首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20913篇
  免费   915篇
  国内免费   931篇
电工技术   436篇
技术理论   1篇
综合类   836篇
化学工业   344篇
金属工艺   376篇
机械仪表   1324篇
建筑科学   610篇
矿业工程   1690篇
能源动力   247篇
轻工业   180篇
水利工程   83篇
石油天然气   186篇
武器工业   192篇
无线电   1919篇
一般工业技术   722篇
冶金工业   1653篇
原子能技术   260篇
自动化技术   11700篇
  2023年   149篇
  2022年   209篇
  2021年   311篇
  2020年   365篇
  2019年   244篇
  2018年   291篇
  2017年   401篇
  2016年   497篇
  2015年   502篇
  2014年   988篇
  2013年   869篇
  2012年   1023篇
  2011年   1396篇
  2010年   965篇
  2009年   1056篇
  2008年   1182篇
  2007年   1525篇
  2006年   1490篇
  2005年   1424篇
  2004年   1266篇
  2003年   1203篇
  2002年   886篇
  2001年   652篇
  2000年   531篇
  1999年   491篇
  1998年   354篇
  1997年   274篇
  1996年   268篇
  1995年   250篇
  1994年   169篇
  1993年   158篇
  1992年   105篇
  1991年   69篇
  1990年   74篇
  1989年   80篇
  1988年   70篇
  1987年   53篇
  1986年   78篇
  1985年   65篇
  1984年   57篇
  1983年   34篇
  1982年   41篇
  1981年   56篇
  1979年   31篇
  1978年   31篇
  1977年   33篇
  1976年   45篇
  1968年   46篇
  1965年   32篇
  1964年   27篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
The development of data-driven artificial intelligence technology has given birth to a variety of big data applications. Data has become an essential factor to improve these applications. Federated learning, a privacy-preserving machine learning method, is proposed to leverage data from different data owners. It is typically used in conjunction with cryptographic methods, in which data owners train the global model by sharing encrypted model updates. However, data encryption makes it difficult to identify the quality of these model updates. Malicious data owners may launch attacks such as data poisoning and free-riding. To defend against such attacks, it is necessary to find an approach to audit encrypted model updates. In this paper, we propose a blockchain-based audit approach for encrypted gradients. It uses a behavior chain to record the encrypted gradients from data owners, and an audit chain to evaluate the gradients’ quality. Specifically, we propose a privacy-preserving homomorphic noise mechanism in which the noise of each gradient sums to zero after aggregation, ensuring the availability of aggregated gradient. In addition, we design a joint audit algorithm that can locate malicious data owners without decrypting individual gradients. Through security analysis and experimental evaluation, we demonstrate that our approach can defend against malicious gradient attacks in federated learning.  相似文献   
2.
With a sharp increase in the information volume, analyzing and retrieving this vast data volume is much more essential than ever. One of the main techniques that would be beneficial in this regard is called the Clustering method. Clustering aims to classify objects so that all objects within a cluster have similar features while other objects in different clusters are as distinct as possible. One of the most widely used clustering algorithms with the well and approved performance in different applications is the k-means algorithm. The main problem of the k-means algorithm is its performance which can be directly affected by the selection in the primary clusters. Lack of attention to this crucial issue has consequences such as creating empty clusters and decreasing the convergence time. Besides, the selection of appropriate initial seeds can reduce the cluster’s inconsistency. In this paper, we present a new method to determine the initial seeds of the k-mean algorithm to improve the accuracy and decrease the number of iterations of the algorithm. For this purpose, a new method is proposed considering the average distance between objects to determine the initial seeds. Our method attempts to provide a proper tradeoff between the accuracy and speed of the clustering algorithm. The experimental results showed that our proposed approach outperforms the Chithra with 1.7% and 2.1% in terms of clustering accuracy for Wine and Abalone detection data, respectively. Furthermore, achieved results indicate that comparing with the Reverse Nearest Neighbor (RNN) search approach, the proposed method has a higher convergence speed.  相似文献   
3.
为了探讨在安卓平台上构建医用图像采集系统的开发个案,分析通过以智能手机、平板电脑为核心安卓设备通过拍照获得化验单数据后进行文本识别并提交智慧医疗系统的解决方案。本文首先通过二值化算法形成低阈值图像数据,使用卷积神经元网络算法对文本进行逐一识别,使用K-means算法对识别后的单字文本进行字段记录值的整合并形成元数据库服务于其他智慧医疗系统模块。在使用9000组数据对神经元网络进行前期训练的前提下,该系统的识别准确率达到了99.5%以上。本系统具有一定的可行性,对未来智慧医疗的系统开发有实践意义。  相似文献   
4.
