首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   101782篇
  免费   14244篇
  国内免费   10043篇
工业技术   126069篇
  2024年   466篇
  2023年   2198篇
  2022年   4090篇
  2021年   4568篇
  2020年   4625篇
  2019年   3297篇
  2018年   2717篇
  2017年   3168篇
  2016年   3336篇
  2015年   3865篇
  2014年   6618篇
  2013年   5958篇
  2012年   7554篇
  2011年   7891篇
  2010年   6146篇
  2009年   6595篇
  2008年   6853篇
  2007年   7633篇
  2006年   6458篇
  2005年   5830篇
  2004年   4900篇
  2003年   4347篇
  2002年   3452篇
  2001年   2922篇
  2000年   2443篇
  1999年   1997篇
  1998年   1483篇
  1997年   1197篇
  1996年   965篇
  1995年   735篇
  1994年   531篇
  1993年   367篇
  1992年   237篇
  1991年   150篇
  1990年   117篇
  1989年   92篇
  1988年   57篇
  1987年   29篇
  1986年   35篇
  1985年   33篇
  1984年   20篇
  1983年   20篇
  1982年   27篇
  1981年   7篇
  1980年   3篇
  1979年   8篇
  1975年   3篇
  1963年   3篇
  1959年   4篇
  1951年   6篇
排序方式: 共有10000条查询结果,搜索用时 140 毫秒
61.
Today’s information technologies involve increasingly intelligent systems, which come at the cost of increasingly complex equipment. Modern monitoring systems collect multi-measuring-point and long-term data which make equipment health prediction a “big data” problem. It is difficult to extract information from such condition monitoring data to accurately estimate or predict health statuses. Deep learning is a powerful tool for big data processing that is widely utilized in image and speech recognition applications, and can also provide effective predictions in industrial processes. This paper proposes the Long Short-term Memory Integrating Principal Component Analysis based on Human Experience (HEPCA-LSTM), which uses operational time-series data for equipment health prognostics. Principal component analysis based on human experience is first conducted to extract condition parameters from the condition monitoring system. The long short-term memory (LSTM) framework is then constructed to predict the target status. Finally, a dynamic update of the prediction model with incoming data is performed at a certain interval to prevent any model misalignment caused by the drifting of relevant variables. The proposed model is validated on a practical case and found to outperform other prediction methods. It utilizes a powerful deep learning analysis method, the LSTM, to fully process big condition monitoring series data; it effectively extracts the features involved with human experience and takes dynamic updates into consideration.  相似文献   
62.
Urban researchers have maintained a constant interest in the complexity and continuity of urban space usage. Some have applied actor–network theory (ANT) to investigate the heterogeneity of spaces and present them through the networks of their users’ activities. However, these accounts are predominantly limited in examining the extent to which these spaces may be heterogeneous when exploring such networks. This paper draws on recent ANT scholarship, which employs an ethnographic research conducted in a main park in a housing project at Dahiyat Al Hussein in Amman, Jordan. The findings describe the complex and unpredictable negotiations that occur within spaces by documenting the varieties and interrelations among user activity networks within this common and shared urban space. This research reveals the extent to which spaces, parks in this case, may be heterogeneous by unpacking their usage. The conclusions and insights assert the necessity of paying attention to design detail and creating designs that are responsive to evolving user activities.  相似文献   
63.
带有传感器的可穿戴式医疗设备不断生成大量数据,由于数据的复杂性,难以通过处理和分析大数据来找到有价值的决策信息。为了解决这个问题,提出了一种新的物联网体系结构,用于存储和处理医疗应用的可扩展传感器数据(大数据)。所提出的架构主要由两个子架构组成:Meta Fog重定向(MF-R)架构和AWS密钥管理机制。MF-R架构使用Apache Pig和Apache HBase等大数据技术来收集和存储不同传感器设备生成的传感器数据,并利用卡尔曼滤波消除噪声。AWS密钥管理机制使用密钥管理方案,目的是保护云中的数据,防止未经授权的访问。当数据存储在云中时,所提出的系统能够使用随机梯度下降算法和逻辑回归来开发心脏病的预测模型。仿真实验表明,和其他几种算法相比,提出的算法具有更小的误差,且在吞吐量、准确度等方面具有一定的优越性。  相似文献   
64.
