首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21391篇
  免费   2917篇
  国内免费   1885篇
电工技术   708篇
综合类   1326篇
化学工业   560篇
金属工艺   518篇
机械仪表   1674篇
建筑科学   411篇
矿业工程   264篇
能源动力   258篇
轻工业   413篇
水利工程   78篇
石油天然气   445篇
武器工业   282篇
无线电   4852篇
一般工业技术   1460篇
冶金工业   264篇
原子能技术   136篇
自动化技术   12544篇
  2024年   37篇
  2023年   252篇
  2022年   485篇
  2021年   618篇
  2020年   613篇
  2019年   505篇
  2018年   522篇
  2017年   727篇
  2016年   900篇
  2015年   966篇
  2014年   1442篇
  2013年   1263篇
  2012年   1481篇
  2011年   1617篇
  2010年   1373篇
  2009年   1412篇
  2008年   1431篇
  2007年   1598篇
  2006年   1415篇
  2005年   1262篇
  2004年   1058篇
  2003年   1031篇
  2002年   775篇
  2001年   568篇
  2000年   480篇
  1999年   424篇
  1998年   376篇
  1997年   330篇
  1996年   214篇
  1995年   182篇
  1994年   145篇
  1993年   103篇
  1992年   81篇
  1991年   59篇
  1990年   58篇
  1989年   47篇
  1988年   43篇
  1987年   16篇
  1986年   29篇
  1985年   40篇
  1984年   36篇
  1983年   45篇
  1982年   26篇
  1981年   31篇
  1980年   19篇
  1979年   17篇
  1978年   13篇
  1977年   6篇
  1976年   8篇
  1973年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
In this paper, the feature representation of an image by CNN is used to hide the secret image into the cover image. The style of the cover image hides the content of the secret image and produce a stego image using Neural Style Transfer (NST) algorithm, which resembles the cover image and also contains the semantic content of secret image. The main technical contributions are to hide the content of the secret image in the in-between hidden layered style features of the cover image, which is the first of its kind in the present state-of-art-technique. Also, to recover the secret image from the stego image, destylization is done with the help of conditional generative adversarial networks (GANs) using Residual in Residual Dense Blocks (RRDBs). Further, stego images from different layer combinations of content and style features are obtained and evaluated. Evaluation is based on the visual similarity and quality loss between the cover-stego pair and the secret-reconstructed secret pair of images. From the experiments, it has been observed that the proposed algorithm has 43.95 dB Peak Signal-to-Noise Ratio (PSNR)), .995 Structural Similarity Index (SSIM), and .993 Visual Information Fidelity (VIF) for the ImageNet dataset. The proposed algorithm is found to be more robust against StegExpose than the traditional methods.  相似文献   
2.
A novel image sequence-based risk behavior detection method to achieve high-precision risk behavior detection for power maintenance personnel is proposed in this paper. In this method, the original image sequence data is first separated from the foreground and background. Then, the free anchor frame detection method is used in the foreground image to detect the personnel and correct their direction. Finally, human posture nodes are extracted from each frame of the image sequence, which are then used to identify the abnormal behavior of the human. Simulation experiment results demonstrate that the proposed algorithm has significant advantages in terms of the accuracy of human posture node detection and risk behavior identification.  相似文献   
3.
4.
Interface shear strength of geosynthetic clay liners (GCL) with the sand particles is predominantly influenced by the surface characteristics of the GCL, size and shape of the sand particles and their interaction mechanisms. This study brings out the quantitative effects of particle shape on the interaction mechanisms and shear strength of GCL-sand interfaces. Interface direct shear tests are conducted on GCL in contact with a natural sand and a manufactured sand of identical gradation, eliminating the particle size effects. Results showed that manufactured sand provides effective particle-fiber interlocking compared to river sand, due to the favorable shape of its grains. Further, the role of particle shape on the hydration of GCL is investigated through interface shear tests on GCL-sand interfaces at different water contents. Bentonite hydration is found to be less in tests with manufactured sand, leading to better interface shear strength. Grain shape parameters of sands, surface changes related to hydration and particle entrapment in GCL are quantified through image analysis on sands and tested GCL surfaces. It is observed that the manufactured sand provides higher interface shear strength and causes lesser hydration related damages to GCL, owing to its angular particles and low permeability.  相似文献   
5.
