首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   235篇
  免费   9篇
电工技术   3篇
综合类   3篇
化学工业   19篇
金属工艺   3篇
机械仪表   4篇
建筑科学   10篇
能源动力   32篇
轻工业   10篇
水利工程   4篇
无线电   17篇
一般工业技术   65篇
冶金工业   9篇
原子能技术   1篇
自动化技术   64篇
  2023年   11篇
  2022年   21篇
  2021年   7篇
  2020年   6篇
  2019年   10篇
  2018年   7篇
  2017年   3篇
  2016年   10篇
  2015年   4篇
  2014年   11篇
  2013年   24篇
  2012年   10篇
  2011年   13篇
  2010年   8篇
  2009年   10篇
  2008年   9篇
  2007年   1篇
  2006年   6篇
  2005年   5篇
  2004年   11篇
  2003年   4篇
  2002年   12篇
  2001年   4篇
  2000年   2篇
  1999年   8篇
  1998年   5篇
  1997年   2篇
  1996年   1篇
  1995年   4篇
  1994年   1篇
  1992年   1篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1987年   2篇
  1986年   1篇
  1985年   1篇
  1981年   1篇
  1978年   2篇
  1977年   1篇
排序方式: 共有244条查询结果,搜索用时 31 毫秒
1.
BACKGROUND: Germ cell tumors (GCTs) and their metastases may be found in numerous sites that are accessible to cytologic sampling, and many are responsive to chemotherapy. METHODS: The authors reviewed 20 examples of GCT cytology from 16 males and 3 females ranging in age from 1.5 to 61 years (median, 34 years). With two exceptions, one benign cystic ovarian teratoma in which intraoperative cytology was used to diagnose an associated adult-type carcinoma and one undescended testis in which seminoma presented as an abdominal mass, the material reviewed included no examples of primary gonadal GCT. RESULTS: The authors studied 7 primary and 13 metastatic GCTs; these studies were based on 13 in vivo aspirations, 4 intraoperative preparations, and 3 samples of body cavity fluids. All samples were correctly interpreted as malignant, and only one was incorrectly classified as a non-GCT malignancy. CONCLUSIONS: Clinical and cytologic findings are useful in the diagnosis of GCTs and their metastases. Incorrect interpretation of these neoplasms as poorly differentiated malignancies of other types may deprive the patient of effective chemotherapy. Air-dried, Romanowsky-stained smear material and cell block sections may contribute to the resolution of diagnostic dilemmas.  相似文献   
2.
Finite element methods for dynamic analysis employing elements with drilling degrees of freedom are presented. The formulation is based on a variational principle in which displacements and rotations are interpolated independently. The issue of zero masses corresponding to rotational degrees of freedom is addressed and techniques for defining consistent and lumped rotational mass matrices are presented.  相似文献   
3.
This paper presents a Knowledge-based system (KBS) developed to allow users, who may not be knowledgeable about sensors, to select sensors suitable for their specific needs. The KBS runs on a micro-computer. The selection criteria are user specified and are based on the desired measurement parameters. The system output includes all of the operational and dimensional parameters of the recommended sensor, price, and vendor information.  相似文献   
4.
Architectures and methods for the rapid design of silicon cores for implementing discrete wavelet transforms over a wide range of specifications are described. These architectures are efficient, modular, scalable, and cover orthonormal and biorthogonal wavelet transform families. They offer efficient hardware utilization by exploiting a number of core wavelet filter properties and allow the creation of silicon designs that are highly parameterized, including in terms of wavelet type and wordlengths. Control circuitry is embedded within these systems allowing them to be cascaded for any desired level of decomposition without any interface glue logic. The time to produce chip designs for a specific wavelet application is typically less than a day and these are comparable in area and performance to handcrafted designs. They are also portable across a wide range of silicon foundries and suitable for field programmable gate array and programmable logic data implementation. The approach described has also been extended to wavelet packet transforms.  相似文献   
5.
Anomaly detection in resource constrained wireless networks is an important challenge for tasks such as intrusion detection, quality assurance and event monitoring applications. The challenge is to detect these interesting events or anomalies in a timely manner, while minimising energy consumption in the network. We propose a distributed anomaly detection architecture, which uses multiple hyperellipsoidal clusters to model the data at each sensor node, and identify global and local anomalies in the network. In particular, a novel anomaly scoring method is proposed to provide a score for each hyperellipsoidal model, based on how remote the ellipsoid is relative to their neighbours. We demonstrate using several synthetic and real datasets that our proposed scheme achieves a higher detection performance with a significant reduction in communication overhead in the network compared to centralised and existing schemes.  相似文献   
6.
Certificateless cryptography addresses the private key escrow problem in identity-based systems, while overcoming the costly issues in traditional public key cryptography. Undeniable signature schemes were proposed with the aim of limiting the public verifiability of ordinary digital signatures. The first certificateless undeniable signature scheme was put forth by Duan. The proposed scheme can be considered as the certificateless version of the identity-based undeniable signature scheme which was introduced by Libert and Quisquater. In this paper, we propose a new scheme which is much more efficient comparing to Duan's scheme. Our scheme requires only one pairing evaluation for signature generation and provides more efficient confirmation and disavowal protocols for both the signer and the verifier. We also prove the security of our scheme in the strong security model based on the intractability of some well-known pairing-based assumptions in the random oracle model.  相似文献   
7.
