全文获取类型
收费全文 | 28676篇 |
免费 | 5473篇 |
国内免费 | 4100篇 |
专业分类
电工技术 | 1583篇 |
技术理论 | 1篇 |
综合类 | 3231篇 |
化学工业 | 2202篇 |
金属工艺 | 834篇 |
机械仪表 | 2200篇 |
建筑科学 | 2371篇 |
矿业工程 | 505篇 |
能源动力 | 601篇 |
轻工业 | 1095篇 |
水利工程 | 582篇 |
石油天然气 | 1081篇 |
武器工业 | 305篇 |
无线电 | 3400篇 |
一般工业技术 | 3254篇 |
冶金工业 | 1018篇 |
原子能技术 | 291篇 |
自动化技术 | 13695篇 |
出版年
2024年 | 189篇 |
2023年 | 895篇 |
2022年 | 1604篇 |
2021年 | 1688篇 |
2020年 | 1631篇 |
2019年 | 1338篇 |
2018年 | 1149篇 |
2017年 | 1280篇 |
2016年 | 1376篇 |
2015年 | 1404篇 |
2014年 | 1910篇 |
2013年 | 1950篇 |
2012年 | 2285篇 |
2011年 | 2305篇 |
2010年 | 1795篇 |
2009年 | 1784篇 |
2008年 | 1807篇 |
2007年 | 1918篇 |
2006年 | 1596篇 |
2005年 | 1412篇 |
2004年 | 1149篇 |
2003年 | 996篇 |
2002年 | 847篇 |
2001年 | 698篇 |
2000年 | 602篇 |
1999年 | 504篇 |
1998年 | 384篇 |
1997年 | 327篇 |
1996年 | 248篇 |
1995年 | 228篇 |
1994年 | 164篇 |
1993年 | 116篇 |
1992年 | 110篇 |
1991年 | 86篇 |
1990年 | 91篇 |
1989年 | 81篇 |
1988年 | 61篇 |
1987年 | 25篇 |
1986年 | 22篇 |
1985年 | 31篇 |
1984年 | 21篇 |
1983年 | 29篇 |
1982年 | 16篇 |
1980年 | 10篇 |
1979年 | 11篇 |
1966年 | 6篇 |
1964年 | 6篇 |
1959年 | 8篇 |
1958年 | 5篇 |
1955年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Small object detection is challenging and far from satisfactory. Most general object detectors suffer from two critical issues with small objects: (1) Feature extractor based on classification network cannot express the characteristics of small objects reasonably due to insufficient appearance information of targets and a large amount of background interference around them. (2) The detector requires a much higher location accuracy for small objects than for general objects. This paper proposes an effective and efficient small object detector YOLSO to address the above problems. For feature representation, we analyze the drawbacks in previous backbones and present a Half-Space Shortcut(HSSC) module to build a background-aware backbone. Furthermore, a coarse-to-fine Feature Pyramid Enhancement(FPE) module is introduced for layer-wise aggregation at a granular level to enhance the semantic discriminability. For loss function, we propose an exponential L1 loss to promote the convergence of regression, and a focal IOU loss to focus on prime samples with high classification confidence and high IOU. Both of them significantly improves the location accuracy of small objects. The proposed YOLSO sets state-of-the-art results on two typical small object datasets, MOCOD and VeDAI, at a speed of over 200 FPS. In the meantime, it also outperforms the baseline YOLOv3 by a wide margin on the common COCO dataset. 相似文献
2.
3.
Alexander Detzner Martin Eigner 《Quality and Reliability Engineering International》2021,37(1):335-351
Manufacturing companies not only strive to deliver flawless products but also monitor product failures in the field to identify potential quality issues. When product failures occur, quality engineers must identify the root cause to improve any affected product and process. This root-cause analysis can be supported by feature selection methods that identify relevant product attributes, such as manufacturing dates with an increased number of product failures. In this paper, we present different methods for feature selection and evaluate their ability to identify relevant product attributes in a root-cause analysis. First, we compile a list of feature selection methods. Then, we summarize the properties of product attributes in warranty case data and discuss these properties regarding the challenges they pose for machine learning algorithms. Next, we simulate datasets of warranty cases, which emulate these product properties. Finally, we compare the feature selection methods based on these simulated datasets. In the end, the univariate filter information gain is determined to be a suitable method for a wide range of applications. The comparison based on simulated data provides a more general result than other publications, which only focus on a single use case. Due to the generic nature of the simulated datasets, the results can be applied to various root-cause analysis processes in different quality management applications and provide a guideline for readers who wish to explore machine learning methods for their analysis of quality data. 相似文献
4.
《Mechatronics》2022
This paper considers the shared path following control of an unmanned ground vehicle by a single person. A passive measure of human intent is used to blend the human and machine inputs in a mixed initiative approach. The blending law is combined with saturated super-twisting sliding mode speed and heading controllers, so that exogenous disturbances can be counteracted via equivalent control. It is proven that when the proposed blending law is used, the combined control signals from both the human and automatic controller respect the actuator magnitude constraints of the machine. To demonstrate the approach, shared control experiments are performed using an unmanned ground vehicle, which follows a lawn mower pattern shaped path. 相似文献
5.
