首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12640篇
  免费   533篇
  国内免费   271篇
电工技术   525篇
技术理论   1篇
综合类   225篇
化学工业   818篇
金属工艺   465篇
机械仪表   332篇
建筑科学   456篇
矿业工程   73篇
能源动力   114篇
轻工业   286篇
水利工程   88篇
石油天然气   243篇
武器工业   52篇
无线电   616篇
一般工业技术   498篇
冶金工业   192篇
原子能技术   123篇
自动化技术   8337篇
  2024年   17篇
  2023年   114篇
  2022年   234篇
  2021年   334篇
  2020年   211篇
  2019年   167篇
  2018年   147篇
  2017年   190篇
  2016年   132篇
  2015年   182篇
  2014年   424篇
  2013年   387篇
  2012年   986篇
  2011年   2553篇
  2010年   1303篇
  2009年   1121篇
  2008年   842篇
  2007年   735篇
  2006年   608篇
  2005年   699篇
  2004年   619篇
  2003年   645篇
  2002年   357篇
  2001年   54篇
  2000年   80篇
  1999年   85篇
  1998年   59篇
  1997年   39篇
  1996年   20篇
  1995年   23篇
  1994年   22篇
  1993年   14篇
  1992年   10篇
  1991年   9篇
  1990年   3篇
  1989年   3篇
  1988年   4篇
  1987年   3篇
  1985年   1篇
  1984年   2篇
  1983年   1篇
  1981年   3篇
  1959年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
目前已有蚁群算法优化的特征选择方法,大多采用的是以属性依赖度和信息熵属性重要度作为路径上启发搜索因子,但这类搜索方法在某些决策表中存在算法早熟或搜索到的特征子集包含了冗余特征,从而导致选择精度显著下降。针对此类问题,根据条件属性在分辨矩阵中的占比提出了一种属性重要度的度量方法,以分辨矩阵重要度作为路径上启发因子,设计了一种基于分辨矩阵与蚁群算法优化的特征子集搜索方法。该算法从特征核出发,蚁群依次选择概率大的特征加入特征核集,直至找到最小特征子集算法终止。通过实例验证和UCI数据集实验结果表明,与基于属性依赖度和信息熵属性重要度的特征选择方法相比,在通常情况下,该算法能较小代价找到最小特征子集,并且可以有效减少计算工作量。  相似文献   
992.
训练基于序列到序列(seq2seq)的文本简化模型需要大规模平行语料库,但是规模较大且标注质量较好的语料却难以获得。为此,提出一种无监督文本简化方法,使模型的学习仅需要无标注的复杂句和简单句语料。首先,利用去噪自编码器(denoising autoencoder)分别从简单句语料和复杂句语料中学习,获取简单句的自编码器和复杂句的自编码器;然后,组合两个自编码器形成初始的文本简化模型和文本复杂化模型;最后,利用回译策略(back-translation)将无监督文本简化问题转换为监督问题,不断迭代优化文本简化模型。通过在标准数据集上的实验验证,该方法在通用指标BLEU和SARI上均优于现有无监督模型,同时在词汇级别和句法级别均有简化效果。  相似文献   
993.
This paper addresses the problem of automatic optical phase identification of micro-drill bits for micro-drilling tool inspection in printed circuit board production. To overcome the limitations of conventional active shape model (ASM) on shape modeling of micro-drill bits, six key landmarks are defined for the initialization and optimization of ASM, and a novel method based on projection profiles is also proposed for these key landmarks detection. In addition, to involve the local shape feature, a bag of shape segment (BoSS) model is developed. Based on the improved ASM and BoSS, a new shape representation of micro-drill bits is proposed for phase identification. Experimental results show that the proposed method outperforms the conventional ASM and can improve the phase identification accuracy of micro-drill bits.  相似文献   
994.
汽油芳构化技术的应用   总被引:1,自引:0,他引:1  
采用汽油芳构化技术代替催化重整工艺,对某小型炼油厂(500kt/a)进行改造,投资约为催化重整的12%.使原料在HZSM-5分子筛催化剂内表面酸性中心发生裂化、齐聚、环化和脱氢反应,设置3台反应釜,用固定床模拟移动反应,石脑油2釜串联反应、另1釜待命,3釜轮流切换操作,实现连续生产,产物辛烷值>90#;催化轻汽油采用单釜反应,产物烯烃≤2%.解决了石脑油的低辛烷值及催化轻汽油烯烃质量分数>62%的双重难题,降低了能耗,延长了催化剂使用寿命,达到了汽油升级的目的.  相似文献   
995.
The two standard models used for communication in concurrent programs, shared memory and message passing, have been the focus of much debate for a long time. Still, we believe the main issue at stake should not be the choice between these models, but rather how to ensure that communication is structured, i.e., it occurs only in syntactically restricted code regions. In this survey, we explore concurrency control models and evaluate how their characteristics contribute positively or negatively to the support for structured communication. We focus the evaluation on three properties: reasonability, which is the main property we are interested in and determines how easily programmers can reason about a concurrent program’s execution; performance, which determines whether there are any distinct features which can prevent or facilitate efficient implementations; and composability, which determines whether a model offers constructs that can be used as building blocks for coarser-grained, or higher-level, concurrency abstractions.  相似文献   
996.
