首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12193篇
  免费   1948篇
  国内免费   1519篇
电工技术   533篇
技术理论   1篇
综合类   1277篇
化学工业   85篇
金属工艺   45篇
机械仪表   338篇
建筑科学   185篇
矿业工程   166篇
能源动力   19篇
轻工业   56篇
水利工程   66篇
石油天然气   39篇
武器工业   75篇
无线电   4718篇
一般工业技术   375篇
冶金工业   93篇
原子能技术   20篇
自动化技术   7569篇
  2024年   36篇
  2023年   209篇
  2022年   319篇
  2021年   381篇
  2020年   399篇
  2019年   292篇
  2018年   328篇
  2017年   436篇
  2016年   432篇
  2015年   585篇
  2014年   1026篇
  2013年   894篇
  2012年   1170篇
  2011年   1182篇
  2010年   872篇
  2009年   929篇
  2008年   1005篇
  2007年   1043篇
  2006年   840篇
  2005年   804篇
  2004年   583篇
  2003年   515篇
  2002年   325篇
  2001年   261篇
  2000年   200篇
  1999年   144篇
  1998年   100篇
  1997年   86篇
  1996年   64篇
  1995年   46篇
  1994年   29篇
  1993年   24篇
  1992年   17篇
  1991年   16篇
  1990年   17篇
  1989年   8篇
  1988年   7篇
  1987年   7篇
  1986年   5篇
  1985年   7篇
  1984年   4篇
  1983年   6篇
  1982年   5篇
  1981年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
This paper presents a novel No-Reference Video Quality Assessment (NR-VQA) model that utilizes proposed 3D steerable wavelet transform-based Natural Video Statistics (NVS) features as well as human perceptual features. Additionally, we proposed a novel two-stage regression scheme that significantly improves the overall performance of quality estimation. In the first stage, transform-based NVS and human perceptual features are separately passed through the proposed hybrid regression scheme: Support Vector Regression (SVR) followed by Polynomial curve fitting. The two visual quality scores predicted from the first stage are then used as features for the similar second stage. This predicts the final quality scores of distorted videos by achieving score level fusion. Extensive experiments were conducted using five authentic and four synthetic distortion databases. Experimental results demonstrate that the proposed method outperforms other published state-of-the-art benchmark methods on synthetic distortion databases and is among the top performers on authentic distortion databases. The source code is available at https://github.com/anishVNIT/two-stage-vqa.  相似文献   
2.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)).  相似文献   
3.
With the evolution of video surveillance systems, the requirement of video storage grows rapidly; in addition, safe guards and forensic officers spend a great deal of time observing surveillance videos to find abnormal events. As most of the scene in the surveillance video are redundant and contains no information needs attention, we propose a video condensation method to summarize the abnormal events in the video by rearranging the moving trajectory and sort them by the degree of anomaly. Our goal is to improve the condensation rate to reduce more storage size, and increase the accuracy in abnormal detection. As the trajectory feature is the key to both goals, in this paper, a new method for feature extraction of moving object trajectory is proposed, and we use the SOINN (Self-Organizing Incremental Neural Network) method to accomplish a high accuracy abnormal detection. In the results, our method is able to shirk the video size to 10% storage size of the original video, and achieves 95% accuracy of abnormal event detection, which shows our method is useful and applicable to the surveillance industry.  相似文献   
4.
针对传统大数据特征加密方法中大数据精度较差、加密耗时较长的问题,提出基于信息熵抑制的大数据特征隐匿性加密方法。分析信息熵抑制相关理论,采用信息熵映射函数对大数据分类,将信息熵抑制过程转化为计算2个文件相似性的过程,并根据余弦相似度公式以及Hamming距离值计算数据相似度,完成数据消冗。在完成数据消冗的基础上,分析分组密码方法和ECC加密方法,结合两种方法得到大数据特征隐匿性加密处理计算公式,实现基于信息熵抑制的大数据特征隐匿性加密。实验研究结果表明,所提方法能够有效去除冗余数据,提升大数据精度,加快数据加密的处理速度,高效完成大数据加密过程。  相似文献   
5.
身份基加密(IBE)需要提供一种有效的成员撤销机制,然而,现有可撤销成员的IBE方案存在密钥更新和加密运算量过大的问题,可能使执行该操作的设备成为系统的瓶颈。将完全子树方法和在线离线技术相结合,通过修改指数逆类型IBE的密钥生成和加密算法,提出了一种高效可撤销的身份基在线离线加密方案。方案利用完全子树方法生成更新钥,使得撤销用户无法获得更新钥,进而失去解密能力;利用在线离线技术,将大部分加密运算在离线阶段进行预处理,使得在线阶段仅执行少量简单计算即可生成密文。与相关知名方案相比,该方案不仅提高密钥生成中心的密钥更新的效率,而且极大减少了轻量级设备的在线加密工作量,适合于轻量级设备保护用户隐私信息。  相似文献   
6.
