首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1717篇
  免费   113篇
  国内免费   81篇
电工技术   23篇
综合类   72篇
化学工业   133篇
金属工艺   78篇
机械仪表   52篇
建筑科学   79篇
矿业工程   19篇
能源动力   13篇
轻工业   190篇
水利工程   5篇
石油天然气   36篇
武器工业   4篇
无线电   275篇
一般工业技术   45篇
冶金工业   84篇
原子能技术   47篇
自动化技术   756篇
  2023年   11篇
  2022年   14篇
  2021年   28篇
  2020年   40篇
  2019年   19篇
  2018年   31篇
  2017年   40篇
  2016年   61篇
  2015年   62篇
  2014年   146篇
  2013年   121篇
  2012年   127篇
  2011年   166篇
  2010年   91篇
  2009年   105篇
  2008年   85篇
  2007年   99篇
  2006年   98篇
  2005年   77篇
  2004年   67篇
  2003年   73篇
  2002年   60篇
  2001年   50篇
  2000年   38篇
  1999年   37篇
  1998年   33篇
  1997年   18篇
  1996年   20篇
  1995年   18篇
  1994年   16篇
  1993年   26篇
  1992年   11篇
  1991年   6篇
  1990年   4篇
  1989年   2篇
  1988年   4篇
  1987年   1篇
  1986年   1篇
  1984年   4篇
  1979年   1篇
排序方式: 共有1911条查询结果,搜索用时 31 毫秒
1.
2.
3.
A double optimal projection method that involves projections for intra-cluster and inter-cluster dimensionality reduction are proposed for video fingerprinting. The video is initially set as a graph with frames as its vertices in a high-dimensional space. A similarity measure that can compute the weights of the edges is then proposed. Subsequently, the video frames are partitioned into different clusters based on the graph model. Double optimal projection is used to explore the optimal mapping points in a low-dimensional space to reduce the video dimensions. The statistics and geometrical fingerprints are generated to determine whether a query video is copied from one of the videos in the database. During matching, the video can be roughly matched by utilizing the statistics fingerprint. Further matching is thereafter performed in the corresponding group using geometrical fingerprints. Experimental results show the good performance of the proposed video fingerprinting method in robustness and discrimination.  相似文献   
4.
In this paper, we propose content adaptive denoising in highly corrupted videos based on human visual perception. We introduce the human visual perception in video denoising to achieve good performance. In general, smooth regions corrupted by noise are much more annoying to human observers than complex regions. Moreover, human eyes are more interested in complex regions with image details and more sensitive to luminance than chrominance. Based on the human visual perception, we perform perceptual video denoising to effectively preserve image details and remove annoying noise. To successfully remove noise and recover the image details, we extend nonlocal mean filtering to the spatiotemporal domain. With the guidance of content adaptive segmentation and motion detection, we conduct content adaptive filtering in the YUV color space to consider context in images and obtain perceptually pleasant results. Extensive experiments on various video sequences demonstrate that the proposed method reconstructs natural-looking results even in highly corrupted images and achieves good performance in terms of both visual quality and quantitative measures.  相似文献   
5.
Cloud computing has become the real trend of enterprise IT service model that offers cost-effective and scalable processing. Meanwhile, Software-Defined Networking (SDN) is gaining popularity in enterprise networks for flexibility in network management service and reduced operational cost. There seems a trend for the two technologies to go hand-in-hand in providing an enterprise’s IT services. However, the new challenges brought by the marriage of cloud computing and SDN, particularly the implications on enterprise network security, have not been well understood. This paper sets to address this important problem.We start by examining the security impact, in particular, the impact on DDoS attack defense mechanisms, in an enterprise network where both technologies are adopted. We find that SDN technology can actually help enterprises to defend against DDoS attacks if the defense architecture is designed properly. To that end, we propose a DDoS attack mitigation architecture that integrates a highly programmable network monitoring to enable attack detection and a flexible control structure to allow fast and specific attack reaction. To cope with the new architecture, we propose a graphic model based attack detection system that can deal with the dataset shift problem. The simulation results show that our architecture can effectively and efficiently address the security challenges brought by the new network paradigm and our attack detection system can effectively report various attacks using real-world network traffic.  相似文献   
6.
