首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16666篇
  免费   1537篇
  国内免费   1382篇
电工技术   617篇
技术理论   1篇
综合类   2322篇
化学工业   716篇
金属工艺   187篇
机械仪表   836篇
建筑科学   1488篇
矿业工程   338篇
能源动力   370篇
轻工业   449篇
水利工程   437篇
石油天然气   267篇
武器工业   63篇
无线电   1126篇
一般工业技术   1808篇
冶金工业   737篇
原子能技术   87篇
自动化技术   7736篇
  2024年   21篇
  2023年   149篇
  2022年   286篇
  2021年   343篇
  2020年   429篇
  2019年   428篇
  2018年   383篇
  2017年   472篇
  2016年   572篇
  2015年   565篇
  2014年   1150篇
  2013年   1185篇
  2012年   1320篇
  2011年   1170篇
  2010年   992篇
  2009年   1151篇
  2008年   1148篇
  2007年   1170篇
  2006年   1027篇
  2005年   919篇
  2004年   721篇
  2003年   632篇
  2002年   505篇
  2001年   503篇
  2000年   397篇
  1999年   319篇
  1998年   248篇
  1997年   182篇
  1996年   163篇
  1995年   154篇
  1994年   129篇
  1993年   110篇
  1992年   93篇
  1991年   83篇
  1990年   74篇
  1989年   84篇
  1988年   62篇
  1987年   34篇
  1986年   30篇
  1985年   21篇
  1984年   14篇
  1983年   17篇
  1982年   12篇
  1981年   12篇
  1979年   8篇
  1964年   8篇
  1963年   9篇
  1961年   8篇
  1957年   7篇
  1955年   7篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method.  相似文献   
2.
In this paper, we propose a globally convergent BFGS method to solve Variational Inequality Problems (VIPs). In fact, a globalization technique on the basis of the hyperplane projection method is applied to the BFGS method. The technique, which is independent of any merit function, is applicable for pseudo-monotone problems. The proposed method applies the BFGS direction and tries to reduce the distance of iterates to the solution set. This property, called Fejer monotonicity of iterates with respect to the solution set, is the basis of the convergence analysis. The method applied to pseudo-monotone VIP is globally convergent in the sense that subproblems always have unique solutions, and the sequence of iterates converges to a solution to the problem without any regularity assumption. Finally, some numerical simulations are included to evaluate the efficiency of the proposed algorithm.  相似文献   
3.
Traditional Multiple Empirical Kernel Learning (MEKL) expands the expressions of the sample and brings better classification ability by using different empirical kernels to map the original data space into multiple kernel spaces. To make MEKL suit for the imbalanced problems, this paper introduces a weight matrix and a regularization term into MEKL. The weight matrix assigns high misclassification cost to the minority samples to balanced misclassification cost between minority and majority class. The regularization term named Majority Projection (MP) is used to make the classification hyperplane fit the distribution shape of majority samples and enlarge the between-class distance of minority and majority class. The contributions of this work are: (i) assigning high cost to minority samples to deal with imbalanced problems, (ii) introducing a new regularization term to concern the property of data distribution, (iii) and modifying the original PAC-Bayes bound to test the error upper bound of MEKL-MP. Through analyzing the experimental results, the proposed MEKL-MP is well suited to the imbalanced problems and has lower generalization risk in accordance with the value of PAC-Bayes bound.  相似文献   
4.
5.
杨楠  李亚平 《计算机应用》2019,39(6):1701-1706
对于用户泛化和模糊的查询,将Web搜索引擎返回的列表内容聚类处理,便于用户有效查找感兴趣的内容。由于返回的列表由称为片段(snippet)的短文本组成,而传统的单词频率-逆文档频率(TF-IDF)特征选择模型不能适用于稀疏的短文本,使得聚类性能下降。一个有效的方法就是通过一个外部的知识库对短文本进行扩展。受到基于神经网络词表示方法的启发,提出了通过词嵌入技术的Word2Vec模型对短文本扩展,即采用Word2Vec模型的TopN个最相似的单词用于对片段(snippet)的扩展,扩展文档使得TF-IDF模型特征选择得到聚类性能的提高。同时考虑到通用性单词造成的噪声引入,对扩展文档的TF-IDF矩阵进行了词频权重修正。实验在两个公开数据集ODP239和SearchSnippets上完成,将所提方法和纯snippet无扩展的方法、基于Wordnet的特征扩展方法和基于Wikipedia的特征扩展方法进行了对比。实验结果表明,所提方法在聚类性能方面优于对比方法。  相似文献   
6.
Brain source imaging based on EEG aims to reconstruct the neural activities producing the scalp potentials. This includes solving the forward and inverse problems. The aim of the inverse problem is to estimate the activity of the brain sources based on the measured data and leadfield matrix computed in the forward step. Spatial filtering, also known as beamforming, is an inverse method that reconstructs the time course of the source at a particular location by weighting and linearly combining the sensor data. In this paper, we considered a temporal assumption related to the time course of the source, namely sparsity, in the Linearly Constrained Minimum Variance (LCMV) beamformer. This assumption sounds reasonable since not all brain sources are active all the time such as epileptic spikes and also some experimental protocols such as electrical stimulations of a peripheral nerve can be sparse in time. Developing the sparse beamformer is done by incorporating L1-norm regularization of the beamformer output in the relevant cost function while obtaining the filter weights. We called this new beamformer SParse LCMV (SP-LCMV). We compared the performance of the SP-LCMV with that of LCMV for both superficial and deep sources with different amplitudes using synthetic EEG signals. Also, we compared them in localization and reconstruction of sources underlying electric median nerve stimulation. Results show that the proposed sparse beamformer can enhance reconstruction of sparse sources especially in the case of sources with high amplitude spikes.  相似文献   
7.
The paper concerns an analysis of an equilibrium problem for 2D elastic body with two semirigid inclusions. It is assumed that inclusions have a joint point, and we investigate a junction problem for these inclusions. The existence of solutions is proved, and different equivalent formulations of the problem are proposed. We investigate a convergence to infinity of a rigidity parameter of the semirigid inclusion. It is proved that in the limit, we obtain an equilibrium problem for the elastic body with a rigid inclusion and a semirigid one. A parameter identification problem is investigated. In particular, the existence of a solution to a suitable optimal control problem is proved.  相似文献   
8.
9.
This paper is concerned with the inverse problem for non-selfadjoint Sturm–Liouville operator with discontinuity conditions inside a finite interval. Firstly, we give the definitions of generalized weight numbers for this operator which may have the multiple spectrum and then investigate the connections between the generalized weight numbers and other spectral characteristics. Secondly, we obtain the generalized spectral data, which consists of the generalized weight numbers and the spectrum. Then the operator is determined uniquely by the method of spectral mappings. Finally, we give an algorithm for reconstructing the potential function and the coefficients of the boundary conditions and the coefficients of the discontinuity conditions.  相似文献   
10.
This paper deals with the determination of an initial condition in degenerate hyperbolic equation from final observations. With the aim of reducing the execution time, this inverse problem is solved using an approach based on double regularization: a Tikhonov’s regularization and regularization in equation by viscose-elasticity. So, we obtain a sequence of weak solutions of degenerate linear viscose-elastic problems. Firstly, we prove the existence and uniqueness of each term of this sequence. Secondly, we prove the convergence of this sequence to the weak solution of the initial problem. Also we present some numerical experiments to show the performance of this approach.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号