首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4671篇
  免费   731篇
  国内免费   110篇
化学   740篇
晶体学   1篇
力学   87篇
综合类   74篇
数学   800篇
物理学   915篇
无线电   2895篇
  2024年   106篇
  2023年   386篇
  2022年   773篇
  2021年   751篇
  2020年   574篇
  2019年   316篇
  2018年   231篇
  2017年   244篇
  2016年   258篇
  2015年   192篇
  2014年   238篇
  2013年   256篇
  2012年   137篇
  2011年   136篇
  2010年   112篇
  2009年   115篇
  2008年   91篇
  2007年   86篇
  2006年   75篇
  2005年   67篇
  2004年   49篇
  2003年   34篇
  2002年   40篇
  2001年   25篇
  2000年   44篇
  1999年   31篇
  1998年   16篇
  1997年   23篇
  1996年   16篇
  1995年   21篇
  1994年   6篇
  1993年   5篇
  1992年   11篇
  1991年   5篇
  1990年   3篇
  1989年   3篇
  1988年   6篇
  1987年   3篇
  1986年   9篇
  1985年   2篇
  1984年   2篇
  1983年   1篇
  1981年   1篇
  1979年   3篇
  1977年   2篇
  1971年   1篇
  1969年   1篇
  1959年   5篇
排序方式: 共有5512条查询结果,搜索用时 15 毫秒
21.
3D conformable electronic devices on freeform surfaces show superior performance to the conventional, planar ones. They represent a trend of future electronics and have witnessed exponential growth in various applications. However, their potential is largely limited by a lack of sophisticated fabrication techniques. To tackle this challenge, a new direct freeform laser (DFL) fabrication method enabled by a 5-axis laser processing platform for directly fabricating 3D conformable electronics on targeted arbitrary surfaces is reported. Accordingly, representative laser-induced graphene (LIG), metals, and metal oxides are successfully fabricated as high-performance sensing and electrode materials from different material precursors on various types of substrates for applications in temperature/light/gas sensing, energy storage, and printed circuit board for circuit. Last but not the least, to demonstrate an application in smart homes, LIG-based conformable strain sensors are fabricated and distributed in designated locations of an artificial tree. The distributed sensors have the capability of monitoring the wind speed and direction with the assistance of well-trained machine-learning models. This novel process will pave a new and general route to fabricating 3D conformable electronic devices, thus creating new opportunities in robotics, biomedical sensing, structural health, environmental monitoring, and Internet of Things applications.  相似文献   
22.
Satellite's communication system is used to communicate under significant distance and circumstances where the other communication systems are not comfortable. Since all the data are exchanged over a public channel, so the security of the data is an essential component for the communicating parties. Both key exchange and authentication are two cryptographic tools to establish a secure communication between two parties. Currently, various kinds of authentication protocols are available to establish a secure network, but all of them depend on number–theoretical (discrete logarithm problem/factorization assumption) hard assumptions. Due to Shor's and Grover's computing algorithm number theoretic assumptions are breakable by quantum computers. Although Kumar and Garg have proposed a quantum attack-resistant protocol for satellite communication, it cannot resist stolen smart card attack. We have analyzed that how Kumar and Garg is vulnerable to the stolen smart card attack using differential power analysis attack described in He et al and Chen and Chen. We have also analyzed the modified version of signal leakage attack and sometimes called improved signal leakage attack on Kumar and Garg's protocol. We have tried to construct a secure and efficient authentication protocol for satellites communication that is secure against quantum computing. This is more efficient as it requires only three messages of exchange. This paper includes security proof and performance of the proposed authentication and key agreement protocol.  相似文献   
23.
隋金坪  刘振  刘丽  黎湘 《雷达学报》2022,11(3):418-433
雷达辐射源信号分选是雷达信号侦察的关键技术之一,同时也是战场态势感知的重要环节。该文系统梳理了雷达辐射源信号分选的主流技术,从基于脉间调制特征、基于脉内调制特征、基于机器学习的雷达辐射源信号分选3个角度阐述了目前雷达辐射源信号分选工作的主要研究方向及进展,并重点阐释了基于深度神经网络、数据流聚类等最新分选技术的原理与特点。最后,对现有雷达辐射源信号分选技术的不足进行了总结并对未来趋势进行了预测。   相似文献   
24.
While malicious samples are widely found in many application fields of machine learning, suitable countermeasures have been investigated in the field of adversarial machine learning. Due to the importance and popularity of Support Vector Machines (SVMs), we first describe the evasion attack against SVM classification and then propose a defense strategy in this paper. The evasion attack utilizes the classification surface of SVM to iteratively find the minimal perturbations that mislead the nonlinear classifier. Specially, we propose what is called a vulnerability function to measure the vulnerability of the SVM classifiers. Utilizing this vulnerability function, we put forward an effective defense strategy based on the kernel optimization of SVMs with Gaussian kernel against the evasion attack. Our defense method is verified to be very effective on the benchmark datasets, and the SVM classifier becomes more robust after using our kernel optimization scheme.  相似文献   
25.
With the development of the Internet of Things (IoT), the massive data sharing between IoT devices improves the Quality of Service (QoS) and user experience in various IoT applications. However, data sharing may cause serious privacy leakages to data providers. To address this problem, in this study, data sharing is realized through model sharing, based on which a secure data sharing mechanism, called BP2P-FL, is proposed using peer-to-peer federated learning with the privacy protection of data providers. In addition, by introducing the blockchain to the data sharing, every training process is recorded to ensure that data providers offer high-quality data. For further privacy protection, the differential privacy technology is used to disturb the global data sharing model. The experimental results show that BP2P-FL has high accuracy and feasibility in the data sharing of various IoT applications.  相似文献   
26.
