首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3946篇
  免费   240篇
  国内免费   23篇
电工技术   70篇
综合类   8篇
化学工业   929篇
金属工艺   87篇
机械仪表   96篇
建筑科学   130篇
矿业工程   3篇
能源动力   240篇
轻工业   356篇
水利工程   51篇
石油天然气   93篇
无线电   500篇
一般工业技术   760篇
冶金工业   130篇
原子能技术   13篇
自动化技术   743篇
  2024年   15篇
  2023年   140篇
  2022年   266篇
  2021年   323篇
  2020年   218篇
  2019年   222篇
  2018年   266篇
  2017年   196篇
  2016年   202篇
  2015年   130篇
  2014年   162篇
  2013年   319篇
  2012年   214篇
  2011年   239篇
  2010年   170篇
  2009年   159篇
  2008年   116篇
  2007年   78篇
  2006年   80篇
  2005年   75篇
  2004年   55篇
  2003年   40篇
  2002年   44篇
  2001年   40篇
  2000年   27篇
  1999年   31篇
  1998年   40篇
  1997年   25篇
  1996年   31篇
  1995年   18篇
  1994年   20篇
  1993年   27篇
  1992年   21篇
  1991年   9篇
  1990年   9篇
  1989年   17篇
  1988年   20篇
  1987年   10篇
  1986年   12篇
  1985年   12篇
  1984年   16篇
  1983年   11篇
  1982年   8篇
  1981年   11篇
  1980年   11篇
  1979年   6篇
  1978年   10篇
  1977年   8篇
  1976年   11篇
  1974年   6篇
排序方式: 共有4209条查询结果,搜索用时 781 毫秒
941.
942.
The Model‐Driven Architecture (MDA) is an approach that aligns modeling and automation for software development. By applying such an approach to data warehouse (DW) projects, we can minimize a great deal of time and cost. Furthermore, most of OnLine Analytical Processing (OLAP) platforms seem to be like black boxes that provide wizards only to business intelligence developers to create and manipulate OLAP objects without allowing their sustainability and migration from a platform to another. That is why many works in the literature have proposed using the MDA approach in DW projects. However, most of them have mainly focused on the generation of the DW relational model from the conceptual one, and they overlooked the OLAP model and the cube implementation. To deal with this problem, we propose in this paper an MDA solution to automate the process of getting OLAP cube and its implementation through a set of metamodels and automatic transformations among them. In fact, the proposal generates the OLAP and DW relational models (PSMs) from the conceptual one, using also a PDM model that describes the target business intelligence platform. After that, the source code to create the cube is got from both PSM models. For this aim, we define a set of transformation rules implemented using the Atlas transformation language. Finally, a case study will be provided to validate our approach.  相似文献   
943.

Welding processes are considered as an essential component in most of industrial manufacturing and for structural applications. Among the most widely used welding processes is the shielded metal arc welding (SMAW) due to its versatility and simplicity. In fact, the welding process is predominant procedure in the maintenance and repair industry, construction of steel structures and also industrial fabrication. The most important physical characteristics of the weldment are the bead geometry which includes bead height and width and the penetration. Different methods and approaches have been developed to achieve the acceptable values of bead geometry parameters. This study presents artificial intelligence techniques (AIT): For example, radial basis function neural network (RBF-NN) and multilayer perceptron neural network (MLP-NN) models were developed to predict the weld bead geometry. A number of 33 plates of mild steel specimens that have undergone SMAW process are analyzed for their weld bead geometry. The input parameters of the SMAW consist of welding current (A), arc length (mm), welding speed (mm/min), diameter of electrode (mm) and welding gap (mm). The outputs of the AIT models include property parameters, namely penetration, bead width and reinforcement. The results showed outstanding level of accuracy utilizing RBF-NN in simulating the weld geometry and very satisfactorily to predict all parameters in comparison with the MLP-NN model.

  相似文献   
944.
Abstract

The main limit of data mining algorithms is their inability to deal with the huge amount of available data in a reasonable processing time. A solution of producing fast and accurate results is instances and features selection. This process eliminates noisy or redundant data in order to reduce the storage and computational cost without performances degradation. In this paper, a new instance selection approach called Ensemble Margin Instance Selection (EMIS) algorithm is proposed. This approach is based on the ensemble margin. To evaluate our approach, we have conducted several experiments on different real-world classification problems from UCI Machine learning repository. The pixel-based image segmentation is a field where the storage requirement and computational cost of applied model become higher. To solve these limitations we conduct a study based on the application of EMIS and other instance selection techniques for the segmentation and automatic recognition of white blood cells WBC (nucleus and cytoplasm) in cytological images.  相似文献   
945.