采用结合粉末工艺的两步法搅拌摩擦加工制备石墨烯增强铝基复合材料,研究了石墨烯添加量对复合材料力学性能和导电性能的影响。结果表明,石墨烯的添加对铝基复合材料性能有明显的影响,随石墨烯添加量增加,复合材料的硬度逐渐提高、塑性持续下降,而抗拉强度和电导率均呈先增后减的趋势。石墨烯体积分数为3.7%时,复合材料的抗拉强度最高,达到146.5 MPa,与同等加工条件下的纯铝相比,提高了78.7%,而石墨烯体积分数为1.3%时,复合材料的电导率最高,达到30.62 MS/m,较同等加工条件下的纯铝基体提高了53.4%。  相似文献   
7.
Frequent content retrieval leads to significant energy consumption in cellular networks. Thereby, device-to-device (D2D) communication is used for proximal content delivery. Be aware that social friends may have common content interests, D2D content delivery is further improved by considering social network. However, how to implement efficient D2D multicast with the aid of social relationship needs further consideration. In this paper, with a proposed architecture on combined networks, the cooperation range of content sharing is investigated for D2D multicast to minimize the average energy consumption of serving a content request. Based on combined networks, a cooperation group formation scheme is proposed. Simulation results verify our analyzes and the advantage of proposed scheme.  相似文献   
8.
采用光学显微镜、扫描电镜、万能拉伸机、显微硬度计等手段研究了不同Fe含量对热挤压再生铝合金组织和性能的影响,并探讨富Fe相形态演变机制。结果表明,Fe含量的增加有利于抑制再生铝晶粒尺寸的长大。随着Fe含量增加,晶粒尺寸逐渐减小,减小幅度达25%。热挤压后再生铝中富Fe相发生了折断和破碎,并沿着挤压方向呈带状分布。随着Fe含量增加,富Fe相的面积分数和平均长度均逐渐提高,当Fe含量分别为0.10%~1.24%时,面积分数和平均长度增长最快;而富Fe相的圆整度则随Fe含量的增加稍有降低。同时,再生铝的抗拉强度、屈服强度和伸长率均随着Fe含量的增加呈现逐渐降低的趋势,最大降低幅度分别为10.4%、23.2%和46.0%,而显微硬度则逐渐提高,最大提高幅度为21.7%。断口形貌也由纯韧性断裂转变为混合型断裂模式。  相似文献   
9.
Many organizations struggle to meaningfully engage with their stakeholders on political, societal and environmental topics via social media. Often such discourses unravel into splintered and negative conversations, raising the question whether organizations can and should exercise some level of control and ‘steering’ in these conversations and, if so, how stakeholders would react to such ‘top down’ moderation. Existing studies lack empirical insights into the impacts of different levels of moderation in social media conversations on stakeholder attitudes. Two experimental studies were developed to test the effect of different levels of organizational moderation on stakeholder attitudes towards organizations. We show that increased levels of moderation negatively affect attitudes towards an organization, satisfaction with an organization's performance, and trust in the organization. Increased moderation also significantly undermines beliefs in the commitment of the organization to its stakeholders and control mutuality. This paper extends recent qualitative attempts to build new theory around stakeholder dialogues on social media by testing the effects of varying levels of moderation in such dialogues.  相似文献   
10.
In this digitalised world, crossing boundaries between life domains is becoming increasingly easy. We are constantly faced with the need to define whether we are online or offline, and technology management is now an integral part of daily life. Technology management, which is affected by the individual's networking position, has different components: connectivity management, online self-presentation and privacy management. The objective of this study is to explore technology management strategies among working adult students. The study identifies three networking positions: socio-affective enthusiasts, context-contingent pragmatists and pragmatic avoiders. These three groups have specific approaches to technology management.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号