全文获取类型
收费全文 | 7984篇 |
免费 | 1004篇 |
国内免费 | 1418篇 |
专业分类
电工技术 | 67篇 |
综合类 | 487篇 |
化学工业 | 294篇 |
金属工艺 | 57篇 |
机械仪表 | 128篇 |
建筑科学 | 83篇 |
矿业工程 | 25篇 |
能源动力 | 129篇 |
轻工业 | 184篇 |
水利工程 | 15篇 |
石油天然气 | 6篇 |
武器工业 | 8篇 |
无线电 | 1212篇 |
一般工业技术 | 297篇 |
冶金工业 | 19篇 |
原子能技术 | 40篇 |
自动化技术 | 7355篇 |
出版年
2024年 | 115篇 |
2023年 | 400篇 |
2022年 | 430篇 |
2021年 | 497篇 |
2020年 | 475篇 |
2019年 | 402篇 |
2018年 | 457篇 |
2017年 | 806篇 |
2016年 | 737篇 |
2015年 | 604篇 |
2014年 | 828篇 |
2013年 | 615篇 |
2012年 | 701篇 |
2011年 | 640篇 |
2010年 | 500篇 |
2009年 | 475篇 |
2008年 | 330篇 |
2007年 | 337篇 |
2006年 | 282篇 |
2005年 | 171篇 |
2004年 | 57篇 |
2003年 | 87篇 |
2002年 | 73篇 |
2001年 | 59篇 |
2000年 | 58篇 |
1999年 | 50篇 |
1998年 | 17篇 |
1997年 | 25篇 |
1996年 | 20篇 |
1995年 | 14篇 |
1994年 | 14篇 |
1993年 | 9篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 6篇 |
1989年 | 7篇 |
1988年 | 24篇 |
1987年 | 32篇 |
1986年 | 43篇 |
1985年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
2.
针对现有的混凝土裂缝检测算法在各种复杂环境中检测精度不够、鲁棒性不强的问题,根据深度学习理论和U-net模型,提出一种全U型网络的裂缝检测算法。首先,依照原U-net模型路线构建网络;然后,在每个池化层后都进行一次上采样,恢复其在池化层之前的特征图规格,并将其与池化之前的卷积层进行融合,将融合之后的特征图作为新的融合层与原U-net网络上采样之后的网络层进行融合;最后,为了验证算法的有效性,在测试集中进行实验。结果表明,所提算法的平均精确率可达到83.48%,召回率为85.08%,F1为84.11%,相较于原U-net分别提升了1.48%,4.68%和3.29%,在复杂环境中也能提取完整裂缝,保证了裂缝检测的鲁棒性。 相似文献
3.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)). 相似文献
4.
5.
Wei Shaowei Yu Guoxian Wang Jun Domeniconi Carlotta Zhang Xiangliang 《Machine Learning》2021,110(6):1505-1526
Machine Learning - Traditional clustering algorithms focus on a single clustering result; as such, they cannot explore potential diverse patterns of complex real world data. To deal with this... 相似文献
6.
7.
Novel organic hybrid silver thiostannates [Hen]4[Ln(en)4]2[Ag6Sn6S20]·3en (Ln = Er, 1; Tm, 2; Yb, 3) were prepared by the reactions of Ln2O3, Ag, Sn and S in ethylenediamine (en) under solvothermal conditions. Six SnS4 tetrahedra and six AgS3 triangles are connected into the heterometallic sulfide cluster [Ag6Sn6S20]10 − via edge-sharing. In the [Ag6Sn6S20]10 − cluster, a hexanuclear Ag6S6 core is enclosed by two Sn3S10 fragments. The Ag6S6 core is the first As–S cluster stabilized by inorganic SnS4 ligands. In 1–3, all Ln3 + ions are in 8-fold coordination environments that involved four bidentate en ligands, forming bicapped trigonal prisms. Compounds 1–3 show well-defined absorption edges with band gaps in the range of 2.18–2.47 eV. 相似文献
8.
High dimensionality in real-world multi-reservoir systems greatly hinders the application and popularity of evolutionary algorithms, especially for systems with heterogeneous units. An efficient hierarchical optimization framework is presented for search space reduction, determining the best water distributions, not only between cascade reservoirs, but also among different types of hydropower units. The framework is applied to the Three Gorges Project (TGP) system and the results demonstrate that the difficulties of multi-reservoir optimization caused by high dimensionality can be effectively solved by the proposed hierarchical method. For the day studied, power output could be increased by 6.79 GWh using an optimal decision with the same amount of water actually used; while the same amount of power could be generated with 2.59 × 107 m3 less water compared to the historical policy. The methodology proposed is general in that it can be used for other reservoir systems and other types of heterogeneous unit generators. 相似文献
9.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks. 相似文献
10.
We investigate the problem of efficient wireless power transfer in wireless sensor networks. In our approach, special mobile entities (called the Mobile Chargers) traverse the network and wirelessly replenish the energy of sensor nodes. In contrast to most current approaches, we envision methods that are distributed and use limited network information. We propose four new protocols for efficient charging, addressing key issues which we identify, most notably (i) what are good coordination procedures for the Mobile Chargers and (ii) what are good trajectories for the Mobile Chargers. Two of our protocols (DC, DCLK) perform distributed, limited network knowledge coordination and charging, while two others (CC, CCGK) perform centralized, global network knowledge coordination and charging. As detailed simulations demonstrate, one of our distributed protocols outperforms a known state of the art method, while its performance gets quite close to the performance of the powerful centralized global knowledge method. 相似文献