《Ceramics International》2021,47(20):28086-28105
Refractory castables develop microstructures after curing that behave as partially saturated porous media. Upon heating (during its drying stage), the steam generated by the physical and chemically bond water can result in pore pressurization and explosive spalling. Numerical modeling can provide guidelines for designing safer heat-up profiles and also a better understanding of the mechanisms that lead to catastrophic damage. This work aims to review the fundamentals and models available, providing insightful thoughts on the current trends of the drying phenomena of ceramic compositions. The review also highlights that there are models better oriented to result in reasonable predictions of pore pressure values and others focused on a more accurate representation of the main physical phenomena that take place during heating. According to the findings, there are still various challenges to attain accurate models with high applicability capable of yielding safer and more efficient drying of refractory castables.  相似文献   
5.
Tracking-by-detection (TBD) is a significant framework for visual object tracking. However, current trackers are usually updated online based on random sampling with a probability distribution. The performance of the learning-based TBD trackers is limited by the lack of discriminative features, especially when the background is full of semantic distractors. We propose an attention-driven data augmentation method, in which a residual attention mechanism is integrated into the TBD tracking network as supplementary references to identify discriminative image features. A mask generating network is used to simulate changes in target appearances to obtain positive samples, where attention information and image features are combined to identify discriminative features. In addition, we propose a method for mining hard negative samples, which searches for semantic distractors with the response of the attention module. The experiments on the OTB2015, UAV123, and LaSOT benchmarks show that this method achieves competitive performance in terms of accuracy and robustness.  相似文献   
6.
随着科学技术的发展,粮食行业信息化发展得到了强有力的科技支撑。为满足粮库整体信息化建设的要求,打破"信息孤岛"现状,实现资源整合、数据共享,为大数据分析和数据应用提供数据基础,设计一款能够实时采集粮仓内温湿度、氧气、二氧化碳气体浓度、粮堆高度的数据集成系统。系统采用分层分布式结构,由数据集中器和多种传感器模块组成,数据集中器与各传感器模块间通过RS485总线进行数据通讯,并由数据集中器通过网络专线传输汇总的环境监测数据,通过专用软件进行数据处理和挖掘,从而实现粮仓环境监测和预警等功能。  相似文献   
7.
地表建构筑物位于在生产矿山地表开采移动范围内,如果按照一般圈定地表移动范围原则判断建构筑物的安全可靠性,结果是不安全或者预留保安矿柱可保证安全。为分析地表移动带范围内建构筑物安全可靠性,采用FLAC3D软件建立数值模拟模型,对矿区地表移动进行分析研究,并结合建构筑物的破坏等级评判标准,可以更加合理地判断地表移动范围内建构筑物的安全可靠性,对存在相似条件的矿山具有一定的借鉴意义。  相似文献   
8.
以伊犁矿区第三系砂砾岩含水层下综放开采为工程背景,利用相似模拟实验研究了采动引起覆岩的破断特征。结果表明,工作面推进到135 m左右,裂隙带即与砂砾岩含水层贯通,这对于6-7煤层安全高效开采造成较大威胁。为了保障工作面回采安全,设计了超前探放水钻孔,累计泄水量344 800 m3,大幅度减少了对粗砂岩流砂层的补给作用;对首采综放工作面现场观测表明,垮落到采空区的粗砂岩流砂层成为湿润的固体砂,固体砂覆盖于采空区又起到防灭火的作用,对矿井安全生产十分有利。  相似文献   
9.
从黄柏河东支流域磷矿山绿色开发要求出发,基于地表水环境系统和矿业开采的耦合影响作用,开展了磷矿山开采对黄柏河东支的水环境的影响研究。通过定量和定性分析,在磷矿山开采过程中对黄柏河东支的各种影响因素中,矿井涌水(占比为43.19%)、尾渣淋溶水(占比为15.51%)、矿废石淋溶水(占比为14.64%)和生产废水(占比为10.84%)为磷矿山开采对黄柏河东支水环境的主要影响因素,尤其是矿井涌水携带的总污染物量大,影响占比接近50%。该研究影响分析为黄柏河东支水环境的治理提供有力指引支撑。  相似文献   
10.
The parameters governing the crystallisation of paracetamol using various conventional techniques has been extensively studied, however the factors influencing the drug crystallisation using spray drying is not as well understood. The aim of this work was to investigate the crystallisation of an active pharmaceutical ingredient through evaporative crystallisation using a spray dryer to study the physicochemical properties of the drug and to use semi-empirical equations to gain insight into the morphology and particle size of the dried powder. Paracetamol solutions were spray dried at various inlet temperatures ranging from 60 °C to 120 °C and also from a series of inlet feed solvent compositions ranging from 50/50% v/v ethanol/water to 100% ethanol and solid-state characterisation was done. The size and morphology of the dried materials were altered with a change in spray drying parameters, with an increase in inlet temperature leading to an increase in particle Sauter mean diameter (from 3.0 to 4.4 µm) and a decrease in the particle size with an increase in ethanol concentration in the feed (from 4.6 to 4.4 µm) as a result of changes in particle density and atomised droplet size. The morphology of the dried particles consisted of agglomerates of individual crystallites bound together into larger semi-spherical agglomerates with a higher tendency for particles having crystalline ridges to form at higher ethanol concentrations of the feed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号