首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   31240篇
  免费   5387篇
  国内免费   4479篇
电工技术   1703篇
技术理论   8篇
综合类   4414篇
化学工业   525篇
金属工艺   522篇
机械仪表   2070篇
建筑科学   2638篇
矿业工程   492篇
能源动力   191篇
轻工业   422篇
水利工程   317篇
石油天然气   881篇
武器工业   241篇
无线电   6437篇
一般工业技术   1772篇
冶金工业   609篇
原子能技术   55篇
自动化技术   17809篇
  2024年   117篇
  2023年   740篇
  2022年   1550篇
  2021年   1637篇
  2020年   1741篇
  2019年   1216篇
  2018年   967篇
  2017年   1078篇
  2016年   1187篇
  2015年   1417篇
  2014年   2283篇
  2013年   2019篇
  2012年   2809篇
  2011年   2705篇
  2010年   2124篇
  2009年   1945篇
  2008年   2008篇
  2007年   2221篇
  2006年   1870篇
  2005年   1649篇
  2004年   1394篇
  2003年   1302篇
  2002年   1170篇
  2001年   1044篇
  2000年   893篇
  1999年   631篇
  1998年   406篇
  1997年   268篇
  1996年   196篇
  1995年   143篇
  1994年   95篇
  1993年   53篇
  1992年   51篇
  1991年   32篇
  1990年   32篇
  1989年   25篇
  1988年   7篇
  1987年   6篇
  1986年   12篇
  1985年   13篇
  1984年   7篇
  1983年   13篇
  1982年   2篇
  1981年   3篇
  1979年   3篇
  1977年   6篇
  1975年   2篇
  1973年   2篇
  1955年   1篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
2.
高效率地使用工程车辆是工程项目管理中节约成本的有效方法,无人监管环境下工程车辆的工况识别,是实现工程车辆高效率使用的有效手段。目前以GPS等技术为核心的车辆智能管理系统未对工程车辆进行工况识别,提出一种基于GRU循环神经网络的工程车辆工况识别方法,通过对工程车辆在不同工况下产生的音频信号进行分析,从中提取Mel倒谱系数作为主要特征,构建GRU循环神经网络模型进行训练和识别。实验结果表明,该方法可以实现对工程车辆工况的有效识别。  相似文献   
3.
Single-cell RNA-sequencing (scRNA-seq) is a rapidly increasing research area in biomedical signal processing. However, the high complexity of single-cell data makes efficient and accurate analysis difficult. To improve the performance of single-cell RNA data processing, two single-cell features calculation method and corresponding dual-input neural network structures are proposed. In this feature extraction and fusion scheme, the features at the cluster level are extracted by hierarchical clustering and differential gene analysis, and the features at the cell level are extracted by the calculation of gene frequency and cross cell frequency. Our experiments on COVID-19 data demonstrate that the combined use of these two feature achieves great results and high robustness for classification tasks.  相似文献   
4.
为避免传统均匀采样方法因忽视曲线重要特征而生成不理想的采样结果,获得给定数量且由特征点和辅助点组成的采样点序列,提出基于特征识别的高质量空间曲线非均匀采样方法.首先使用抛物线插值法得到曲线上所有曲率极大值点和挠率极大值点的近似位置,经筛选后产生特征点,以更好地抓住空间曲线的轮廓特征.然后定义基于弧长、曲率和挠率加权组合的特征函数,并以此自适应地选取曲线上的辅助点.与3种主流采样方法比较的实验结果表明,该方法能够获得更高质量的采样结果且具有更好的实用性,从而进一步改善空间曲线的B样条拟合效果.  相似文献   
5.
针对强噪声背景下轴承故障特征提取困难的问题,提出一种基于奇异值分解和参数优化变分模态分解联合降噪的轴承故障特征提取方法(SSVMD):首先,对原始信号进行奇异值分解(Singular Value Decomposition,SVD)处理,运用奇异值差分谱法选取有效奇异值并将原始信号重构得到初步降噪信号;其次,为防止故障信息丢失,将残余信号进行麻雀算法(Sparrow Search Algorithm,SSA)优化的变分模态分解(Variational Mode Decomposition,VMD)算法处理,得到最佳的模态个数K和惩罚参数α,选取峭度值最大、包络熵最小的IMF分量与初步降噪信号叠加得到最终降噪信号,并对信号进行包络分析;最后,通过仿真和试验数据分析得出,该方法能在信噪比很低的情况下降低噪声含量并提取轴承故障特征,为设备的状态监测和故障诊断提供理论依据。  相似文献   
6.
