全文获取类型
收费全文 | 8850篇 |
免费 | 591篇 |
国内免费 | 360篇 |
学科分类
工业技术 | 9801篇 |
出版年
2024年 | 29篇 |
2023年 | 129篇 |
2022年 | 243篇 |
2021年 | 339篇 |
2020年 | 291篇 |
2019年 | 169篇 |
2018年 | 122篇 |
2017年 | 162篇 |
2016年 | 241篇 |
2015年 | 286篇 |
2014年 | 705篇 |
2013年 | 561篇 |
2012年 | 710篇 |
2011年 | 818篇 |
2010年 | 714篇 |
2009年 | 611篇 |
2008年 | 476篇 |
2007年 | 480篇 |
2006年 | 447篇 |
2005年 | 378篇 |
2004年 | 305篇 |
2003年 | 280篇 |
2002年 | 267篇 |
2001年 | 162篇 |
2000年 | 116篇 |
1999年 | 109篇 |
1998年 | 59篇 |
1997年 | 62篇 |
1996年 | 45篇 |
1995年 | 34篇 |
1994年 | 28篇 |
1993年 | 18篇 |
1992年 | 21篇 |
1990年 | 12篇 |
1989年 | 17篇 |
1988年 | 17篇 |
1987年 | 14篇 |
1986年 | 15篇 |
1984年 | 15篇 |
1966年 | 19篇 |
1965年 | 12篇 |
1962年 | 14篇 |
1961年 | 11篇 |
1960年 | 11篇 |
1959年 | 21篇 |
1958年 | 19篇 |
1957年 | 20篇 |
1956年 | 16篇 |
1955年 | 19篇 |
1954年 | 16篇 |
排序方式: 共有9801条查询结果,搜索用时 15 毫秒
1.
2.
3.
Face aging (FA) for young faces refers to rendering the aging faces at target age for an individual, generally under 20s, which is an important topic of facial age analysis. Unlike traditional FA for adults, it is challenging to age children with one deep learning-based FA network, since there are deformations of facial shapes and variations of textural details. To alleviate the deficiency, a unified FA framework for young faces is proposed, which consists of two decoupled networks to apply aging image translation. It explicitly models transformations of geometry and appearance using two components: GD-GAN, which simulates the Geometric Deformation using Generative Adversarial Network; TV-GAN, which simulates the Textural Variations guided by the age-related saliency map. Extensive experiments demonstrate that our method has advantages over the state-of-the-art methods in terms of synthesizing visually plausible images for young faces, as well as preserving the personalized features. 相似文献
4.
5.
Besides entertainment, games have shown to have the potential to impact a broader variety of cognitive abilities. Research has consistently shown that several aspects in cognition such as visual short-memory, multitasking and spatial skills can be enhanced by game play. In a previous study, it was found that playing Monkey Tales, a game aimed at training arithmetic skills, helped second grade pupils to increase their accuracy in mental calculation as compared to paper exercises. In this follow up study we explore whether traditional methods and game training differ in terms of the cognitive processes that both are able to impact. We incorporated standardized measures of working memory and visuo-motor skills. Additionally, the mathematics game was modified and its contents extracted to allow precise comparison between the gaming and paper exercises condition. Thus each single math exercise, type of question (e.g., multiple choice), quantity and order was perfectly matched in the game training and the traditional training conditions. Gains in arithmetical performance, and self-reported measures of enjoyment were also investigated. We found some evidence suggesting that arithmetic performance enhancement induced by game play and paper exercises differ not only in terms of enjoyment but also of working memory capacity improvements. 相似文献
6.
