首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15055篇
  免费   1814篇
  国内免费   1356篇
电工技术   231篇
综合类   684篇
化学工业   235篇
金属工艺   88篇
机械仪表   228篇
建筑科学   92篇
矿业工程   33篇
能源动力   222篇
轻工业   71篇
水利工程   6篇
石油天然气   19篇
武器工业   11篇
无线电   3196篇
一般工业技术   550篇
冶金工业   24篇
原子能技术   22篇
自动化技术   12513篇
  2024年   49篇
  2023年   389篇
  2022年   695篇
  2021年   850篇
  2020年   919篇
  2019年   663篇
  2018年   746篇
  2017年   1576篇
  2016年   1567篇
  2015年   1201篇
  2014年   1783篇
  2013年   1038篇
  2012年   1230篇
  2011年   1105篇
  2010年   858篇
  2009年   939篇
  2008年   403篇
  2007年   635篇
  2006年   472篇
  2005年   274篇
  2004年   110篇
  2003年   146篇
  2002年   147篇
  2001年   154篇
  2000年   107篇
  1999年   107篇
  1998年   4篇
  1997年   9篇
  1996年   7篇
  1995年   3篇
  1994年   4篇
  1992年   4篇
  1991年   3篇
  1990年   1篇
  1989年   5篇
  1987年   2篇
  1985年   1篇
  1984年   2篇
  1982年   2篇
  1981年   2篇
  1979年   4篇
  1978年   3篇
  1977年   2篇
  1976年   1篇
  1974年   2篇
  1972年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Recent generative adversarial networks (GANs) have yielded remarkable performance in face image synthesis. GAN inversion embeds an image into the latent space of a pretrained generator, enabling it to be used for real face manipulation. However, current inversion approaches for real faces suffer the dilemma of initialization collapse and identity loss. In this paper, we propose a hierarchical GAN inversion for real faces with identity preservation based on mutual information maximization. We first use a facial domain guaranteed initialization to avoid the initialization collapse. Furthermore, we prove that maximizing the mutual information between inverted faces and their identities is equivalent to minimizing the distance between identity features from inverted and original faces. Optimization for real face inversion with identity preservation is implemented on this mutual information-maximizing constraint. Extensive experimental results show that our approach outperforms state-of-the-art solutions for inverting and editing real faces, particularly in terms of face identity preservation.  相似文献   
2.
3.
Efficient electricity price forecasting plays a significant role in our society. In this paper, a novel influencer-defaulter mutation (IDM) mutation operator has been proposed. The IDM operator has been combined with six well-known optimization algorithms to create mutated optimization algorithms whose performance has been tested on twenty-four standard benchmark functions. Further, the artificial neural network is integrated with mutated optimization algorithms to solve the electricity price prediction problem. The policymakers can identify appropriate variables based on the predicted prices to help future market planning. The statistical results prove the efficacy of the IDM operator on the recent optimization algorithms.  相似文献   
4.
Li  Miao  Xiong  Naixue  Zhang  Yin  Hu  Ying 《Mobile Networks and Applications》2022,27(4):1768-1777
Mobile Networks and Applications - With the rapid development of Internet of things, the traditional city model is no longer applicable. Therefore, the emerging concept of smart city meets the...  相似文献   
5.
Wireless Personal Communications - The Internet of Medical Things (IoMT) is the array of medical instruments and related technologies that link Information Technology (IT) systems in...  相似文献   
6.
Wireless Networks - In centralized video streaming platforms, the platform owner, rather than the content producer, controls most of the content uploaded on the centralized video...  相似文献   
7.
