首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   42436篇
  免费   2419篇
  国内免费   43篇
电工技术   333篇
综合类   32篇
化学工业   7708篇
金属工艺   815篇
机械仪表   813篇
建筑科学   1351篇
矿业工程   82篇
能源动力   812篇
轻工业   5576篇
水利工程   383篇
石油天然气   174篇
武器工业   4篇
无线电   2431篇
一般工业技术   7467篇
冶金工业   11082篇
原子能技术   214篇
自动化技术   5621篇
  2023年   362篇
  2022年   355篇
  2021年   910篇
  2020年   759篇
  2019年   678篇
  2018年   1534篇
  2017年   1532篇
  2016年   1583篇
  2015年   1123篇
  2014年   1429篇
  2013年   2809篇
  2012年   2426篇
  2011年   2264篇
  2010年   1794篇
  2009年   1579篇
  2008年   1837篇
  2007年   1606篇
  2006年   1203篇
  2005年   1021篇
  2004年   962篇
  2003年   852篇
  2002年   776篇
  2001年   512篇
  2000年   512篇
  1999年   659篇
  1998年   3557篇
  1997年   2132篇
  1996年   1372篇
  1995年   822篇
  1994年   698篇
  1993年   686篇
  1992年   239篇
  1991年   250篇
  1990年   245篇
  1989年   231篇
  1988年   215篇
  1987年   198篇
  1986年   204篇
  1985年   230篇
  1984年   207篇
  1983年   150篇
  1982年   180篇
  1981年   190篇
  1980年   174篇
  1979年   140篇
  1978年   126篇
  1977年   215篇
  1976年   476篇
  1975年   114篇
  1973年   91篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
871.

Due to the increase and complexity of computer systems, reducing the overhead of fault tolerance techniques has become important in recent years. One technique in fault tolerance is checkpointing, which saves a snapshot with the information that has been computed up to a specific moment, suspending the execution of the application, consuming I/O resources and network bandwidth. Characterizing the files that are generated when performing the checkpoint of a parallel application is useful to determine the resources consumed and their impact on the I/O system. It is also important to characterize the application that performs checkpoints, and one of these characteristics is whether the application does I/O. In this paper, we present a model of checkpoint behavior for parallel applications that performs I/O; this depends on the application and on other factors such as the number of processes, the mapping of processes and the type of I/O used. These characteristics will also influence scalability, the resources consumed and their impact on the IO system. Our model describes the behavior of the checkpoint size based on the characteristics of the system and the type (or model) of I/O used, such as the number I/O aggregator processes, the buffering size utilized by the two-phase I/O optimization technique and components of collective file I/O operations. The BT benchmark and FLASH I/O are analyzed under different configurations of aggregator processes and buffer size to explain our approach. The model can be useful when selecting what type of checkpoint configuration is more appropriate according to the applications’ characteristics and resources available. Thus, the user will be able to know how much storage space the checkpoint consumes and how much the application consumes, in order to establish policies that help improve the distribution of resources.

  相似文献   
872.
Software Quality Journal - The number of electronic control units (ECU) installed in vehicles is increasingly high. Manufacturers must improve the software quality and reduce cost by proposing...  相似文献   
873.

Deep learning (DL) has shown great success in many human-related tasks, which has led to its adoption in many computer vision based applications, such as security surveillance systems, autonomous vehicles and healthcare. Such safety-critical applications have to draw their path to success deployment once they have the capability to overcome safety-critical challenges. Among these challenges are the defense against or/and the detection of the adversarial examples (AEs). Adversaries can carefully craft small, often imperceptible, noise called perturbations to be added to the clean image to generate the AE. The aim of AE is to fool the DL model which makes it a potential risk for DL applications. Many test-time evasion attacks and countermeasures, i.e., defense or detection methods, are proposed in the literature. Moreover, few reviews and surveys were published and theoretically showed the taxonomy of the threats and the countermeasure methods with little focus in AE detection methods. In this paper, we focus on image classification task and attempt to provide a survey for detection methods of test-time evasion attacks on neural network classifiers. A detailed discussion for such methods is provided with experimental results for eight state-of-the-art detectors under different scenarios on four datasets. We also provide potential challenges and future perspectives for this research direction.

