首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20845篇
  免费   1114篇
  国内免费   1074篇
电工技术   829篇
技术理论   2篇
综合类   1084篇
化学工业   467篇
金属工艺   409篇
机械仪表   1577篇
建筑科学   730篇
矿业工程   460篇
能源动力   347篇
轻工业   229篇
水利工程   218篇
石油天然气   246篇
武器工业   230篇
无线电   2350篇
一般工业技术   836篇
冶金工业   463篇
原子能技术   330篇
自动化技术   12226篇
  2024年   18篇
  2023年   160篇
  2022年   246篇
  2021年   376篇
  2020年   382篇
  2019年   263篇
  2018年   323篇
  2017年   429篇
  2016年   532篇
  2015年   578篇
  2014年   1158篇
  2013年   998篇
  2012年   1233篇
  2011年   1506篇
  2010年   1016篇
  2009年   1058篇
  2008年   1234篇
  2007年   1571篇
  2006年   1498篇
  2005年   1463篇
  2004年   1275篇
  2003年   1199篇
  2002年   897篇
  2001年   652篇
  2000年   522篇
  1999年   453篇
  1998年   337篇
  1997年   246篇
  1996年   238篇
  1995年   214篇
  1994年   150篇
  1993年   120篇
  1992年   73篇
  1991年   62篇
  1990年   56篇
  1989年   60篇
  1988年   52篇
  1987年   41篇
  1986年   38篇
  1985年   40篇
  1984年   39篇
  1983年   28篇
  1982年   26篇
  1981年   29篇
  1980年   22篇
  1979年   15篇
  1978年   21篇
  1977年   17篇
  1976年   31篇
  1975年   10篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Tracking-by-detection (TBD) is a significant framework for visual object tracking. However, current trackers are usually updated online based on random sampling with a probability distribution. The performance of the learning-based TBD trackers is limited by the lack of discriminative features, especially when the background is full of semantic distractors. We propose an attention-driven data augmentation method, in which a residual attention mechanism is integrated into the TBD tracking network as supplementary references to identify discriminative image features. A mask generating network is used to simulate changes in target appearances to obtain positive samples, where attention information and image features are combined to identify discriminative features. In addition, we propose a method for mining hard negative samples, which searches for semantic distractors with the response of the attention module. The experiments on the OTB2015, UAV123, and LaSOT benchmarks show that this method achieves competitive performance in terms of accuracy and robustness.  相似文献   
2.
To improve the safety of wet dust removal systems for processing magnesium-based alloys, a new method is proposed for preventing hydrogen generation. In this paper, hydrogen generation by Mg–Zn alloy dust was inhibited with six common metal corrosion inhibitors. The results showed that sodium dodecylbenzene sulfonate was the best hydrogen inhibitor, while CeCl3 enhanced hydrogen precipitation. The film-forming stability of sodium dodecylbenzene sulfonate was tested with different contents, temperatures, Cl? concentrations and perturbation rates. The results showed that this inhibitor formed stable protective films on the surfaces of Mg–Zn alloy particles, and adsorption followed the Langmuir adsorption model.  相似文献   
3.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability.  相似文献   
4.
为了探讨在安卓平台上构建医用图像采集系统的开发个案,分析通过以智能手机、平板电脑为核心安卓设备通过拍照获得化验单数据后进行文本识别并提交智慧医疗系统的解决方案。本文首先通过二值化算法形成低阈值图像数据,使用卷积神经元网络算法对文本进行逐一识别,使用K-means算法对识别后的单字文本进行字段记录值的整合并形成元数据库服务于其他智慧医疗系统模块。在使用9000组数据对神经元网络进行前期训练的前提下,该系统的识别准确率达到了99.5%以上。本系统具有一定的可行性,对未来智慧医疗的系统开发有实践意义。  相似文献   
5.
《Ceramics International》2021,47(20):28086-28105
Refractory castables develop microstructures after curing that behave as partially saturated porous media. Upon heating (during its drying stage), the steam generated by the physical and chemically bond water can result in pore pressurization and explosive spalling. Numerical modeling can provide guidelines for designing safer heat-up profiles and also a better understanding of the mechanisms that lead to catastrophic damage. This work aims to review the fundamentals and models available, providing insightful thoughts on the current trends of the drying phenomena of ceramic compositions. The review also highlights that there are models better oriented to result in reasonable predictions of pore pressure values and others focused on a more accurate representation of the main physical phenomena that take place during heating. According to the findings, there are still various challenges to attain accurate models with high applicability capable of yielding safer and more efficient drying of refractory castables.  相似文献   
6.
