首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   110896篇
  免费   14773篇
  国内免费   10457篇
电工技术   16467篇
技术理论   10篇
综合类   13094篇
化学工业   4842篇
金属工艺   2237篇
机械仪表   5880篇
建筑科学   5511篇
矿业工程   3079篇
能源动力   2723篇
轻工业   2934篇
水利工程   2684篇
石油天然气   3112篇
武器工业   1125篇
无线电   20947篇
一般工业技术   5038篇
冶金工业   2347篇
原子能技术   438篇
自动化技术   43658篇
  2024年   894篇
  2023年   2342篇
  2022年   4426篇
  2021年   4886篇
  2020年   4949篇
  2019年   3594篇
  2018年   3029篇
  2017年   3549篇
  2016年   3785篇
  2015年   4229篇
  2014年   7239篇
  2013年   6415篇
  2012年   8309篇
  2011年   8582篇
  2010年   6621篇
  2009年   6987篇
  2008年   7220篇
  2007年   8242篇
  2006年   6944篇
  2005年   6235篇
  2004年   5173篇
  2003年   4605篇
  2002年   3631篇
  2001年   3094篇
  2000年   2505篇
  1999年   2071篇
  1998年   1494篇
  1997年   1232篇
  1996年   987篇
  1995年   762篇
  1994年   569篇
  1993年   389篇
  1992年   264篇
  1991年   200篇
  1990年   150篇
  1989年   133篇
  1988年   94篇
  1987年   44篇
  1986年   39篇
  1985年   38篇
  1984年   24篇
  1983年   26篇
  1982年   33篇
  1981年   11篇
  1980年   9篇
  1979年   10篇
  1959年   10篇
  1958年   5篇
  1955年   7篇
  1951年   5篇
排序方式: 共有10000条查询结果,搜索用时 10 毫秒
941.
For a non-idealized machine tool, each point in the workspace is associated with a tool point positioning error vector. If this error map can be determined, then it is possible to substantially improve the positioning performance of the machine by introducing suitable compensation into the control loop. This paper explores the possibility of using an artifical neural network (ANN) to compute this mapping. The training set for the ANN is obtained by mounting a physical artifact whose dimensions are precisely known in the machine's workspace. The machine, equipped with a touch trigger probe, measures the positions of features on the artifact. The difference between the machine reading and the known dimension is the machine error at that point in the workspace. Using standard modeling techniques, the kinematic error model for a CNC turning center was developed. This model was parameterized by measurement of the parametric error functions using a laser interferometer, electronic levels and a precision square. The kinematic model was then used to simulate the artifact-measuring process and develop the ANN training set. The effect of changing artifact geometry was explored and a machining operation was simulated using the ANN output to provide compensation. The results show that the ANN is capable of learning the error map of a real machine, and that ANN-based compensation can significantly reduce part-dimensional errors.  相似文献   
942.
Research in computer-supported writing has traditionally compared electronic communication with oral, face-to-face communication to identify the benefits and weaknesses of each, as if they entailed dichotomous choices. In this article, we challenge that view and argue instead that any form of communication and its educational usefulness is shaped by the situation in which it is used, the backgrounds and goals of the participants, the institutional and technological setup, and the intended purpose of the medium. Three modes of communication in one graduate course are examined — oral discussion, synchronous written discussion on a local area network, and asynchronous written postings on an email list set up for the class. It was found that patterns of participation, topic introduction, and topic development differed across the three communication modes, but that the three were interwoven with each other and embedded within the larger classroom context and forms of knowledge creation in the class. Thus, rather than examining different communication media separately, researchers interested in understanding computer-supported collaborative writing need to look at how different media are used to create a meta-medium, which is established by the discourse community involved.  相似文献   
943.
The learning convergence of CMAC in cyclic learning   总被引:6,自引:0,他引:6       下载免费PDF全文
In this paper we discuss the learning convergence of the cerebellar model articulation controller (CMAC) in cyclic learning.We prove the following results.First,if the training samples are noiseless,the training algorithm converges if and only if the learning rate is chosen from (0,2).Second,when the training samples have noises,the learning algorithm will converge with a probability of one if the learning rate is dynamically decreased.Third,in the case with noises,with a small but fixed learning rate ε the mean square error of the weight sequences generated by the CMAC learning algorithm will be bounded by O(ε).Some simulation experiments are carried out to test these results.  相似文献   
944.
Consumer decision-making is related to the success or failure of enterprises, and products that cater to the cognitive preferences of users have become a focus of current research. Based on the theory of bounded rationality, this paper explores the cognitive process of consumer decision-making. Then, how product shape affects consumption decision-making is analyzed with eye-tracking technology. Finally, the design principle of the product form is further explored. The results demonstrate the following: (1) the perceptual cognition of users has a driving effect on consumption behavior; (2) as a key factor affecting the perceptual cognition of users, product form affects consumer decision-making by influencing the degree of approach motivation; (3) by establishing the mapping relationship between product form elements and user images, the principles of product form design can be more consistent with user image preferences. This study provides useful suggestions for how to increase the purchase behavior of users from the perspective of bounded rationality.  相似文献   
945.
