首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14672篇
  免费   2061篇
  国内免费   1469篇
电工技术   256篇
技术理论   1篇
综合类   823篇
化学工业   199篇
金属工艺   76篇
机械仪表   268篇
建筑科学   87篇
矿业工程   73篇
能源动力   213篇
轻工业   98篇
水利工程   49篇
石油天然气   19篇
武器工业   9篇
无线电   2929篇
一般工业技术   552篇
冶金工业   11篇
原子能技术   11篇
自动化技术   12528篇
  2024年   30篇
  2023年   384篇
  2022年   758篇
  2021年   844篇
  2020年   831篇
  2019年   615篇
  2018年   687篇
  2017年   1295篇
  2016年   1181篇
  2015年   1029篇
  2014年   1596篇
  2013年   1130篇
  2012年   1395篇
  2011年   1468篇
  2010年   916篇
  2009年   1063篇
  2008年   549篇
  2007年   809篇
  2006年   674篇
  2005年   296篇
  2004年   114篇
  2003年   91篇
  2002年   123篇
  2001年   115篇
  2000年   91篇
  1999年   49篇
  1998年   12篇
  1997年   8篇
  1996年   13篇
  1995年   4篇
  1994年   7篇
  1993年   10篇
  1992年   2篇
  1991年   2篇
  1990年   4篇
  1989年   1篇
  1986年   1篇
  1983年   1篇
  1980年   1篇
  1977年   1篇
  1976年   1篇
  1975年   1篇
排序方式: 共有10000条查询结果,搜索用时 78 毫秒
1.
Recent generative adversarial networks (GANs) have yielded remarkable performance in face image synthesis. GAN inversion embeds an image into the latent space of a pretrained generator, enabling it to be used for real face manipulation. However, current inversion approaches for real faces suffer the dilemma of initialization collapse and identity loss. In this paper, we propose a hierarchical GAN inversion for real faces with identity preservation based on mutual information maximization. We first use a facial domain guaranteed initialization to avoid the initialization collapse. Furthermore, we prove that maximizing the mutual information between inverted faces and their identities is equivalent to minimizing the distance between identity features from inverted and original faces. Optimization for real face inversion with identity preservation is implemented on this mutual information-maximizing constraint. Extensive experimental results show that our approach outperforms state-of-the-art solutions for inverting and editing real faces, particularly in terms of face identity preservation.  相似文献   
2.
3.
In the present paper, therapeutic treatment of infected tumorous cells has been studied through mathematical modeling and simulation of heat transfer in tissues by using a nonlinear dual-phase lag bioheat transfer model with Dirichlet boundary condition. The components of volumetric heat source in this model such as blood perfusion and metabolism are assumed experimentally validated temperature-dependent function, which gives more accurate temperature distribution in tissues through this model. We have used the finite difference and RK (4, 5) techniques of numerical methods to solve the proposed problem and obtained the exact solution in a particular case. After comparison, we got a good agreement between them. We have used dimensionless quantities throughout this paper. The effect of relaxation and thermalization time with respect to dimensionless temperature distribution has been analyzed in the treatment process.  相似文献   
4.
Efficient electricity price forecasting plays a significant role in our society. In this paper, a novel influencer-defaulter mutation (IDM) mutation operator has been proposed. The IDM operator has been combined with six well-known optimization algorithms to create mutated optimization algorithms whose performance has been tested on twenty-four standard benchmark functions. Further, the artificial neural network is integrated with mutated optimization algorithms to solve the electricity price prediction problem. The policymakers can identify appropriate variables based on the predicted prices to help future market planning. The statistical results prove the efficacy of the IDM operator on the recent optimization algorithms.  相似文献   
5.
Wireless Personal Communications - The Internet of Medical Things (IoMT) is the array of medical instruments and related technologies that link Information Technology (IT) systems in...  相似文献   
6.
提出了一种新的基于SSD网络的眨眼与打哈欠检测。首先,对原SSD架构进行四个方面的修改。第一,主干网用MobileNetV3替换了VGG,使得架构尺寸缩减三分之一。第二,重新设计了输出检测器,实现了目标检测与分类、目标定位与高宽比回归多任务的融合。第三,网络直接回归高宽比,比传统的从关键点离线计算高宽比的方法鲁棒性要高。第四,省去了非最大抑制层(NMS)中的重叠度(IOU)计算和阈值设定,使得单目标检测速度提高了40%。另外,在数据集YawDD上验证了所提出方法的有效性,眨眼与打哈欠的测全率为95.1%与100.0%,在单卡2080Ti上实现了41fps的高检测速度。  相似文献   
7.
