首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   33252篇
  免费   3193篇
  国内免费   2532篇
电工技术   1835篇
技术理论   1篇
综合类   2462篇
化学工业   1961篇
金属工艺   571篇
机械仪表   1608篇
建筑科学   975篇
矿业工程   279篇
能源动力   638篇
轻工业   581篇
水利工程   291篇
石油天然气   250篇
武器工业   161篇
无线电   6234篇
一般工业技术   2011篇
冶金工业   477篇
原子能技术   111篇
自动化技术   18531篇
  2024年   124篇
  2023年   491篇
  2022年   667篇
  2021年   803篇
  2020年   881篇
  2019年   789篇
  2018年   717篇
  2017年   962篇
  2016年   1144篇
  2015年   1385篇
  2014年   1890篇
  2013年   2229篇
  2012年   2111篇
  2011年   2458篇
  2010年   1950篇
  2009年   2405篇
  2008年   2484篇
  2007年   2446篇
  2006年   2113篇
  2005年   1761篇
  2004年   1496篇
  2003年   1352篇
  2002年   1116篇
  2001年   944篇
  2000年   851篇
  1999年   680篇
  1998年   594篇
  1997年   500篇
  1996年   391篇
  1995年   296篇
  1994年   219篇
  1993年   187篇
  1992年   126篇
  1991年   72篇
  1990年   56篇
  1989年   39篇
  1988年   33篇
  1987年   21篇
  1986年   17篇
  1985年   43篇
  1984年   38篇
  1983年   35篇
  1982年   40篇
  1981年   4篇
  1980年   2篇
  1979年   6篇
  1978年   3篇
  1976年   2篇
  1958年   1篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 19 毫秒
991.
In this paper we show, for the first time, how Radial Basis Function (RBF) network techniques can be used to explore questions surrounding authorship of historic documents. The paper illustrates the technical and practical aspects of RBF's, using data extracted from works written in the early 17th century by William Shakespeare and his contemporary John Fletcher. We also present benchmark comparisons with other standard techniques for contrast and comparison.David Lowe is Professor of Neural Computing at Aston University, UK. His research interests span from the theoretical aspects of dynamical systems theory and statistical pattern processing, to a wide range of application domains, from financial market analysis (Novel Exploitation of Neural Network Methods in Financial Markets, invited paper,World Conference on Computational Intelligence, vol. VI, pp. 3623–28, 1994) to the artificial nose (Novel Topographic Nonlinear Feature Extraction using Radial Basis Functions for Concentration Coding in the Artificial Nose,3 rd IEE International Conference on Artificial Neural Networks, pp. 95–99, Conference Publication number 372, The Institute of Electrical Engineers, 1993).Robert Matthews is a visiting research fellow at Aston University. His research interests include probability, number theory and astronomy. His recent paper inNature (vol. 374, pp. 681–82, 1995) somehow managed to combine all three.  相似文献   
992.
电弧故障是引发电气火灾的主要原因之一。在电动汽车电气系统中,直流串联电弧故障通常发生在接触点松动或线路连接损坏处,会引起火灾、爆炸等严重事故。为快速、准确地检测电动汽车串联型电弧故障,搭建了电动汽车故障电弧实验平台,采集不同工况下干路电流时间序列并建立了样本库。通过轻量化卷积神经网络,建立了基于改进Mobilenet网络的串联故障电弧检测模型。通过对比分析学习率、网络层数、样本长度,对模型进行了优化。该优化模型通过干路电流可实现电动汽车串联型故障电弧的检测和故障选线,检测准确率达到96.39%,论文为电动汽车电气系统电弧故障检测提供了一种可行性方案。  相似文献   
993.
高分三号卫星是我国首颗分辨率达到1 m的C波段 多极化合成孔径雷达(synthetic aperture radar,SAR) 卫星,其中扫描 式合成孔径雷达(scan synthetic aperture radar,ScanSAR)模式是高分三号卫星重要的工 作模式之一,由于该模式的工作机制导致生成的图像可能发生扇贝效应,一般呈现为明暗相 间的条纹。本文针对高分三号卫星ScanSAR模式下存在的扇贝效应,提出自注意力机制与循 环一致对抗网络(cycle-consistent adversarial networks,CycleGAN)结合的模型对Scan S AR图像进行处理,从而抑制扇贝效应产生的条纹现象。本文所示方法与传统扇贝效应抑制方 法和深度学习相关算法进行比较,并通过亮度均值、平均梯度等指标进行分析。实验结果表 明,本文方法可以对高分三号ScanSAR图像存在的扇贝效应进行较好的处理,有效抑制图像 的条纹现象,使得图像质量得到提升,具有较大的实用意义。  相似文献   
994.
In Energy Harvesting Wireless Sensor Networks (EHWSN), the communication protocol will directly affect the final performance of the network, so it is necessary to study the communication protocol based on EHWSN. In this paper, for the low-cost fixed clustering problem, a fixed clustering protocol RRCEH is based on random relaying. Our proposed RRCEH abandons the inefficient inter-cluster communication method of the traditional fixed clustering protocol. To coordinate the data upload of the cluster head, RRCEH allocates different random relay vectors to each ring area of the network, and combines all the random relay vectors into a random relay matrix of RRCEH. In each communication round, the cluster head node randomly selects its relay target node to send data according to the probability distribution in the random relay vector in the area. For two different cluster head configuration scenarios, by optimizing the random relay matrix, RRCEH can effectively reduce the network's configuration requirements for cluster head energy harvesting capability, thus reducing the deployment cost of EHWSN.  相似文献   
995.
