首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   66995篇
  免费   4766篇
  国内免费   2029篇
电工技术   3879篇
技术理论   1篇
综合类   6165篇
化学工业   4053篇
金属工艺   1960篇
机械仪表   2821篇
建筑科学   11842篇
矿业工程   1693篇
能源动力   991篇
轻工业   12194篇
水利工程   3322篇
石油天然气   1827篇
武器工业   309篇
无线电   4185篇
一般工业技术   3171篇
冶金工业   3492篇
原子能技术   214篇
自动化技术   11671篇
  2024年   130篇
  2023年   830篇
  2022年   1395篇
  2021年   1893篇
  2020年   1769篇
  2019年   1337篇
  2018年   1217篇
  2017年   1564篇
  2016年   1714篇
  2015年   1963篇
  2014年   4719篇
  2013年   3640篇
  2012年   4772篇
  2011年   5339篇
  2010年   4025篇
  2009年   4237篇
  2008年   4005篇
  2007年   4684篇
  2006年   4363篇
  2005年   3535篇
  2004年   3097篇
  2003年   2865篇
  2002年   2473篇
  2001年   1804篇
  2000年   1433篇
  1999年   1141篇
  1998年   758篇
  1997年   579篇
  1996年   491篇
  1995年   451篇
  1994年   310篇
  1993年   232篇
  1992年   200篇
  1991年   148篇
  1990年   96篇
  1989年   105篇
  1988年   72篇
  1987年   66篇
  1986年   47篇
  1985年   64篇
  1984年   42篇
  1983年   31篇
  1982年   26篇
  1981年   26篇
  1980年   30篇
  1979年   11篇
  1977年   11篇
  1976年   6篇
  1975年   8篇
  1959年   6篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
针对目标估计过程需要大量人工参与、自动化程度低的问题,提出了基于数据质量评价的目标估计方法。利用目标数据质量评价方法,对不同传感器得到的目标数据质量进行科学、有效的测度和评价,并根据质量得分动态调整各数据源在目标估计过程中所占的权重,从而减少人工干预,提高目标估计效能。仿真试验结果证明了该方法的有效性。  相似文献   
2.
《工程爆破》2022,(4):78-84
介绍了在包头市某工程实施管道穿越黄河施工中,采用爆破法处理卡钻的经验。针对深水环境条件及钻杆内径小不宜采用集团装药的条件,确定采用"小直径爆破筒,钻杆内部装药"的爆破方案,阐述了爆破设计及施工注意事项。可供类似工程参考。  相似文献   
3.
机器翻译译文质量估计(Quality Estimation,QE)是指在不需要人工参考译文的条件下,估计机器翻译系统产生的译文的质量,对机器翻译研究和应用具有很重要的价值。机器翻译译文质量估计经过最近几年的发展,取得了丰富的研究成果。该文首先介绍了机器翻译译文质量估计的背景与意义;然后详细介绍了句子级QE、单词级QE、文档级QE的具体任务目标、评价指标等内容,进一步概括了QE方法发展的三个阶段: 基于特征工程和机器学习的QE方法阶段,基于深度学习的QE方法阶段,融入预训练模型的QE方法阶段,并介绍了每一阶段中的代表性研究工作;最后分析了目前的研究现状及不足,并对未来QE方法的研究及发展方向进行了展望。  相似文献   
4.
The development of data-driven artificial intelligence technology has given birth to a variety of big data applications. Data has become an essential factor to improve these applications. Federated learning, a privacy-preserving machine learning method, is proposed to leverage data from different data owners. It is typically used in conjunction with cryptographic methods, in which data owners train the global model by sharing encrypted model updates. However, data encryption makes it difficult to identify the quality of these model updates. Malicious data owners may launch attacks such as data poisoning and free-riding. To defend against such attacks, it is necessary to find an approach to audit encrypted model updates. In this paper, we propose a blockchain-based audit approach for encrypted gradients. It uses a behavior chain to record the encrypted gradients from data owners, and an audit chain to evaluate the gradients’ quality. Specifically, we propose a privacy-preserving homomorphic noise mechanism in which the noise of each gradient sums to zero after aggregation, ensuring the availability of aggregated gradient. In addition, we design a joint audit algorithm that can locate malicious data owners without decrypting individual gradients. Through security analysis and experimental evaluation, we demonstrate that our approach can defend against malicious gradient attacks in federated learning.  相似文献   
5.
