首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   516篇
  免费   39篇
  国内免费   15篇
电工技术   10篇
综合类   2篇
化学工业   124篇
金属工艺   16篇
机械仪表   14篇
建筑科学   5篇
能源动力   53篇
轻工业   51篇
水利工程   4篇
石油天然气   3篇
无线电   37篇
一般工业技术   113篇
冶金工业   25篇
原子能技术   11篇
自动化技术   102篇
  2023年   15篇
  2022年   29篇
  2021年   52篇
  2020年   37篇
  2019年   51篇
  2018年   41篇
  2017年   35篇
  2016年   44篇
  2015年   23篇
  2014年   33篇
  2013年   47篇
  2012年   30篇
  2011年   13篇
  2010年   18篇
  2009年   10篇
  2008年   6篇
  2007年   13篇
  2006年   4篇
  2005年   7篇
  2003年   5篇
  2002年   2篇
  2001年   4篇
  2000年   4篇
  1999年   3篇
  1998年   6篇
  1997年   3篇
  1996年   6篇
  1995年   2篇
  1994年   5篇
  1992年   1篇
  1991年   2篇
  1990年   2篇
  1989年   1篇
  1988年   3篇
  1987年   2篇
  1986年   1篇
  1984年   2篇
  1983年   1篇
  1976年   2篇
  1975年   1篇
  1974年   1篇
  1973年   1篇
  1972年   1篇
  1971年   1篇
排序方式: 共有570条查询结果,搜索用时 62 毫秒
1.
Clinical narratives such as progress summaries, lab reports, surgical reports, and other narrative texts contain key biomarkers about a patient's health. Evidence-based preventive medicine needs accurate semantic and sentiment analysis to extract and classify medical features as the input to appropriate machine learning classifiers. However, the traditional approach of using single classifiers is limited by the need for dimensionality reduction techniques, statistical feature correlation, a faster learning rate, and the lack of consideration of the semantic relations among features. Hence, extracting semantic and sentiment-based features from clinical text and combining multiple classifiers to create an ensemble intelligent system overcomes many limitations and provides a more robust prediction outcome. The selection of an appropriate approach and its interparameter dependency becomes key for the success of the ensemble method. This paper proposes a hybrid knowledge and ensemble learning framework for prediction of venous thromboembolism (VTE) diagnosis consisting of the following components: a VTE ontology, semantic extraction and sentiment assessment of risk factor framework, and an ensemble classifier. Therefore, a component-based analysis approach was adopted for evaluation using a data set of 250 clinical narratives where knowledge and ensemble achieved the following results with and without semantic extraction and sentiment assessment of risk factor, respectively: a precision of 81.8% and 62.9%, a recall of 81.8% and 57.6%, an F measure of 81.8% and 53.8%, and a receiving operating characteristic of 80.1% and 58.5% in identifying cases of VTE.  相似文献   
2.
The effect of Co addition on the formation of Ni-Ti clusters in maraging stainless steel was studied by three dimensional atom probe (3DAP) and first-principles calculation. The cluster analysis based on the maximum separation approach showed an increase in size but a decrease in density of Ni-Ti clusters with increasing the Co content. The first-principles calculation indicated weaker Co-Ni (Co-Ti) interactions than Co-Ti (Fe-Ti) interactions, which should be the essential reason for the change of distribution characteristics of Ni-Ti clusters in bcc Fe caused by Co addition.  相似文献   
3.
Thin films of cadmium sulphide and cadmium telluride have been prepared by thermal evaporation under various conditions of deposition. These films have been characterized optically. electrically and for structure determination. The results of these characterizations along with the initial results of all thin film CdS/CdTe solar cells are presented in this paper  相似文献   
4.
