首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   74343篇
  免费   12956篇
  国内免费   8261篇
电工技术   8769篇
技术理论   2篇
综合类   8125篇
化学工业   5381篇
金属工艺   2568篇
机械仪表   7603篇
建筑科学   3556篇
矿业工程   2397篇
能源动力   3162篇
轻工业   3576篇
水利工程   1791篇
石油天然气   3425篇
武器工业   1010篇
无线电   6975篇
一般工业技术   6234篇
冶金工业   2053篇
原子能技术   333篇
自动化技术   28600篇
  2024年   741篇
  2023年   1932篇
  2022年   3633篇
  2021年   3710篇
  2020年   3910篇
  2019年   3298篇
  2018年   2865篇
  2017年   3400篇
  2016年   3774篇
  2015年   4193篇
  2014年   5768篇
  2013年   5475篇
  2012年   6562篇
  2011年   6536篇
  2010年   4669篇
  2009年   4820篇
  2008年   4373篇
  2007年   4830篇
  2006年   3990篇
  2005年   3254篇
  2004年   2627篇
  2003年   2118篇
  2002年   1770篇
  2001年   1426篇
  2000年   1219篇
  1999年   854篇
  1998年   760篇
  1997年   638篇
  1996年   507篇
  1995年   412篇
  1994年   332篇
  1993年   234篇
  1992年   206篇
  1991年   160篇
  1990年   145篇
  1989年   117篇
  1988年   67篇
  1987年   25篇
  1986年   34篇
  1985年   23篇
  1984年   21篇
  1983年   27篇
  1982年   20篇
  1981年   8篇
  1980年   16篇
  1979年   16篇
  1978年   7篇
  1977年   8篇
  1975年   6篇
  1951年   12篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Small object detection is challenging and far from satisfactory. Most general object detectors suffer from two critical issues with small objects: (1) Feature extractor based on classification network cannot express the characteristics of small objects reasonably due to insufficient appearance information of targets and a large amount of background interference around them. (2) The detector requires a much higher location accuracy for small objects than for general objects. This paper proposes an effective and efficient small object detector YOLSO to address the above problems. For feature representation, we analyze the drawbacks in previous backbones and present a Half-Space Shortcut(HSSC) module to build a background-aware backbone. Furthermore, a coarse-to-fine Feature Pyramid Enhancement(FPE) module is introduced for layer-wise aggregation at a granular level to enhance the semantic discriminability. For loss function, we propose an exponential L1 loss to promote the convergence of regression, and a focal IOU loss to focus on prime samples with high classification confidence and high IOU. Both of them significantly improves the location accuracy of small objects. The proposed YOLSO sets state-of-the-art results on two typical small object datasets, MOCOD and VeDAI, at a speed of over 200 FPS. In the meantime, it also outperforms the baseline YOLOv3 by a wide margin on the common COCO dataset.  相似文献   
2.
The continuous catalytic regenerative (CCR) reforming process is one of the most significant sources of hydrogen production in the petroleum refining process. However, the fluctuations in feedstock composition and flow rate could significantly affect both product distribution and energy consumption. In this study, a robust deviation criterion based multi-objective optimization approach is proposed to perform the optimal operation of CCR reformer under feedstock uncertainty, with simultaneous maximization of product yields and minimization of energy consumption. Minimax approach is adopted to handle these uncertain objectives, and the Latin hypercube sampling method is then used to calculate these robust deviation criteria. Multi-objective surrogate-based optimization methods are next introduced to effectively solve the robust operational problem with high computational cost. The level diagram method is finally utilized to assist in multi-criteria decision-making. Two robust operational optimization problems with different objectives are solved to demonstrate the effectiveness of the proposed method for robust optimal operation of the CCR reforming process under feedstock uncertainty.  相似文献   
3.
A key element in solving real-life data science problems is selecting the types of models to use. Tree ensemble models (such as XGBoost) are usually recommended for classification and regression problems with tabular data. However, several deep learning models for tabular data have recently been proposed, claiming to outperform XGBoost for some use cases. This paper explores whether these deep models should be a recommended option for tabular data by rigorously comparing the new deep models to XGBoost on various datasets. In addition to systematically comparing their performance, we consider the tuning and computation they require. Our study shows that XGBoost outperforms these deep models across the datasets, including the datasets used in the papers that proposed the deep models. We also demonstrate that XGBoost requires much less tuning. On the positive side, we show that an ensemble of deep models and XGBoost performs better on these datasets than XGBoost alone.  相似文献   
4.
