全文获取类型
收费全文 | 4706篇 |
免费 | 303篇 |
国内免费 | 277篇 |
专业分类
电工技术 | 75篇 |
综合类 | 92篇 |
化学工业 | 49篇 |
金属工艺 | 195篇 |
机械仪表 | 583篇 |
建筑科学 | 107篇 |
矿业工程 | 27篇 |
能源动力 | 17篇 |
轻工业 | 33篇 |
水利工程 | 11篇 |
石油天然气 | 114篇 |
武器工业 | 12篇 |
无线电 | 546篇 |
一般工业技术 | 160篇 |
冶金工业 | 23篇 |
原子能技术 | 5篇 |
自动化技术 | 3237篇 |
出版年
2024年 | 1篇 |
2023年 | 82篇 |
2022年 | 118篇 |
2021年 | 151篇 |
2020年 | 149篇 |
2019年 | 99篇 |
2018年 | 110篇 |
2017年 | 137篇 |
2016年 | 181篇 |
2015年 | 188篇 |
2014年 | 306篇 |
2013年 | 235篇 |
2012年 | 262篇 |
2011年 | 350篇 |
2010年 | 238篇 |
2009年 | 273篇 |
2008年 | 213篇 |
2007年 | 290篇 |
2006年 | 263篇 |
2005年 | 265篇 |
2004年 | 222篇 |
2003年 | 225篇 |
2002年 | 166篇 |
2001年 | 113篇 |
2000年 | 122篇 |
1999年 | 113篇 |
1998年 | 113篇 |
1997年 | 67篇 |
1996年 | 56篇 |
1995年 | 33篇 |
1994年 | 21篇 |
1993年 | 25篇 |
1992年 | 11篇 |
1991年 | 5篇 |
1990年 | 9篇 |
1989年 | 3篇 |
1988年 | 1篇 |
1986年 | 5篇 |
1985年 | 6篇 |
1984年 | 4篇 |
1983年 | 7篇 |
1982年 | 7篇 |
1981年 | 11篇 |
1980年 | 6篇 |
1979年 | 5篇 |
1978年 | 7篇 |
1977年 | 2篇 |
1976年 | 6篇 |
1974年 | 3篇 |
1973年 | 1篇 |
排序方式: 共有5286条查询结果,搜索用时 20 毫秒
1.
Aiming at the performance degradation of the existing presentation attack detection methods due to the illumination variation, a two-stream vision transformers framework (TSViT) based on transfer learning in two complementary spaces is proposed in this paper. The face images of RGB color space and multi-scale retinex with color restoration (MSRCR) space are fed to TSViT to learn the distinguishing features of presentation attack detection. To effectively fuse features from two sources (RGB color space images and MSRCR images), a feature fusion method based on self-attention is built, which can effectively capture the complementarity of two features. Experiments and analysis on Oulu-NPU, CASIA-MFSD, and Replay-Attack databases show that it outperforms most existing methods in intra-database testing and achieves good generalization performance in cross-database testing. 相似文献
2.
3.
针对传统大数据特征加密方法中大数据精度较差、加密耗时较长的问题,提出基于信息熵抑制的大数据特征隐匿性加密方法。分析信息熵抑制相关理论,采用信息熵映射函数对大数据分类,将信息熵抑制过程转化为计算2个文件相似性的过程,并根据余弦相似度公式以及Hamming距离值计算数据相似度,完成数据消冗。在完成数据消冗的基础上,分析分组密码方法和ECC加密方法,结合两种方法得到大数据特征隐匿性加密处理计算公式,实现基于信息熵抑制的大数据特征隐匿性加密。实验研究结果表明,所提方法能够有效去除冗余数据,提升大数据精度,加快数据加密的处理速度,高效完成大数据加密过程。 相似文献
4.
5.
