首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30536篇
  免费   5659篇
  国内免费   4096篇
电工技术   2637篇
技术理论   7篇
综合类   3717篇
化学工业   1273篇
金属工艺   699篇
机械仪表   2847篇
建筑科学   2286篇
矿业工程   795篇
能源动力   644篇
轻工业   672篇
水利工程   491篇
石油天然气   1294篇
武器工业   331篇
无线电   4415篇
一般工业技术   2464篇
冶金工业   856篇
原子能技术   105篇
自动化技术   14758篇
  2024年   341篇
  2023年   775篇
  2022年   1516篇
  2021年   1521篇
  2020年   1562篇
  2019年   1210篇
  2018年   1033篇
  2017年   1151篇
  2016年   1287篇
  2015年   1492篇
  2014年   2189篇
  2013年   1931篇
  2012年   2576篇
  2011年   2702篇
  2010年   2181篇
  2009年   1994篇
  2008年   2032篇
  2007年   2167篇
  2006年   1909篇
  2005年   1655篇
  2004年   1387篇
  2003年   1136篇
  2002年   873篇
  2001年   784篇
  2000年   647篇
  1999年   513篇
  1998年   379篇
  1997年   310篇
  1996年   245篇
  1995年   187篇
  1994年   134篇
  1993年   99篇
  1992年   84篇
  1991年   55篇
  1990年   53篇
  1989年   38篇
  1988年   30篇
  1987年   8篇
  1986年   19篇
  1985年   16篇
  1984年   12篇
  1983年   16篇
  1982年   4篇
  1981年   3篇
  1980年   4篇
  1979年   5篇
  1977年   4篇
  1975年   4篇
  1964年   3篇
  1956年   2篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
Small object detection is challenging and far from satisfactory. Most general object detectors suffer from two critical issues with small objects: (1) Feature extractor based on classification network cannot express the characteristics of small objects reasonably due to insufficient appearance information of targets and a large amount of background interference around them. (2) The detector requires a much higher location accuracy for small objects than for general objects. This paper proposes an effective and efficient small object detector YOLSO to address the above problems. For feature representation, we analyze the drawbacks in previous backbones and present a Half-Space Shortcut(HSSC) module to build a background-aware backbone. Furthermore, a coarse-to-fine Feature Pyramid Enhancement(FPE) module is introduced for layer-wise aggregation at a granular level to enhance the semantic discriminability. For loss function, we propose an exponential L1 loss to promote the convergence of regression, and a focal IOU loss to focus on prime samples with high classification confidence and high IOU. Both of them significantly improves the location accuracy of small objects. The proposed YOLSO sets state-of-the-art results on two typical small object datasets, MOCOD and VeDAI, at a speed of over 200 FPS. In the meantime, it also outperforms the baseline YOLOv3 by a wide margin on the common COCO dataset.  相似文献   
2.
Manufacturing companies not only strive to deliver flawless products but also monitor product failures in the field to identify potential quality issues. When product failures occur, quality engineers must identify the root cause to improve any affected product and process. This root-cause analysis can be supported by feature selection methods that identify relevant product attributes, such as manufacturing dates with an increased number of product failures. In this paper, we present different methods for feature selection and evaluate their ability to identify relevant product attributes in a root-cause analysis. First, we compile a list of feature selection methods. Then, we summarize the properties of product attributes in warranty case data and discuss these properties regarding the challenges they pose for machine learning algorithms. Next, we simulate datasets of warranty cases, which emulate these product properties. Finally, we compare the feature selection methods based on these simulated datasets. In the end, the univariate filter information gain is determined to be a suitable method for a wide range of applications. The comparison based on simulated data provides a more general result than other publications, which only focus on a single use case. Due to the generic nature of the simulated datasets, the results can be applied to various root-cause analysis processes in different quality management applications and provide a guideline for readers who wish to explore machine learning methods for their analysis of quality data.  相似文献   
3.
三维异质异构集成技术是实现电子信息系统向着微型化、高效能、高整合、低功耗及低成本方向发展的最重要方法,也是决定信息化平台中微电子和微纳系统领域未来发展的一项核心高技术。文章详细介绍了毫米波频段三维异质异构集成技术的优势、近年来的发展趋势以及面临的挑战。利用硅基MEMS 光敏复合薄膜多层布线工艺可实现异质芯片的低损耗互连,同时三维集成高性能封装滤波器、高辐射效率封装天线等无源元件,还能很好地处理布线间的电磁兼容和芯片间的屏蔽问题。最后介绍了一款新型毫米波三维异质异构集成雷达及其在远距离生命体征探测方面的应用。  相似文献   
4.
At present, the development and implementation of digital transformation are the keys to promoting high-quality industry development. The new digital fabrication method of robotic 3D printing is a research area being studied by many to tackle the issue of the declining productivity of traditional construction methods. Although many studies have been done, most of the current 3D printing projects are facing limitations in terms of scale. In order to bridge the gap, this article proposed a mass customization 3D printing framework system for large-scale projects. This article discusses how mass customization is made possible through the joint operation of the FUROBOT software and 3D printing hardware. By taking the east gate of Nanjing Happy Valley Plaza as a case study, the article demonstrates and studies the feasibility of the large-scale mass customization 3D printing framework system.  相似文献   
5.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
6.
