全文获取类型
收费全文 | 182124篇 |
免费 | 17137篇 |
国内免费 | 9125篇 |
专业分类
电工技术 | 11390篇 |
技术理论 | 13篇 |
综合类 | 14846篇 |
化学工业 | 16329篇 |
金属工艺 | 5348篇 |
机械仪表 | 8792篇 |
建筑科学 | 19557篇 |
矿业工程 | 5436篇 |
能源动力 | 3234篇 |
轻工业 | 20002篇 |
水利工程 | 6094篇 |
石油天然气 | 7048篇 |
武器工业 | 1517篇 |
无线电 | 18279篇 |
一般工业技术 | 11462篇 |
冶金工业 | 7697篇 |
原子能技术 | 1710篇 |
自动化技术 | 49632篇 |
出版年
2024年 | 360篇 |
2023年 | 2570篇 |
2022年 | 4950篇 |
2021年 | 7185篇 |
2020年 | 5810篇 |
2019年 | 4724篇 |
2018年 | 4556篇 |
2017年 | 4921篇 |
2016年 | 6237篇 |
2015年 | 7444篇 |
2014年 | 12399篇 |
2013年 | 11108篇 |
2012年 | 12531篇 |
2011年 | 12818篇 |
2010年 | 9987篇 |
2009年 | 10131篇 |
2008年 | 10169篇 |
2007年 | 12965篇 |
2006年 | 11979篇 |
2005年 | 10496篇 |
2004年 | 8607篇 |
2003年 | 7772篇 |
2002年 | 6060篇 |
2001年 | 4416篇 |
2000年 | 3606篇 |
1999年 | 2831篇 |
1998年 | 2012篇 |
1997年 | 1613篇 |
1996年 | 1444篇 |
1995年 | 1244篇 |
1994年 | 959篇 |
1993年 | 685篇 |
1992年 | 535篇 |
1991年 | 443篇 |
1990年 | 366篇 |
1989年 | 318篇 |
1988年 | 241篇 |
1987年 | 206篇 |
1986年 | 175篇 |
1985年 | 210篇 |
1984年 | 180篇 |
1983年 | 150篇 |
1982年 | 131篇 |
1981年 | 112篇 |
1980年 | 101篇 |
1979年 | 61篇 |
1977年 | 49篇 |
1976年 | 48篇 |
1964年 | 43篇 |
1962年 | 69篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
针对目标估计过程需要大量人工参与、自动化程度低的问题,提出了基于数据质量评价的目标估计方法。利用目标数据质量评价方法,对不同传感器得到的目标数据质量进行科学、有效的测度和评价,并根据质量得分动态调整各数据源在目标估计过程中所占的权重,从而减少人工干预,提高目标估计效能。仿真试验结果证明了该方法的有效性。 相似文献
2.
3.
In the present paper, therapeutic treatment of infected tumorous cells has been studied through mathematical modeling and simulation of heat transfer in tissues by using a nonlinear dual-phase lag bioheat transfer model with Dirichlet boundary condition. The components of volumetric heat source in this model such as blood perfusion and metabolism are assumed experimentally validated temperature-dependent function, which gives more accurate temperature distribution in tissues through this model. We have used the finite difference and RK (4, 5) techniques of numerical methods to solve the proposed problem and obtained the exact solution in a particular case. After comparison, we got a good agreement between them. We have used dimensionless quantities throughout this paper. The effect of relaxation and thermalization time with respect to dimensionless temperature distribution has been analyzed in the treatment process. 相似文献
4.
针对目前气象数据存储所面临的海量扩张、高并发读写、结构化和非结构化数据并存以及长时间序列和大数据集检索效率低下等问题,提出了以Hadoop开源框架为基础的气象数据分布式存储方案。通过对气象数据自身属性和特点进行分析,得出了气象数据在经过充分优化的基础上,在分布式存储框架中具有很强的适应性和规模化应用的潜力;并在HBase数据库中的Row Key设计和小文件合并策略方面做了创新。最后针对气象数据中广泛存在的结构化和非结构化这两种主要数据类型,以自动气象站数据和雷达产品数据为具体实例,给出了详细的设计思路和实现方法。 相似文献
5.
机器翻译译文质量估计(Quality Estimation,QE)是指在不需要人工参考译文的条件下,估计机器翻译系统产生的译文的质量,对机器翻译研究和应用具有很重要的价值。机器翻译译文质量估计经过最近几年的发展,取得了丰富的研究成果。该文首先介绍了机器翻译译文质量估计的背景与意义;然后详细介绍了句子级QE、单词级QE、文档级QE的具体任务目标、评价指标等内容,进一步概括了QE方法发展的三个阶段: 基于特征工程和机器学习的QE方法阶段,基于深度学习的QE方法阶段,融入预训练模型的QE方法阶段,并介绍了每一阶段中的代表性研究工作;最后分析了目前的研究现状及不足,并对未来QE方法的研究及发展方向进行了展望。 相似文献
6.
