首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1630篇
  免费   289篇
  国内免费   278篇
电工技术   66篇
综合类   162篇
化学工业   66篇
金属工艺   34篇
机械仪表   137篇
建筑科学   64篇
矿业工程   23篇
能源动力   17篇
轻工业   75篇
水利工程   27篇
石油天然气   17篇
武器工业   5篇
无线电   275篇
一般工业技术   91篇
冶金工业   35篇
原子能技术   11篇
自动化技术   1092篇
  2024年   8篇
  2023年   57篇
  2022年   117篇
  2021年   121篇
  2020年   111篇
  2019年   100篇
  2018年   67篇
  2017年   63篇
  2016年   76篇
  2015年   67篇
  2014年   102篇
  2013年   114篇
  2012年   126篇
  2011年   123篇
  2010年   105篇
  2009年   92篇
  2008年   97篇
  2007年   91篇
  2006年   77篇
  2005年   61篇
  2004年   67篇
  2003年   52篇
  2002年   51篇
  2001年   38篇
  2000年   31篇
  1999年   31篇
  1998年   20篇
  1997年   13篇
  1996年   22篇
  1995年   12篇
  1994年   10篇
  1993年   5篇
  1992年   6篇
  1991年   11篇
  1990年   2篇
  1989年   8篇
  1988年   3篇
  1987年   5篇
  1986年   13篇
  1985年   6篇
  1984年   3篇
  1983年   6篇
  1982年   2篇
  1981年   2篇
  1977年   3篇
排序方式: 共有2197条查询结果,搜索用时 31 毫秒
1.
2.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method.  相似文献   
3.
针对在传统的客户流失预测数据预处理中,使用one-hot编码处理离散属性导致数据维度增加及数据过于稀疏的问题,提出了两种基于多层感知机的改进后的客户流失预测模型。其主要思想是分别使用堆叠自编码器和实体嵌入两种方法对多层感知机进行改进,通过将离散属性的高维编码数据向低维空间映射,有效地减少了one-hot编码产生的稀疏数据,增加了离散属性值之间的关联度。在对两份公开的数据集进行交叉验证后的实验结果表明,改进后的模型既有效地提高了预测的准确度,又维持了传统多层感知机模型在并行化计算方面的优势。  相似文献   
4.
The effects of titanium ion implantation on the stress corrosion cracking (SCC) behaviour of 304 austenitic stainless steel were studied. Slow strain rate tests (SSRTs) were conducted on 304 steel in air and in 5?wt-% NaCl solution. The microscopic effects of ion implantation were evaluated by Stopping and Range of Ions in Matter Procedures (SRIM). Fracture morphologies and microstructures were investigated by scanning electron microscopy (SEM) and transmission electron microscopy (TEM). The fracture surfaces illustrate that ion implantation significantly inhibits the corrosion pits that initiate SCC. A dense passive film, which inhibits SCC, was formed during the ion implantation process. SCC initiation was restrained due to the dense dislocation nets that were generated by titanium ion implantation.

Highlights
  • Ion implantation inhibits SCC susceptibility.

  • The lack of Cr at the grain boundary leads to the expansion of SCC along the grain boundary.

  • Implantation-induced damage leads to high-density dislocations.

  • The surface was amorphised due to high-density dislocations.

  相似文献   
5.
利用X射线衍射、X射线荧光光谱(XRF)、X射线能谱分析(EDX)和矿物解离分析(MLA)等检测手段对云南镇源难处理金精矿的化学组成、矿物组成、硫化物特征以及金的分布情况进行了详细的工艺矿物学研究。结果显示:该金矿以硫化矿、碳酸盐和硅酸盐类矿物为主,含有3.18%的有机碳和2.37%的无机碳。通过金的诊断浸出发现96.16%的金被硫化物包裹,少量金以单体形式存在。通过对主要载金矿物黄铁矿、辉锑矿和毒砂的粒度、包裹及裸露情况进行分析,得出大部分硫化矿以解离单体的形式存在,少部分与其他矿物共生。根据MLA测试及金的诊断浸出,认为大部分金被硫化矿完全包裹,处理该矿石时应先进行硫化物包裹层的氧化处理,再进行金矿的浸出。  相似文献   
6.
在使用词嵌入法进行词转向量时,两个反义词会转换成相近的向量。如果这两个词是情感词,将会导致词的情感信息的丢失,这在情感分析任务中是不合理的。为了解决这个问题,提出了一种在词嵌入的基础上增加情感向量来获取情感信息的方法。首先利用情感词典资源构建情感向量,将其与词嵌入法得到的词向量融合在一起;然后采用双向长短期记忆(BiLSTM)网络获取文本的特征;最后对文本的情感进行分类。在4个数据集上分别对该方法与未融合情感向量的方法进行了实验。实验结果表明所提方法分类准确度与F1值都高于未融合方法,说明了加入情感向量有助于提高情感分析的性能。  相似文献   
7.
银行智能派单系统的实现和功能完善,对银行提升客户满意度、提高突发事件处理效率、降低人工处理成本等非常重要。针对现有的基于Word2vec和TextCNN模型的银行智能派单系统进行了改进,针对特征词权重表达性弱,特征词类别及位置区分性弱等问题,提出基于改进TF-IDF加权的Word2vec词嵌入表示和卷积神经网络结合的银行智能派单系统:首先利用Word2vec模型得到输入事件单的词嵌入向量;再针对经典TF-IDF方法不具备类别区分性、位置区分性,也没有考虑极端频率特征词代表性的情况,提出改进型TF-IDF算法,计算每个特征词的权重,得到基于改进TF-IDF加权的Word2vec词嵌入表示;最后在卷积神经网络模型中进行训练,通过迭代训练最终得到分类器,利用分类器可对输入事件单信息自动进行系统类别的判断。实验结果表明改进词嵌入表示的银行智能派单系统分类模型的宏查准率、宏查全率、准确率以及宏F1值都得到进一步的提高。  相似文献   
8.
Discretization of continuous time autoregressive (AR) processes driven by a Brownian motion and embedding of discrete time AR sequences driven by a Gaussian white noise are classical issues. The article aims at establishing and using such discretization and embedding formulae between extended AR continuous time processes and discrete time sequences. The continuous-time processes are driven by either Brownian or jump processes, and may have random coefficients depending on time; Lévy-driven processes are also considered. The innovation of the discrete time processes may be of many types – including Gaussian. In one way, observing the continuous time AR process at discrete times leads the AR dynamics of the discretized process to be characterized. The other way round, AR sequences can be embedded, in the almost sure sense, into continuous time AR processes with the same dynamics. Illustration is provided through many examples and simulation.  相似文献   
9.
10.

Heterogeneous information networks, which consist of multi-typed vertices representing objects and multi-typed edges representing relations between objects, are ubiquitous in the real world. In this paper, we study the problem of entity matching for heterogeneous information networks based on distributed network embedding and multi-layer perceptron with a highway network, and we propose a new method named DEM short for Deep Entity Matching. In contrast to the traditional entity matching methods, DEM utilizes the multi-layer perceptron with a highway network to explore the hidden relations to improve the performance of matching. Importantly, we incorporate DEM with the network embedding methodology, enabling highly efficient computing in a vectorized manner. DEM’s generic modeling of both the network structure and the entity attributes enables it to model various heterogeneous information networks flexibly. To illustrate its functionality, we apply the DEM algorithm to two real-world entity matching applications: user linkage under the social network analysis scenario that predicts the same or matched users in different social platforms and record linkage that predicts the same or matched records in different citation networks. Extensive experiments on real-world datasets demonstrate DEM’s effectiveness and rationality.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号