OBJECTIVE: Earlier studies have shown a depression in the sarcoplasmic reticular (SR) Ca2+ uptake and gene expression in Ca2+ pump ATPase protein in congestive heart failure subsequent to myocardial infarction. It is the objective of this study to understand further the mechanisms of depressed SR Ca2+ pump activity in the failing heart. METHODS: Heart failure in rats was induced by occluding the left coronary artery for 16 weeks and the viable left ventricle was processed for the isolation of SR membranes. Sham-operated animals were used as control. The characteristics of SR Ca2+ pump ATPase in the presence of different concentrations of K+, Ca2+ and ATP were examined and the purity of these membranes was monitored by determining the marker enzyme activities. In addition to measuring changes in cyclic adenosine monophosphate (cAMP) protein kinase and Ca(2+)-calmodulin induced phosphorylation, alterations in SR phospholipid composition as well as sulfhydryl (SH) group content were investigated. RESULTS: Ca(2+)-stimulated ATPase activity, unlike Mg(2+)-ATPase activity, was depressed in the left ventricular SR from failing hearts as compared to control. The decrease in Ca(2+)-stimulated ATPase activity was seen at different concentrations of Ca2+, K+ and ATP but no changes in the affinities of the enzyme for Ca2+ and ATP were evident. The SR Ca(2+)-stimulated ATPase activities in the presence of both cAMP-dependent protein kinase and Ca(2+)-calmodulin were markedly decreased in the failing hearts when compared to control preparations. Furthermore, the 32P incorporation in the presence of cAMP-dependent protein kinase or Ca(2+)-calmodulin was also reduced in the experimental heart SR membranes. The phospholipid composition of the SR membranes from the failing heart was markedly altered. No changes in SH-group or the degree of cross contamination with other membranes were apparent in the failing heart SR. CONCLUSIONS: These results suggest that abnormalities in membrane phospholipid composition and phosphorylation of the enzyme may partly explain the observed depression in SR Ca2+ pump ATPase activity in heart failure following myocardial infarction.  相似文献   
5.
Autonomous mapping of HL7 RIM and relational database schema   总被引:1,自引:0,他引:1  
Healthcare systems need to share information within and across the boundaries in order to provide better care to the patients. For this purpose, they take advantage of the full potential of current state of the art in healthcare standards providing interoperable solutions. HL7 V3 specification is an international message exchange and interoperability standard. HL7 V3 messages exchanged between healthcare applications are ultimately recorded into local healthcare databases, mostly in relational databases. In order to bring these relational databases in compliance with HL7, mappings between HL7 RIM (Reference Information Model) and relational database schema are required. Currently, RIM and database mapping is largely performed manually, therefore it is tedious, time consuming, error prone and expensive process. It is a challenging task to determine all correspondences between RIM and schema automatically because of extreme heterogeneity issues in healthcare databases. To reduce the amount of manual efforts as much as possible, autonomous mapping approaches are required. This paper proposes a technique that addresses the aforementioned mapping issue and aligns healthcare databases to HL7 V3 RIM specifications. Furthermore, the proposed technique has been implemented as a working application and tested on real world healthcare systems. The application loads the target healthcare schema and then identifies the most appropriate match for tables and the associated fields in the schema by using domain knowledge and the matching rules defined in the Mapping Knowledge Repository. These rules are designed to handle the complexity of semantics found in healthcare databases. The GUI allows users to view and edit/re-map the correspondences. Once all the mappings are defined, the application generates Mapping Specification, which contains all the mapping information i.e. database tables and fields with associated RIM classes and attributes. In order to enable the transactions, the application is facilitated with the autonomous code generation from the Mapping Specification. The Code Generator component focuses primarily on generating custom classes and hibernate mapping files against the runtime system to retrieve and parse the data from the data source—thus allows bi-directional HL7 to database communication, with minimum programming required. Our experimental results show 35–65% accuracy on real laboratory systems, thus demonstrating the promise of the approach. The proposed scheme is an effective step in bringing the clinical databases in compliance with RIM, providing ease and flexibility.  相似文献   
6.
