首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   26842篇
  免费   5797篇
  国内免费   1438篇
工业技术   34077篇
  2024年   11篇
  2023年   185篇
  2022年   474篇
  2021年   494篇
  2020年   505篇
  2019年   521篇
  2018年   661篇
  2017年   523篇
  2016年   662篇
  2015年   561篇
  2014年   3989篇
  2013年   2944篇
  2012年   3926篇
  2011年   4189篇
  2010年   3703篇
  2009年   3362篇
  2008年   1573篇
  2007年   869篇
  2006年   758篇
  2005年   719篇
  2004年   506篇
  2003年   517篇
  2002年   456篇
  2001年   370篇
  2000年   330篇
  1999年   287篇
  1998年   221篇
  1997年   194篇
  1996年   165篇
  1995年   99篇
  1994年   63篇
  1993年   59篇
  1992年   37篇
  1991年   25篇
  1990年   15篇
  1989年   25篇
  1988年   11篇
  1987年   5篇
  1986年   9篇
  1985年   10篇
  1984年   12篇
  1983年   8篇
  1982年   5篇
  1981年   10篇
  1980年   3篇
  1979年   1篇
  1977年   2篇
  1976年   2篇
  1975年   1篇
排序方式: 共有10000条查询结果,搜索用时 109 毫秒
1.
死亡风险预测指根据病人临床体征监测数据来预测未来一段时间的死亡风险。对于ICU病患,通过死亡风险预测可以有针对性地对病人做出临床诊断,以及合理安排有限的医疗资源。基于临床使用的MEWS和Glasgow昏迷评分量表,针对ICU病人临床监测的17项生理参数,提出一种基于多通道的ICU脑血管疾病死亡风险预测模型。引入多通道概念应用于BiLSTM模型,用于突出每个生理参数对死亡风险预测的作用。采用Attention机制用于提高模型预测精度。实验数据来自MIMIC [Ⅲ]数据库,从中提取3?080位脑血管疾病患者的16?260条记录用于此次研究,除了六组超参数实验之外,将所提模型与LSTM、Multichannel-BiLSTM、逻辑回归(logistic regression)和支持向量机(support vector machine, SVM)四种模型进行了对比分析,准确率Accuracy、灵敏度Sensitive、特异性Specificity、AUC-ROC和AUC-PRC作为评价指标,实验结果表明,所提模型性能优于其他模型,AUC值达到94.3%。  相似文献   
2.
The ability to detect gun and gun held in hand or other body parts is a typical human skill. The same problem presents an imperative task for computer vision system. Automatic observer independent detection of hand held gun or gun held in the other body part, whether it is visible or concealed, provides enhance security in vulnerable places and initiates appropriate action there. Compare to the automatic object detection systems, automatic detection of gun has very few successful attempts. In the present scope of this paper, we present an extensive survey on automatic detection of gun and define a taxonomy for this particular detection system. We also describe the inherent difficulties related with this problem. In this survey of published papers, we examine different approaches used in state-of-the-art attempts and compare performances of these approaches. Finally, this paper concludes pointing to the possible research gaps in related fields.  相似文献   
3.
4.
为了更加准确地检测出图像中的显著性目标,提出了多先验融合的显著性目标检测算法。针对传统中心先验对偏离图像中心的显著性目标会出现检测失效的情况,提出在多颜色空间下求显著性目标的最小凸包交集来确定目标的大致位置,以凸包区域中心计算中心先验。同时通过融合策略将凸包区域中心先验、颜色对比先验和背景先验融合并集成到特征矩阵中。最后通过低秩矩阵恢复模型生成结果显著图。在公开数据集MSRA1000和ESSCD上的仿真实验结果表明,MPLRR能够得到清晰高亮的显著性目标视觉效果图,同时F,AUC,MAE等评价指标也比现有的许多方法有明显提升。  相似文献   
5.
6.
为了开发β受体阻断剂新药(S)-噻吗洛尔半水合物,采用3-吗啉-4-氯-1,2,5-噻二唑为起始原料,经水解反应得到中间体1(3-吗啉-4-羟基-1,2,5-噻二唑)。中间体1与R-环氧氯丙烷发生醚化反应,经后处理及重结晶得到中间体2 {(R)-4-[4-(环氧乙烷-2-基甲氧基)-1,2,5-噻二唑-3-基]吗啉}。中间体2经胺化反应、马来酸成盐及重结晶得到(S)-马来酸噻吗洛尔。(S)-马来酸噻吗洛尔经游离、纯水转晶得到符合药典标准的(S)-噻吗洛尔半水合物,总收率14.05%且e.e.值为99.66%。最终成品经IR、1H-NMR、13C-NMR、MS、TGA、DSC表征,并优化各步反应条件。结果表明:以三乙胺为醚化反应缚酸剂75 ℃反应最佳;以乙醇为胺化反应溶剂46 ℃反应16 h最佳;S-噻吗洛尔的转晶拆分以水作溶剂,比传统不对称合成工艺安全稳定,操作简单,适合工业化生产。  相似文献   
7.
In this article we illustrate a methodology for building cross-language search engine. A synergistic approach between thesaurus-based approach and corpus-based approach is proposed. First, a bilingual ontology thesaurus is designed with respect to two languages: English and Spanish, where a simple bilingual listing of terms, phrases, concepts, and subconcepts is built. Second, term vector translation is used – a statistical multilingual text retrieval techniques that maps statistical information about term use between languages (Ontology co-learning). These techniques map sets of t f id f term weights from one language to another. We also applied a query translation method to retrieve multilingual documents with an expansion technique for phrasal translation. Finally, we present our findings.  相似文献   
8.
Fault detection and isolation in water distribution networks is an active topic due to the nonlinearities of flow propagation and recent increases in data availability due to sensor deployment. Here, we propose an efficient two-step data driven alternative: first, we perform sensor placement taking the network topology into account; second, we use incoming sensor data to build a network model through online dictionary learning. Online learning is fast and allows tackling large networks as it processes small batches of signals at a time. This brings the benefit of continuous integration of new data into the existing network model, either in the beginning for training or in production when new data samples are gathered. The proposed algorithms show good performance in our simulations on both small and large-scale networks.  相似文献   
9.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks.  相似文献   
10.
We investigate the problem of efficient wireless power transfer in wireless sensor networks. In our approach, special mobile entities (called the Mobile Chargers) traverse the network and wirelessly replenish the energy of sensor nodes. In contrast to most current approaches, we envision methods that are distributed and use limited network information. We propose four new protocols for efficient charging, addressing key issues which we identify, most notably (i) what are good coordination procedures for the Mobile Chargers and (ii) what are good trajectories for the Mobile Chargers. Two of our protocols (DC, DCLK) perform distributed, limited network knowledge coordination and charging, while two others (CC, CCGK) perform centralized, global network knowledge coordination and charging. As detailed simulations demonstrate, one of our distributed protocols outperforms a known state of the art method, while its performance gets quite close to the performance of the powerful centralized global knowledge method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号