社会经济的快速发展促进了科学技术水平的显著提升,社会生产生活各个领域当中对计算机网络的应用程度不断提升,当前,网络已经成为了人们日常生活与工作的重要组成部分。为此,加强对网络安全等因素影响研究就显得格外重要。网络环境关系着用户的使用质量,更加影响人们的工作效率,加强对网络安全技术的研究时解决相关问题的核心内容。本文针对网络安全威胁因素以及常见的网络安全技术进行了简要分析。  相似文献   
65.
During restructuring processes, due to mergers and acquisitions, banks frequently face the problem of having redundant branches competing in the same market. In this work, we introduce a new Capacitated Branch Restructuring Model which extends the available literature in delocation models. It considers both closing down and long term operations׳ costs, and addresses the problem of resizing open branches in order to maintain a constant service level. We consider, as well, the presence of competitors and allow for ceding market share whenever the restructuring costs are prohibitively expensive.We test our model in a real life scenario, obtaining a reduction of about 40% of the network size, and annual savings over 45% in operation costs from the second year on. We finally perform a sensitivity analysis on critical parameters. This analysis shows that the final design of the network depends on certain strategic decisions concerning the redundancy of the branches, as well as their proximity to the demand nodes and to the competitor׳s branches. At the same time, this design is quite robust to changes in the parameters associated with the adjustments on service capacity and with the market reaction.  相似文献   
66.
67.
This paper considers a novel distributed iterative learning consensus control algorithm based on neural networks for the control of heterogeneous nonlinear multiagent systems. The system's unknown nonlinear function is approximated by suitable neural networks; the approximation error is countered by a robust term in the control. Two types of control algorithms, both of which utilize distributed learning laws, are provided to achieve consensus. In the provided control algorithms, the desired reference is considered to be an unknown factor and then estimated using the associated learning laws. The consensus convergence is proven by the composite energy function method. A numerical simulation is ultimately presented to demonstrate the efficacy of the proposed control schemes.  相似文献   
68.
为解决依赖装维上门鉴别光网络单元故障带来的不便,可以从机器视觉入手实现自动化故障识别。近年,ImageNet挑战赛的成功推动了物体识别技术的跨越式发展,特别是基于卷积的深度学习技术在视觉识别方面已经达到人类水平,为光网络单元故障的自动识别提供了技术基础。文章对识别光网络单元的工作状态进行了研究,将设备工作状态分为7个场景,提出了利用手机APP采集图片识别故障的解决方案并投入了实际生产;重点阐述了深度学习模块的设计与实现,提出一种通过算法整合的方式综合运用物体检测和图像分类算法,分3阶段逐步求精,解决了图片过滤,光网络单元型号和状态识别等问题,实现了基于计算机视觉自动识别光网络单元故障。从数据上看产品的端到端准确率超过84%,识别速度达到10 FPS,月均提供服务超过1万人次,在减少用户等待的同时节约了人力资源。  相似文献   
69.
近年来深度学习迅猛发展,颠覆了语音识别、图像分类、文本理解等领域的算法设计思路。深度学习因其具备强大的特征提取能力,在图像识别领域的成绩尤为突出。然而深度学习与视频监控领域的结合并不多,由于深度模型具有多层网络结构,算法复杂度大,训练和更新模型时比较耗时,很难满足实时性要求。回顾了深度学习的发展史,介绍了最近10年来国内外深度学习主要模型,论述了基于深度学习的目标跟踪算法,指出了各算法的优缺点,最后对当前该领域存在的问题和发展前景进行了总结和展望。  相似文献   
70.
The correct separation of chromosomes during mitosis is necessary to prevent genetic instability and aneuploidy, which are responsible for cancer and other diseases, and it depends on proper centrosome duplication. In a recent study, we found that Smy2 can suppress the essential role of Mps2 in the insertion of yeast centrosome into the nuclear membrane by interacting with Eap1, Scp160, and Asc1 and designated this network as SESA (S my2, E ap1, S cp160, A sc1). Detailed analysis showed that the SESA network is part of a mechanism which regulates translation of POM34 mRNA. Thus, SESA is a system that suppresses spindle pole body duplication defects by repressing the translation of POM34 mRNA. In this study, we performed a genome-wide screening in order to identify new members of the SESA network and confirmed Dhh1 as a putative member. Dhh1 is a cytoplasmic DEAD-box helicase known to regulate translation. Therefore, we hypothesized that Dhh1 is responsible for the highly selective inhibition of POM34 mRNA by SESA.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号