A technology for cyclic generation of hydrogen and oxygen using electrodes made of variable valency material that does not need the use of separating ion-exchange membranes is presented. The technological solution enables to fabricate electrolyzers for uninterrupted producing high-pressure hydrogen with reduced energy intensity of the production. The total work for compressing 1 m3 of hydrogen and 0.5 m3 of oxygen has been estimated. Results of investigation of influence of discrete supply of DC current to the electrolysis cell, in order to improve the processes of gas evolution and to simplify the power systems of the electrolysis plant, have been considered. There is also considered an electrolysis installation equipped with a thermosorption compressor in which LaNi5 is used as a hydride-forming compound. The comparative characteristics of the developed electrolyzer and the currently used hydrogen generators are given.  相似文献   
5.
Manufacturing companies not only strive to deliver flawless products but also monitor product failures in the field to identify potential quality issues. When product failures occur, quality engineers must identify the root cause to improve any affected product and process. This root-cause analysis can be supported by feature selection methods that identify relevant product attributes, such as manufacturing dates with an increased number of product failures. In this paper, we present different methods for feature selection and evaluate their ability to identify relevant product attributes in a root-cause analysis. First, we compile a list of feature selection methods. Then, we summarize the properties of product attributes in warranty case data and discuss these properties regarding the challenges they pose for machine learning algorithms. Next, we simulate datasets of warranty cases, which emulate these product properties. Finally, we compare the feature selection methods based on these simulated datasets. In the end, the univariate filter information gain is determined to be a suitable method for a wide range of applications. The comparison based on simulated data provides a more general result than other publications, which only focus on a single use case. Due to the generic nature of the simulated datasets, the results can be applied to various root-cause analysis processes in different quality management applications and provide a guideline for readers who wish to explore machine learning methods for their analysis of quality data.  相似文献   
6.
7.
Chemical engineering systems often involve a functional porous medium, such as in catalyzed reactive flows, fluid purifiers, and chromatographic separations. Ideally, the flow rates throughout the porous medium are uniform, and all portions of the medium contribute efficiently to its function. The permeability is a property of a porous medium that depends on pore geometry and relates flow rate to pressure drop. Additive manufacturing techniques raise the possibilities that permeability can be arbitrarily specified in three dimensions, and that a broader range of permeabilities can be achieved than by traditional manufacturing methods. Using numerical optimization methods, we show that designs with spatially varying permeability can achieve greater flow uniformity than designs with uniform permeability. We consider geometries involving hemispherical regions that distribute flow, as in many glass chromatography columns. By several measures, significant improvements in flow uniformity can be obtained by modifying permeability only near the inlet and outlet.  相似文献   
8.
With liquefied natural gas becoming increasingly prevalent as a flexible source of energy, the design and optimization of industrial refrigeration cycles becomes even more important. In this article, we propose an integrated surrogate modeling and optimization framework to model and optimize the complex CryoMan Cascade refrigeration cycle. Dimensionality reduction techniques are used to reduce the large number of process decision variables which are subsequently supplied to an array of Gaussian processes, modeling both the process objective as well as feasibility constraints. Through iterative resampling of the rigorous model, this data-driven surrogate is continually refined and subsequently optimized. This approach was not only able to improve on the results of directly optimizing the process flow sheet but also located the set of optimal operating conditions in only 2 h as opposed to the original 3 weeks, facilitating its use in the operational optimization and enhanced process design of large-scale industrial chemical systems.  相似文献   
9.
This paper focuses on the configuration design of flexure hinges with a prescribed compliance matrix and preset rotational center position. A new method for the topology optimization of flexure hinges is proposed based on the adaptive spring model and stress constraint. The hinge optimization model is formulated by maximizing the bending displacement with a spring while optimizing the compliance matrix to a prescribed value. To avoid numerical instability, an artificial spring is used as an auxiliary calculation, and a new strategy is developed for adaptively adjusting the spring stiffness according to the prescribed compliance matrix. The maximum stress of flexure hinge is limited by using a normalized P-norm of the effective von Mises stress, and a position constraint of rotational center is proposed to predetermine the position of the rotational center. In addition, to reduce the error of the stress measurement, a simple but effective filtering method is presented to obtain a complete black-and-white design. Numerical examples are used to verify the proposed method. Topology results show that the obtained flexure hinges have the prescribed compliance matrix and preset rotational center position while also meeting the stress requirements.  相似文献   
10.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号