首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1998篇
  免费   97篇
  国内免费   14篇
电工技术   25篇
综合类   4篇
化学工业   420篇
金属工艺   87篇
机械仪表   81篇
建筑科学   45篇
矿业工程   2篇
能源动力   128篇
轻工业   191篇
水利工程   25篇
石油天然气   9篇
无线电   259篇
一般工业技术   382篇
冶金工业   133篇
原子能技术   6篇
自动化技术   312篇
  2024年   7篇
  2023年   44篇
  2022年   93篇
  2021年   150篇
  2020年   108篇
  2019年   94篇
  2018年   134篇
  2017年   113篇
  2016年   103篇
  2015年   61篇
  2014年   95篇
  2013年   159篇
  2012年   100篇
  2011年   117篇
  2010年   82篇
  2009年   79篇
  2008年   63篇
  2007年   62篇
  2006年   50篇
  2005年   44篇
  2004年   20篇
  2003年   22篇
  2002年   20篇
  2001年   20篇
  2000年   17篇
  1999年   12篇
  1998年   41篇
  1997年   23篇
  1996年   14篇
  1995年   20篇
  1994年   18篇
  1993年   9篇
  1992年   7篇
  1991年   6篇
  1990年   8篇
  1989年   14篇
  1988年   8篇
  1987年   7篇
  1986年   5篇
  1985年   7篇
  1984年   11篇
  1983年   4篇
  1982年   5篇
  1981年   9篇
  1980年   4篇
  1979年   5篇
  1978年   3篇
  1977年   4篇
  1976年   3篇
  1974年   2篇
排序方式: 共有2109条查询结果,搜索用时 0 毫秒
181.
The deep learning model encompasses a powerful learning ability that integrates the feature extraction, and classification method to improve accuracy. Convolutional Neural Networks (CNN) perform well in machine learning and image processing tasks like segmentation, classification, detection, identification, etc. The CNN models are still sensitive to noise and attack. The smallest change in training images as in an adversarial attack can greatly decrease the accuracy of the CNN model. This paper presents an alpha fusion attack analysis and generates defense against adversarial attacks. The proposed work is divided into three phases: firstly, an MLSTM-based CNN classification model is developed for classifying COVID-CT images. Secondly, an alpha fusion attack is generated to fool the classification model. The alpha fusion attack is tested in the last phase on a modified LSTM-based CNN (CNN-MLSTM) model and other pre-trained models. The results of CNN models show that the accuracy of these models dropped greatly after the alpha-fusion attack. The highest F1 score before the attack was achieved is 97.45 And after the attack lowest F1 score recorded is 22%. Results elucidate the performance in terms of accuracy, precision, F1 score and Recall.  相似文献   
182.
183.
184.
185.
International Journal of Computer Vision - We propose a novel CNN architecture called ACTNET for robust instance image retrieval from large-scale datasets. Our key innovation is a learnable...  相似文献   
186.
Neural Computing and Applications - Lung cancer is a deadly disease if not diagnosed in its early stages. However, early detection of lung cancer is a challenging task due to the shape and size of...  相似文献   
187.
This paper presents an algorithm to transform a dynamic influence net (DIN) into a dynamic Bayesian network (DBN). The transformation aims to bring the best of both probabilistic reasoning paradigms. The advantages of DINs lie in their ability to represent causal and time‐varying information in a compact and easy‐to‐understand manner. They facilitate a system modeler in connecting a set of desired effects and a set of actionable events through a series of dynamically changing cause and effect relationships. The resultant probabilistic model is then used to analyze different courses of action in terms of their effectiveness to achieve the desired effect(s). The major drawback of DINs is their inability to incorporate evidence that arrive during the execution of a course of action (COA). Several belief‐updating algorithms, on the other hand, have been developed for DBNs that enable a system modeler to insert evidence in dynamic probabilistic models. Dynamic Bayesian networks, however, suffer from the intractability of knowledge acquisition. The presented transformation algorithm combines the advantages of both DINs and DBNs. It enables a system analyst to capture a complex situation using a DIN and pick the best (or close‐to‐best) COA that maximizes the likelihood of achieving the desired effect. During the execution, if evidence becomes available, the DIN is converted into an equivalent DBN and beliefs of other nodes in the network are updated. If required, the selected COA can be revised on the basis of the recently received evidence. The presented methodology is applicable in domains requiring strategic level decision making in highly complex situations, such as war games, real‐time strategy video games, and business simulation games. © 2009 Wiley Periodicals, Inc.  相似文献   
188.
Estimating the number of defects in a software product is an important and challenging problem. A multitude of estimation techniques have been proposed for defect prediction. However, not all techniques are applicable in all cases. The selection of the proper approach to use depends on multiple factors: the features of the approach; the availability of resources; and the goals for using the estimated defect data. In this paper a survey of existing estimation techniques and a decision support approach for selecting the most suitable defect estimation technique for a project, with specific goals, is proposed. The results of the ranking are a clear indication that no estimation technique provides a single, comprehensive solution; the selection must be done according to a given scenario. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
189.
190.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号