Classification process plays a key role in diagnosing brain tumors. Earlier research works are intended for identifying brain tumors using different classification techniques. However, the False Alarm Rates (FARs) of existing classification techniques are high. To improve the early-stage brain tumor diagnosis via classification the Weighted Correlation Feature Selection Based Iterative Bayesian Multivariate Deep Neural Learning (WCFS-IBMDNL) technique is proposed in this work. The WCFS-IBMDNL algorithm considers medical dataset for classifying the brain tumor diagnosis at an early stage. At first, the WCFS-IBMDNL technique performs Weighted Correlation-Based Feature Selection (WC-FS) by selecting subsets of medical features that are relevant for classification of brain tumors. After completing the feature selection process, the WCFS-IBMDNL technique uses Iterative Bayesian Multivariate Deep Neural Network (IBMDNN) classifier for reducing the misclassification error rate of brain tumor identification. The WCFS-IBMDNL technique was evaluated in JAVA language using Disease Diagnosis Rate (DDR), Disease Diagnosis Time (DDT), and FAR parameter through the epileptic seizure recognition dataset. 相似文献
6.
由于人类语言的复杂性,文本情感分类算法大多都存在因为冗余而造成的词汇量过大的问题。深度信念网络(DBN)通过学习输入语料中的有用信息以及它的几个隐藏层来解决这个问题。然而对于大型应用程序来说,DBN是一个耗时且计算代价昂贵的算法。针对这个问题,提出了一种半监督的情感分类算法,即基于特征选择和深度信念网络的文本情感分类算法(FSDBN)。首先使用特征选择方法(文档频率(DF)、信息增益(IG)、卡方统计(CHI)、互信息(MI))过滤掉一些不相关的特征从而使词汇表的复杂性降低;然后将特征选择的结果输入到DBN中,使得DBN的学习阶段更加高效。将所提算法应用到中文以及维吾尔语中,实验结果表明在酒店评论数据集上,FSDBN在准确率方面比DBN提高了1.6%,在训练时间上比DBN缩短一半。 相似文献
7.
8.
Facial Expression Recognition (FER) is an important subject of human–computer interaction and has long been a research area of great interest. Accurate Facial Expression Sequence Interception (FESI) and discriminative expression feature extraction are two enormous challenges for the video-based FER. This paper proposes a framework of FER for the intercepted video sequences by using feature point movement trend and feature block texture variation. Firstly, the feature points are marked by Active Appearance Model (AAM) and the most representative 24 of them are selected. Secondly, facial expression sequence is intercepted from the face video by determining two key frames whose emotional intensities are minimum and maximum, respectively. Thirdly, the trend curve which represents the Euclidean distance variations between any two selected feature points is fitted, and the slopes of specific points on the trend curve are calculated. Finally, combining Slope Set which is composed by the calculated slopes with the proposed Feature Block Texture Difference (FBTD) which refers to the texture variation of facial patch, the final expressional feature are formed and inputted to One-dimensional Convolution Neural Network (1DCNN) for FER. Five experiments are conducted in this research, and three average FER rates 95.2%, 96.5%, and 97% for Beihang University (BHU) facial expression database, MMI facial expression database, and the combination of two databases, respectively, have shown the significant advantages of the proposed method over the existing ones. 相似文献
9.
The amount and variety of digital data currently being generated, stored and analyzed, including images, videos, and time series, have brought challenges to data administrators, analysts and developers, who struggle to comply with the expectations of both data owners and end users. The majority of the applications demand searching complex data by taking advantage of queries that analyze different aspects of the data, and need the answers in a timely manner. Content-based similarity retrieval techniques are well-suited to handle large databases, because they enable performing queries and analyses using features automatically extracted from the data, without users’ intervention. In this paper, we review and discuss the challenges posed to the database and related communities in order to provide techniques and tools that can meet the variety and veracity characteristics of big and complex data, while also considering the aspects of semantical preservation and completeness of the data. Examples and results obtained over a two-decade-long experience with real applications are presented and discussed. 相似文献
10.