首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2084篇
  免费   131篇
  国内免费   18篇
电工技术   32篇
综合类   5篇
化学工业   486篇
金属工艺   46篇
机械仪表   43篇
建筑科学   48篇
矿业工程   4篇
能源动力   104篇
轻工业   168篇
水利工程   12篇
石油天然气   21篇
无线电   246篇
一般工业技术   476篇
冶金工业   128篇
原子能技术   5篇
自动化技术   409篇
  2024年   5篇
  2023年   32篇
  2022年   87篇
  2021年   101篇
  2020年   94篇
  2019年   97篇
  2018年   132篇
  2017年   112篇
  2016年   117篇
  2015年   73篇
  2014年   88篇
  2013年   167篇
  2012年   135篇
  2011年   146篇
  2010年   110篇
  2009年   96篇
  2008年   106篇
  2007年   79篇
  2006年   64篇
  2005年   51篇
  2004年   35篇
  2003年   30篇
  2002年   27篇
  2001年   26篇
  2000年   16篇
  1999年   11篇
  1998年   20篇
  1997年   21篇
  1996年   17篇
  1995年   16篇
  1994年   11篇
  1993年   15篇
  1992年   8篇
  1991年   3篇
  1990年   7篇
  1989年   3篇
  1988年   7篇
  1987年   5篇
  1986年   4篇
  1985年   4篇
  1984年   4篇
  1983年   6篇
  1982年   4篇
  1981年   4篇
  1980年   3篇
  1977年   4篇
  1976年   6篇
  1975年   6篇
  1974年   7篇
  1973年   5篇
排序方式: 共有2233条查询结果,搜索用时 15 毫秒
21.
Component commonality effects on inventory costs   总被引:5,自引:0,他引:5  
In this paper we study the effects of increasing component commonality for a single-period model. A two-product, two-level configuration under a general component cost structure is considered. The economic implications of replacing different products' components by common components are analyzed. We develop optimal solutions for the Commonality and Non-Commonality (Basic) Models and provide bounds on the total savings resulting from using commonality. We demonstrate, under general and specific component cost structures, that some forms of commonality may not always be a preferred strategy. Furthermore, we present conditions under which commonality should not be used. Finally, an extension to the two-product multicomponent model is provided.  相似文献   
22.
In this paper, we present a novel two-stage minimum-mean-squared-error (MMSE) multiuser decision feedback detector (DFD) for code division multiple access systems working in the frequency-selective multipath fading environment. The first stage of the proposed cascaded structure is the noise-predictive successive DFD (NP-S-DFD), in which the active users are detected successively using the conventional bell labs layered space-time (BLAST) ordering criterion. The second stage includes an adaptive successive/parallel DFD (SP-DFD), which uses the tentative decisions obtained at the first stage for multiuser interference cancellation and data detection. Therefore, the proposed two-stage DFD may be called noise-predictive successive SP-DFD (NP-S-SP-DFD). Simulation results are presented to demonstrate the substantial improvement in the bit error rate performance of NP-S-SP-DFD over the conventional single-stage and cascaded DFDs. It may be inferred that the proposed DFD provides additional performance gain, when the order in which the users are detected is optimized according to the BLAST ordering based on MMSE criterion.  相似文献   
23.
24.
People can recognize the meaning or gist of a scene from a single glance, and a few recent studies have begun to examine the sorts of information that contribute to scene gist recognition. The authors of the present study used visual masking coupled with image manipulations (randomizing phase while maintaining the Fourier amplitude spectrum; random image structure evolution [RISE]; J. Sadr & P. Sinha, 2004) to explore whether and when unlocalized Fourier amplitude information contributes to gist perception. In 4 experiments, the authors found that differences between scene categories in the Fourier amplitude spectrum are insufficient for gist recognition or gist masking. Whereas the global 1/f spatial frequency amplitude spectra of scenes plays a role in gist masking, local phase information is necessary for gist recognition and for the strongest gist masking. Moreover, the ability to recognize the gist of a target image was influenced by mask recognizability, suggesting that conceptual masking occurs even at the earliest stages of scene processing. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
25.
Most interaction recognition approaches have been limited to single‐person action classification in videos. However, for still images where motion information is not available, the task becomes more complex. Aiming to this point, we propose an approach for multiperson human interaction recognition in images with keypoint‐based feature image analysis. Proposed method is a three‐stage framework. In the first stage, we propose feature‐based neural network (FCNN) for action recognition trained with feature images. Feature images are body features, that is, effective distances between a set of body part pairs and angular relation between body part triplets, rearranged in 2D gray‐scale image to learn effective representation of complex actions. In the later stage, we propose a voting‐based method for direction encoding to anticipate probable motion in steady images. Finally, our multiperson interaction recognition algorithm identifies which human pairs are interacting with each other using an interaction parameter. We evaluate our approach on two real‐world data sets, that is, UT‐interaction and SBU kinect interaction. The empirical experiments show that results are better than the state‐of‐the‐art methods with recognition accuracy of 95.83% on UT‐I set 1, 92.5% on UT‐I set 2, and 94.28% on SBU clean data set.  相似文献   
26.