Joint photographic experts group (JPEG) can provide good quality with small file size but also eliminate extensively the redundancies of images. Therefore, hiding data into JPEG images in terms of maintaining high visual quality at small file sizes has been a great challenge for researchers. In this paper, an adaptive reversible data hiding method for JPEG images containing multiple two-dimensional (2D) histograms is proposed. Adaptability is mainly reflected in three aspects. The first one is to preferentially select sharper histograms for data embedding after K histograms are established by constructing the kth (k{1,2,,K}) histogram using the kth non-zero alternating current (AC) coefficient of all the quantized discrete cosine transform blocks. On the other hand, to fully exploit the strong correlation between coefficients of one histogram, the smoothness of each coefficient is estimated by a block smoothness estimator so that a sharply-distributed 2D-histogram is constructed by combining two coefficients with similar smoothness into a pair. The pair corresponding to low complexity is selected priorly for data embedding, leading to high embedding performance while maintaining low file size. Besides, we design multiple embedding strategies to adaptively select the embedding strategy for each 2D histogram. Experimental results demonstrate that the proposed method can achieve higher rate–distortion performance which maintaining lower file storage space, compared with previous studies.  相似文献   
8.
Knowledge distillation has become a key technique for making smart and light-weight networks through model compression and transfer learning. Unlike previous methods that applied knowledge distillation to the classification task, we propose to exploit the decomposition-and-replacement based distillation scheme for depth estimation from a single RGB color image. To do this, Laplacian pyramid-based knowledge distillation is firstly presented in this paper. The key idea of the proposed method is to transfer the rich knowledge of the scene depth, which is well encoded through the teacher network, to the student network in a structured way by decomposing it into the global context and local details. This is fairly desirable for the student network to restore the depth layout more accurately with limited resources. Moreover, we also propose a new guidance concept for knowledge distillation, so-called ReplaceBlock, which replaces blocks randomly selected in the decoded feature of the student network with those of the teacher network. Our ReplaceBlock gives a smoothing effect in learning the feature distribution of the teacher network by considering the spatial contiguity in the feature space. This process is also helpful to clearly restore the depth layout without the significant computational cost. Based on various experimental results on benchmark datasets, the effectiveness of our distillation scheme for monocular depth estimation is demonstrated in details. The code and model are publicly available at : https://github.com/tjqansthd/Lap_Rep_KD_Depth.  相似文献   
9.
Mixed reality can overlay and display 3D digital content in the real world, convey abstract concepts to users, and promote the understanding of complex tasks. However, the abstract graphics overlaid on the physical space may cause a certain cognitive load for local users and reduce the efficiency of collaboration. To improve the efficiency of remote collaboration, we conducted an elicitation study on assembly tasks, explored the user needs for collaboration, and defined the design goals of our remote collaboration method. Inspired by the mirror-neuron mechanism, we present an imitative collaboration method that allows local users to imitate the interaction behavior of remote users to complete tasks. We also propose a series of interaction methods for remote users to select, copy, and interact with the local point clouds to facilitate the expression of collaboration intentions. Finally, the results of a user study evaluating our imitative collaboration method on assembly tasks are reported, confirming that our method improves collaboration efficiency while reducing the cognitive load of local users.  相似文献   
10.
In the present era of machines and edge-cutting technologies, still document frauds persist. They are done intuitively by using almost identical inks, that it becomes challenging to detect them—this demands an approach that efficiently investigates the document and leaves it intact. Hyperspectral imaging is one such a type of approach that captures the images from hundreds to thousands of spectral bands and analyzes the images through their spectral and spatial features, which is not possible by conventional imaging. Deep learning is an edge-cutting technology known for solving critical problems in various domains. Utilizing supervised learning imposes constraints on its usage in real scenarios, as the inks used in forgery are not known prior. Therefore, it is beneficial to use unsupervised learning. An unsupervised feature extraction through a Convolutional Autoencoder (CAE) followed by Logistic Regression (LR) for classification is proposed (CAE-LR). Feature extraction is evolved around spectral bands, spatial patches, and spectral-spatial patches. We inspected the impact of spectral, spatial, and spectral-spatial features by mixing inks in equal and unequal proportion using CAE-LR on the UWA writing ink hyperspectral images dataset for blue and black inks. Hyperspectral images are captured at multiple correlated spectral bands, resulting in information redundancy handled by restoring certain principal components. The proposed approach is compared with eight state-of-art approaches used by the researchers. The results depicted that by using the combination of spectral and spatial patches, the classification accuracy enhanced by 4.85% for black inks and 0.13% for blue inks compared to state-of-art results. In the present scenario, the primary area concern is to identify and detect the almost similar inks used in document forgery, are efficiently managed by the proposed approach.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号