In the last few years, more and more complex microsphere models have been proposed to predict the mechanical response of various polymers. Similarly than for microplane models, they consist in deriving a one-dimensional force vs. stretch equation and to integrate it over the unit sphere to obtain a three-dimensional constitutive equation. In this context, the focus of authors is laid on the physics of the one-dimensional relationship, but in most of the case the influence of the integration method on the prediction is not investigated.Here we compare three numerical integration schemes: a classical Gaussian scheme, a method based on a regular geometric meshing of the sphere, and an approach based on spherical harmonics. Depending on the method, the number of integration points may vary from 4 to 983,040! Considering simple quantities, i.e. principal (large) strain invariants, it is shown that the integration method must be carefully chosen. Depending on the quantities retained to described the one-dimensional equation and the required error, the performances of the three methods are discussed. Consequences on stress–strain prediction are illustrated with a directional version of the classical Mooney–Rivlin hyperelastic model. Finally, the paper closes with some advices for the development of new microsphere constitutive equations.  相似文献   
7.
曾招鑫  刘俊 《计算机应用》2020,40(5):1453-1459
利用计算机实现自动、准确的秀丽隐杆线虫(C.elegans)的各项形态学参数分析,至关重要的是从显微图像上分割出线虫体态,但由于显微镜下的图像噪声较多,线虫边缘像素与周围环境相似,而且线虫的体态具有鞭毛和其他附着物需要分离,多方面因素导致设计一个鲁棒性的C.elegans分割算法仍然面临着挑战。针对这些问题,提出了一种基于深度学习的线虫分割方法,通过训练掩模区域卷积神经网络(Mask R-CNN)学习线虫形态特征实现自动分割。首先,通过改进多级特征池化将高级语义特征与低级边缘特征融合,结合大幅度软最大损失(LMSL)损失算法改进损失计算;然后,改进非极大值抑制;最后,引入全连接融合分支等方法对分割结果进行进一步优化。实验结果表明,相比原始的Mask R-CNN,该方法平均精确率(AP)提升了4.3个百分点,平均交并比(mIOU)提升了4个百分点。表明所提出的深度学习分割方法能够有效提高分割准确率,在显微图像中更加精确地分割出线虫体。  相似文献   
8.
This paper introduces a simultaneous process optimization and heat integration approach, which can be used directly with the rigorous models in process simulators. In this approach, the overall process is optimized utilizing external derivative-free optimizers, which interact directly with the process simulation. The heat integration subproblem is formulated as an LP model and solved simultaneously during optimization of the flowsheet to update the minimum utility and heat exchanger area targets. A piecewise linear approximation for the composite curve is applied to obtain more accurate heat integration results. This paper describes the application of this simultaneous approach for three cases: a recycle process, a separation process and a power plant with carbon capture. Case study results indicate that this simultaneous approach is relatively easy to implement and achieves higher profit and lower operating cost and, in the case of the power plant example, higher net efficiency than the sequential approach.  相似文献   
9.
This paper describes algorithms that use demand-side management to address large-scale integration of wind power. In particular, demand response (DR) is used to manage wind power intermittency by shifting the time that electrical power system loads occur in response to real-time prices and wind availability. An economic dispatch with transmission, DR capacity and operational constraints is used to model the operation of a transmission constrained system with a high penetration of wind power. This optimization model is used to determine the optimal sizing and distribution of DR given a fixed budget for customer incentives and the installation of enabling technology. We demonstrate the effectiveness of the operational model based on a simple PJM 5-bus system and an IEEE 118-bus system. Simulation results show that transmission constraints have a greater effect on sizing of DR capacity than the location of wind power, which means that buses electrically close to congested lines tend to have higher incentives to deploy DR resources than other buses. The second part of the work examines optimal siting of technology that enables DR based on the frequency of DR based load changes, which are generally a function of the network location.  相似文献   
10.
Electromagnetic signal emitted by satellite communication (satcom) transmitters are used to identify specific individual uplink satcom terminals sharing the common transponder in real environment, which is known as specific emitter identification (SEI) that allows for early indications and warning (I&W) of the targets carrying satcom furnishment and furthermore the real time electromagnetic situation awareness in military operations. In this paper, the authors are the first to propose the identification of specific transmitters of satcom by using probabilistic neural networks (PNN) to reach the goal of target recognition. We have been devoted to the examination by exploring the feasibility of utilizing the Hilbert transform to signal preprocessing, applying the discrete wavelet transform to feature extraction, and employing the PNN to perform the classification of stationary signals. There are a total of 1000 sampling time series with binary phase shift keying (BPSK) modulation originated by five types of satcom transmitters in the test. The established PNNs classifier implements the data testing and finally yields satisfactory accuracy at 8 dB(±1 dB) carrier to noise ratio, which indicates the feasibility of our method, and even the keen insight of its application in military.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号