitive neural network, is used to classify defects using the output amplitude of the eddy-current probe (ECP) and its operation frequency. The crack detection, classification and estimation of the geometrical characteristics, for different classes of defects, are described in the paper. 相似文献
103.
为了解决分布式结构给P2P网络带来的安全问题,提出了一种适用于P2P网络的恶意节点检测机制,在此基础上设计了P2P网络恶意节点检测模型。在网络中定义针对不同攻击的节点行为规范(NBS),并根据NBS对节点之间发送的消息进行比较,找出与多数节点发送消息具有不同内容的节点,定义为恶意节点,然后利用分布式证书机制将恶意节点清除出网络。实验结果表明,该机制具有较好的可靠性和有效性。 相似文献
104.
A distributed approach to enabling privacy-preserving model-based classifier training 总被引:4,自引:4,他引:0
Hangzai Luo Jianping Fan Xiaodong Lin Aoying Zhou Elisa Bertino 《Knowledge and Information Systems》2009,20(2):157-185
This paper proposes a novel approach for privacy-preserving distributed model-based classifier training. Our approach is an
important step towards supporting customizable privacy modeling and protection. It consists of three major steps. First, each
data site independently learns a weak concept model (i.e., local classifier) for a given data pattern or concept by using
its own training samples. An adaptive EM algorithm is proposed to select the model structure and estimate the model parameters simultaneously. The second step deals with combined classifier training by integrating the weak concept models that are shared from multiple data sites. To reduce the data transmission costs and
the potential privacy breaches, only the weak concept models are sent to the central site and synthetic samples are directly generated from these shared weak concept models at the central site. Both the shared weak concept models and
the synthetic samples are then incorporated to learn a reliable and complete global concept model. A computational approach is developed to automatically achieve a good trade off between the privacy disclosure risk, the
sharing benefit and the data utility. The third step deals with validating the combined classifier by distributing the global
concept model to all these data sites in the collaboration network while at the same time limiting the potential privacy breaches.
Our approach has been validated through extensive experiments carried out on four UCI machine learning data sets and two image
data sets.
相似文献
Jianping FanEmail: |
105.
Comparison of different classifier algorithms for diagnosing macular and optic nerve diseases 总被引:1,自引:1,他引:0
Abstract: The aim of this research was to compare classifier algorithms including the C4.5 decision tree classifier, the least squares support vector machine (LS-SVM) and the artificial immune recognition system (AIRS) for diagnosing macular and optic nerve diseases from pattern electroretinography signals. The pattern electroretinography signals were obtained by electrophysiological testing devices from 106 subjects who were optic nerve and macular disease subjects. In order to show the test performance of the classifier algorithms, the classification accuracy, receiver operating characteristic curves, sensitivity and specificity values, confusion matrix and 10-fold cross-validation have been used. The classification results obtained are 85.9%, 100% and 81.82% for the C4.5 decision tree classifier, the LS-SVM classifier and the AIRS classifier respectively using 10-fold cross-validation. It is shown that the LS-SVM classifier is a robust and effective classifier system for the determination of macular and optic nerve diseases. 相似文献
106.
We present in this work a two-step sparse classifier called IP-LSSVM which is based on Least Squares Support Vector Machine (LS-SVM). The formulation of LS-SVM aims at solving the learning problem with a system of linear equations. Although this solution is simpler, there is a loss of sparseness in the feature vectors. Many works on LS-SVM are focused on improving support vectors representation in the least squares approach, since they correspond to the only vectors that must be stored for further usage of the machine, which can also be directly used as a reduced subset that represents the initial one. The proposed classifier incorporates the advantages of either SVM and LS-SVM: automatic detection of support vectors and a solution obtained simply by the solution of systems of linear equations. IP-LSSVM was compared with other sparse LS-SVM classifiers from literature, and RRS+LS-SVM. The experiments were performed on four important benchmark databases in Machine Learning and on two artificial databases created to show visually the support vectors detected. The results show that IP-LSSVM represents a viable alternative to SVMs, since both have similar features, supported by literature results and yet IP-LSSVM has a simpler and more understandable formulation. 相似文献
107.
In this paper, we study the performance improvement that it is possible to obtain combining classifiers based on different
notions (each trained using a different physicochemical property of amino-acids). This multi-classifier has been tested in
three problems: HIV-protease; recognition of T-cell epitopes; predictive vaccinology. We propose a multi-classifier that combines
a classifier that approaches the problem as a two-class pattern recognition problem and a method based on a one-class classifier.
Several classifiers combined with the “sum rule” enables us to obtain an improvement performance over the best results previously
published in the literature.
相似文献
Loris NanniEmail: |
108.
Rule-based intrusion detection systems generally rely on hand crafted signatures developed by domain experts. This could lead to a delay in updating the signature bases and potentially compromising the security of protected systems. In this paper, we present a biologically-inspired computational approach to dynamically and adaptively learn signatures for network intrusion detection using a supervised learning classifier system. The classifier is an online and incremental parallel production rule-based system.A signature extraction system is developed that adaptively extracts signatures to the knowledge base as they are discovered by the classifier. The signature extraction algorithm is augmented by introducing new generalisation operators that minimise overlap and conflict between signatures. Mechanisms are provided to adapt main algorithm parameters to deal with online noisy and imbalanced class data. Our approach is hybrid in that signatures for both intrusive and normal behaviours are learnt.The performance of the developed systems is evaluated with a publicly available intrusion detection dataset and results are presented that show the effectiveness of the proposed system. 相似文献
109.
110.
软件工程中的软件缺陷报告数量在快速增长,开发者们越来越困惑于大量的缺陷报告。因此,为了达到缺陷修复和软件复用等目的,有必要研究软件缺陷报告的提取方法。提出一种提取方法,该方法首先合并缺陷报告中的同义词,然后建立空间向量模型,使用词频反文档频率以及信息增益等文本挖掘的方法来收集软件缺陷报告中单词的特征,同时设计算法来确定句子复杂度以选择长句,最后将贝叶斯分类器引入该领域。该方法可以提高缺陷报告提取的命中率,降低虚警率。实验证明,基于文本挖掘和贝叶斯分类器的软件缺陷报告提取方法在接受者工作特征曲线面积(0.71)、F-score(0.80)和Kappa值(0.75)方面有良好效果。 相似文献