Joint photographic experts group (JPEG) can provide good quality with small file size but also eliminate extensively the redundancies of images. Therefore, hiding data into JPEG images in terms of maintaining high visual quality at small file sizes has been a great challenge for researchers. In this paper, an adaptive reversible data hiding method for JPEG images containing multiple two-dimensional (2D) histograms is proposed. Adaptability is mainly reflected in three aspects. The first one is to preferentially select sharper histograms for data embedding after K histograms are established by constructing the kth (k{1,2,,K}) histogram using the kth non-zero alternating current (AC) coefficient of all the quantized discrete cosine transform blocks. On the other hand, to fully exploit the strong correlation between coefficients of one histogram, the smoothness of each coefficient is estimated by a block smoothness estimator so that a sharply-distributed 2D-histogram is constructed by combining two coefficients with similar smoothness into a pair. The pair corresponding to low complexity is selected priorly for data embedding, leading to high embedding performance while maintaining low file size. Besides, we design multiple embedding strategies to adaptively select the embedding strategy for each 2D histogram. Experimental results demonstrate that the proposed method can achieve higher rate–distortion performance which maintaining lower file storage space, compared with previous studies.  相似文献   
8.
Mixed reality can overlay and display 3D digital content in the real world, convey abstract concepts to users, and promote the understanding of complex tasks. However, the abstract graphics overlaid on the physical space may cause a certain cognitive load for local users and reduce the efficiency of collaboration. To improve the efficiency of remote collaboration, we conducted an elicitation study on assembly tasks, explored the user needs for collaboration, and defined the design goals of our remote collaboration method. Inspired by the mirror-neuron mechanism, we present an imitative collaboration method that allows local users to imitate the interaction behavior of remote users to complete tasks. We also propose a series of interaction methods for remote users to select, copy, and interact with the local point clouds to facilitate the expression of collaboration intentions. Finally, the results of a user study evaluating our imitative collaboration method on assembly tasks are reported, confirming that our method improves collaboration efficiency while reducing the cognitive load of local users.  相似文献   
9.
Fine-grained few-shot learning is a difficult task in image classification. The reason is that the discriminative features of fine-grained images are often located in local areas of the image, while most of the existing few-shotlearning image classification methods only use top-level features and adopt a single measure. In that way, the localfeatures of the sample cannot be learned well. In response to this problem, ensemble relation network with multi-level measure (ERN-MM) is proposed in this paper. It adds the relation modules in the shallow feature space tocompare the similarity between the samples in the local features, and finally integrates the similarity scores from thefeature spaces to assign the label of the query samples. So the proposed method ERN-MM can use local details andglobal information of different grains. Experimental results on different fine-grained datasets show that the proposedmethod achieves good classification performance and also proves its rationality.  相似文献   
10.
Zhang  Jiawei  Li  Chen  Rahaman  Md Mamunur  Yao  Yudong  Ma  Pingli  Zhang  Jinghua  Zhao  Xin  Jiang  Tao  Grzegorzek  Marcin 《Artificial Intelligence Review》2022,55(4):2875-2944

Microorganisms such as bacteria and fungi play essential roles in many application fields, like biotechnique, medical technique and industrial domain. Microorganism counting techniques are crucial in microorganism analysis, helping biologists and related researchers quantitatively analyze the microorganisms and calculate their characteristics, such as biomass concentration and biological activity. However, traditional microorganism manual counting methods, such as plate counting method, hemocytometry and turbidimetry, are time-consuming, subjective and need complex operations, which are difficult to be applied in large-scale applications. In order to improve this situation, image analysis is applied for microorganism counting since the 1980s, which consists of digital image processing, image segmentation, image classification and suchlike. Image analysis-based microorganism counting methods are efficient comparing with traditional plate counting methods. In this article, we have studied the development of microorganism counting methods using digital image analysis. Firstly, the microorganisms are grouped as bacteria and other microorganisms. Then, the related articles are summarized based on image segmentation methods. Each part of the article is reviewed by methodologies. Moreover, commonly used image processing methods for microorganism counting are summarized and analyzed to find common technological points. More than 144 papers are outlined in this article. In conclusion, this paper provides new ideas for the future development trend of microorganism counting, and provides systematic suggestions for implementing integrated microorganism counting systems in the future. Researchers in other fields can refer to the techniques analyzed in this paper.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号