首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   614篇
  免费   29篇
  国内免费   6篇
工业技术   649篇
  2024年   2篇
  2023年   18篇
  2022年   20篇
  2021年   30篇
  2020年   24篇
  2019年   26篇
  2018年   35篇
  2017年   36篇
  2016年   36篇
  2015年   21篇
  2014年   39篇
  2013年   53篇
  2012年   24篇
  2011年   36篇
  2010年   34篇
  2009年   42篇
  2008年   35篇
  2007年   17篇
  2006年   17篇
  2005年   11篇
  2004年   9篇
  2003年   9篇
  2002年   12篇
  2001年   9篇
  2000年   7篇
  1999年   6篇
  1998年   6篇
  1997年   7篇
  1996年   4篇
  1995年   4篇
  1994年   1篇
  1992年   1篇
  1991年   2篇
  1990年   2篇
  1989年   2篇
  1986年   3篇
  1985年   2篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1980年   1篇
  1979年   1篇
  1977年   1篇
  1974年   1篇
排序方式: 共有649条查询结果,搜索用时 0 毫秒
1.
The role of myelin basic protein (MBP) T cell recognition in the induction of experimental allergic encephalomyelitis (EAE) has been well established in mice and rats. A remarkable restriction has been observed in T cell receptor (TCR) genes utilized by encephalitogenic T cell lines (TCLs) specific for immunodominant epitopes in these species. Pathological similarities between this animal model and multiple sclerosis (MS) has led to consider MBP as a major candidate autoantigen in this human disorder. Unlike in inbred strains of animals, the T cell response to MBP in humans is quite heterogenous with regard to fine epitope specificity. The existence of V alpha and/or V beta restriction in MBP-specific T cells, from MS patients and healthy controls, is still a matter of debate. In this study we generated 77 MBP-specific TCLs from nine healthy donors and showed that peptide 7-27 is one of the most frequently recognized epitopes. 37% of all epitope-specific TCLs recognized this peptide and p7-27 specific TCLs were generated from seven out of the nine subjects studied. A high level of in vivo clonal expansion was observed in p7-27-specific TCLs in several subjects, which however is not specific of this epitope since this phenomenon was also observed in p85-104- and 149-162-specific TCLs.  相似文献   
2.
3.
The rise of Web 2.0 is signaled by sites such as Flickr, del.icio.us, and YouTube, and social tagging is essential to their success. A typical tagging action involves three components, user, item (e.g., photos in Flickr), and tags (i.e., words or phrases). Analyzing how tags are assigned by certain users to certain items has important implications in helping users search for desired information. In this paper, we develop a dual mining framework to explore tagging behavior. This framework is centered around two opposing measures, similarity and diversity, applied to one or more tagging components, and therefore enables a wide range of analysis scenarios such as characterizing similar users tagging diverse items with similar tags or diverse users tagging similar items with diverse tags. By adopting different concrete measures for similarity and diversity in the framework, we show that a wide range of concrete analysis problems can be defined and they are NP-Complete in general. We design four sets of efficient algorithms for solving many of those problems and demonstrate, through comprehensive experiments over real data, that our algorithms significantly out-perform the exact brute-force approach without compromising analysis result quality.  相似文献   
4.
To evade signature-based detection, metamorphic viruses transform their code before each new infection. Software similarity measures are a potentially useful means of detecting such malware. We can compare a given file to a known sample of metamorphic malware and compute their similarity—if they are sufficiently similar, we classify the file as malware of the same family. In this paper, we analyze an opcode-based software similarity measure inspired by simple substitution cipher cryptanalysis. We show that the technique provides a useful means of classifying metamorphic malware.  相似文献   
5.
In this article, new probabilistic health-informatics indices connecting probabilities: Pr(A),Pr(B),Pr(A IB) and P r(A ]B-) are discovered, where .4 and B denote respectively the "ability of a hospital to treat anthrax patients" and "whether a hospital drilled to be prepared to deal with an adverse bioterrorism". These probabilistic informatics are not seen in any textbooks or journal articles and yet, they are too valuable to be unnoticed to comprehend the hospitals' preparedness to treat anthrax patients in an outbreak of bioterrorism. A demonstration of this new probabilistic informatics is made in this article with the data in the U.S. Government's General Accounting Office's report GA0-03-924. Via this example, this article advocates the importance of the above mentioned probabilistic-informatics for health professionals to understand and act swiftly to deal with public health emergencies.  相似文献   
6.
