全文获取类型
收费全文 | 1998篇 |
免费 | 97篇 |
国内免费 | 14篇 |
专业分类
电工技术 | 25篇 |
综合类 | 4篇 |
化学工业 | 420篇 |
金属工艺 | 87篇 |
机械仪表 | 81篇 |
建筑科学 | 45篇 |
矿业工程 | 2篇 |
能源动力 | 128篇 |
轻工业 | 191篇 |
水利工程 | 25篇 |
石油天然气 | 9篇 |
无线电 | 259篇 |
一般工业技术 | 382篇 |
冶金工业 | 133篇 |
原子能技术 | 6篇 |
自动化技术 | 312篇 |
出版年
2024年 | 7篇 |
2023年 | 44篇 |
2022年 | 93篇 |
2021年 | 150篇 |
2020年 | 108篇 |
2019年 | 94篇 |
2018年 | 134篇 |
2017年 | 113篇 |
2016年 | 103篇 |
2015年 | 61篇 |
2014年 | 95篇 |
2013年 | 159篇 |
2012年 | 100篇 |
2011年 | 117篇 |
2010年 | 82篇 |
2009年 | 79篇 |
2008年 | 63篇 |
2007年 | 62篇 |
2006年 | 50篇 |
2005年 | 44篇 |
2004年 | 20篇 |
2003年 | 22篇 |
2002年 | 20篇 |
2001年 | 20篇 |
2000年 | 17篇 |
1999年 | 12篇 |
1998年 | 41篇 |
1997年 | 23篇 |
1996年 | 14篇 |
1995年 | 20篇 |
1994年 | 18篇 |
1993年 | 9篇 |
1992年 | 7篇 |
1991年 | 6篇 |
1990年 | 8篇 |
1989年 | 14篇 |
1988年 | 8篇 |
1987年 | 7篇 |
1986年 | 5篇 |
1985年 | 7篇 |
1984年 | 11篇 |
1983年 | 4篇 |
1982年 | 5篇 |
1981年 | 9篇 |
1980年 | 4篇 |
1979年 | 5篇 |
1978年 | 3篇 |
1977年 | 4篇 |
1976年 | 3篇 |
1974年 | 2篇 |
排序方式: 共有2109条查询结果,搜索用时 0 毫秒
181.
Mohibullah Khan Ata Ullah Isra Naz Sajjad Haider Nz Jhanji Mohammad Shorfuzzaman Mehedi Masud 《计算机系统科学与工程》2023,46(1):461-473
The deep learning model encompasses a powerful learning ability that integrates the feature extraction, and classification method to improve accuracy. Convolutional Neural Networks (CNN) perform well in machine learning and image processing tasks like segmentation, classification, detection, identification, etc. The CNN models are still sensitive to noise and attack. The smallest change in training images as in an adversarial attack can greatly decrease the accuracy of the CNN model. This paper presents an alpha fusion attack analysis and generates defense against adversarial attacks. The proposed work is divided into three phases: firstly, an MLSTM-based CNN classification model is developed for classifying COVID-CT images. Secondly, an alpha fusion attack is generated to fool the classification model. The alpha fusion attack is tested in the last phase on a modified LSTM-based CNN (CNN-MLSTM) model and other pre-trained models. The results of CNN models show that the accuracy of these models dropped greatly after the alpha-fusion attack. The highest F1 score before the attack was achieved is 97.45 And after the attack lowest F1 score recorded is 22%. Results elucidate the performance in terms of accuracy, precision, F1 score and Recall. 相似文献
182.
183.
184.
185.
Husain Syed Sameed Ong Eng-Jon Bober Miroslaw 《International Journal of Computer Vision》2021,129(5):1432-1450
International Journal of Computer Vision - We propose a novel CNN architecture called ACTNET for robust instance image retrieval from large-scale datasets. Our key innovation is a learnable... 相似文献
186.
Meraj Talha Rauf Hafiz Tayyab Zahoor Saliha Hassan Arslan Lali M. IkramUllah Ali Liaqat Bukhari Syed Ahmad Chan Shoaib Umar 《Neural computing & applications》2021,33(17):10737-10750
Neural Computing and Applications - Lung cancer is a deadly disease if not diagnosed in its early stages. However, early detection of lung cancer is a challenging task due to the shape and size of... 相似文献
187.
Sajjad Haider 《国际智能系统杂志》2009,24(8):919-933
This paper presents an algorithm to transform a dynamic influence net (DIN) into a dynamic Bayesian network (DBN). The transformation aims to bring the best of both probabilistic reasoning paradigms. The advantages of DINs lie in their ability to represent causal and time‐varying information in a compact and easy‐to‐understand manner. They facilitate a system modeler in connecting a set of desired effects and a set of actionable events through a series of dynamically changing cause and effect relationships. The resultant probabilistic model is then used to analyze different courses of action in terms of their effectiveness to achieve the desired effect(s). The major drawback of DINs is their inability to incorporate evidence that arrive during the execution of a course of action (COA). Several belief‐updating algorithms, on the other hand, have been developed for DBNs that enable a system modeler to insert evidence in dynamic probabilistic models. Dynamic Bayesian networks, however, suffer from the intractability of knowledge acquisition. The presented transformation algorithm combines the advantages of both DINs and DBNs. It enables a system analyst to capture a complex situation using a DIN and pick the best (or close‐to‐best) COA that maximizes the likelihood of achieving the desired effect. During the execution, if evidence becomes available, the DIN is converted into an equivalent DBN and beliefs of other nodes in the network are updated. If required, the selected COA can be revised on the basis of the recently received evidence. The presented methodology is applicable in domains requiring strategic level decision making in highly complex situations, such as war games, real‐time strategy video games, and business simulation games. © 2009 Wiley Periodicals, Inc. 相似文献
188.
Joo W. Cangussu Syed W. Haider Kendra Cooper Michael Baron 《Software Testing, Verification and Reliability》2011,21(2):125-152
Estimating the number of defects in a software product is an important and challenging problem. A multitude of estimation techniques have been proposed for defect prediction. However, not all techniques are applicable in all cases. The selection of the proper approach to use depends on multiple factors: the features of the approach; the availability of resources; and the goals for using the estimated defect data. In this paper a survey of existing estimation techniques and a decision support approach for selecting the most suitable defect estimation technique for a project, with specific goals, is proposed. The results of the ranking are a clear indication that no estimation technique provides a single, comprehensive solution; the selection must be done according to a given scenario. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
189.
190.