Since powerful editing software is easily accessible, manipulation on images is expedient and easy without leaving any noticeable evidences. Hence, it turns out to be a challenging chore to authenticate the genuineness of images as it is impossible for human’s naked eye to distinguish between the tampered image and actual image. Among the most common methods extensively used to copy and paste regions within the same image in tampering image is the copy-move method. Discrete Cosine Transform (DCT) has the ability to detect tampered regions accurately. Nevertheless, in terms of precision (FP) and recall (FN), the block size of overlapping block influenced the performance. In this paper, the researchers implemented the copy-move image forgery detection using DCT coefficient. Firstly, by using the standard image conversion technique, RGB image is transformed into grayscale image. Consequently, grayscale image is segregated into overlying blocks of m × m pixels, m = 4.8. 2D DCT coefficients are calculated and reposition into a feature vector using zig-zag scanning in every block. Eventually, lexicographic sort is used to sort the feature vectors. Finally, the duplicated block is located by the Euclidean Distance. In order to gauge the performance of the copy-move detection techniques with various block sizes with respect to accuracy and storage, threshold D_similar = 0.1 and distance threshold (N)_d = 100 are used to implement the 10 input images in order. Consequently, 4 × 4 overlying block size had high false positive thus decreased the accuracy of forged detection in terms of accuracy. However, 8 × 8 overlying block accomplished more accurately for forged detection in terms of precision and recall as compared to 4 × 4 overlying block. In a nutshell, the result of the accuracy performance of different overlying block size are influenced by the diverse size of forged area, distance between two forged areas and threshold value used for the research.

  相似文献   
946.
A wireless sensor network (WSN) consists of a large number of static or mobile, low-cost, and low-power sensor nodes. And energy is one of the most important factors that should be considered. In this paper, we propose clustering-based routing protocol for dynamic networks (CRPD) to reduce energy consumption and improve energy efficiency through clustering and routing algorithms. The basic idea is to periodically update the network topology and select the node with larger degree and high residual energy as the cluster head to be responsible for data aggregation and transmission. With the nodes moving, joining, and choosing the optimal clustering radius, the energy load of the whole network can be evenly distributed to each sensor node, which can significantly prolong the network lifetime. Extensive simulations show that CRPD is more energy-efficient than the existing protocols.  相似文献   
947.
Deep Learning for Tomato Diseases: Classification and Symptoms Visualization   总被引:12,自引:0,他引:12  
Several studies have invested in machine learning classifiers to protect plants from diseases by processing leaf images. Most of the proposed classifiers are trained and evaluated with small datasets, focusing on the extraction of hand-crafted features from image to classify the leaves. In this study, we have used a large dataset compared to the state-of-the art. Here, the dataset contains 14,828 images of tomato leaves infected with nine diseases. To train our classifier, we have introduced the Convolutional Neural Network (CNN) as a learning algorithm. One of the biggest advantages of CNN is the automatic extraction of features by processing directly the raw images. To analyze the proposed deep model, we have used visualization methods to understand symptoms and to localize disease regions in leaf. The obtained results are encouraging, reaching 99.18% of accuracy, which ourperforms dramatically shallow models, and they can be used as a practical tool for farmers to protect tomato against disease.  相似文献   
948.
Offshore wind farms are a growing source of energy, which aims to ensure a clean energy with a low environmental impact. In this context, this paper investigates opportunities of the turbine gearbox end of life-cycle to improve the operation and maintenance strategies. We determine the impact of spare part policy based on the remanufacturing of gearboxes recovered after each replacement. The remanufacturing implementation allows the extension of the gearbox life-cycle and involves a perfect organization and coordination between maintenance, monitoring, operation and spare part supply chain to determine the best way to use each gearbox of each wind turbine. In this paper, we present a multi-agent based approach to analyze the impact of the spare parts remanufacturing strategy on the performance of an offshore wind farm in term of total cost and carbon footprint.  相似文献   
949.
In this study, zinc?aluminum alloy (ZA-27) matrix composites reinforced by different weight fractions of fly ash or alumina (Al2O3) were produced using the traditional stir casting technique. The corrosion behaviors of both unreinforced alloy and reinforced composites were examined using direct current polarization (DCP) test in a simulated sea solution (3.5 wt.% NaCl). Scanning electron microscopy (SEM) and energy dispersive x-ray (EDX) were used to examine the morphology of the composites’ surface before and after corrosion tests. The results of corrosion revealed that reinforcing ZA-27 alloy by fly ash or Al2O3 particles decreases its tendency to uniform corrosion due to the formation of weak microgalvanic couple between matrix and reinforcement particles. The fly ash and alumina (Al2O3) particles have protected the matrix material from pits formation at early stage of polarization. However, once these pits are formed, they grow faster. Positive hysteresis of the polarization curves implies that the salt layer breakdown and matrix dissolution overshadow surface passivation during the reverse scan. The electrochemical results are consistent with the pits’ morphology of the corroded composite. Composites with fly ash reinforcements have autocatalytic pits, whereas composites with alumina (Al2O3) reinforcements have shallow pits.  相似文献   
950.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号