首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30925篇
  免费   2194篇
  国内免费   1694篇
电工技术   1914篇
技术理论   8篇
综合类   2233篇
化学工业   1094篇
金属工艺   599篇
机械仪表   2477篇
建筑科学   1906篇
矿业工程   687篇
能源动力   713篇
轻工业   442篇
水利工程   352篇
石油天然气   592篇
武器工业   318篇
无线电   3620篇
一般工业技术   1910篇
冶金工业   751篇
原子能技术   307篇
自动化技术   14890篇
  2024年   37篇
  2023年   296篇
  2022年   488篇
  2021年   684篇
  2020年   694篇
  2019年   505篇
  2018年   525篇
  2017年   708篇
  2016年   827篇
  2015年   972篇
  2014年   1889篇
  2013年   1594篇
  2012年   1937篇
  2011年   2427篇
  2010年   1773篇
  2009年   1721篇
  2008年   1892篇
  2007年   2227篇
  2006年   2132篇
  2005年   2016篇
  2004年   1787篇
  2003年   1581篇
  2002年   1163篇
  2001年   961篇
  2000年   747篇
  1999年   623篇
  1998年   463篇
  1997年   361篇
  1996年   319篇
  1995年   293篇
  1994年   200篇
  1993年   171篇
  1992年   113篇
  1991年   88篇
  1990年   76篇
  1989年   66篇
  1988年   67篇
  1987年   41篇
  1986年   43篇
  1985年   43篇
  1984年   41篇
  1983年   31篇
  1982年   24篇
  1981年   29篇
  1980年   20篇
  1979年   15篇
  1978年   18篇
  1977年   15篇
  1976年   31篇
  1975年   10篇
排序方式: 共有10000条查询结果,搜索用时 18 毫秒
1.
The development of data-driven artificial intelligence technology has given birth to a variety of big data applications. Data has become an essential factor to improve these applications. Federated learning, a privacy-preserving machine learning method, is proposed to leverage data from different data owners. It is typically used in conjunction with cryptographic methods, in which data owners train the global model by sharing encrypted model updates. However, data encryption makes it difficult to identify the quality of these model updates. Malicious data owners may launch attacks such as data poisoning and free-riding. To defend against such attacks, it is necessary to find an approach to audit encrypted model updates. In this paper, we propose a blockchain-based audit approach for encrypted gradients. It uses a behavior chain to record the encrypted gradients from data owners, and an audit chain to evaluate the gradients’ quality. Specifically, we propose a privacy-preserving homomorphic noise mechanism in which the noise of each gradient sums to zero after aggregation, ensuring the availability of aggregated gradient. In addition, we design a joint audit algorithm that can locate malicious data owners without decrypting individual gradients. Through security analysis and experimental evaluation, we demonstrate that our approach can defend against malicious gradient attacks in federated learning.  相似文献   
2.
Renewable energy integration into existing or new energy hubs together with Green technologies such as Power to Gas and Green Hydrogen has become essential because of the aim of keeping the average global temperature rise within 2 °C with regard to the Paris Agreement. Hence, all energy markets are expected to face substantial transitions worldwide. On the other hand, investigation of renewable energy systems integrated with green chemical conversion, and in particular combination of green hydrogen and synthetic methanation, is still a scarce subject in the literature in terms of optimal and simultaneous design and operation for integrated energy grids under weather intermittency and demand uncertainty. In fact, the integration of such promising new technologies has been studied mainly in the operational phase, without considering design and management simultaneously. Thus, in this work, a multi-period mixed-integer linear programming (MILP) model is formulated to deal with the aforementioned challenges. Under current carbon dioxide limitations dictated by the Paris Agreement, this model computes the best configuration of the renewable and non-renewable-based generators, their optimal rated powers, capacities and scheduling sequences from a large candidate pool containing thirty-nine different equipment simultaneously. Moreover, the effect of the intermittent nature of renewable resources is analyzed comprehensively under three different scenarios for a specific location. Accordingly, a practical scenario generation method is proposed in this work. It is observed that photovoltaic, oil co-generator, reciprocating ICE, micro turbine, and bio-gasifier are the equipment that is commonly chosen under the three different scenarios. Results also show that concepts such as green hydrogen and power-to-gas are currently not preferable for the investigated location. On the other hand, analysis shows that if the emission limits are getting tightened, it is expected that constructing renewable resource-based grids will be economically more feasible.  相似文献   
3.
三维异质异构集成技术是实现电子信息系统向着微型化、高效能、高整合、低功耗及低成本方向发展的最重要方法,也是决定信息化平台中微电子和微纳系统领域未来发展的一项核心高技术。文章详细介绍了毫米波频段三维异质异构集成技术的优势、近年来的发展趋势以及面临的挑战。利用硅基MEMS 光敏复合薄膜多层布线工艺可实现异质芯片的低损耗互连,同时三维集成高性能封装滤波器、高辐射效率封装天线等无源元件,还能很好地处理布线间的电磁兼容和芯片间的屏蔽问题。最后介绍了一款新型毫米波三维异质异构集成雷达及其在远距离生命体征探测方面的应用。  相似文献   
4.