A mobile ad hoc network (MANET) is dynamic in nature and is composed of wirelessly connected nodes that perform hop-by-hop routing without the help of any fixed infrastructure. One of the important requirements of a MANET is the efficiency of energy, which increases the lifetime of the network. Several techniques have been proposed by researchers to achieve this goal and one of them is clustering in MANETs that can help in providing an energy-efficient solution. Clustering involves the selection of cluster-heads (CHs) for each cluster and fewer CHs result in greater energy efficiency as these nodes drain more power than noncluster-heads. In the literature, several techniques are available for clustering by using optimization and evolutionary techniques that provide a single solution at a time. In this paper, we propose a multi-objective solution by using multi-objective particle swarm optimization (MOPSO) algorithm to optimize the number of clusters in an ad hoc network as well as energy dissipation in nodes in order to provide an energy-efficient solution and reduce the network traffic. In the proposed solution, inter-cluster and intra-cluster traffic is managed by the cluster-heads. The proposed algorithm takes into consideration the degree of nodes, transmission power, and battery power consumption of the mobile nodes. The main advantage of this method is that it provides a set of solutions at a time. These solutions are achieved through optimal Pareto front. We compare the results of the proposed approach with two other well-known clustering techniques; WCA and CLPSO-based clustering by using different performance metrics. We perform extensive simulations to show that the proposed approach is an effective approach for clustering in mobile ad hoc networks environment and performs better than the other two approaches.  相似文献   
7.
Localization is a crucial problem in wireless sensor networks and most of the localization algorithms given in the literature are non-adaptive and designed for fixed sensor networks. In this paper, we propose a learning based localization algorithm for mobile wireless sensor networks. By this technique, mobility in the network will be discovered by two crucial methods in the beacons: position and distance checks methods. These two methods help to have accurate localization and constrain communication just when it is necessary. The proposed method localizes the nodes based on connectivity information (hop count), which doesn’t need extra hardware and is cost efficient. The experimental results show that the proposed algorithm is scalable with a small set of beacons in large scale network with a high density of nodes. The given algorithm is fast and free from a pre-deployment requirement. The simulation results show the high performance of the proposed algorithm.  相似文献   
8.
Multimedia Tools and Applications - Conventional steganography focuses on invisibility and undetectability, as the main concern is to make the algorithms immune to steganalysis. Zero-steg-anography...  相似文献   
9.
In the design phase of business and IT system development, it is desirable to predict the properties of the system-to-be. A number of formalisms to assess qualities such as performance, reliability and security have therefore previously been proposed. However, existing prediction systems do not allow the modeler to express uncertainty with respect to the design of the considered system. Yet, in contemporary business, the high rate of change in the environment leads to uncertainties about present and future characteristics of the system, so significant that ignoring them becomes problematic. In this paper, we propose a formalism, the Predictive, Probabilistic Architecture Modeling Framework (P2AMF), capable of advanced and probabilistically sound reasoning about business and IT architecture models, given in the form of Unified Modeling Language class and object diagrams. The proposed formalism is based on the Object Constraint Language (OCL). To OCL, P2AMF adds a probabilistic inference mechanism. The paper introduces P2AMF, describes its use for system property prediction and assessment and proposes an algorithm for probabilistic inference.  相似文献   
10.

Visual Cryptography (VC) is gaining attraction during the past few years to secure the visual information in the transmission network. It enables the visual data i.e. handwritten notes, photos, printed text, etc. to encrypt in such a way that their decryption can be done through the human visual framework. Hence, no computational assistance is required for the decryption of the secret images they can be seen through naked eye. In this paper, a novel enhanced halftoning-based VC scheme is proposed that works for both binary and color images. Fake share is generated by the combination of random black and white pixels. The proposed algorithm consists of 3 stages i.e., detection, encryption, and decryption. Halftoning, Encryption, (2, 2) visual cryptography and the novel idea of fake share, make it even more secure and improved. As a result, it facilitates the original restored image to the authentic user, however, the one who enters the wrong password gets the combination of fake share with any real share. Both colored and black images can be processed with minimal capacity using the proposed scheme.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号