首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19946篇
  免费   1798篇
  国内免费   1562篇
电工技术   1495篇
技术理论   3篇
综合类   2243篇
化学工业   442篇
金属工艺   506篇
机械仪表   1063篇
建筑科学   1257篇
矿业工程   327篇
能源动力   221篇
轻工业   354篇
水利工程   349篇
石油天然气   324篇
武器工业   114篇
无线电   3814篇
一般工业技术   1192篇
冶金工业   588篇
原子能技术   81篇
自动化技术   8933篇
  2024年   33篇
  2023年   210篇
  2022年   379篇
  2021年   437篇
  2020年   591篇
  2019年   387篇
  2018年   461篇
  2017年   489篇
  2016年   559篇
  2015年   719篇
  2014年   1285篇
  2013年   1281篇
  2012年   1525篇
  2011年   1617篇
  2010年   1216篇
  2009年   1365篇
  2008年   1496篇
  2007年   1675篇
  2006年   1399篇
  2005年   1381篇
  2004年   1120篇
  2003年   894篇
  2002年   648篇
  2001年   493篇
  2000年   424篇
  1999年   271篇
  1998年   196篇
  1997年   138篇
  1996年   138篇
  1995年   109篇
  1994年   110篇
  1993年   67篇
  1992年   33篇
  1991年   22篇
  1990年   19篇
  1989年   18篇
  1988年   8篇
  1987年   9篇
  1986年   8篇
  1985年   14篇
  1984年   5篇
  1983年   3篇
  1982年   8篇
  1981年   9篇
  1980年   6篇
  1979年   5篇
  1973年   5篇
  1957年   2篇
  1956年   2篇
  1955年   2篇
排序方式: 共有10000条查询结果,搜索用时 281 毫秒
1.
In this paper, a novel method is proposed for increasing the performance through coupling of top-down models adjusting the object detector based on a new loss function. Generally, object detectors and keypoint estimators are sequentially used in real-time multi-person pose estimations; however, these two models are separately trained. Therefore, the results of the object detector are not optimized for the keypoint estimator. To solve this problem, we analyze the relationship between the two models and propose a feedback-based loss optimization in the object detector, based on the estimation results of the keypoint estimator. In addition, the resulting bounding box of the object detector is readjusted to improve the accuracy of the keypoint estimation model. The experimental results demonstrate that the proposed approach can perform real-time operations with a high frame rate similar to that of the baseline model. Moreover, it achieved an accuracy of 74.2 average precision (AP), which is higher than the state-of-the-arts model including the human detector used in the experiment.  相似文献   
2.
This paper aims to provide a review of the conceptual design and theoretical framework of the main control schemes proposed in the literature for unmanned underwater vehicles (UUVs). Additionally, the objective of the paper is not only to present an overview of the recent control architectures validated on UUVs but also to give detailed experimental-based comparative studies of the proposed control schemes. To this end, the main control schemes, including proportional–integral–derivative (PID) based, sliding mode control (SMC) based, adaptive based, observation-based, model predictive control (MPC) based, combined control techniques, are revisited in order to consolidate the principal efforts made in the last two decades by the automatic control community in the field. Besides implementing some key tracking control schemes from the classification mentioned above on Leonard UUV, several real-time experimental scenarios are tested, under different operating conditions, to evaluate and compare the efficiency of the selected tracking control schemes. Furthermore, we point out potential investigation gaps and future research trends at the end of this survey.  相似文献   
3.
Machine learning-based fault detection methods are frequently combined with wavelet transform (WT) to detect an unintentional islanding condition. In contrast to this condition, these methods have long detection and computation time. Thus, selecting a useful signal processing-based approach is required for reliable islanding detection, especially in real-time applications. This paper presents a new modified signal processing-based islanding detection method (IDM) for real-time applications of hydrogen energy-based distributed generators. In the study, a new IDM using a modified pyramidal algorithm approach with an undecimated wavelet transform (UWT) is presented. The proposed method is performed with different grid conditions with the presence of electric noise in real-time. Experimental results show that oscillations in the acquired signal can be reduced by the UWT, and noise sensitivity is lower than other WT-based methods. The non-detection zone is zero and the maximum detection and computational time is also 75 ms at a close power match.  相似文献   
4.
One of the most challenging issues in radio received signal strength (RSS)-based localization systems is the generation and distribution of a radio map with a coordinate system linked with spatial information in a large indoor space. This study proposes a novel spatial-tagged radio-mapping system (SRS) that effectively combines the heterogeneous properties of LiDAR and mobile phones to simultaneously perform both spatial and radio mappings. The SRS consists of synchronization, localization, and map building processes, and enables real-time spatial and radio mapping. In the synchronization process, the distance range, motion data, and radio signals obtained through the LiDAR and mobile phone are collected in nodal units according to the sensing time. In the localization process, a feature variance filter is used to control the number of features generated from LiDAR and estimate the positions at which the nodes are generated in real time according to the motion data and radio signals. In map building, the estimated positions of the nodes are used to extract spatial and radio maps by using a unified location coordinate system. To ensure mobility, the SRS is manufactured in the form of a backpack supporting LiDAR and a mobile phone; the usefulness of the system is experimentally verified. The experiments are performed in a large indoor shopping mall with a complex structure. The experimental results demonstrated that a common coordinate system could be used to build spatial and radio maps with high accuracy and efficiency in real time. In addition, the field applicability of the SRS to location-based services is experimentally verified by applying the constructed radio map to well-known fingerprinting algorithms using the heterogeneous mobile phones.  相似文献   
5.