The muon radiography imaging technique for high-atomic-number objects(Z) and large-volume objects via muon transmission imaging and muon multiple scattering imaging remains a popular topic in the field of radiation detection imaging. However, few imaging studies have been reported on low and medium Z objects at the centimeter scale. This paper presents an imaging system that consists of three layers of a position-sensitive detector and four plastic scintillation detectors. It acquires data by co...  相似文献   
6.
为了探讨在安卓平台上构建医用图像采集系统的开发个案,分析通过以智能手机、平板电脑为核心安卓设备通过拍照获得化验单数据后进行文本识别并提交智慧医疗系统的解决方案。本文首先通过二值化算法形成低阈值图像数据,使用卷积神经元网络算法对文本进行逐一识别,使用K-means算法对识别后的单字文本进行字段记录值的整合并形成元数据库服务于其他智慧医疗系统模块。在使用9000组数据对神经元网络进行前期训练的前提下,该系统的识别准确率达到了99.5%以上。本系统具有一定的可行性,对未来智慧医疗的系统开发有实践意义。  相似文献   
7.
To save bandwidth and storage space as well as speed up data transmission, people usually perform lossy compression on images. Although the JPEG standard is a simple and effective compression method, it usually introduces various visually unpleasing artifacts, especially the notorious blocking artifacts. In recent years, deep convolutional neural networks (CNNs) have seen remarkable development in compression artifacts reduction. Despite the excellent performance, most deep CNNs suffer from heavy computation due to very deep and wide architectures. In this paper, we propose an enhanced wide-activated residual network (EWARN) for efficient and accurate image deblocking. Specifically, we propose an enhanced wide-activated residual block (EWARB) as basic construction module. Our EWARB gives rise to larger activation width, better use of interdependencies among channels, and more informative and discriminative non-linearity activation features without more parameters than residual block (RB) and wide-activated residual block (WARB). Furthermore, we introduce an overlapping patches extraction and combination (OPEC) strategy into our network in a full convolution way, leading to large receptive field, enforced compatibility among adjacent blocks, and efficient deblocking. Extensive experiments demonstrate that our EWARN outperforms several state-of-the-art methods quantitatively and qualitatively with relatively small model size and less running time, achieving a good trade-off between performance and complexity.  相似文献   
8.
With the deepening of social information, the panoramic image has drawn a significant interest of viewers and researchers as it can provide a very wide field of view (FoV). Since panoramic images are usually obtained by capturing images with the overlapping regions and then stitching them together, image stitching plays an important role in generating panoramic images. In order to effectively evaluate the quality of stitched images, a novel quality assessment method based on bi-directional matching is proposed for stitched images. Specifically, dense correspondences between the testing and benchmark stitched images are first established by bi-directional SIFT-flow matching. Then, color-aware, geometric-aware and structure-aware features are respectively extracted and fused via support vector regression (SVR) to obtain the final quality score. Experiments on our newly constructed database and ISIQA database demonstrate that the proposed method can achieve comparable performance compared with the conventional blind quality metrics and the quality metrics specially designed for stitched images.  相似文献   
9.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)).  相似文献   
10.
概述了侧围加强内框总成与周边零件的匹配关系,从检具操作的人机工程出发,描述了侧围加强内框总成检具的2种定位方式和结构设计,对比了2种定位方式对于检测结果的影响,总结了其优点和弊端,结果表明侧围加强内框总成检具采用车内方向朝下的定位方式效果更好。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号