Diagnosing the cardiovascular disease is one of the biggest medical difficulties in recent years. Coronary cardiovascular (CHD) is a kind of heart and blood vascular disease. Predicting this sort of cardiac illness leads to more precise decisions for cardiac disorders. Implementing Grid Search Optimization (GSO) machine training models is therefore a useful way to forecast the sickness as soon as possible. The state-of-the-art work is the tuning of the hyperparameter together with the selection of the feature by utilizing the model search to minimize the false-negative rate. Three models with a cross-validation approach do the required task. Feature Selection based on the use of statistical and correlation matrices for multivariate analysis. For Random Search and Grid Search models, extensive comparison findings are produced utilizing retrieval, F1 score, and precision measurements. The models are evaluated using the metrics and kappa statistics that illustrate the three models’ comparability. The study effort focuses on optimizing function selection, tweaking hyperparameters to improve model accuracy and the prediction of heart disease by examining Framingham datasets using random forestry classification. Tuning the hyperparameter in the model of grid search thus decreases the erroneous rate achieves global optimization.  相似文献   
7.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability.  相似文献   
8.
Accurate and timely network traffic measurement is essential for network status monitoring, network fault analysis, network intrusion detection, and network security management. With the rapid development of the network, massive network traffic brings severe challenges to network traffic measurement. However, existing measurement methods suffer from many limitations for effectively recording and accurately analyzing big-volume traffic. Recently, sketches, a family of probabilistic data structures that employ hashing technology for summarizing traffic data, have been widely used to solve these problems. However, current literature still lacks a thorough review on sketch-based traffic measurement methods to offer a comprehensive insight on how to apply sketches for fulfilling various traffic measurement tasks. In this paper, we provide a detailed and comprehensive review on the applications of sketches in network traffic measurement. To this end, we classify the network traffic measurement tasks into four categories based on the target of traffic measurement, namely cardinality estimation, flow size estimation, change anomaly detection, and persistent spreader identification. First, we briefly introduce these four types of traffic measurement tasks and discuss the advantages of applying sketches. Then, we propose a series of requirements with regard to the applications of sketches in network traffic measurement. After that, we perform a fine-grained classification for each sketch-based measurement category according to the technologies applied on sketches. During the review, we evaluate the performance, advantages and disadvantages of current sketch-based traffic measurement methods based on the proposed requirements. Through the thorough review, we gain a number of valuable implications that can guide us to choose and design proper traffic measurement methods based on sketches. We also review a number of general sketches that are highly expected in modern network systems to simultaneously perform multiple traffic measurement tasks and discuss their performance based on the proposed requirements. Finally, through our serious review, we summarize a number of open issues and identify several promising research directions.  相似文献   
9.
多种退化类型混合的图像比单一类型的退化图像降质更严重,很难建立精确模型对其复原,研究端到端的神经网络算法是复原的关键.现有的基于操作选择注意力网络的算法(operation-wiseattentionnetwork,OWAN)虽然有一定的性能提升,但是其网络过于复杂,运行较慢,复原图像缺乏高频细节,整体效果也有提升的空间.针对这些问题,提出一种基于层级特征融合的自适应复原算法.该算法直接融合不同感受野分支的特征,增强复原图像的结构;用注意力机制对不同层级的特征进行动态融合,增加模型的自适应性,降低了模型冗余;另外,结合L1损失和感知损失,增强了复原图像的视觉感知效果.在DIV2K,BSD500等数据集上的实验结果表明,该算法无论是在峰值信噪比和结构相似性上的定量分析,还是在主观视觉质量方面,均优于OWAN算法,充分证明了该算法的有效性.  相似文献   
10.
Small object detection is challenging and far from satisfactory. Most general object detectors suffer from two critical issues with small objects: (1) Feature extractor based on classification network cannot express the characteristics of small objects reasonably due to insufficient appearance information of targets and a large amount of background interference around them. (2) The detector requires a much higher location accuracy for small objects than for general objects. This paper proposes an effective and efficient small object detector YOLSO to address the above problems. For feature representation, we analyze the drawbacks in previous backbones and present a Half-Space Shortcut(HSSC) module to build a background-aware backbone. Furthermore, a coarse-to-fine Feature Pyramid Enhancement(FPE) module is introduced for layer-wise aggregation at a granular level to enhance the semantic discriminability. For loss function, we propose an exponential L1 loss to promote the convergence of regression, and a focal IOU loss to focus on prime samples with high classification confidence and high IOU. Both of them significantly improves the location accuracy of small objects. The proposed YOLSO sets state-of-the-art results on two typical small object datasets, MOCOD and VeDAI, at a speed of over 200 FPS. In the meantime, it also outperforms the baseline YOLOv3 by a wide margin on the common COCO dataset.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号