全文获取类型
收费全文 | 36007篇 |
免费 | 2464篇 |
国内免费 | 1532篇 |
专业分类
电工技术 | 2427篇 |
技术理论 | 1篇 |
综合类 | 2248篇 |
化学工业 | 2329篇 |
金属工艺 | 1307篇 |
机械仪表 | 2522篇 |
建筑科学 | 2795篇 |
矿业工程 | 1601篇 |
能源动力 | 892篇 |
轻工业 | 1404篇 |
水利工程 | 842篇 |
石油天然气 | 1867篇 |
武器工业 | 288篇 |
无线电 | 2762篇 |
一般工业技术 | 1811篇 |
冶金工业 | 1570篇 |
原子能技术 | 736篇 |
自动化技术 | 12601篇 |
出版年
2024年 | 50篇 |
2023年 | 296篇 |
2022年 | 524篇 |
2021年 | 768篇 |
2020年 | 806篇 |
2019年 | 625篇 |
2018年 | 653篇 |
2017年 | 873篇 |
2016年 | 979篇 |
2015年 | 1042篇 |
2014年 | 2118篇 |
2013年 | 2060篇 |
2012年 | 2330篇 |
2011年 | 2596篇 |
2010年 | 1777篇 |
2009年 | 1863篇 |
2008年 | 1878篇 |
2007年 | 2397篇 |
2006年 | 2343篇 |
2005年 | 2153篇 |
2004年 | 1979篇 |
2003年 | 1829篇 |
2002年 | 1518篇 |
2001年 | 1257篇 |
2000年 | 963篇 |
1999年 | 839篇 |
1998年 | 612篇 |
1997年 | 481篇 |
1996年 | 472篇 |
1995年 | 419篇 |
1994年 | 305篇 |
1993年 | 225篇 |
1992年 | 155篇 |
1991年 | 142篇 |
1990年 | 100篇 |
1989年 | 99篇 |
1988年 | 73篇 |
1987年 | 57篇 |
1986年 | 43篇 |
1985年 | 37篇 |
1984年 | 39篇 |
1983年 | 30篇 |
1982年 | 30篇 |
1981年 | 32篇 |
1980年 | 19篇 |
1979年 | 18篇 |
1978年 | 17篇 |
1977年 | 15篇 |
1976年 | 32篇 |
1975年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
《Digital Communications & Networks》2022,8(5):614-624
The development of data-driven artificial intelligence technology has given birth to a variety of big data applications. Data has become an essential factor to improve these applications. Federated learning, a privacy-preserving machine learning method, is proposed to leverage data from different data owners. It is typically used in conjunction with cryptographic methods, in which data owners train the global model by sharing encrypted model updates. However, data encryption makes it difficult to identify the quality of these model updates. Malicious data owners may launch attacks such as data poisoning and free-riding. To defend against such attacks, it is necessary to find an approach to audit encrypted model updates. In this paper, we propose a blockchain-based audit approach for encrypted gradients. It uses a behavior chain to record the encrypted gradients from data owners, and an audit chain to evaluate the gradients’ quality. Specifically, we propose a privacy-preserving homomorphic noise mechanism in which the noise of each gradient sums to zero after aggregation, ensuring the availability of aggregated gradient. In addition, we design a joint audit algorithm that can locate malicious data owners without decrypting individual gradients. Through security analysis and experimental evaluation, we demonstrate that our approach can defend against malicious gradient attacks in federated learning. 相似文献
2.
在国内,火花放电原子发射光谱分析广泛使用类型标准化进行方法校正。在国外,标准和文献中鲜见使用此方法的相关论述。类型标准化主要采用平移校正和转动校正两种方式,哪种方式更加合理也鲜见报道。国外设备类型标准化的默认设置优先采用转动校正方式,相关国内标准对最优校正方式的规定尚不明确,此默认设置的合理性有待探讨。实验选用低合金钢20CrNi2Mo、R407标准样品和不锈钢317L、0Cr18Ni9标准样品,引用国内相关标准,以正确度临界差为评判依据,模拟类型标准化样品和待测样品“十分接近”和“接近”两种情况下平移校正和转动校正的数据正确度。经数据统计分析,平移校正分析结果均满足要求,转动校正结果在“接近”情况下部分元素不满足要求。结合相关国家标准中元素含量范围和精密度数据进行分析,通过计算允许最大偏倚量并制作曲线图方式展开分析,得出如下结论:在满足文中类型标准化控制要点前提下,分析设置更适合于采用平移校正方式。 相似文献
3.