We propose an approach for interactive 3D face editing based on deep generative models. Most of the current face modeling methods rely on linear methods and cannot express complex and non-linear deformations. In contrast to 3D morphable face models based on Principal Component Analysis (PCA), we introduce a novel architecture based on variational autoencoders. Our architecture has multiple encoders (one for each part of the face, such as the nose and mouth) which feed a single decoder. As a result, each sub-vector of the latent vector represents one part. We train our model with a novel loss function that further disentangles the space based on different parts of the face. The output of the network is a whole 3D face. Hence, unlike part-based PCA methods, our model learns to merge the parts intrinsically and does not require an additional merging process. To achieve interactive face modeling, we optimize for the latent variables given vertex positional constraints provided by a user. To avoid unwanted global changes elsewhere on the face, we only optimize the subset of the latent vector that corresponds to the part of the face being modified. Our editing optimization converges in less than a second. Our results show that the proposed approach supports a broader range of editing constraints and generates more realistic 3D faces.  相似文献   
996.
The technological innovations and wide use of Wireless Sensor Network (WSN) applications need to handle diverse data. These huge data possess network security issues as intrusions that cannot be neglected or ignored. An effective strategy to counteract security issues in WSN can be achieved through the Intrusion Detection System (IDS). IDS ensures network integrity, availability, and confidentiality by detecting different attacks. Regardless of efforts by various researchers, the domain is still open to obtain an IDS with improved detection accuracy with minimum false alarms to detect intrusions. Machine learning models are deployed as IDS, but their potential solutions need to be improved in terms of detection accuracy. The neural network performance depends on feature selection, and hence, it is essential to bring an efficient feature selection model for better performance. An optimized deep learning model has been presented to detect different types of attacks in WSN. Instead of the conventional parameter selection procedure for Convolutional Neural Network (CNN) architecture, a nature-inspired whale optimization algorithm is included to optimize the CNN parameters such as kernel size, feature map count, padding, and pooling type. These optimized features greatly improved the intrusion detection accuracy compared to Deep Neural network (DNN), Random Forest (RF), and Decision Tree (DT) models.  相似文献   
997.
Manufacturing programmable materials, whose mechanical properties can be adapted on demand, is highly desired for their application in areas ranging from robotics, to biomedicine, or microfluidics. Herein, the inclusion of dynamic and living bonds, such as alkoxyamines, in a printable formulation suitable for two-photon 3D laser printing is exploited. On one hand, taking advantage of the dynamic covalent character of alkoxyamines, the nitroxide exchange reaction is investigated. As a consequence, a reduction of the Young´s Modulus by 50%, is measured by nanoindentation. On the other hand, due to its “living” characteristic, the chain extension becomes possible via nitroxide mediated polymerization. In particular, living nitroxide mediated polymerization of styrene results not only in a dramatic increase of the volume (≈8 times) of the 3D printed microstructure but also an increase of the Young's Modulus by two orders of magnitude (from 14 MPa to 2.7 GPa), while maintaining the shape including fine structural details. Thus, the approach introduces a new dimension by enabling to create microstructures with dynamically tunable size and mechanical properties.  相似文献   
998.
Liquid crystalline polymers (LCPs), especially liquid crystalline elastomers (LCEs) can generate ultrahigh shape change amplitude but has lower mechanical strength. Although some attempts have been tried to improve the mechanical performance of LCE, there are still limitations including complicated fabrication and high actuation temperature. Here, a versatile method is reported to fabricate light-driven actuator by covalently cross-linking polyurethane (PU) into LCP networks (PULCN). This new scheme is distinct from the previous interpenetrating network strategy, the hydrogen bonds and covalent bonds are used in this study to improve the miscibility of non-liquid-crystalline PU and LCP materials and enhance the stability of the composite system. This material not only possesses the shape memory properties of PU but shows shape-changing behavior of LCPs. With a shrinkage ratio of 20% at the phase transition temperature, the prepared materials reached a maximum mechanical strength of 20 MPa, higher than conventional LCP. Meanwhile, the resulting film shows diverse and programmable initial shapes by constructing crosslinking density gradient across the thickness of the film. By integration of PULCN with near-infrared light-responsive polydopamine, local and sequential light control is achieved. This study may provide a new route for the fabrication of programmable and mechanically robust light-driven soft actuator.  相似文献   
999.
The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated view of the trends in the IoT authentication area. Among the issues covered include a series of authentication protocols that have remained research gaps in various studies. This study applies a comparative evaluation of authentication protocols, including their strengths and weaknesses. Thus, it forms the foundation in the IoT authentication field of study. In that direction, a multi authentication architecture that involves secured means is proposed for protocol authentication. Informal analysis can affect the security of the protocols. Burrows-Abadi-Needham (BAN) logic provides proof of the attainment of mutual authentication. NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic.  相似文献   
1000.
不同行人的高度相似性以及相同行人外观姿态的差异性,使得不同摄像头下的行人重识别面临严峻的挑战。生成对抗网络可以合成新的图像,被认为是解决行人姿态变化的主要技术手段。提出一种基于多姿态图像生成的行人重识别算法,利用生成对抗网络生成不同姿态的行人图像,通过归一化消除姿态的影响,从而大幅度提升行人重识别的整体性能。该行人重识别算法包括多姿态行人图像生成、不同姿态的行人特征提取与融合、距离度量和重排序三部分内容。在Market-1501数据集和DukeMTMC-ReID数据集上的实验证实了所提出算法的有效性,通过与state-of-the-art行人重识别方法比较,展示了多姿态图像生成方法在行人重识别任务中的优越性,同时表明生成行人图像的特征与原始图像的特征是相互补充的。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号