首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   27995篇
  免费   4569篇
  国内免费   3451篇
电工技术   1211篇
技术理论   4篇
综合类   3828篇
化学工业   1047篇
金属工艺   369篇
机械仪表   1342篇
建筑科学   1997篇
矿业工程   267篇
能源动力   114篇
轻工业   373篇
水利工程   172篇
石油天然气   421篇
武器工业   309篇
无线电   5793篇
一般工业技术   1643篇
冶金工业   981篇
原子能技术   43篇
自动化技术   16101篇
  2024年   120篇
  2023年   501篇
  2022年   1045篇
  2021年   1208篇
  2020年   1232篇
  2019年   895篇
  2018年   752篇
  2017年   940篇
  2016年   1062篇
  2015年   1193篇
  2014年   1926篇
  2013年   1653篇
  2012年   2207篇
  2011年   2320篇
  2010年   1936篇
  2009年   1958篇
  2008年   2020篇
  2007年   2238篇
  2006年   1887篇
  2005年   1577篇
  2004年   1283篇
  2003年   1167篇
  2002年   949篇
  2001年   690篇
  2000年   532篇
  1999年   462篇
  1998年   391篇
  1997年   310篇
  1996年   233篇
  1995年   219篇
  1994年   157篇
  1993年   152篇
  1992年   123篇
  1991年   62篇
  1990年   55篇
  1989年   78篇
  1988年   46篇
  1987年   31篇
  1986年   25篇
  1985年   37篇
  1984年   36篇
  1983年   47篇
  1982年   38篇
  1981年   35篇
  1980年   27篇
  1979年   22篇
  1978年   23篇
  1977年   28篇
  1976年   23篇
  1973年   10篇
排序方式: 共有10000条查询结果,搜索用时 187 毫秒
1.
现代战场中的无线通信设备日益增多,精准获取个体信息已成为研究热点,但也是难点。针对通信电台,提出了一种分选识别技术。该技术从电台物理层特性出发,对其辐射信号的细微特征进行K-means聚类以实现分选,分选的同时提取各个个体的特征属性值,未知信号通过与特征属性值相关运算实现个体识别。该技术无需先验知识,无需训练运算,通过实验验证,其可行、高效,易于工程实现。  相似文献   
2.
Accurate and timely network traffic measurement is essential for network status monitoring, network fault analysis, network intrusion detection, and network security management. With the rapid development of the network, massive network traffic brings severe challenges to network traffic measurement. However, existing measurement methods suffer from many limitations for effectively recording and accurately analyzing big-volume traffic. Recently, sketches, a family of probabilistic data structures that employ hashing technology for summarizing traffic data, have been widely used to solve these problems. However, current literature still lacks a thorough review on sketch-based traffic measurement methods to offer a comprehensive insight on how to apply sketches for fulfilling various traffic measurement tasks. In this paper, we provide a detailed and comprehensive review on the applications of sketches in network traffic measurement. To this end, we classify the network traffic measurement tasks into four categories based on the target of traffic measurement, namely cardinality estimation, flow size estimation, change anomaly detection, and persistent spreader identification. First, we briefly introduce these four types of traffic measurement tasks and discuss the advantages of applying sketches. Then, we propose a series of requirements with regard to the applications of sketches in network traffic measurement. After that, we perform a fine-grained classification for each sketch-based measurement category according to the technologies applied on sketches. During the review, we evaluate the performance, advantages and disadvantages of current sketch-based traffic measurement methods based on the proposed requirements. Through the thorough review, we gain a number of valuable implications that can guide us to choose and design proper traffic measurement methods based on sketches. We also review a number of general sketches that are highly expected in modern network systems to simultaneously perform multiple traffic measurement tasks and discuss their performance based on the proposed requirements. Finally, through our serious review, we summarize a number of open issues and identify several promising research directions.  相似文献   
3.
Manufacturing companies not only strive to deliver flawless products but also monitor product failures in the field to identify potential quality issues. When product failures occur, quality engineers must identify the root cause to improve any affected product and process. This root-cause analysis can be supported by feature selection methods that identify relevant product attributes, such as manufacturing dates with an increased number of product failures. In this paper, we present different methods for feature selection and evaluate their ability to identify relevant product attributes in a root-cause analysis. First, we compile a list of feature selection methods. Then, we summarize the properties of product attributes in warranty case data and discuss these properties regarding the challenges they pose for machine learning algorithms. Next, we simulate datasets of warranty cases, which emulate these product properties. Finally, we compare the feature selection methods based on these simulated datasets. In the end, the univariate filter information gain is determined to be a suitable method for a wide range of applications. The comparison based on simulated data provides a more general result than other publications, which only focus on a single use case. Due to the generic nature of the simulated datasets, the results can be applied to various root-cause analysis processes in different quality management applications and provide a guideline for readers who wish to explore machine learning methods for their analysis of quality data.  相似文献   
4.
5.
The recent trend of integration among new network services such as the long-term evolution (LTE) based on internet protocol (IP) needs reputable analyses and prediction information on the internet traffic. The IP along with increased internet traffics due to expanding new service platforms such as smartphones will reflect policies such as network QoS according to new services. The establishment of monitoring methods and analysis plans is thus required for the development of internet traffics that will analyze their status and predict their future. The paper with the speed of Internet traffic model is developed for monitoring the state of the experiment and verified. The problem is that the proposed service Internet service provider (ISP) to resolve the conflict between the occurrences can be considerably Internet traffic and that the state of data may be helpful in understanding. The paper advancement policy to reflect the network traffic volume of Internet services and users irradiation with increased traffic due to the development and management of the analysis was carried out experimental measurements.  相似文献   
6.
