首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   304432篇
  免费   22847篇
  国内免费   11786篇
电工技术   16428篇
技术理论   31篇
综合类   18490篇
化学工业   52258篇
金属工艺   17823篇
机械仪表   19436篇
建筑科学   24153篇
矿业工程   10084篇
能源动力   8293篇
轻工业   17928篇
水利工程   5079篇
石油天然气   21251篇
武器工业   2377篇
无线电   33092篇
一般工业技术   35919篇
冶金工业   16008篇
原子能技术   2978篇
自动化技术   37437篇
  2024年   1298篇
  2023年   4922篇
  2022年   8323篇
  2021年   12040篇
  2020年   9017篇
  2019年   7625篇
  2018年   8564篇
  2017年   9699篇
  2016年   8409篇
  2015年   11769篇
  2014年   14547篇
  2013年   17332篇
  2012年   18689篇
  2011年   20378篇
  2010年   17666篇
  2009年   16810篇
  2008年   16291篇
  2007年   15898篇
  2006年   16881篇
  2005年   15009篇
  2004年   9584篇
  2003年   8376篇
  2002年   7770篇
  2001年   6854篇
  2000年   7449篇
  1999年   8851篇
  1998年   7152篇
  1997年   6091篇
  1996年   5686篇
  1995年   4710篇
  1994年   3912篇
  1993年   2720篇
  1992年   2210篇
  1991年   1662篇
  1990年   1227篇
  1989年   981篇
  1988年   799篇
  1987年   541篇
  1986年   400篇
  1985年   275篇
  1984年   190篇
  1983年   128篇
  1982年   137篇
  1981年   91篇
  1980年   72篇
  1979年   24篇
  1978年   2篇
  1965年   2篇
  1951年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
971.
The probabilistic distribution properties of a set of medical images are studied. It is shown that the generalized Gaussian function provides a good approximation to the distribution of AP chest radiographs. Based on this result and a goodness-of-fit test, a generalized Gaussian autoregressive model (GGAR) is proposed. Its properties and limitations are also discussed. It is expected that the GGAR model will be useful in describing the stochastic characteristics of some classes of medical images and in image data compression and other applications.  相似文献   
972.
Knowledge and Information Systems - Developing effective and efficient data stream classifiers is challenging for the machine learning community because of the dynamic nature of data streams. As a...  相似文献   
973.
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased network traffic markedly. Over the past few decades, network traffic identification has been a research hotspot in the field of network management and security monitoring. However, as more network services use encryption technology, network traffic identification faces many challenges. Although classic machine learning methods can solve many problems that cannot be solved by port- and payload-based methods, manually extract features that are frequently updated is time-consuming and labor-intensive. Deep learning has good automatic feature learning capabilities and is an ideal method for network traffic identification, particularly encrypted traffic identification; Existing recognition methods based on deep learning primarily use supervised learning methods and rely on many labeled samples. However, in real scenarios, labeled samples are often difficult to obtain. This paper adjusts the structure of the auxiliary classification generation adversarial network (ACGAN) so that it can use unlabeled samples for training, and use the wasserstein distance instead of the original cross entropy as the loss function to achieve semisupervised learning. Experimental results show that the identification accuracy of ISCX and USTC data sets using the proposed method yields markedly better performance when the number of labeled samples is small compared to that of convolutional neural network (CNN) based classifier.  相似文献   
974.
Identifying the key factors of the disaster-related information propagation process can provide decision support for disaster management. This study characterizes the effects of content types, location, and social capital of social media users on the virality of disaster-related information. We found through the Weibo dataset of the Yiliang earthquake that the virality of different types of information can vary on the basis of the social capital of users who post the information. This study fills the current research gaps by examining the individual and joint effects of the content and creator characteristics on the virality of disaster-related information.  相似文献   
975.
Nanehkaran  Y. A.  Zhang  Defu  Salimi  S.  Chen  Junde  Tian  Yuan  Al-Nabhan  Najla 《The Journal of supercomputing》2021,77(4):3193-3222
The Journal of Supercomputing - Handwriting recognition remains a challenge in the machine vision field, especially in optical character recognition (OCR). The OCR has various applications such as...  相似文献   
976.

As the global economy develops rapidly, traffic congestion has become a major problem for first-tier cities in various countries. In order to address the problem of failed real-time control of the traffic flow data by the traditional traffic light control as well as malicious attack and other security problems faced by the intelligent traffic light (ITL) control system, a multi-agent distributed ITL control method was proposed based on the fog computing platform and the Q learning algorithm used for the reinforcement learning in this study, and the simulation comparison was conducted by using the simulation platform jointly constructed based on the VISSIM-Excel VBA-MATLAB software. Subsequently, on the basis of puzzle difficulty of the computational Diffie–Helleman (CDH) and Hash Collision, the applicable security control scheme of ITL under the fog computing was proposed. The results reveal that the proposed intelligent control system prolongs the time of green light properly when the number of vehicles increases, thereby reducing the delay time and retention rate of vehicles; the security control scheme of ITL based on the puzzle of CDH is less efficient when the vehicle density increases, while that based on the puzzle of Hash collision is very friendly to the fog equipment. In conclusion, the proposed control method of ITL based on the fog computing and Q learning algorithm can alleviate the traffic congestion effectively, so the proposed method has high security.

  相似文献   
977.
Zhang  Hongjun  Zhang  Heng  Zhang  Libo  Wu  Yanjun 《The Journal of supercomputing》2021,77(5):5148-5175
The Journal of Supercomputing - Nowadays, many applications, e.g., network routers, distributed data process engines, firewall, need to transfer packets at linear rate. With the increasing data...  相似文献   
978.
Bai  Qingchun  Wei  Kai  Zhou  Jie  Xiong  Chao  Wu  Yuanbin  Lin  Xin  He  Liang 《The Journal of supercomputing》2021,77(9):9474-9493
The Journal of Supercomputing - Sentiment analysis in Danmaku video interaction aims at measuring public mood in respect of the video, which is helpful for the potential applications in behavioral...  相似文献   
979.
Li  Hongjian  Wei  Yaojun  Xiong  Yu  Ma  Enjie  Tian  Wenhong 《The Journal of supercomputing》2021,77(10):11575-11596
The Journal of Supercomputing - With the fast growth of big data applications, it has brought about a huge increase in the energy consumption for big data processing in Cloud data centers. In this...  相似文献   
980.
International Journal of Computer Vision - Occlusion is probably the biggest challenge for human pose estimation in the wild. Typical solutions often rely on intrusive sensors such as IMUs to...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号