首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3286篇
  免费   524篇
  国内免费   396篇
电工技术   266篇
技术理论   1篇
综合类   336篇
化学工业   177篇
金属工艺   95篇
机械仪表   186篇
建筑科学   345篇
矿业工程   171篇
能源动力   54篇
轻工业   163篇
水利工程   87篇
石油天然气   74篇
武器工业   8篇
无线电   502篇
一般工业技术   155篇
冶金工业   158篇
原子能技术   30篇
自动化技术   1398篇
  2024年   13篇
  2023年   82篇
  2022年   164篇
  2021年   173篇
  2020年   164篇
  2019年   127篇
  2018年   108篇
  2017年   108篇
  2016年   137篇
  2015年   143篇
  2014年   202篇
  2013年   210篇
  2012年   270篇
  2011年   278篇
  2010年   230篇
  2009年   223篇
  2008年   208篇
  2007年   212篇
  2006年   185篇
  2005年   156篇
  2004年   129篇
  2003年   123篇
  2002年   97篇
  2001年   75篇
  2000年   60篇
  1999年   63篇
  1998年   49篇
  1997年   34篇
  1996年   36篇
  1995年   22篇
  1994年   21篇
  1993年   13篇
  1992年   14篇
  1991年   18篇
  1990年   3篇
  1989年   13篇
  1988年   4篇
  1987年   6篇
  1986年   14篇
  1985年   5篇
  1984年   2篇
  1983年   6篇
  1982年   1篇
  1980年   1篇
  1977年   1篇
  1976年   1篇
  1973年   1篇
  1967年   1篇
排序方式: 共有4206条查询结果,搜索用时 31 毫秒
1.
2.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method.  相似文献   
3.
针对在传统的客户流失预测数据预处理中,使用one-hot编码处理离散属性导致数据维度增加及数据过于稀疏的问题,提出了两种基于多层感知机的改进后的客户流失预测模型。其主要思想是分别使用堆叠自编码器和实体嵌入两种方法对多层感知机进行改进,通过将离散属性的高维编码数据向低维空间映射,有效地减少了one-hot编码产生的稀疏数据,增加了离散属性值之间的关联度。在对两份公开的数据集进行交叉验证后的实验结果表明,改进后的模型既有效地提高了预测的准确度,又维持了传统多层感知机模型在并行化计算方面的优势。  相似文献   
4.
利用X射线衍射、X射线荧光光谱(XRF)、X射线能谱分析(EDX)和矿物解离分析(MLA)等检测手段对云南镇源难处理金精矿的化学组成、矿物组成、硫化物特征以及金的分布情况进行了详细的工艺矿物学研究。结果显示:该金矿以硫化矿、碳酸盐和硅酸盐类矿物为主,含有3.18%的有机碳和2.37%的无机碳。通过金的诊断浸出发现96.16%的金被硫化物包裹,少量金以单体形式存在。通过对主要载金矿物黄铁矿、辉锑矿和毒砂的粒度、包裹及裸露情况进行分析,得出大部分硫化矿以解离单体的形式存在,少部分与其他矿物共生。根据MLA测试及金的诊断浸出,认为大部分金被硫化矿完全包裹,处理该矿石时应先进行硫化物包裹层的氧化处理,再进行金矿的浸出。  相似文献   
5.
在使用词嵌入法进行词转向量时,两个反义词会转换成相近的向量。如果这两个词是情感词,将会导致词的情感信息的丢失,这在情感分析任务中是不合理的。为了解决这个问题,提出了一种在词嵌入的基础上增加情感向量来获取情感信息的方法。首先利用情感词典资源构建情感向量,将其与词嵌入法得到的词向量融合在一起;然后采用双向长短期记忆(BiLSTM)网络获取文本的特征;最后对文本的情感进行分类。在4个数据集上分别对该方法与未融合情感向量的方法进行了实验。实验结果表明所提方法分类准确度与F1值都高于未融合方法,说明了加入情感向量有助于提高情感分析的性能。  相似文献   
6.
银行智能派单系统的实现和功能完善,对银行提升客户满意度、提高突发事件处理效率、降低人工处理成本等非常重要。针对现有的基于Word2vec和TextCNN模型的银行智能派单系统进行了改进,针对特征词权重表达性弱,特征词类别及位置区分性弱等问题,提出基于改进TF-IDF加权的Word2vec词嵌入表示和卷积神经网络结合的银行智能派单系统:首先利用Word2vec模型得到输入事件单的词嵌入向量;再针对经典TF-IDF方法不具备类别区分性、位置区分性,也没有考虑极端频率特征词代表性的情况,提出改进型TF-IDF算法,计算每个特征词的权重,得到基于改进TF-IDF加权的Word2vec词嵌入表示;最后在卷积神经网络模型中进行训练,通过迭代训练最终得到分类器,利用分类器可对输入事件单信息自动进行系统类别的判断。实验结果表明改进词嵌入表示的银行智能派单系统分类模型的宏查准率、宏查全率、准确率以及宏F1值都得到进一步的提高。  相似文献   
7.
Discretization of continuous time autoregressive (AR) processes driven by a Brownian motion and embedding of discrete time AR sequences driven by a Gaussian white noise are classical issues. The article aims at establishing and using such discretization and embedding formulae between extended AR continuous time processes and discrete time sequences. The continuous-time processes are driven by either Brownian or jump processes, and may have random coefficients depending on time; Lévy-driven processes are also considered. The innovation of the discrete time processes may be of many types – including Gaussian. In one way, observing the continuous time AR process at discrete times leads the AR dynamics of the discretized process to be characterized. The other way round, AR sequences can be embedded, in the almost sure sense, into continuous time AR processes with the same dynamics. Illustration is provided through many examples and simulation.  相似文献   
8.
9.