无线体域网中传输的是与生命高度相关的敏感数据,身份认证是信息安全保护的第一道防线。现有的基于人体生物信息的身份认证方案存在信息难提取、偶然性大和误差性大的问题,基于传统密码学的认证方案需较大计算资源和能量消耗,并不适用于无线体域网环境。为此,在动态口令和非对称加密机制基础上,提出一种适用于无线体域网的动态口令双向认证轻量协议,并对其进行形式化分析。通过理论证明、SVO逻辑推理及SPIN模型检测得出:该协议满足双向认证,且能够抵御重放攻击、伪装攻击、拒绝服务器攻击和口令离线攻击,具有较高安全性。  相似文献   
7.
人像智能分析指的是对视频或录像中的人像进行结构化和可视化分析,对目标人物进行性别、年龄、发型等特征的智能识别,这项技术在视频侦查中有极高的应用价值。人像识别早期的算法是通过人工提取特征,通过学习低级视觉特征来针对不同属性进行分类学习,这种基于传统方法的模型表现常常不尽如人意。在计算机视觉领域,通过海量图像数据学习的神经网络比传统方法有更丰富的信息量和特征可以被提取。文章尝试通过深度学习技术训练神经网络模型对行人进行检测和识别,对于衣着不同的行人进行智能识别,具有更好的鲁棒性,提升了视频人像识别的准确率,拓展了人工智能技术在身份识别领域的应用。  相似文献   
8.
尹玉  詹永照  姜震 《计算机应用》2019,39(8):2204-2209
在视频语义检测中,有标记样本不足会严重影响检测的性能,而且伪标签样本中的噪声也会导致集成学习基分类器性能提升不足。为此,提出一种伪标签置信选择的半监督集成学习算法。首先,在三个不同的特征空间上训练出三个基分类器,得到基分类器的标签矢量;然后,引入加权融合样本所属某个类别的最大概率与次大概率的误差和样本所属某个类别的最大概率与样本所属其他各类别的平均概率的误差,作为基分类器的标签置信度,并融合标签矢量和标签置信度得到样本的伪标签和集成置信度;接着,选择集成置信度高的样本加入到有标签的样本集,迭代训练基分类器;最后,采用训练好的基分类器集成协作检测视频语义概念。该算法在实验数据集UCF11上的平均准确率到达了83.48%,与Co-KNN-SVM算法相比,平均准确率提高了3.48个百分点。该算法选择的伪标签能体现样本所属类别与其他类别的总体差异性,又能体现所属类别的唯一性,可减少利用伪标签样本的风险,有效提高视频语义概念检测的准确率。  相似文献   
9.
Across stages of acquisition, second language (L2) competencies are contingent on the variation among individuals learning the language, in both informal and formal learning contexts. This study investigates a group of outliers whose extreme test scores serve as a foundation to examine them as individuals. The study addresses the outliers' characteristics as good L2 readers but poor first language (L1) readers. Combining quantitative (test results, survey, and language logs) and qualitative (focus groups and interviews) data among 21 adolescents in Norway (aged 16–17 years), the study identifies dimensions of individual language use in L1 Norwegian and L2 English. Findings revealed that they explained their English proficiency by the role of interest and their extensive use of English technology and tools outside school. In‐depth analysis identified three profiles: the Gamer, who spends up to 8 hr daily playing online games while using English mainly; the Surfer, who spends hours on the Internet, searching for authentic language situations, commonly involving English; and the Social Media User, who produces and consumes information in English through social media. Additionally, the Gamers read printed novels voluntarily outside the classroom. This study offers unique perspectives and new directions for future L2 research.  相似文献   
10.
对访问控制机制中存在的安全性和有效性的问题进行了研究,提出了基于访问树剪枝的属性加密ATP-ABE(Access Tree Pruning Attribute Based Encryption)的访问控制方案。当ATP-ABE算法需要访问它的树型结构访问策略时,通过剪枝处理访问树结构中包含用户ID属性节点的分支,提高了用户所有者DO(Data Owner)管理和控制属性的效率,更加有效地实现了数据共享。还为访问树结构设计了许可访问属性,使DO仍保留共享数据的关键属性,并且能够完全控制它们的共享数据。基于决策双线性密钥交换算法DBDH(Decisional Bilinear Diffie-Hellman)假设分析了ATP-ABE方案的安全性,研究结果表明与两种经典ABE方案比较,ATP-ABE更加有效地减少了算法的系统设置、私钥生成、密文大小、用户属性撤销以及加解密过程中的计算开销,并给出了定量结论。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号