Farzaneh Khorasani Morteza Mohammadi Zanjireh Mahdi Bahaghighat Qin Xin 《计算机系统科学与工程》2022,40(3):1085-1098
With a sharp increase in the information volume, analyzing and retrieving this vast data volume is much more essential than ever. One of the main techniques that would be beneficial in this regard is called the Clustering method. Clustering aims to classify objects so that all objects within a cluster have similar features while other objects in different clusters are as distinct as possible. One of the most widely used clustering algorithms with the well and approved performance in different applications is the k-means algorithm. The main problem of the k-means algorithm is its performance which can be directly affected by the selection in the primary clusters. Lack of attention to this crucial issue has consequences such as creating empty clusters and decreasing the convergence time. Besides, the selection of appropriate initial seeds can reduce the cluster’s inconsistency. In this paper, we present a new method to determine the initial seeds of the k-mean algorithm to improve the accuracy and decrease the number of iterations of the algorithm. For this purpose, a new method is proposed considering the average distance between objects to determine the initial seeds. Our method attempts to provide a proper tradeoff between the accuracy and speed of the clustering algorithm. The experimental results showed that our proposed approach outperforms the Chithra with 1.7% and 2.1% in terms of clustering accuracy for Wine and Abalone detection data, respectively. Furthermore, achieved results indicate that comparing with the Reverse Nearest Neighbor (RNN) search approach, the proposed method has a higher convergence speed. 相似文献
4.
为了探讨在安卓平台上构建医用图像采集系统的开发个案,分析通过以智能手机、平板电脑为核心安卓设备通过拍照获得化验单数据后进行文本识别并提交智慧医疗系统的解决方案。本文首先通过二值化算法形成低阈值图像数据,使用卷积神经元网络算法对文本进行逐一识别,使用K-means算法对识别后的单字文本进行字段记录值的整合并形成元数据库服务于其他智慧医疗系统模块。在使用9000组数据对神经元网络进行前期训练的前提下,该系统的识别准确率达到了99.5%以上。本系统具有一定的可行性,对未来智慧医疗的系统开发有实践意义。 相似文献
5.
《Ceramics International》2021,47(20):28086-28105
Refractory castables develop microstructures after curing that behave as partially saturated porous media. Upon heating (during its drying stage), the steam generated by the physical and chemically bond water can result in pore pressurization and explosive spalling. Numerical modeling can provide guidelines for designing safer heat-up profiles and also a better understanding of the mechanisms that lead to catastrophic damage. This work aims to review the fundamentals and models available, providing insightful thoughts on the current trends of the drying phenomena of ceramic compositions. The review also highlights that there are models better oriented to result in reasonable predictions of pore pressure values and others focused on a more accurate representation of the main physical phenomena that take place during heating. According to the findings, there are still various challenges to attain accurate models with high applicability capable of yielding safer and more efficient drying of refractory castables. 相似文献
6.
Tracking-by-detection (TBD) is a significant framework for visual object tracking. However, current trackers are usually updated online based on random sampling with a probability distribution. The performance of the learning-based TBD trackers is limited by the lack of discriminative features, especially when the background is full of semantic distractors. We propose an attention-driven data augmentation method, in which a residual attention mechanism is integrated into the TBD tracking network as supplementary references to identify discriminative image features. A mask generating network is used to simulate changes in target appearances to obtain positive samples, where attention information and image features are combined to identify discriminative features. In addition, we propose a method for mining hard negative samples, which searches for semantic distractors with the response of the attention module. The experiments on the OTB2015, UAV123, and LaSOT benchmarks show that this method achieves competitive performance in terms of accuracy and robustness. 相似文献
7.
8.
Lipase production by solid‐state fermentation of olive pomace in tray‐type and pressurized bioreactors 下载免费PDF全文
9.
随着科学技术的发展,粮食行业信息化发展得到了强有力的科技支撑。为满足粮库整体信息化建设的要求,打破"信息孤岛"现状,实现资源整合、数据共享,为大数据分析和数据应用提供数据基础,设计一款能够实时采集粮仓内温湿度、氧气、二氧化碳气体浓度、粮堆高度的数据集成系统。系统采用分层分布式结构,由数据集中器和多种传感器模块组成,数据集中器与各传感器模块间通过RS485总线进行数据通讯,并由数据集中器通过网络专线传输汇总的环境监测数据,通过专用软件进行数据处理和挖掘,从而实现粮仓环境监测和预警等功能。 相似文献
10.
针对无线网络链路干扰大、误码率高等特点,以及TCP Westwood算法(TCPW)存在估算带宽时过度依赖包的反馈,缺乏区分传输过程中丢包类型的缺点等问题,提出一种TCPW拥塞控制优化算法--TCPW-F。该算法利用发送速率等构建拥塞因子[F]作为判断丢包类型的依据,同时对判定发生噪声丢包时的拥塞窗口进一步调整,避免噪声丢包引起的窗口下降,提高该情况下窗口的发送效率。仿真结果表明,TCPW-F算法在时延性能方面表现更优,单位时间抖动趋于稳定的速度更快。在同一信道带宽下增大包生成速率,改进算法的实时吞吐量明显高于原算法,具备一定的噪声丢包感知能力,无线网络的TCP传输质量获得较大改善。 相似文献