全文获取类型
收费全文 | 23158篇 |
免费 | 4193篇 |
国内免费 | 2943篇 |
专业分类
电工技术 | 1095篇 |
综合类 | 2458篇 |
化学工业 | 1035篇 |
金属工艺 | 365篇 |
机械仪表 | 1217篇 |
建筑科学 | 293篇 |
矿业工程 | 296篇 |
能源动力 | 111篇 |
轻工业 | 348篇 |
水利工程 | 219篇 |
石油天然气 | 439篇 |
武器工业 | 288篇 |
无线电 | 4736篇 |
一般工业技术 | 1273篇 |
冶金工业 | 992篇 |
原子能技术 | 43篇 |
自动化技术 | 15086篇 |
出版年
2024年 | 183篇 |
2023年 | 481篇 |
2022年 | 975篇 |
2021年 | 1111篇 |
2020年 | 1112篇 |
2019年 | 791篇 |
2018年 | 665篇 |
2017年 | 808篇 |
2016年 | 904篇 |
2015年 | 978篇 |
2014年 | 1455篇 |
2013年 | 1303篇 |
2012年 | 1688篇 |
2011年 | 1829篇 |
2010年 | 1517篇 |
2009年 | 1624篇 |
2008年 | 1737篇 |
2007年 | 1878篇 |
2006年 | 1667篇 |
2005年 | 1395篇 |
2004年 | 1150篇 |
2003年 | 995篇 |
2002年 | 777篇 |
2001年 | 513篇 |
2000年 | 431篇 |
1999年 | 389篇 |
1998年 | 318篇 |
1997年 | 247篇 |
1996年 | 189篇 |
1995年 | 183篇 |
1994年 | 139篇 |
1993年 | 136篇 |
1992年 | 110篇 |
1991年 | 54篇 |
1990年 | 48篇 |
1989年 | 67篇 |
1988年 | 43篇 |
1987年 | 25篇 |
1986年 | 24篇 |
1985年 | 33篇 |
1984年 | 33篇 |
1983年 | 43篇 |
1982年 | 38篇 |
1981年 | 33篇 |
1980年 | 27篇 |
1979年 | 22篇 |
1978年 | 23篇 |
1977年 | 26篇 |
1976年 | 23篇 |
1974年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
Although greedy algorithms possess high efficiency, they often receive suboptimal solutions of the ensemble pruning problem, since their exploration areas are limited in large extent. And another marked defect of almost all the currently existing ensemble pruning algorithms, including greedy ones, consists in: they simply abandon all of the classifiers which fail in the competition of ensemble selection, causing a considerable waste of useful resources and information. Inspired by these observations, an interesting greedy Reverse Reduce-Error (RRE) pruning algorithm incorporated with the operation of subtraction is proposed in this work. The RRE algorithm makes the best of the defeated candidate networks in a way that, the Worst Single Model (WSM) is chosen, and then, its votes are subtracted from the votes made by those selected components within the pruned ensemble. The reason is because, for most cases, the WSM might make mistakes in its estimation for the test samples. And, different from the classical RE, the near-optimal solution is produced based on the pruned error of all the available sequential subensembles. Besides, the backfitting step of RE algorithm is replaced with the selection step of a WSM in RRE. Moreover, the problem of ties might be solved more naturally with RRE. Finally, soft voting approach is employed in the testing to RRE algorithm. The performances of RE and RRE algorithms, and two baseline methods, i.e., the method which selects the Best Single Model (BSM) in the initial ensemble, and the method which retains all member networks of the initial ensemble (ALL), are evaluated on seven benchmark classification tasks under different initial ensemble setups. The results of the empirical investigation show the superiority of RRE over the other three ensemble pruning algorithms. 相似文献
2.
针对现有混合入侵检测模型仅定性选取特征而导致检测精度较低的问题,同时为了充分结合误用检测模型和异常检测模型的优势,提出一种采用信息增益率的混合入侵检测模型.首先,利用信息增益率定量地选择特征子集,最大程度地保留样本信息;其次,采用余弦时变粒子群算法确定支持向量机参数构建误用检测模型,使其更好地平衡粒子在全局和局部的搜索能力,然后,选取灰狼算法确定单类支持向量机参数构建异常检测模型,以此来提高对最优参数的搜索效率和精细程度,综合提高混合入侵检测模型对攻击的检测效果;最后,通过两种数据集进行仿真实验,验证了所提混合入侵检测模型具有较好的检测性能. 相似文献
3.