Buoyancy driven convection in a square cavity induced by two mutually orthogonal arbitrarily placed heated thin plates is studied numerically under isothermal and isoflux boundary conditions. The flow is assumed to be two-dimensional. The coupled governing equations were solved by the finite difference method using the Alternating Direction Implicit technique and Successive Over Relaxation method. The steady state results are depicted in terms of streamline and isotherm plots. It is found that the resulting convection pattern is stronger for the isothermal boundary condition. A better overall heat transfer can be achieved by placing one of the plates far away from the center of the cavity for isothermal boundary condition and near the center of the cavity for isoflux boundary condition.  相似文献   
7.
For a long time, legal entities have developed and used crime prediction methodologies. The techniques are frequently updated based on crime evaluations and responses from scientific communities. There is a need to develop type-based crime prediction methodologies that can be used to address issues at the subgroup level. Child maltreatment is not adequately addressed because children are voiceless. As a result, the possibility of developing a model for predicting child abuse was investigated in this study. Various exploratory analysis methods were used to examine the city of Chicago’s child abuse events. The data set was balanced using the Borderline-SMOTE technique, and then a stacking classifier was employed to ensemble multiple algorithms to predict various types of child abuse. The proposed approach successfully predicted crime types with 93% of accuracy, precision, recall, and F1-Score. The AUC value of the same was 0.989. However, when compared to the Extra Trees model (17.55), which is the second best, the proposed model’s execution time was significantly longer (476.63). We discovered that Machine Learning methods effectively evaluate the demographic and spatial-temporal characteristics of the crimes and predict the occurrences of various subtypes of child abuse. The results indicated that the proposed Borderline-SMOTE enabled Stacking Classifier model (BS-SC Model) would be effective in the real-time child abuse prediction and prevention process.  相似文献   
8.
Sentiment Analysis (SA) is one of the subfields in Natural Language Processing (NLP) which focuses on identification and extraction of opinions that exist in the text provided across reviews, social media, blogs, news, and so on. SA has the ability to handle the drastically-increasing unstructured text by transforming them into structured data with the help of NLP and open source tools. The current research work designs a novel Modified Red Deer Algorithm (MRDA) Extreme Learning Machine Sparse Autoencoder (ELMSAE) model for SA and classification. The proposed MRDA-ELMSAE technique initially performs preprocessing to transform the data into a compatible format. Moreover, TF-IDF vectorizer is employed in the extraction of features while ELMSAE model is applied in the classification of sentiments. Furthermore, optimal parameter tuning is done for ELMSAE model using MRDA technique. A wide range of simulation analyses was carried out and results from comparative analysis establish the enhanced efficiency of MRDA-ELMSAE technique against other recent techniques.  相似文献   
9.

The World Wide Web(WWW) comprises a wide range of information, and it is mainly operated on the principles of keyword matching which often reduces accurate information retrieval. Automatic query expansion is one of the primary methods for information retrieval, and it handles the vocabulary mismatch problem often faced by the information retrieval systems to retrieve an appropriate document using the keywords. This paper proposed a novel approach of hybrid COOT-based Cat and Mouse Optimization (CMO) algorithm named as hybrid COOT-CMO for the appropriate selection of optimal candidate terms in the automatic query expansion process. To improve the accuracy of the Cat and Mouse Optimization (CMO) algorithm, the parameters are tuned with the help of the Coot algorithm. The best suitable expanded query is identified from the available expanded query sets also known as candidate query pools. All feasible combinations in this candidate query pool should be obtained from the top retrieved documents. Benchmark datasets such as the GOV2 Test Collection, the Cranfield Collections, and the NTCIR Test Collection are utilized to assess the performance of the proposed hybrid COOT-CMO method for automatic query expansion. This proposed method surpasses the existing state-of-the-art techniques using many performance measures such as F-score, precision, and mean average precision (MAP).

  相似文献   
10.
Aluminum metal matrix composites (AMMCs) explicitly show better physical and mechanical properties as compared to aluminum alloys and results in a more preferred material for a wide range of applications. The addition of reinforcements embargo AMMCs employment to industry requirements by increasing order of machining complexity. However, it can be machined with a high order of surface integrity by nonconventional approaches like abrasive water jet machining. Hybrid aluminum alloy composites were reinforced by B4C (5–15?vol%) and solid lubricant hBN (15?vol%) particles and fabricated using a liquid metallurgy route. This research article deals with the experimental investigation on the effect of process parameters such as mesh size, abrasive flow rate, water pressure and work traverse speed of abrasive water jet machining on hybrid AA6061-B4C-hBN composites. Water jet pressure and traverse speed have been proved to be the most significant parameters which influenced the responses like kerf taper angle and surface roughness. Increase in reinforcement particles affects both the kerf taper angle and surface roughness. SEM images of the machined surface show that cutting wear mechanism was largely operating in material removal.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号