Heterogeneous information networks, which consist of multi-typed vertices representing objects and multi-typed edges representing relations between objects, are ubiquitous in the real world. In this paper, we study the problem of entity matching for heterogeneous information networks based on distributed network embedding and multi-layer perceptron with a highway network, and we propose a new method named DEM short for Deep Entity Matching. In contrast to the traditional entity matching methods, DEM utilizes the multi-layer perceptron with a highway network to explore the hidden relations to improve the performance of matching. Importantly, we incorporate DEM with the network embedding methodology, enabling highly efficient computing in a vectorized manner. DEM’s generic modeling of both the network structure and the entity attributes enables it to model various heterogeneous information networks flexibly. To illustrate its functionality, we apply the DEM algorithm to two real-world entity matching applications: user linkage under the social network analysis scenario that predicts the same or matched users in different social platforms and record linkage that predicts the same or matched records in different citation networks. Extensive experiments on real-world datasets demonstrate DEM’s effectiveness and rationality.

  相似文献   
10.
ABSTRACT

In recent years, information security over the internet has gained enormous immersion due to a technological escalation in communication via digital media. Nowadays, videos are the most common form of media over the internet, and they have gained the attention of video steganography research community for the security of the communication. This paper implemented video steganography using a widely-known transform technique, discrete wavelet transform (DWT) which consists of different orthogonal and biorthogonal filters used for the decomposition of a frame/image. The aim of this paper is to provide a comparative evaluation for orthogonal and biorthogonal DWT filters with different matrices such as MSE, PSNR. The performance of the different filters has been evaluated both quantitatively and qualitatively to investigate the best among them. Also, the best of orthogonal and biorthogonal filters have been further evaluated with other metrics such as SSIM, BER and histogram analysis. Further, the embedding algorithm has been compared with the existing video steganography techniques. The experimental results illustrate that bior 6.8 (biorthogonal filter) outperforms the other orthogonal and biorthogonal filters in terms of visual distortion.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号