Identifying an unfamiliar caller's profession is important to protect citizens' personal safety and property. Owing to the limited data protection of various popular online services in some countries, such as taxi hailing and ordering takeouts, many users presently encounter an increasing number of phone calls from strangers. The situation may be aggravated when criminals pretend to be such service delivery staff, threatening the user individuals as well as the society. In addition, numerous people experience excessive digital marketing and fraudulent phone calls because of personal information leakage. However, previous works on malicious call detection only focused on binary classification, which does not work for the identification of multiple professions. We observed that web service requests issued from users' mobile phones might exhibit their application preferences, spatial and temporal patterns, and other profession-related information. This offers researchers and engineers a hint to identify unfamiliar callers. In fact, some previous works already leveraged raw data from mobile phones (which includes sensitive information) for personality studies. However, accessing users' mobile phone raw data may violate the more and more strict private data protection policies and regulations (e.g., General Data Protection Regulation). We observe that appropriate statistical methods can offer an effective means to eliminate private information and preserve personal characteristics, thus enabling the identification of the types of mobile phone callers without privacy concerns. In this paper, we develop CPFinder —- a system that exploits privacy-preserving mobile data to automatically identify callers who are divided into four categories of users: taxi drivers, delivery and takeouts staffs, telemarketers and fraudsters, and normal users (other professions). Our evaluation of an anonymized dataset of 1,282 users over a period of 3 months in Shanghai City shows that the CPFinder can achieve accuracies of more than 75.0% and 92.4% for multiclass and binary classifications, respectively.  相似文献   
27.
With the rapid development of mobile devices and deep learning, mobile smart applications using deep learning technology have sprung up. It satisfies multiple needs of users, network operators and service providers, and rapidly becomes a main research focus. In recent years, deep learning has achieved tremendous success in image processing, natural language processing, language analysis and other research fields. Despite the task performance has been greatly improved, the resources required to run these models have increased significantly. This poses a major challenge for deploying such applications on resource-restricted mobile devices. Mobile intelligence needs faster mobile processors, more storage space, smaller but more accurate models, and even the assistance of other network nodes. To help the readers establish a global concept of the entire research direction concisely, we classify the latest works in this field into two categories, which are local optimization on mobile devices and distributed optimization based on the computational position of machine learning tasks. We also list a few typical scenarios to make readers realize the importance and indispensability of mobile deep learning applications. Finally, we conjecture what the future may hold for deploying deep learning applications on mobile devices research, which may help to stimulate new ideas.  相似文献   
28.
基于深度学习的光网络流量诊断与预测等场景中,由于保密等原因,光链路的流量数据采集和存储工作受限。针对数据量少而无法支撑深度学习的问题,文章提出了一种基于拓扑链路识别的光网络流量数据合成算法,其核心思想是在生成对抗网络框架下,联合基于光网络拓扑的条件生成模型和基于光网络流量的数据合成模型,以自监督的方式合成指定光链路的流量数据。仿真结果表明,所提算法合成的光网络流量数据在自相关系数指标上与真实数据接近且使得基于全连接神经网络的流量预测模型准确率达到95%以上。  相似文献   
29.
构建基金智能客服情绪安抚算法,增加人性化设计以有效提升客户使用体验。由基于OCC模型的情绪粗粒度分类得到有负面情感的文本信息,对该文本信息进行相关处理,而后基于SVM模型进行情绪细粒度分类,得到文本的负面情绪类别并在囊括专业知识和情绪应答的基金领域知识库中匹配答案和情绪应答语句,将查询结果展示给客户。  相似文献   
30.
电网因其在电能传输方面的关键性作用,在我国民生项目建设领域一直扮演着至关重要的角色。电网杆塔上的绝缘子一旦发生自爆(也称“缺陷”),绝缘子会自动剥落,输电线路就会产生安全隐患,严重时会降低输电线路的运行寿命,甚至会引发供电中断,发生大范围的停电事故,造成巨大的财产损失。目前,主流的巡检方法为人工巡检,该方法不仅耗时耗力,而且也存在一定主观出错率,已不适用于目前电路巡检的实际情况。本设计采用YOLO V5网络模型,对无人机航拍影像中绝缘子串及绝缘子自爆进行自动识别。首先通过平移、翻转、裁剪等,对航拍绝缘子影像数据集进行数据增广,并对增广后的数据集在LabelImg中进行标注,然后利用YOLO V5网络模型对绝缘子串及绝缘子自爆进行识别,最后采用PyQt5框架在PyCharm中设计了绝缘子自爆识别的系统界面,对模型进行调用,实现了绝缘子串及绝缘子自爆识别。本设计采用从网络上下载、国家电网提供、数据增广所得到的500张无人机航拍影像作为数据集,对所得数据集进行人工标注,再使用YOLO V5网络模型进行训练和测试,结果表明YOLO V5网络模型对绝缘子串具有较高的识别精度,最高识别精度为90.2%,对绝缘子自爆的最高检测精度为80.8%。这说明了YOLO V5网络模型在绝缘子串识别方面有较好的表现,但是由于训练集中绝缘子自爆的样本影像数量有限,所以该网络模型对绝缘子的自爆识别存在一定局限性,本实验能够部分代替人力实现电网绝缘子智能巡检,提高了检测效率。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号