摘 要:核心网业务模型的建立是5G网络容量规划和网络建设的基础,通过现有方法得到的理论业务模型是静态不可变的且与实际网络存在偏离。为了克服现有5G核心网业务模型与现网模型适配性较差以及规划设备无法满足用户实际业务需求的问题,提出了一种长短期记忆(long short-term memory,LSTM)网络与卷积LSTM (convolution LSTM,ConvLSTM)网络双通道融合的 5G 核心网业务模型预测方法。该方法基于人工智能(artificial intelligence,AI)技术以实现高质量的核心网业务模型的智能预测,形成数据反馈闭环,实现网络自优化调整,助力网络智能化建设。  相似文献   
6.
Evaluating the efficiency of healthcare services accurately can help in analyzing the rationality of inputs and outputs in such services. Considering the consistency and equity of assessment criteria, this study conducts the stochastic multicriteria acceptability analysis (SMAA-2) with a directional distance function to evaluate the efficiency of healthcare services in 31 provincial administrative regions of mainland China, as observed in 2018. We use SMAA-DDF to explore all the projection directions to the efficient frontier instead of a certain projection direction. We measure the maximum and average efficiencies for each of the 31 provincial healthcare services. Our empirical findings show that only seven provinces achieve optimal healthcare service efficiency; the eastern area performed the best, followed by the central, western, and northeast areas. Furthermore, the path along the projection directions is provided to help inefficient provinces improve their efficiency and obtain the best possible positions.  相似文献   
7.
5G-NR和B5G系统都需能高效地支持小微数据包(块)的传输,且在不同的无线传输技术(如宽带或超低时延)之间快速灵活地切换。系统梳理和比较和小微数据包(块)相关的多种无线传输技术,如两步RACH、预配置授权和公共资源竞争等,分析它们对3GPP各个系统和各个RAN协议的影响和复杂度优劣等,并进一步展望其未来发展和应用趋势。  相似文献   
8.
董玉妹  甘为  董华 《包装工程》2021,42(8):109-114, 147
目的 针对面向老龄化社会的产品及产品服务系统设计,将赋能的设计理念和价值引入其中,探索设计结果提升老年人能动性和参与性的赋能品质,为设计师开展设计赋能实践提供参考.方法 以设计教学中的学生设计方案作为研究材料,邀请设计研究者参与工作坊,对设计结果的赋能属性进行分析,并通过聚类获得类别化的设计属性,产生了能描述赋能品质的属性词汇表.结果 总结了包含5组形容词组的设计赋能品质集,这一集合包含"顺应性"和"激励性"两个面向.结论 研究结果为设计师进行老龄化设计提供了知识参考,有助于提升设计师的赋能意识.揭示了设计赋能充满矛盾性的品质,提出面向老龄化的设计赋能需要在"顺应"和"激励"之间找到平衡.  相似文献   
9.
《Journal of dairy science》2021,104(10):10896-10904
Dairy bull fertility is traditionally evaluated using semen production and quality traits; however, these attributes explain only part of the differences observed in fertility among bulls. Alternatively, bull fertility can be directly evaluated using cow field data. The main objective of this study was to investigate bull fertility in the Italian Brown Swiss dairy cattle population using confirmed pregnancy records. The data set included a total of 397,926 breeding records from 1,228 bulls and 129,858 lactating cows between first and fifth lactation from 2000 to 2019. We first evaluated cow pregnancy success, including factors related to the bull under evaluation, such as bull age, bull inbreeding, and AI organization, and factors associated with the cow that receives the dose of semen, including herd-year-season, cow age, parity, and milk yield. We then estimated sire conception rate using only factors related to the bull. Model predictive ability was evaluated using 10-fold cross-validation with 10 replicates. Interestingly, our analyses revealed that there is a substantial variation in conception rate among Brown Swiss bulls, with more than 20% conception rate difference between high-fertility and low-fertility bulls. We also showed that the prediction of bull fertility is feasible as our cross-validation analyses achieved predictive correlations equal to 0.30 for sire conception rate. Improving reproduction performance is one of the major challenges of the dairy industry worldwide, and for this, it is essential to have accurate predictions of service sire fertility. This study represents the foundation for the development of novel tools that will allow dairy producers, breeders, and artificial insemination companies to make enhanced management and selection decisions on Brown Swiss male fertility.  相似文献   
10.
With the evolution of location-based services (LBS), a new type of LBS has already gain a lot of attention and implementation, we name this kind of LBS as the Device-Dependent LBS (DLBS). In DLBS, the service provider (SP) will not only send the information according to the user’s location, more significant, he also provides a service device which will be carried by the user. DLBS has been successfully practised in some of the large cities around the world, for example, the shared bicycle in Beijing and London. In this paper, we, for the first time, blow the whistle of the new location privacy challenges caused by DLBS, since the service device is enabled to perform the localization without the permission of the user. To conquer these threats, we design a service architecture along with a credit system between DLBS provider and the user. The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy, DLBS provider has to sacrifice their revenue in order to gain extra location information of their device. We make the simulation of our proposed scheme and the result convince its effectiveness.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号