Although greedy algorithms possess high efficiency, they often receive suboptimal solutions of the ensemble pruning problem, since their exploration areas are limited in large extent. And another marked defect of almost all the currently existing ensemble pruning algorithms, including greedy ones, consists in: they simply abandon all of the classifiers which fail in the competition of ensemble selection, causing a considerable waste of useful resources and information. Inspired by these observations, an interesting greedy Reverse Reduce-Error (RRE) pruning algorithm incorporated with the operation of subtraction is proposed in this work. The RRE algorithm makes the best of the defeated candidate networks in a way that, the Worst Single Model (WSM) is chosen, and then, its votes are subtracted from the votes made by those selected components within the pruned ensemble. The reason is because, for most cases, the WSM might make mistakes in its estimation for the test samples. And, different from the classical RE, the near-optimal solution is produced based on the pruned error of all the available sequential subensembles. Besides, the backfitting step of RE algorithm is replaced with the selection step of a WSM in RRE. Moreover, the problem of ties might be solved more naturally with RRE. Finally, soft voting approach is employed in the testing to RRE algorithm. The performances of RE and RRE algorithms, and two baseline methods, i.e., the method which selects the Best Single Model (BSM) in the initial ensemble, and the method which retains all member networks of the initial ensemble (ALL), are evaluated on seven benchmark classification tasks under different initial ensemble setups. The results of the empirical investigation show the superiority of RRE over the other three ensemble pruning algorithms.  相似文献   
7.
王传旭  薛豪 《电子学报》2020,48(8):1465-1471
提出一种以"关键人物"为核心,使用门控融合单元(GFU,Gated Fusion Unit)进行特征融合的组群行为识别框架,旨在解决两个问题:①组群行为信息冗余,重点关注关键人物行为特征,忽略无关人员对组群行为的影响;②组群内部交互行为复杂,使用GFU有效融合以关键人物为核心的交互特征,再通过LSTM时序建模成为表征能力更强的组群特征.最终,通过softmax分类器进行组群行为类别分类.该算法在排球数据集上取得了86.7%的平均识别率.  相似文献   
8.
Bile acids have been reported as important cofactors promoting human and murine norovirus (NoV) infections in cell culture. The underlying mechanisms are not resolved. Through the use of chemical shift perturbation (CSP) NMR experiments, we identified a low-affinity bile acid binding site of a human GII.4 NoV strain. Long-timescale MD simulations reveal the formation of a ligand-accessible binding pocket of flexible shape, allowing the formation of stable viral coat protein–bile acid complexes in agreement with experimental CSP data. CSP NMR experiments also show that this mode of bile acid binding has a minor influence on the binding of histo-blood group antigens and vice versa. STD NMR experiments probing the binding of bile acids to virus-like particles of seven different strains suggest that low-affinity bile acid binding is a common feature of human NoV and should therefore be important for understanding the role of bile acids as cofactors in NoV infection.  相似文献   
9.
Abnormal activation of Toll-like receptor (TLRs) signaling can result in colon cancer development. The aim of this study was to investigate the expression of important TLRs in different histological types of colorectal polyps and evaluate their relationship with intestinal microbiota. The expression levels of TLR2, 3, 4, and 5 were analyzed in intestinal biopsy specimens of 21 hyperplastic polyp (HP), 16 sessile serrated adenoma (SSA), 29 tubular adenoma (TA), 21 villous/tubulovillous (VP/TVP) cases, and 31 normal controls. In addition, selected gut bacteria including Streptococcus bovis, Enterococcus faecalis, Enterotoxigenic Bacteroides fragilis (ETBF), Fusobacterium nucleatum, Porphyromonas spp., Lactobacillus spp., Roseburia spp., and Bifidobacterium spp. were quantified in fecal samples using absolute qRT PCR, and, finally, the association between TLRs and these gut microbiota- was evaluated by Spearman’s correlation coefficient. Higher expression of TLR2 and TLR4 in VP/TVP and TA, and lower expression levels of TLR3 and TLR5 in all type of polyps were observed. The differences in TLR expression patterns was not only dependent on the histology, location, size, and dysplasia grade of polyps but also related to the intestinal microbiota patterns. TLR2 and TLR4 expression was directly associated with the F. nucleatum, E. faecalis, S. bovis, Porphyromonas, and inversely to Bifidobacterium, Lactobacillus, and Roseburia quantity. Furthermore, TLR3 and TLR5 expression was directly associated with Bifidobacterium, Roseburia, and Lactobacillus quantity. Our results suggest a possible critical role of TLRs during colorectal polyp progression. An abnormal regulation of TLRs in relation to gut microbial quantity may contribute to carcinogenesis.  相似文献   
10.
张兵  杨雪花 《煤炭科技》2020,41(1):35-38
在铁路运煤装车过程中为了快速、准确地识别车号,提出一种基于机器视觉的运煤车车号识别技术。将连通区域提取与投影分割法结合,实现车号的粗定位、细分割,并对图像中的断裂字符进行二次分割,构建了基于BP神经网络的分类模型进行车号识别,提升了煤炭装车的效率和精度。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号