随着海洋资源勘探和海洋污染物监控工作的开展,水文数据的监测和采集等已经成为重要的研究方向。其中,水下无线传感器网络在水文数据采集过程中起着举足轻重的作用。本文研究的是水下无线传感器二维监测网络模型中,传感器节点数据采集的问题,其设计方法是通过自组织映射(Self-organizing mapping,SOM)对传感器节点进行路径最优化处理,结合优化的路径图形和K-means算法找到路径内部聚合点,利用聚合点和传感器的节点得到传感器通信半径内的数据采集点,最后通过SOM得到水下机器人(Autonomous underwater vehicle,AUV)到各个数据采集点采集数据的最优路径。经过实验验证,在水下1 200 m×1 750 m范围内布置52个传感器节点的情景下,数据采集点相比于传感器节点路径规划采用相同的采集顺序得到的路径优化了6.7%;对数据采集点重新进行自组织路径规划得到的路径比传感器结点路径的最优解提高了12.2%。增加传感器节点的数量,其结果也大致相同,因此采用该方法可以提高水下机器人采集数据的效率。  相似文献   
7.
This work aims to improve the existing monitoring systems MS for two grid-connected PV stations GCPVS of URERMS ADRAR, to eliminate its limitations. This improvement consists of developing an MS which is used for two PV stations with different configurations. This MS contains new LabVIEW-based monitoring software for visualizing real-time measured data and evaluating GCPVS performance. In addition, it illustrates the 2D and 3D real-time relationships of PV system parameters, which allow us to understand the dynamic behavior of PV system components. This developed monitoring software synchronizes also the various data acquisition units DAU of GCPVS, allowing simultaneous data access.To perform a reliable performance analysis and a comparative study of different GCPVS based on accurate measurements, the sensor's calibration is performed with its DAU. The MS autonomy is ensured by integrating developed PV-UPS. A graphical user interface is provided for the evaluation of PV-UPS performance.  相似文献   
8.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors.  相似文献   
9.
任浩伟  王树志 《中国矿业》2021,30(S2):13-15
本文选取2016年1月至2021年7月在地质学领域权威期刊:《地质学报》、《岩石学报》、《地学前缘》上发表的文献为研究对象,利用Endnote、Excel和Vosviewer等软件对数据进行相应的整理和清洗,分析了相关热点与关键词的耦合关系。结果显示:在成矿时代同位素定年的研究中,Lu-Hf年代学逐渐成为地学研究的一个热点;随着测试分析手段的进步,西藏地区作为研究青藏高原前寒武纪-早古生代演化历史的关键,逐渐成为当下国内外研究热点地区;随着信息技术的发展,地学研究的数据化、信息化,已成为地质学研究的热门方向。  相似文献   
10.
With a sharp increase in the information volume, analyzing and retrieving this vast data volume is much more essential than ever. One of the main techniques that would be beneficial in this regard is called the Clustering method. Clustering aims to classify objects so that all objects within a cluster have similar features while other objects in different clusters are as distinct as possible. One of the most widely used clustering algorithms with the well and approved performance in different applications is the k-means algorithm. The main problem of the k-means algorithm is its performance which can be directly affected by the selection in the primary clusters. Lack of attention to this crucial issue has consequences such as creating empty clusters and decreasing the convergence time. Besides, the selection of appropriate initial seeds can reduce the cluster’s inconsistency. In this paper, we present a new method to determine the initial seeds of the k-mean algorithm to improve the accuracy and decrease the number of iterations of the algorithm. For this purpose, a new method is proposed considering the average distance between objects to determine the initial seeds. Our method attempts to provide a proper tradeoff between the accuracy and speed of the clustering algorithm. The experimental results showed that our proposed approach outperforms the Chithra with 1.7% and 2.1% in terms of clustering accuracy for Wine and Abalone detection data, respectively. Furthermore, achieved results indicate that comparing with the Reverse Nearest Neighbor (RNN) search approach, the proposed method has a higher convergence speed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号