多种退化类型混合的图像比单一类型的退化图像降质更严重,很难建立精确模型对其复原,研究端到端的神经网络算法是复原的关键.现有的基于操作选择注意力网络的算法(operation-wiseattentionnetwork,OWAN)虽然有一定的性能提升,但是其网络过于复杂,运行较慢,复原图像缺乏高频细节,整体效果也有提升的空间.针对这些问题,提出一种基于层级特征融合的自适应复原算法.该算法直接融合不同感受野分支的特征,增强复原图像的结构;用注意力机制对不同层级的特征进行动态融合,增加模型的自适应性,降低了模型冗余;另外,结合L1损失和感知损失,增强了复原图像的视觉感知效果.在DIV2K,BSD500等数据集上的实验结果表明,该算法无论是在峰值信噪比和结构相似性上的定量分析,还是在主观视觉质量方面,均优于OWAN算法,充分证明了该算法的有效性. 相似文献
6.
Jens Mller Anne Busch Christian Berens Helmut Hotzel Andreas Burkovski 《International journal of molecular sciences》2021,22(7)
Corynebacterium silvaticum is a newly identified animal pathogen of forest animals such as roe deer and wild boars. The species is closely related to the emerging human pathogen Corynebacterium ulcerans and the widely distributed animal pathogen Corynebacterium pseudotuberculosis. In this study, Corynebacterium silvaticum strain W25 was characterized with respect to its interaction with human cell lines. Microscopy, measurement of transepithelial electric resistance and cytotoxicity assays revealed detrimental effects of C. silvaticum to different human epithelial cell lines and to an invertebrate animal model, Galleria mellonella larvae, comparable to diphtheria toxin-secreting C. ulcerans. Furthermore, the results obtained may indicate a considerable zoonotic potential of this newly identified species. 相似文献
7.
《International Journal of Hydrogen Energy》2022,47(36):16121-16131
Ammonia is considered as a promising hydrogen or energy carrier. Ammonia absorption or adsorption is an important aspect for both ammonia removal, storage and separation applications. To these ends, a wide range of solid and liquid sorbents have been investigated. Among these, the deep eutectic solvent (DES) is emerging as a promising class of ammonia absorbers. Herein, we report a novel type of DES, i.e., metal-containing DESs for ammonia absorption. Specifically, the NH3 absorption capacity is enhanced by ca. 18.1–36.9% when a small amount of metal chlorides, such as MgCl2, MnCl2 etc., are added into a DES composed of resorcinol (Res) and ethylene glycol (EG). To our knowledge, the MgCl2/Res/EG (0.1:1:2) DES outperforms most of the reported DESs. The excellent NH3 absorption performances of metal–containing DESs have been attributed to the synergy of Lewis acid–base and hydrogen bonding interactions. Additionally, good reversibility and high NH3/CO2 selectivity are achieved over the MgCl2/Res/EG (0.1:1:2) DES, which enables it to be a potential NH3 absorber for further investigations. 相似文献
8.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security. 相似文献
9.
Collaboration with artificial intelligence (AI) is a growing trend even in the field of creativity. This paper examines which quantitative metrics can be used to comparatively analyse human-computer co-creativity with children. To study this question, 24 schoolchildren of age 10–11 wrote a poem with three co-creative poetry writing processes: a human-computer, a human-human, and a human-human-computer process. The computational participant in the processes was an AI-based application called the Poetry Machine. The children were asked to evaluate their user experience with a 5-point Likert-type questionnaire after each writing process and a comparative questionnaire after finishing all processes. The metrics used in the evaluation were immediate fun, long-term enjoyment, creativity, self-expression, outcome satisfaction, ease of starting and finishing writing, quality of ideas and support from others, and ownership.
Significant differences were found in fun, long-term enjoyment, quality of ideas, support, and ownership. The high number of statistically relevant results was enabled by exposing all participants to all writing processes, and the comparative questionnaire. The human-human-computer process was evaluated the best in long-term enjoyment and the human-computer process the weakest in support and idea quality. Creativity and ease of finishing writing turned out to be outlining metrics for the co-creative processes. 相似文献
10.
轮对在列车走行过程中起着导向、承受以及传递载荷的作用,其踏面及轮缘磨耗对地铁列车运行安全性和钢轨的寿命都将产生重要影响。根据地铁列车车轮磨耗机理,分析车轮尺寸数据特点,针对轮缘厚度这一型面参数,基于梯度提升决策树算法构建轮缘厚度磨耗预测模型。在该模型的基础上,任意选取某轮对数据进行验证分析,结果表明:基于梯度提升决策树的轮对磨耗预测模型具有较好的预测精度,可预测出1~6个月的轮缘厚度变化趋势范围,预测时间范围较长,可为地铁维保部门对轮对的维修方式由状态修转为预防修提供指导性建议。 相似文献