In this paper, the feature representation of an image by CNN is used to hide the secret image into the cover image. The style of the cover image hides the content of the secret image and produce a stego image using Neural Style Transfer (NST) algorithm, which resembles the cover image and also contains the semantic content of secret image. The main technical contributions are to hide the content of the secret image in the in-between hidden layered style features of the cover image, which is the first of its kind in the present state-of-art-technique. Also, to recover the secret image from the stego image, destylization is done with the help of conditional generative adversarial networks (GANs) using Residual in Residual Dense Blocks (RRDBs). Further, stego images from different layer combinations of content and style features are obtained and evaluated. Evaluation is based on the visual similarity and quality loss between the cover-stego pair and the secret-reconstructed secret pair of images. From the experiments, it has been observed that the proposed algorithm has 43.95 dB Peak Signal-to-Noise Ratio (PSNR)), .995 Structural Similarity Index (SSIM), and .993 Visual Information Fidelity (VIF) for the ImageNet dataset. The proposed algorithm is found to be more robust against StegExpose than the traditional methods.  相似文献   
6.
In this study, sea bream, sea bass, anchovy and trout were captured and recorded using a digital camera during refrigerated storage for 7 days. In addition, their total viable counts (TVC) were determined on a daily basis. Based on the TVC, each fish was classified as ‘fresh’ when it was <5 log cfu per g, and as ‘not fresh’ when it was >7 log cfu per g. They were uploaded on a web-based machine learning software called Teachable Machine (TM), which was trained about the pupils and heads of the fish. In addition, images of each species from different angles were uploaded to the software in order to ensure the recognition of fish species by TM. The data of the study indicated that the TM was able to distinguish fish species with high accuracy rates and achieved over 86% success in estimating the freshness of the fish species tested.  相似文献   
7.
The aim of this study was to determine the effects of tumbling at different post-mortem times on the proteolytic features and quality attributes of beef loins (M. longissimus lumborum). Loins (n = 12) were cut into 4 sections and assigned to tumbling at 1, 6 or 11 days post-mortem or non-tumbled control. Upon tumbling, additional ageing was applied to a common post-mortem time of 16 days. In general, tumbling had no considerable impacts on water-holding ability of samples. Tumbling resulted in an immediate decrease in shear force values (WBSF) of beef samples. Tumbling at 1 day post-mortem with no ageing had similar WBSF compared to the non-tumbled controls at 16 days (P > 0.05). With ageing, tumbling increased amounts of protein degradation, myofibrillar fragmentation and calpain-1 autolysis of samples. These results suggest that early post-mortem tumbling coupled with ageing can synergistically impact the tenderness development of beef loins and shorten the necessary ageing period.  相似文献   
8.
9.
丹野   《粮油食品科技》2022,30(5):99-113
北海道では1980年代から2010年代まで,水稲圃場栽培期間である5–9月の気温は年代とともに上昇した。そこで,直近の2010年代(2010—2019年平均)と比べて, 2つの2030年代の予測気象から,既報の関係式より水稲生育を予測した。その結果,2030年代では2010年代に比べ,限界移植日(移植早限)が水稲栽培17地域の平均で8~9日早い。また,早限出穂期が1~5日早く,晩限出穂期が1~5日遅く,安全出穂期間が2~10日長い。出穂期は1~3日早い。出穂期から晩限出穂まで2~9日長いため,遅延型冷害の発生がやや少ない。生育期別気象は,出穂前24日以降30日間では生育が早いため平均気温が同じかやや低い。出穂前10日以降40日間および出穂期以降40日間では平均気温がやや高く,日射量はやや少ない。そのため,玄米収量は96~98%とやや低く,潜在収量性を示す気候登熟量示数は同じである。障害不稔発生に関係する穂ばらみ期冷害危険期の平均気温はわずかに低いかほぼ同じであるため,冷害発生の危険性は残る。一方,不稔発生をもたらす低温域の出現頻度には,地域間で差異がある。精米蛋白質含有率は同じであるが,アミロース含有率はやや低く,やや良食味である。米粒外観品質では被害粒歩合と着色粒歩合は一定の傾向がなく,未熟粒歩合はやや高い。精米白度は同じであるが,玄米白度はやや高い。以上の予測に対する技術的対応方向を示した。  相似文献   
10.
This paper presents a novel No-Reference Video Quality Assessment (NR-VQA) model that utilizes proposed 3D steerable wavelet transform-based Natural Video Statistics (NVS) features as well as human perceptual features. Additionally, we proposed a novel two-stage regression scheme that significantly improves the overall performance of quality estimation. In the first stage, transform-based NVS and human perceptual features are separately passed through the proposed hybrid regression scheme: Support Vector Regression (SVR) followed by Polynomial curve fitting. The two visual quality scores predicted from the first stage are then used as features for the similar second stage. This predicts the final quality scores of distorted videos by achieving score level fusion. Extensive experiments were conducted using five authentic and four synthetic distortion databases. Experimental results demonstrate that the proposed method outperforms other published state-of-the-art benchmark methods on synthetic distortion databases and is among the top performers on authentic distortion databases. The source code is available at https://github.com/anishVNIT/two-stage-vqa.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号