Deunsol Hwang Jong-Beom Seo Hun-Young Park Jisu Kim Kiwon Lim 《International journal of molecular sciences》2021,22(2)
While exercise training (ET) is an efficient strategy to manage obesity, it is recommended with a dietary plan to maximize the antiobesity functions owing to a compensational increase in energy intake. Capsiate is a notable bioactive compound for managing obesity owing to its capacity to increase energy expenditure. We aimed to examine whether the antiobesity effects of ET can be further enhanced by capsiate intake (CI) and determine its effects on resting energy expenditure and metabolic molecules. Mice were randomly divided into four groups (n = 8 per group) and fed high-fat diet. Mild-intensity treadmill ET was conducted five times/week; capsiate (10 mg/kg) was orally administered daily. After 8 weeks, resting metabolic rate and metabolic molecules were analyzed. ET with CI additively reduced the abdominal fat rate by 18% and solely upregulated beta-3-adrenoceptors in adipose tissue (p = 0.013) but did not affect the metabolic molecules in skeletal muscles. Surprisingly, CI without ET significantly increased the abdominal fat rate (p = 0.001) and reduced energy expenditure by 9%. Therefore, capsiate could be a candidate compound for maximizing the antiobesity effects of ET by upregulating beta-3-adrenoceptors in adipose tissue, but CI without ET may not be beneficial in managing obesity. 相似文献
7.
匡红云 《上海第二工业大学学报》2019,(4):298-303
澳大利亚职业教育在全球享有较高的声誉,这与其坚持严格的"基于能力本位的评估"(competency based assessment, CBA)密不可分。介绍了澳大利亚CBA的内涵特征,并详细描述"准备评估、开发评估工具、开展评估、对评估结果进行评估"的CBA运作过程,关注评估工具的开发和后续常规系统性检查及完善,以期对我国的高等职业教育质量评估起到启示和借鉴作用。 相似文献
8.
相似用户挖掘是提高社交网络服务质量的重要途径,在面向大数据的社交网络时代,准确的相似用户挖掘对于用户和互联网企业等都有重要的意义,而根据用户自己的兴趣话题挖掘的相似用户更符合相似用户的要求。提出了一种基于用户兴趣话题进行相似用户挖掘的方法。该方法首先使用TextRank话题提取方法对用户进行兴趣话题提取,再对用户发表内容进行训练,计算出所有词之间的相似度。提出CP(Corresponding Position similarity)、CPW(Corresponding Position Weighted similarity)、AP(All Position similarity)、APW(All Position Weighted similarity)四种用户兴趣话题词相似度计算方法,通过用户和相似用户间关注、粉丝重合率验证相似用户挖掘效果,APW similarity的相似用户的关注/粉丝重合百分比为1.687%,优于提出的其他三种算法,分别提高了26.3%、2.8%、12.4%,并且比传统的文本相似度方法Jaccard相似度、编辑距离算法、余弦相似度分别提高了20.4%、21.2%、45.0%。因此APW方法可以更加有效地挖掘出用户的相似用户。 相似文献
9.
以用户为中心的可见光通信协作传输是近年来出现的新架构,这导致虚拟小区之间出现重叠。为避免导频污染问题,每个虚拟小区中的光接入点(AP)或者虚拟小区中选择相同AP的用户发送的训练序列应该是正交的。针对可见光通信中以用户为中心的协作网络,研究训练资源的正交分配问题,提出了一种新的导频分配算法,联合导频分配和用户选择问题,以期最大限度地增加虚拟小区内可被接入的用户数。分析和仿真结果表明,该导频分配方案可以有效改善导频污染问题,提高训练资源利用率,并且相比已有的导频分配方案,性能有所改进。 相似文献
10.
Intrusion Detection Networks (IDN) are distributed cyberdefense systems composed of different nodes performing local detection and filtering functions, as well as sharing information with other nodes in the IDN. The security and resilience of such cyberdefense systems are paramount, since an attacker will try to evade them or render them unusable before attacking the end systems. In this paper, we introduce a system model for IDN nodes in terms of their logical components, functions, and communication channels. This allows us to model different IDN node roles (e.g., detectors, filters, aggregators, correlators, etc.) and architectures (e.g., hierarchical, centralized, fully distributed, etc.). We then introduce a threat model that considers adversarial actions executed against particular IDN nodes, and also the propagation of such actions throughout connected nodes. Based on such models, we finally introduce a countermeasure allocation model based on a multi-objective optimization algorithm to obtain optimal allocation strategies that minimize both risk and cost. Our experimental results obtained through simulation with different IDN architectures illustrate the benefit of our framework to design and reconfigure cyberdefense systems optimally. 相似文献