  相似文献   
874.
Riad  Rabia  Ros  Frédéric  hajji  Mohamed El  Harba  Rachid 《Applied Intelligence》2022,52(10):11592-11605

Background removal of an identity (ID) picture consists in separating the foreground (face, body, hair and clothes) from the background of the image. It is a necessary groundwork for all modern identity documents that also has many benefits for improving ID security. State of the art image processing techniques encountered several segmentation issues and offer only partial solutions. It is due to the presence of erratic components like hairs, poor contrast, luminosity variation, shadow, color overlap between clothes and background. In this paper, a knowledge infused approach is proposed that hybridizes smart image processing tasks and prior knowledge. The research is based on a divide and conquer strategy aiming at simulating the sequential attention of human when performing a manual segmentation. Knowledge is infused by considering the spatial relation between anatomic elements of the ID image (face feature, forehead, body and hair) as well as their “signal properties”. The process consists in first determining a convex hull around the person’s body including all the foreground while keeping very close to the contour between the background and the foreground. Then, a body map generated from biometric analysis associated to an automatic grab cut process is applied to reach a finer segmentation. Finally, a heuristic-based post-processing step consisting in correcting potential hair and fine boundary issues leads to the final segmentation. Experimental results show that the newly proposed architecture achieves better performances than tested current state-of-the-art methodologies including active contours, generalist popular deep learning techniques, and also two other ones considered as the smartest for portrait segmentation. This new technology has been adopted by an international company as its industrial ID foreground solution.

  相似文献   
875.
Asphalt mixtures are composed by a mass of aggregates (more than 90% of their total weight), which are bonded by a bituminous binder. Despite the fact that the binder is not the main component of these materials (around 5% of their total weight), it exerts a high influence on their mechanical response. In this sense, the service life of asphalt pavements will directly depend on the type of binder used, and thus an adequate choice is crucial to construct more durable roads. Because of this fact, it is necessary to know the characteristics of the bitumen in order to reduce the impact of different distresses that appear on roads. For this purpose, this paper studies the influence of the binder properties in the appearance of the main distresses that affect asphalt pavements around the world (stripping, fatigue cracking and plastic deformations). Five bitumens with different properties have been analysed during this research using diverse binder (UCL, multiple stress creep and recovery test and dynamic shear rheometer time sweep) and mixture (water sensitivity, wheel tracking and UGR-FACT) tests. The results obtained show that the properties of the binder influence the long-term performance of bituminous mixtures. In this sense, it can be said that flexible binders which are able to recover plastic deformations could extend the service life of the pavements.  相似文献   
876.
In this paper, a nano-scratch testing approach was used to measure and evaluate the abrasion wear resistance of high-chromium white cast irons in order to understand the wear mechanism in the interaction between the high-chromium white cast iron and the cBN cutting tool during the machining process. Scratch testing was performed on a nanoindentation instrument using a diamond indenter as the scratch tool. Linear multi-pass scratches in the same path were made on pre-worn surfaces of test materials. The correlation of the scratching resistance and tool wear measured from the machining is presented by the flank wear and maximum scratch depth. The appearance of the cutting edge on a cBN tool suggests that the abrasion wear is mainly related with a combined effect of the carbides and the matrix during machining the high-chromium white cast iron.  相似文献   
877.
878.
879.
This paper presents a generalization of the original ordinary state-based peridynamic model for isotropic linear viscoelasticity. The viscoelastic material response is represented using the thermodynamically acceptable Prony series approach. It can feature as many Prony terms as required and accounts for viscoelastic spherical and deviatoric components. The model was derived from an equivalence between peridynamic viscoelastic parameters and those appearing in classical continuum mechanics, by equating the free energy densities expressed in both frameworks. The model was simplified to a uni-dimensional expression and implemented to simulate a creep-recovery test. This implementation was finally validated by comparing peridynamic predictions to those predicted from classical continuum mechanics. An exact correspondence between peridynamics and the classical continuum approach was shown when the peridynamic horizon becomes small, meaning peridynamics tends toward classical continuum mechanics. This work provides a clear and direct means to researchers dealing with viscoelastic phenomena to tackle their problem within the peridynamic framework.  相似文献   
880.
A new methodology for the calibration of bond microparameters in rocks represented by a package of joined random spherical particles in the discrete element method (DEM) framework is presented. Typically, calibration is achieved through a trial-and-error procedure using several DEM simulations of uniaxial compressive tests (UCTs). The bond calibration model (BCM) does not need a time-dependent UCT-DEM simulation to establish the relation between the microproperties of the bond and the macroproperties of the rock specimen. The BCM uses matrices to describe the interaction forces exerted by bonds and, by means of an assembly process similar to the finite element method, it can describe the complex network of bonds, enabling the model to capture small variations in particle size and bond distribution as demonstrated in this work. In this work, the BCM is presented and compared with UCT simulations performed using Esys Particle software. Multiple simulations are done with constant bond properties and different particle size ratios (\(D_{MAX}/D_{MIN})\) that cause small variations in the specimen’s Young’s modulus; these variations are well captured by the BCM with an error of <10%.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号