首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3955篇
  免费   80篇
  国内免费   265篇
教育   1704篇
科学研究   1426篇
各国文化   3篇
体育   53篇
综合类   110篇
文化理论   10篇
信息传播   994篇
  2024年   1篇
  2023年   36篇
  2022年   85篇
  2021年   139篇
  2020年   156篇
  2019年   106篇
  2018年   109篇
  2017年   108篇
  2016年   84篇
  2015年   156篇
  2014年   283篇
  2013年   266篇
  2012年   312篇
  2011年   313篇
  2010年   244篇
  2009年   303篇
  2008年   271篇
  2007年   297篇
  2006年   254篇
  2005年   239篇
  2004年   180篇
  2003年   137篇
  2002年   95篇
  2001年   51篇
  2000年   25篇
  1999年   18篇
  1998年   7篇
  1997年   5篇
  1996年   3篇
  1995年   1篇
  1994年   2篇
  1993年   1篇
  1992年   2篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1986年   2篇
  1985年   2篇
  1984年   1篇
  1957年   2篇
排序方式: 共有4300条查询结果,搜索用时 31 毫秒
1.
The massive number of Internet of Things (IoT) devices connected to the Internet is continuously increasing. The operations of these devices rely on consuming huge amounts of energy. Power limitation is a major issue hindering the operation of IoT applications and services. To improve operational visibility, Low-power devices which constitute IoT networks, drive the need for sustainable sources of energy to carry out their tasks for a prolonged period of time. Moreover, the means to ensure energy sustainability and QoS must consider the stochastic nature of the energy supplies and dynamic IoT environments. Artificial Intelligence (AI) enhanced protocols and algorithms are capable of predicting and forecasting demand as well as providing leverage at different stages of energy use to supply. AI will improve the efficiency of energy infrastructure and decrease waste in distributed energy systems, ensuring their long-term viability. In this paper, we conduct a survey to explore enhanced AI-based solutions to achieve energy sustainability in IoT applications. AI is relevant through the integration of various Machine Learning (ML) and Swarm Intelligence (SI) techniques in the design of existing protocols. ML mechanisms used in the literature include variously supervised and unsupervised learning methods as well as reinforcement learning (RL) solutions. The survey constitutes a complete guideline for readers who wish to get acquainted with recent development and research advances in AI-based energy sustainability in IoT Networks. The survey also explores the different open issues and challenges.  相似文献   
2.
ABSTRACT

Historic Japanese textiles from over 1000 years ago generally show marked deterioration and only very rare examples show their original forms and much information about textile reproduction has been lost. The replication of textile braids lacks systematic methodology and is still being practiced by only few individual braiding experts. The recreation of original braids as close as possible to original braids is a part of Japan’s intangible cultural heritage. The aim of this study is to clarify the decision-making procedure through which the braiding experts can decipher the original braiding structures. As a preliminary study of this project, interviews of a braid researcher and a replicating expert, Makiko Tada were performed regarding her working practices. It is important to clarify the braiding parameters for structural analysis such as the number of transits and the balance of ridges, and it became clear that the orientation of multiple colored threads plays an important role. The expert’s replicate works were also analyzed using a text-mining statistical technique to clarify the relationship of braiding parameters. The relationship between each braiding parameter and production method such as loop manipulation and Taka-dai became clear. As a result, the process of deciphering the original braid structure has been compiled in simplified workflows, which could contribute to the standardization and improvement in efficiency of replication of cultural property braids.  相似文献   
3.
孙宁 《档案管理》2020,(3):12-13
在大数据视域下,以档案管理理论和信息系统安全理论为基础,参考国家相关法规及标准,结合档案管理工作实务,研究当下档案管理工作中的风险,在此基础上初步构建起档案安全管理体系,并对可引入该体系的实用技术进行分析。  相似文献   
4.
5.