Test suites often grow very large over many releases, such that it is impractical to re-execute all test cases within limited resources. Test case prioritization rearranges test cases to improve the effectiveness of testing. Code coverage has been widely used as criteria in test case prioritization. However, the simple way may not reveal some bugs, such that the fault detection rate decreases. In this paper, we use the ordered sequences of program entities to improve the effectiveness of test case prioritization. The execution frequency profiles of test cases are collected and transformed into the ordered sequences. We propose several novel similarity-based test case prioritization techniques based on the edit distances of ordered sequences. An empirical study of five open source programs was conducted. The experimental results show that our techniques can significantly increase the fault detection rate and be effective in detecting faults in loops. Moreover, our techniques are more cost-effective than the existing techniques.  相似文献   
997.
In a wireless sensor network (WSN), random occurrences of faulty nodes degrade the quality of service of the network. In this paper, we propose an efficient fault detection and routing (EFDR) scheme to manage a large size WSN. The faulty nodes are detected by neighbour node’s temporal and spatial correlation of sensing information and heart beat message passed by the cluster head. In EFDR scheme, three linear cellular automata (CA) are used to manage transmitter circuit/ battery condition/microcontroller fault, receiver circuit fault and sensor circuit fault representation. On the other hand, L-system rules based data routing scheme is proposed to determine optimal routing path between cluster head and base station. The proposed EFDR technique is capable of detecting and managing the faulty nodes in an efficient manner. The simulation results show 86% improvement in the rate of energy loss compared to an existing algorithm.  相似文献   
998.
Cloud computing poses many challenges on integrity and privacy of users’ data though it brings an easy, cost-effective and reliable way of data management. Hence, secure and efficient methods are needed to ensure integrity and privacy of data stored at the cloud. Wang et al. proposed a privacy-preserving public auditing protocol in 2010 but it is seriously insecure. Their scheme is vulnerable to attacks from malicious cloud server and outside attackers regarding to storage correctness. So they proposed a scheme in 2011 with an improved security guarantee but it is not efficient. Thus, in this paper, we proposed a scheme which is secure and with better efficiency. It is a public auditing scheme with third party auditor (TPA), who performs data auditing on behalf of user(s). With detail security analysis, our scheme is proved secure in the random oracle model and our performance analysis shows the scheme is efficient.  相似文献   
999.
A hierarchical scheme for elastic graph matching applied to hand gesture recognition is proposed. The proposed algorithm exploits the relative discriminatory capabilities of visual features scattered on the images, assigning the corresponding weights to each feature. A boosting algorithm is used to determine the structure of the hierarchy of a given graph. The graph is expressed by annotating the nodes of interest over the target object to form a bunch graph. Three annotation techniques, manual, semi-automatic, and automatic annotation are used to determine the position of the nodes. The scheme and the annotation approaches are applied to explore the hand gesture recognition performance. A number of filter banks are applied to hand gestures images to investigate the effect of using different feature representation approaches. Experimental results show that the hierarchical elastic graph matching (HEGM) approach classified the hand posture with a gesture recognition accuracy of 99.85% when visual features were extracted by utilizing the Histogram of Oriented Gradient (HOG) representation. The results also provide the performance measures from the aspect of recognition accuracy to matching benefits, node positions correlation and consistency on three annotation approaches, showing that the semi-automatic annotation method is more efficient and accurate than the other two methods.  相似文献   
1000.
The paper studies a 3D fingerprint reconstruction technique based on multi-view touchless fingerprint images. This technique offers a solution for 3D fingerprint image generation and application when only multi-view 2D images are available. However, the difficulties and stresses of 3D fingerprint reconstruction are the establishment of feature correspondences based on 2D touchless fingerprint images and the estimation of the finger shape model. In this paper, several popular used features, such as scale invariant feature transformation (SIFT) feature, ridge feature and minutiae, are employed for correspondences establishment. To extract these fingerprint features accurately, an improved fingerprint enhancement method has been proposed by polishing orientation and ridge frequency maps according to the characteristics of 2D touchless fingerprint images. Therefore, correspondences can be established by adopting hierarchical fingerprint matching approaches. Through an analysis of 440 3D point cloud finger data (220 fingers, 2 pictures each) collected by a 3D scanning technique, i.e., the structured light illumination (SLI) method, the finger shape model is estimated. It is found that the binary quadratic function is more suitable for the finger shape model than the other mixed model tested in this paper. In our experiments, the reconstruction accuracy is illustrated by constructing a cylinder. Furthermore, results obtained from different fingerprint feature correspondences are analyzed and compared to show which features are more suitable for 3D fingerprint images generation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号