《Digital Communications & Networks》2022,8(5):614-624
The development of data-driven artificial intelligence technology has given birth to a variety of big data applications. Data has become an essential factor to improve these applications. Federated learning, a privacy-preserving machine learning method, is proposed to leverage data from different data owners. It is typically used in conjunction with cryptographic methods, in which data owners train the global model by sharing encrypted model updates. However, data encryption makes it difficult to identify the quality of these model updates. Malicious data owners may launch attacks such as data poisoning and free-riding. To defend against such attacks, it is necessary to find an approach to audit encrypted model updates. In this paper, we propose a blockchain-based audit approach for encrypted gradients. It uses a behavior chain to record the encrypted gradients from data owners, and an audit chain to evaluate the gradients’ quality. Specifically, we propose a privacy-preserving homomorphic noise mechanism in which the noise of each gradient sums to zero after aggregation, ensuring the availability of aggregated gradient. In addition, we design a joint audit algorithm that can locate malicious data owners without decrypting individual gradients. Through security analysis and experimental evaluation, we demonstrate that our approach can defend against malicious gradient attacks in federated learning. 相似文献
7.
Joint photographic experts group (JPEG) can provide good quality with small file size but also eliminate extensively the redundancies of images. Therefore, hiding data into JPEG images in terms of maintaining high visual quality at small file sizes has been a great challenge for researchers. In this paper, an adaptive reversible data hiding method for JPEG images containing multiple two-dimensional (2D) histograms is proposed. Adaptability is mainly reflected in three aspects. The first one is to preferentially select sharper histograms for data embedding after histograms are established by constructing the th () histogram using the th non-zero alternating current (AC) coefficient of all the quantized discrete cosine transform blocks. On the other hand, to fully exploit the strong correlation between coefficients of one histogram, the smoothness of each coefficient is estimated by a block smoothness estimator so that a sharply-distributed 2D-histogram is constructed by combining two coefficients with similar smoothness into a pair. The pair corresponding to low complexity is selected priorly for data embedding, leading to high embedding performance while maintaining low file size. Besides, we design multiple embedding strategies to adaptively select the embedding strategy for each 2D histogram. Experimental results demonstrate that the proposed method can achieve higher rate–distortion performance which maintaining lower file storage space, compared with previous studies. 相似文献
8.
In this study, sea bream, sea bass, anchovy and trout were captured and recorded using a digital camera during refrigerated storage for 7 days. In addition, their total viable counts (TVC) were determined on a daily basis. Based on the TVC, each fish was classified as ‘fresh’ when it was <5 log cfu per g, and as ‘not fresh’ when it was >7 log cfu per g. They were uploaded on a web-based machine learning software called Teachable Machine (TM), which was trained about the pupils and heads of the fish. In addition, images of each species from different angles were uploaded to the software in order to ensure the recognition of fish species by TM. The data of the study indicated that the TM was able to distinguish fish species with high accuracy rates and achieved over 86% success in estimating the freshness of the fish species tested. 相似文献
9.
针对现有基于视频监控的人流量统计方案成本高、算法复杂且不利于个人隐私保护的局限性,利用毫米波雷达体积小、成本低、分辨率高的特点,提出了一种基于双时间点检测的人流量监测方法。该方法先获取人体目标散射点位置和多普勒频移信息来构成点云数据,然后根据多普勒频移正负来判断人体的运动方向,并筛选具有高多普勒频移值的点云数据以降低干扰点对聚类结果的影响;在双时间点对特定区域内人员数量进行统计,并根据双时间点之间所获取的点云数据聚类结果对所统计人员数据进行修正。实验结果表明,该方法能够用匿名的方式以较高的正确率统计人员进出。 相似文献
10.
益生菌可在肠道定植从而发挥抗炎或抗氧化活性,有利于宿主肠道健康。本实验研究了从新疆传统发酵乳制品中分离得到的8?株植物乳杆菌对大肠杆菌侵袭和过氧化氢刺激肠上皮细胞HT-29的保护作用。结果表明:在8?株植物乳杆菌中,植物乳杆菌35具有最高的黏附能力。植物乳杆菌35可通过取代、竞争、排阻的方式抑制大肠杆菌对HT-29细胞的黏附,抑制率分别为42.60%、59.17%、60.19%。植物乳杆菌35及其多糖可抑制大肠杆菌刺激HT-29细胞产生白细胞介素-8;同时保护HT-29细胞免受过氧化氢的损伤,增加超氧化物歧化酶、谷胱甘肽过氧化物酶活力水平并降低丙二醛含量。结论:植物乳杆菌35及其粗胞外多糖具有抑制大肠杆菌O157诱导的炎症性肠病的潜力。 相似文献