首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   570篇
  免费   68篇
  国内免费   215篇
  2023年   22篇
  2022年   30篇
  2021年   56篇
  2020年   44篇
  2019年   58篇
  2018年   59篇
  2017年   40篇
  2016年   46篇
  2015年   41篇
  2014年   46篇
  2013年   86篇
  2012年   30篇
  2011年   23篇
  2010年   29篇
  2009年   27篇
  2008年   28篇
  2007年   25篇
  2006年   33篇
  2005年   18篇
  2004年   21篇
  2003年   17篇
  2002年   16篇
  2001年   11篇
  2000年   5篇
  1999年   5篇
  1998年   6篇
  1997年   5篇
  1996年   6篇
  1995年   1篇
  1994年   4篇
  1993年   4篇
  1992年   3篇
  1991年   2篇
  1990年   2篇
  1989年   2篇
  1988年   1篇
  1977年   1篇
排序方式: 共有853条查询结果,搜索用时 15 毫秒
81.
82.
83.
Detecting in prior bearing faults is an essential task of machine health monitoring because bearings are the vital components of rotary machines. The performance of traditional intelligent fault diagnosis methods depend on feature extraction of fault signals, which requires signal processing techniques, expert knowledge, and human labor. Recently, deep learning algorithms have been applied widely in machine health monitoring. With the capacity of automatically learning complex features of input data, deep learning architectures have great potential to overcome drawbacks of traditional intelligent fault diagnosis. This paper proposes a method for diagnosing bearing faults based on a deep structure of convolutional neural network. Using vibration signals directly as input data, the proposed method is an automatic fault diagnosis system which does not require any feature extraction techniques and achieves very high accuracy and robustness under noisy environments.  相似文献   
84.
Social engagement is associated with healthy aging and preserved cognition. Two dimensions of engagement, verbal interactions and perceived support, likely impact cognition via distinct mechanistic pathways. We explored the cognitive benefit of each construct among enrollees (N = 1,052, mean age = 60.2 years) in the Wisconsin Registry for Alzheimer’s Prevention study, who provide neuropsychological and sociobehavioral data at two-year intervals. Outcomes included six cognitive factor scores representing key domains of executive function and memory. Key predictors included self-reported perceived social support and weekly verbal interaction. Results indicated that after adjusting for lifestyle covariates, social support was positively associated with Speed and Flexibility and that verbal interactions were associated with Verbal Learning and Memory. These findings suggest that support, which may buffer stress, and verbal interaction, an accessible, aging-friendly form of environmental enrichment, are uniquely beneficial. Both are integral in the design of clinical and community interventions and programs that promote successful aging.  相似文献   
85.
86.
People are becoming more and more humanized in the process of understanding the law. According to the right to discipline, the law has its own core setting factors, while some limits can't reach people's desire. Therefore, the legal and illegal mode of transcending rights is very important. In order to analyze the legal form of modern rights, in this paper, the cognitive learning and memory process of human brain were simulated through the artificial neural network and the understanding of human brain structure, and the role of law, discipline and governance was reflected. In the study, the structure and algorithm of the model neural network were optimized, the memory forgetting curve mechanism that can simulate the human brain was introduced, and thus the network recognition rate was improved. And in the algorithm, the calculation of matching degree was avoided, and the computational complexity was reduced to the sample. Then the sample was compared with the SOM, ART1, and PNN algorithms. The experimental simulation results show that the recognition speed of this sample is 1.9 times faster than that of ART1, 58 times than that of SOM, and 1.5 times than that of the PNN network.  相似文献   
87.
Existing antivirus programs detect malicious code based on fixed signatures; therefore, they have limitations in detecting metamorphic malicious code that lacks signature information or possesses circumventing code inserted into it. Research on the methods for detecting this type of metamorphic malicious code primarily focuses on techniques that can detect code based on behavioral similarity to known malicious code. However, these techniques measure the degree of similarity with existing malicious code using API function call patterns. Therefore, they have certain disadvantages, such as low accuracy and large detection times. In this paper, we propose a method which can overcome the limitations of existing methods by using the FP-Growth algorithm, a data mining technique, and the Markov Logic Networks algorithm, a probabilistic inference method. To perform a comparative evaluation of the proposed method's malicious code behavior detection, we performed inference experiments using malicious code with an inserted code for random malicious behavior. We performed experiments to select optimal weights for each inference rule to improve our malicious code behavior inferences’ accuracy. The results of experiments, in which we performed a comparative evaluation with the General Bayesian Network, showed that the proposed method had an 8% higher classification performance.  相似文献   
88.
为探明个体对自我信息的反应抑制神经机制,记录了被试在完成面孔识别的停止信号任务时的脑电信号。神经振荡结果显示,反应任务中,加工自我面孔引发了更大的同步化δ节律和去同步化β节律;停止任务中,自我面孔引发了更大的去同步化β节律,特别在大脑前额区和中线上。表明,自我信息的反应抑制优势发生在抑制控制阶段,在于增强的β节律的去同步化促进了运动准备,提高了后续的动作抑制的速度。  相似文献   
89.
A comprehensive model of gaze control must account for a number of empirical observations at both the behavioural and neurophysiological levels. The computational model presented in this article can simulate the coordinated movements of the eye, head, and body required to perform horizontal gaze shifts. In doing so it reproduces the predictable relationships between the movements performed by these different degrees of freedom (DOFs) in the primate. The model also accounts for the saccadic undershoot that accompanies large gaze shifts in the biological visual system. It can also account for our perception of a stable external world despite frequent gaze shifts and the ability to perform accurate memory-guided and double-step saccades. The proposed model also simulates peri-saccadic compression: the mis-localization of a briefly presented visual stimulus towards the location that is the target for a saccade. At the neurophysiological level, the proposed model is consistent with the existence of cortical neurons tuned to the retinal, head-centred, body-centred, and world-centred locations of visual stimuli and cortical neurons that have gain-modulated responses to visual stimuli. Finally, the model also successfully accounts for peri-saccadic receptive field (RF) remapping which results in reduced responses to stimuli in the current RF location and an increased sensitivity to stimuli appearing at the location that will be occupied by the RF after the saccade. The proposed model thus offers a unified explanation for this seemingly diverse range of phenomena. Furthermore, as the proposed model is an implementation of the predictive coding theory, it offers a single computational explanation for these phenomena and relates gaze shifts to a wider framework for understanding cortical function.  相似文献   
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号