Verma  Amit  Dawar  Siddharth  Kumar  Raman  Navathe  Shamkant  Goyal  Vikram 《Applied Intelligence》2021,51(7):4649-4663

High-utility Itemset Mining (HUIM) finds patterns from a transaction database with their utility no less than a user-defined threshold. The utility of an itemset is defined as the sum of the utilities of its items. The utility notion enables a data analyst to associate a profit score with each item and thereof to a pattern. We extend the notion of high-utility with diversity to define a new pattern type called High-utility and Diverse pattern (HUD). The notion of diversity of a pattern captures the extent of the different categories covered by the selected items in the pattern. An application of diverse-pattern lies in the recommendation task where a system can recommend to a customer a set of items from a new class based on her previously bought items. Our notion of diversity is easy to compute and also captures the basic essence of a previously proposed diversity notion. The existing algorithm to compute frequent-diverse patterns is 2-phase, i.e., in the first phase, frequent patterns are computed, out of which diverse patterns are filtered out in the second phase. We, in this paper, give an integrated algorithm that efficiently computes high-utility and diverse patterns in a single phase. Our experimental study shows that our proposed algorithm is very efficient as compared to a 2-phase algorithm that extracts high-utility itemsets in the first phase and filters out the diverse itemsets in the second phase.

  相似文献   
27.
Neural Computing and Applications - In this research article, a novel approach is proposed by considering the sine augmented scaled sine cosine (SAS-SCA) Algorithm for the load frequency control of...  相似文献   
28.
The availability of cheap network based video cameras and the prevalence of wireless networks has lead to a major thrust towards deployment of large scale Distributed Video Surveillance (DVS) systems. This has opened up an important area of research to deal with the issues involved in DVS system for efficient collection and transmission of large scale video streams from the cameras at the guarded sites, to the end users in possibly constrained network conditions. In this paper, we propose a framework based on content-based video classification and scalable compression scheme to provide a robust bandwidth efficient video transmission for DVS. The scheme builds on a Discrete Wavelet Transform (DWT) based Color-Set Partitioning for Hierarchical Trees (CSPIHT) coding to obtain a scalable bitstream. Wavelet domain segmentation and compression assists in development of a DVS architecture. The architecture includes a novel module for dynamic allocation of Network bandwidth based on the current available resources and constraints. Different frame constituents are optimally coded based on their relative significance, perceptual quality, and available estimate of network bandwidth. Experimental result over different video sequences and simulations for Network conditions demonstrate the efficient performance of the approach.  相似文献   
29.
Antimicrobial resistance has long been viewed as a lethal threat to global health. Despite the availability of a wide range of antibacterial medicines all around the world, organisms have evolved a resistance mechanism to these therapies. As a result, a scenario has emerged requiring the development of effective antibacterial drugs/agents. In this article, we exclusively highlight a significant finding reported by Zbořil and associates (Adv. Sci. 2021, 2003090). The authors construct a covalently bounded silver-cyanographene (GCN/Ag) with the antibacterial activity of 30 fold higher than that of free Ag ions or typical Ag nanoparticles (AgNPs). Ascribed to the strong covalent bond between nitrile and Ag, an immense cytocompatibility is shown by the GCN/Ag towards healthy human cells with a minute leaching of Ag ions. Firm interactions between the microbial membrane and the GCN/Ag are confirmed by molecular dynamics simulations, which rule out the dependence of antibacterial activity upon the Ag ions alone. Thus, this study furnishes ample scope to unfold next-generation hybrid antimicrobial drugs to confront infections arising from drug and Ag-resistant bacterial strains.  相似文献   
30.
AKT, is a serine/threonine protein kinase comprising three isoforms—namely: AKT1, AKT2 and AKT3, whose inhibitors have been recognized as promising therapeutic targets for various human disorders, especially cancer. In this work, we report a systematic evaluation of multi-target Quantitative Structure-Activity Relationship (mt-QSAR) models to probe AKT’ inhibitory activity, based on different feature selection algorithms and machine learning tools. The best predictive linear and non-linear mt-QSAR models were found by the genetic algorithm-based linear discriminant analysis (GA-LDA) and gradient boosting (Xgboost) techniques, respectively, using a dataset containing 5523 inhibitors of the AKT isoforms assayed under various experimental conditions. The linear model highlighted the key structural attributes responsible for higher inhibitory activity whereas the non-linear model displayed an overall accuracy higher than 90%. Both these predictive models, generated through internal and external validation methods, were then used for screening the Asinex kinase inhibitor library to identify the most potential virtual hits as pan-AKT inhibitors. The virtual hits identified were then filtered by stepwise analyses based on reverse pharmacophore-mapping based prediction. Finally, results of molecular dynamics simulations were used to estimate the theoretical binding affinity of the selected virtual hits towards the three isoforms of enzyme AKT. Our computational findings thus provide important guidelines to facilitate the discovery of novel AKT inhibitors.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号