Facial Expression Recognition (FER) is an important subject of human–computer interaction and has long been a research area of great interest. Accurate Facial Expression Sequence Interception (FESI) and discriminative expression feature extraction are two enormous challenges for the video-based FER. This paper proposes a framework of FER for the intercepted video sequences by using feature point movement trend and feature block texture variation. Firstly, the feature points are marked by Active Appearance Model (AAM) and the most representative 24 of them are selected. Secondly, facial expression sequence is intercepted from the face video by determining two key frames whose emotional intensities are minimum and maximum, respectively. Thirdly, the trend curve which represents the Euclidean distance variations between any two selected feature points is fitted, and the slopes of specific points on the trend curve are calculated. Finally, combining Slope Set which is composed by the calculated slopes with the proposed Feature Block Texture Difference (FBTD) which refers to the texture variation of facial patch, the final expressional feature are formed and inputted to One-dimensional Convolution Neural Network (1DCNN) for FER. Five experiments are conducted in this research, and three average FER rates 95.2%, 96.5%, and 97% for Beihang University (BHU) facial expression database, MMI facial expression database, and the combination of two databases, respectively, have shown the significant advantages of the proposed method over the existing ones. 相似文献
4.
针对多角度下车辆出现一定的尺度变化和形变导致很难被准确识别的问题,提出基于多尺度双线性卷积神经网络(MS-B-CNN)的车型精细识别模型。首先,对双线性卷积神经网络(B-CNN)算法进行改进,提出MS-B-CNN算法对不同卷积层的特征进行了多尺度融合,以提高特征表达能力;此外,还采用基于中心损失函数与Softmax损失函数联合学习的策略,在Softmax损失函数基础上分别对训练集每个类别在特征空间维护一个类中心,在训练过程中新增加样本时,网络会约束样本的分类中心距离,以提高多角度情况下的车型识别的能力。实验结果显示,该车型识别模型在CompCars数据集上的正确率达到了93.63%,验证了模型在多角度情况下的准确性和鲁棒性。 相似文献
5.
Simulating the psychological experience of human vision,a road extraction model based on the format tower is proposed to extract the road in the high resolution remote sensing image from the perspective of morphology.Firstly,based on the spectral and texture information,the suspected road targets are extracted by using segmentation technology.Then these targets are classified according to their reliability and extract the road targets for each category.Finally,three types of identified road information are verified and merged,and the continuous smooth road extraction results are obtained.Experiments on real high resolution images show that the results are consistent with the visual perception of the human eye,and the overall classification accuracy is higher,indicating that the algorithm is effective and feasible and has good use value. 相似文献
6.
ABSTRACTThis paper proposes the multiple-hypotheses image segmentation and feed-forward neural network classifier for food recognition to improve the performance. Initially, the food or meal image is given as input. Then, the segmentation is applied to identify the regions, where a particular food item is located using salient region detection, multi-scale segmentation, and fast rejection. Then, the features of every food item are extracted by the global feature and local feature extraction. After the features are obtained, the classification is performed for each segmented region using a feed-forward neural network model. Finally, the calorie value is computed with the aid of (i) food volume and (ii) calorie and nutrition measure based on mass value. The experimental results and performance evaluation are validated. The outcome of the proposed method attains 0.947 for Macro Average Accuracy (MAA) and 0.959 for Standard Accuracy (SA), which provides better classification performance. 相似文献
7.
Many models of spoken word recognition posit the existence of lexical and sublexical representations, with excitatory and inhibitory mechanisms used to affect the activation levels of such representations. Bottom-up evidence provides excitatory input, and inhibition from phonetically similar representations leads to lexical competition. In such a system, long words should produce stronger lexical activation than short words, for 2 reasons: Long words provide more bottom-up evidence than short words, and short words are subject to greater inhibition due to the existence of more similar words. Four experiments provide evidence for this view. In addition, reaction-time-based partitioning of the data shows that long words generate greater activation that is available both earlier and for a longer time than is the case for short words. As a result, lexical influences on phoneme identification are extremely robust for long words but are quite fragile and condition-dependent for short words. Models of word recognition must consider words of all lengths to capture the true dynamics of lexical activation. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
8.
Reading requires the orchestration of visual, attentional, language-related, and oculomotor processing constraints. This study replicates previous effects of frequency, predictability, and length of fixated words on fixation durations in natural reading and demonstrates new effects of these variables related to 144 sentences. Such evidence for distributed processing of words across fixation durations challenges psycholinguistic immediacy-of-processing and eye-mind assumptions. Most of the time the mind processes several words in parallel at different perceptual and cognitive levels. Eye movements can help to unravel these processes. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
9.
10.
网络安全事件的关联分析方法的比较研究 总被引:2,自引:0,他引:2
随着当前攻击手段和技术的日益复杂化,一次入侵事件往往需要多个步骤才能完成,这些步骤都是彼此相关的。但是传统的入侵检测集中于检测底层的入侵或异常,所检测到的结果也仅仅是一次完整入侵的一部分,所以不能将不同的报警结合起来以发现入侵的逻辑步骤或者入侵背后的攻击策略。关联分析技术将不同分析器上产生的报警进行融合与关联分析,极大地减少了报警的数量,降低了入侵检测的误报率,并且适当的减少了入侵检测的漏报率。文中在对网络安全事件关联分析方法的系统结构进行分析后,着重介绍了当前比较流行的几种网络安全事件关联分析方法,最后对各种方法进行了比较研究。 相似文献