The 3D Underwater Sensor Network (USNs) has become the most optimistic medium for tracking and monitoring underwater environment. Energy and collision are two most critical factors in USNs for both sparse and dense regions. Due to harsh ocean environment, it is a challenge to design a reliable energy efficient with collision free protocol. Diversity in link qualities may cause collision and frequent communication lead to energy loss; that effects the network performance. To overcome these challenges a novel protocol Forwarder Selection Energy Efficient Routing (FSE2R) is proposed. Our proposal’s key idea is based on computation of node distance from the sink, Residual Energy (RE) of each node and Signal to Interference Noise Ratio (SINR). The node distance from sink and RE is computed for reliable forwarder node selection and SINR is used for analysis of collision. The novel proposal compares with existing protocols like H2AB, DEEP, and E2LR to achieve Quality of Service (QoS) in terms of throughput, packet delivery ratio and energy consumption. The comparative analysis shows that FSE2R gives on an average 30% less energy consumption, 24.62% better PDR and 48.31% less end-to-end delay compared to other protocols.  相似文献   
8.
The deep learning model encompasses a powerful learning ability that integrates the feature extraction, and classification method to improve accuracy. Convolutional Neural Networks (CNN) perform well in machine learning and image processing tasks like segmentation, classification, detection, identification, etc. The CNN models are still sensitive to noise and attack. The smallest change in training images as in an adversarial attack can greatly decrease the accuracy of the CNN model. This paper presents an alpha fusion attack analysis and generates defense against adversarial attacks. The proposed work is divided into three phases: firstly, an MLSTM-based CNN classification model is developed for classifying COVID-CT images. Secondly, an alpha fusion attack is generated to fool the classification model. The alpha fusion attack is tested in the last phase on a modified LSTM-based CNN (CNN-MLSTM) model and other pre-trained models. The results of CNN models show that the accuracy of these models dropped greatly after the alpha-fusion attack. The highest F1 score before the attack was achieved is 97.45 And after the attack lowest F1 score recorded is 22%. Results elucidate the performance in terms of accuracy, precision, F1 score and Recall.  相似文献   
9.
Twitter is a radiant platform with a quick and effective technique to analyze users’ perceptions of activities on social media. Many researchers and industry experts show their attention to Twitter sentiment analysis to recognize the stakeholder group. The sentiment analysis needs an advanced level of approaches including adoption to encompass data sentiment analysis and various machine learning tools. An assessment of sentiment analysis in multiple fields that affect their elevations among the people in real-time by using Naive Bayes and Support Vector Machine (SVM). This paper focused on analysing the distinguished sentiment techniques in tweets behaviour datasets for various spheres such as healthcare, behaviour estimation, etc. In addition, the results in this work explore and validate the statistical machine learning classifiers that provide the accuracy percentages attained in terms of positive, negative and neutral tweets. In this work, we obligated Twitter Application Programming Interface (API) account and programmed in python for sentiment analysis approach for the computational measure of user’s perceptions that extract a massive number of tweets and provide market value to the Twitter account proprietor. To distinguish the results in terms of the performance evaluation, an error analysis investigates the features of various stakeholders comprising social media analytics researchers, Natural Language Processing (NLP) developers, engineering managers and experts involved to have a decision-making approach.  相似文献   
10.
Artificial neural network (ANN) and Adaptive Neuro-Fuzzy Inference System (ANFIS) have an extensive range of applications in water resources management. Wavelet transformation as a preprocessing approach can improve the ability of a forecasting model by capturing useful information on various resolution levels. The objective of this research is to compare several data-driven models for forecasting groundwater level for different prediction periods. In this study, a number of model structures for Artificial Neural Network (ANN), Adaptive Neuro-Fuzzy Inference System (ANFIS), Wavelet-ANN and Wavelet-ANFIS models have been compared to evaluate their performances to forecast groundwater level with 1, 2, 3 and 4 months ahead under two case studies in two sub-basins. It was demonstrated that wavelet transform can improve accuracy of groundwater level forecasting. It has been also shown that the forecasts made by Wavelet-ANFIS models are more accurate than those by ANN, ANFIS and Wavelet-ANN models. This study confirms that the optimum number of neurons in the hidden layer cannot be always determined by using a specific formula but trial-and-error method. The decomposition level in wavelet transform should be determined according to the periodicity and seasonality of data series. The prediction of these models is more accurate for 1 and 2 months ahead (for example RMSE?=?0.12, E?=?0.93 and R 2?=?0.99 for wavelet-ANFIS model for 1 month ahead) than for 3 and 4 months ahead (for example RMSE?=?2.07, E?=?0.63 and R 2?=?0.91 for wavelet-ANFIS model for 4 months ahead).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号