Ship surveillance plays an important role in ensuring the safety of maritime transportation and navigation. Due to the influence of factors such as waves and special weather, the existing detection methods still cannot balance the accuracy, speed and the parameters of the model in the changeable and complex marine environment. To solve this problem, this paper proposes an improved real-time method based on YOLOv5, which has few parameters and achieves high detection accuracy with little memory and computation cost. Collaborative Attention (CA) mechanism is added to the network structure, which enables the model to more accurately locate and identify target regions. We also design a Spatial Pyramid Pooling module (SPP) and a weighted pyramid network called Bidirectional Feature Pyramid Network (BiFPN) based on the characteristics of the ships to better fuse feature information. Transformer encoder is introduced to capture long-distance dependencies and preserve global and local features to the greatest extent. Furthermore, the ability of our proposed structure to localize objects at each stage is improved through integrating the output of multiple modules. The experimental results show that, the comprehensive performance of this method is better than the existing technology in ship detection on different evaluation criteria.  相似文献   
946.
Object detection (OD) is used for visual quality control in factories. Images that compose training datasets are often collected directly from the production line and labeled with bounding boxes manually. Such data represent well the inference context but might lack diversity, implying a risk of overfitting. To address this issue, we propose a dataset construction method based on an automated pipeline, which receives a CAD model of an object and returns a set of realistic synthetic labeled images (code publicly available). Our approach can be easily used by non-expert users and is relevant for industrial applications, where CAD models are widely available. We performed experiments to compare the use of datasets obtained by the two different ways—collecting and labeling real images or applying the proposed automated pipeline—in the classification of five different industrial parts. To ensure that both approaches can be used without deep learning expertise, all training parameters were kept fixed during these experiments. In our results, both methods were successful for some objects but failed for others. However, we have shown that the combined use of real and synthetic images led to better results. This finding has the potential to make industrial OD models more robust to poor data collection and labeling errors, without increasing the difficulty of the training process.  相似文献   
947.
The present work has been carried out to develop a performance evaluation framework of distribution network design in public health with specific reference to essential medicines based on six different types of public health distribution networks (PHDNs) prevalent across six Indian states. We evaluated the performance of PHDNs on the criteria of cost and service and also on the sub-criteria of cost and service by following the analytic hierarchy process. We utilized the pairwise comparison method in determining the relative importance of criteria and sub-criteria by seeking responses from several experts and subsequently evaluated the PHDNs on all sub-criteria in a 7-point Likert scale by seeking views from the same experts. Finally, we developed the “cost–service matrix,” in which cost and service have been depicted in the horizontal and vertical axes, respectively. We demonstrated the performance of six PHDNs in this matrix in terms of cost and service by plotting scores obtained by them on cost and service, respectively. The findings of the study provide rich insights to the policy planners of public health.  相似文献   
948.
With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL) can be employed to identify anonymous intrusions. Therefore, the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection (HGSODL-ID) model for the IIoT environment. The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format. The HGSO algorithm is employed for Feature Selection (HGSO-FS) to reduce the curse of dimensionality. Moreover, Sparrow Search Optimization (SSO) is utilized with a Graph Convolutional Network (GCN) to classify and identify intrusions in the network. Finally, the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model. The proposed HGSODL-ID model was experimentally validated using a benchmark dataset, and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches.  相似文献   
949.
Nowadays in the medical field, imaging techniques such as Optical Coherence Tomography (OCT) are mainly used to identify retinal diseases. In this paper, the Central Serous Chorio Retinopathy (CSCR) image is analyzed for various stages and then compares the difference between CSCR before as well as after treatment using different application methods. The first approach, which was focused on image quality, improves medical image accuracy. An enhancement algorithm was implemented to improve the OCT image contrast and denoise purpose called Boosted Anisotropic Diffusion with an Unsharp Masking Filter (BADWUMF). The classifier used here is to figure out whether the OCT image is a CSCR case or not. 150 images are checked for this research work (75 abnormal from Optical Coherence Tomography Image Retinal Database, in-house clinical database, and 75 normal images). This article explicitly decides that the approaches suggested aid the ophthalmologist with the precise retinal analysis and hence the risk factors to be minimized. The total precision is 90 percent obtained from the Two Class Support Vector Machine (TCSVM) classifier and 93.3 percent is obtained from Shallow Neural Network with the Powell-Beale (SNNWPB) classifier using the MATLAB 2019a program.  相似文献   
950.
Photovoltaic (PV) systems are electric power systems designed to supply usable solar power by means of photovoltaics, which is the conversion of light into electricity using semiconducting materials. PV systems have gained much attention and are a very attractive energy resource nowadays. The substantial advantage of PV systems is the usage of the most abundant and free energy from the sun. PV systems play an important role in reducing feeder losses, improving voltage profiles and providing ancillary services to local loads. However, large PV grid-connected systems may have a destructive impact on the stability of the electric grid. This is due to the fluctuations of the output AC power generated from the PV systems according to the variations in the solar energy levels. Thus, the electrical distribution system with high penetration of PV systems is subject to performance degradation and instabilities. For that, this project attempts to enhance the integration process of PV systems into electrical grids by analyzing the impact of installing grid-connected PV plants. To accomplish this, an indicative representation of solar irradiation datasets is used for planning and power flow studies of the electric network prior to PV systems installation. Those datasets contain lengthy historical observations of solar energy data, that requires extensive analysis and simulations. To overcome that the lengthy historical datasets are reduced and clustered while preserving the original data characteristics. The resultant clusters can be utilized in the planning stage and simulation studies. Accordingly, studies related to PV systems integration into the electric grid are conducted in an efficient manner, avoiding computing resources and processing times with easier and practical implementation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号