The appearance attribute and pose are two important and complementary features, so integrating them can effectively alleviate the impact of misalignment and occlusion on re-identification. In this paper, we deeply investigate the inner relation between attribute features and the spatial semantic relation between key-point region features of the pose in a person image and propose a person re-identification method based on discriminative feature mining with relation regularization. Firstly, an attribute relation detector based on nonlinear graph convolution is built on mining the inner correlation between attribute features of a person, providing relational attribute features for more effectively distinguishing persons with a similar appearance. Then, we construct a hierarchical pose pyramid to model the multi-grained semantic features of key-point regions of the pose and propose intra-graph and cross-graph node relation information propagation structures to infer the spatial semantic relation between node features within-graph and between-graph. This module is robust to complex pose changes and can suppress noise background redundancy caused by inaccurate key point detection and occlusion. Finally, a refined feature model is proposed to effectively fuse the global appearance feature with the relational attribute and multi-grained pose features, thus providing a more discriminative fusion feature for person re-identification. Many experiments on three large-scale datasets verify the effectiveness and state-of-the-art performance of the proposed method.  相似文献   
6.
Imbalanced sample distribution is usually the main reason for the performance degradation of machine learning algorithms. Based on this, this study proposes a hybrid framework (RGAN-EL) combining generative adversarial networks and ensemble learning method to improve the classification performance of imbalanced data. Firstly, we propose a training sample selection strategy based on roulette wheel selection method to make GAN pay more attention to the class overlapping area when fitting the sample distribution. Secondly, we design two kinds of generator training loss, and propose a noise sample filtering method to improve the quality of generated samples. Then, minority class samples are oversampled using the improved RGAN to obtain a balanced training sample set. Finally, combined with the ensemble learning strategy, the final training and prediction are carried out. We conducted experiments on 41 real imbalanced data sets using two evaluation indexes: F1-score and AUC. Specifically, we compare RGAN-EL with six typical ensemble learning; RGAN is compared with three typical GAN models. The experimental results show that RGAN-EL is significantly better than the other six ensemble learning methods, and RGAN is greatly improved compared with three classical GAN models.  相似文献   
7.
With the creation of interactive tasks that allow students to explore spatial ways of knowing in conjunction with their other ways of knowing the world, we create a space where students can make sense of information as they organize these new ideas into their already existing schema. Through the use of a Common Online Data Analysis Platform (CODAP) and data from Public Use Microdata Areas (PUMA), students can explore the communities in which they live and work, critically examining opportunities and challenges within a defined space.  相似文献   
8.
9.
In the context of social media, users usually post relevant information corresponding to the contents of events mentioned in a Web document. This information posses two important values in that (i) it reflects the content of an event and (ii) it shares hidden topics with sentences in the main document. In this paper, we present a novel model to capture the nature of relationships between document sentences and post information (comments or tweets) in sharing hidden topics for summarization of Web documents by utilizing relevant post information. Unlike previous methods which are usually based on hand-crafted features, our approach ranks document sentences and user posts based on their importance to the topics. The sentence-user-post relation is formulated in a share topic matrix, which presents their mutual reinforcement support. Our proposed matrix co-factorization algorithm computes the score of each document sentence and user post and extracts the top ranked document sentences and comments (or tweets) as a summary. We apply the model to the task of summarization on three datasets in two languages, English and Vietnamese, of social context summarization and also on DUC 2004 (a standard corpus of the traditional summarization task). According to the experimental results, our model significantly outperforms the basic matrix factorization and achieves competitive ROUGE-scores with state-of-the-art methods.  相似文献   
10.
The implementation of digital contact tracing applications around the world to help reduce the spread of the COVID-19 pandemic represents one of the most ambitious uses of massive-scale citizen data ever attempted. There is major divergence among nations, however, between a “privacy-first” approach which protects citizens’ data at the cost of extremely limited access for public health authorities and researchers, and a “data-first” approach which stores large amounts of data which, while of immeasurable value to epidemiologists and other researchers, may significantly intrude upon citizens’ privacy. The lack of a consensus on privacy protection in the contact tracing process creates risks of non-compliance or deliberate obfuscation from citizens who fear revealing private aspects of their lives – a factor greatly exacerbated by recent major scandals over online privacy and the illicit use of citizens’ digital information, which have heightened public consciousness of these issues and created significant new challenges for any collection of large-scale public data. While digital contact tracing for COVID-19 remains in its infancy, the lack of consensus around best practices for its implementation and for reassuring citizens of the protection of their privacy may already have impeded its capacity to contribute to the pandemic response.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号