傅建钢 《模具工业》2022,48(1):69-73
为了解决传统教学无法全面培养人才的问题,采用"课程融合+时空耦合+过程结合"的方式开展人才培养研究。以注射模设计与制造生产过程为导向,构建大项目牵引下的跨越课程、跨越学期的课程融合新模式,利用信息通信技术及互联网平台,将互联网与传统教学进行深度融合,创造新的教学生态,构建多元多维互动的时空耦合教学新关系,以全方位评价为引导,构建课程多元多维的评价新机制。以3个班级为对象开展不同模式下的教学,对试验班级成绩进行分析,研究结果表明:课程融合+时空耦合+过程结合新模式培养的学生更好地完成了综合项目,获得了较好的教学效果。  相似文献   
5.
With a sharp increase in the information volume, analyzing and retrieving this vast data volume is much more essential than ever. One of the main techniques that would be beneficial in this regard is called the Clustering method. Clustering aims to classify objects so that all objects within a cluster have similar features while other objects in different clusters are as distinct as possible. One of the most widely used clustering algorithms with the well and approved performance in different applications is the k-means algorithm. The main problem of the k-means algorithm is its performance which can be directly affected by the selection in the primary clusters. Lack of attention to this crucial issue has consequences such as creating empty clusters and decreasing the convergence time. Besides, the selection of appropriate initial seeds can reduce the cluster’s inconsistency. In this paper, we present a new method to determine the initial seeds of the k-mean algorithm to improve the accuracy and decrease the number of iterations of the algorithm. For this purpose, a new method is proposed considering the average distance between objects to determine the initial seeds. Our method attempts to provide a proper tradeoff between the accuracy and speed of the clustering algorithm. The experimental results showed that our proposed approach outperforms the Chithra with 1.7% and 2.1% in terms of clustering accuracy for Wine and Abalone detection data, respectively. Furthermore, achieved results indicate that comparing with the Reverse Nearest Neighbor (RNN) search approach, the proposed method has a higher convergence speed.  相似文献   
6.
Radicals are closely related to human life and health and have been widely used in biology, chemistry, functional materials, etc. However, the high reactivity, disorder, and short half-lives limit their wide applications. Therefore, it remains a great challenge to prepare stable and ordered radicals. Herein, radicals are prepared with protective umbrellas (diethylmethyleneamine, DEMA) that are integrated on the surface of 2D layered materials to isolate water and oxygen and enhance the stability of radicals. Taking 2D black phosphorus (BP) as an example: triethylamine reacts with dichloromethane to form quaternary ammonium salts with further Hoffmann elimination to produce DEMA radicals that could react with one electron of a lone pair electrons in P on the surface of BP to produce P radicals, which shows a prolonged half-life of 21 days at room temperature. First-principle calculations and electron paramagnetic resonance fitting confirm that the steric hindrance constructed by dense DEMA passivation layer acts as a protective umbrella and the 2D coupling of P radicals and other P atoms in 2D BP plane to enhance the stability and strong superexchange interaction of P radicals. Furthermore, it is a general strategy to produce stable radicals integrated on the 2D plane.  相似文献   
7.
为了探讨在安卓平台上构建医用图像采集系统的开发个案,分析通过以智能手机、平板电脑为核心安卓设备通过拍照获得化验单数据后进行文本识别并提交智慧医疗系统的解决方案。本文首先通过二值化算法形成低阈值图像数据,使用卷积神经元网络算法对文本进行逐一识别,使用K-means算法对识别后的单字文本进行字段记录值的整合并形成元数据库服务于其他智慧医疗系统模块。在使用9000组数据对神经元网络进行前期训练的前提下,该系统的识别准确率达到了99.5%以上。本系统具有一定的可行性,对未来智慧医疗的系统开发有实践意义。  相似文献   
8.
《Ceramics International》2021,47(20):28086-28105
Refractory castables develop microstructures after curing that behave as partially saturated porous media. Upon heating (during its drying stage), the steam generated by the physical and chemically bond water can result in pore pressurization and explosive spalling. Numerical modeling can provide guidelines for designing safer heat-up profiles and also a better understanding of the mechanisms that lead to catastrophic damage. This work aims to review the fundamentals and models available, providing insightful thoughts on the current trends of the drying phenomena of ceramic compositions. The review also highlights that there are models better oriented to result in reasonable predictions of pore pressure values and others focused on a more accurate representation of the main physical phenomena that take place during heating. According to the findings, there are still various challenges to attain accurate models with high applicability capable of yielding safer and more efficient drying of refractory castables.  相似文献   
9.
Tracking-by-detection (TBD) is a significant framework for visual object tracking. However, current trackers are usually updated online based on random sampling with a probability distribution. The performance of the learning-based TBD trackers is limited by the lack of discriminative features, especially when the background is full of semantic distractors. We propose an attention-driven data augmentation method, in which a residual attention mechanism is integrated into the TBD tracking network as supplementary references to identify discriminative image features. A mask generating network is used to simulate changes in target appearances to obtain positive samples, where attention information and image features are combined to identify discriminative features. In addition, we propose a method for mining hard negative samples, which searches for semantic distractors with the response of the attention module. The experiments on the OTB2015, UAV123, and LaSOT benchmarks show that this method achieves competitive performance in terms of accuracy and robustness.  相似文献   
10.
Demands on production, distribution and consumption of electrical energy change fundamentally with the energy revolution. Energy purchasing costs for inflexible consumers are rising and proceeds of inflexible producers are sinking. Companies are able to reduce costs by marketing operational flexibility options. This article sets out the need of flexibility in the energy system and the new marketing options. Flexibility potentials within infrastructure plants of a chemical park are analyzed, evaluated regarding marketing and activated in the presented research project FlexChemistry.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号