首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11299篇
  免费   992篇
  国内免费   572篇
电工技术   113篇
综合类   304篇
化学工业   293篇
金属工艺   332篇
机械仪表   885篇
建筑科学   220篇
矿业工程   60篇
能源动力   60篇
轻工业   225篇
水利工程   28篇
石油天然气   40篇
武器工业   69篇
无线电   2465篇
一般工业技术   802篇
冶金工业   37篇
原子能技术   93篇
自动化技术   6837篇
  2024年   6篇
  2023年   116篇
  2022年   146篇
  2021年   287篇
  2020年   262篇
  2019年   174篇
  2018年   193篇
  2017年   291篇
  2016年   406篇
  2015年   391篇
  2014年   685篇
  2013年   552篇
  2012年   594篇
  2011年   754篇
  2010年   564篇
  2009年   628篇
  2008年   651篇
  2007年   791篇
  2006年   742篇
  2005年   696篇
  2004年   633篇
  2003年   630篇
  2002年   496篇
  2001年   349篇
  2000年   297篇
  1999年   280篇
  1998年   255篇
  1997年   220篇
  1996年   148篇
  1995年   114篇
  1994年   81篇
  1993年   61篇
  1992年   49篇
  1991年   36篇
  1990年   31篇
  1989年   26篇
  1988年   27篇
  1987年   13篇
  1986年   20篇
  1985年   31篇
  1984年   21篇
  1983年   31篇
  1982年   17篇
  1981年   24篇
  1980年   16篇
  1979年   9篇
  1978年   8篇
  1977年   2篇
  1974年   2篇
  1973年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
In this paper, the feature representation of an image by CNN is used to hide the secret image into the cover image. The style of the cover image hides the content of the secret image and produce a stego image using Neural Style Transfer (NST) algorithm, which resembles the cover image and also contains the semantic content of secret image. The main technical contributions are to hide the content of the secret image in the in-between hidden layered style features of the cover image, which is the first of its kind in the present state-of-art-technique. Also, to recover the secret image from the stego image, destylization is done with the help of conditional generative adversarial networks (GANs) using Residual in Residual Dense Blocks (RRDBs). Further, stego images from different layer combinations of content and style features are obtained and evaluated. Evaluation is based on the visual similarity and quality loss between the cover-stego pair and the secret-reconstructed secret pair of images. From the experiments, it has been observed that the proposed algorithm has 43.95 dB Peak Signal-to-Noise Ratio (PSNR)), .995 Structural Similarity Index (SSIM), and .993 Visual Information Fidelity (VIF) for the ImageNet dataset. The proposed algorithm is found to be more robust against StegExpose than the traditional methods.  相似文献   
2.
A novel image sequence-based risk behavior detection method to achieve high-precision risk behavior detection for power maintenance personnel is proposed in this paper. In this method, the original image sequence data is first separated from the foreground and background. Then, the free anchor frame detection method is used in the foreground image to detect the personnel and correct their direction. Finally, human posture nodes are extracted from each frame of the image sequence, which are then used to identify the abnormal behavior of the human. Simulation experiment results demonstrate that the proposed algorithm has significant advantages in terms of the accuracy of human posture node detection and risk behavior identification.  相似文献   
3.
Interface shear strength of geosynthetic clay liners (GCL) with the sand particles is predominantly influenced by the surface characteristics of the GCL, size and shape of the sand particles and their interaction mechanisms. This study brings out the quantitative effects of particle shape on the interaction mechanisms and shear strength of GCL-sand interfaces. Interface direct shear tests are conducted on GCL in contact with a natural sand and a manufactured sand of identical gradation, eliminating the particle size effects. Results showed that manufactured sand provides effective particle-fiber interlocking compared to river sand, due to the favorable shape of its grains. Further, the role of particle shape on the hydration of GCL is investigated through interface shear tests on GCL-sand interfaces at different water contents. Bentonite hydration is found to be less in tests with manufactured sand, leading to better interface shear strength. Grain shape parameters of sands, surface changes related to hydration and particle entrapment in GCL are quantified through image analysis on sands and tested GCL surfaces. It is observed that the manufactured sand provides higher interface shear strength and causes lesser hydration related damages to GCL, owing to its angular particles and low permeability.  相似文献   
4.
机器视觉技术依靠非接触、获取信息丰富的特点,在煤矿智能化的进程中得到了广泛应用,同时在煤炭开采中,掘进机的位姿检测有利于掘进机的自动化以及智能化操作进而有利于煤矿智能化进程的推进,不仅能缓解采掘失衡的矛盾,同时能降低工人的劳动强度,本文分析了近几年来机器视觉技术在掘进机位姿检测中的应用现状与趋势,研究了各种掘进机位姿检测方法中所涉及的图像预处理以及位姿检测模型的关键共性问题,并就关键共性问题,提出了机器视觉技术在掘进机位姿检测的应用中,应在图像采集硬件、位姿检测的冗余性以及特征提取的精确性方面做出突破。  相似文献   
5.
The muon radiography imaging technique for high-atomic-number objects(Z) and large-volume objects via muon transmission imaging and muon multiple scattering imaging remains a popular topic in the field of radiation detection imaging. However, few imaging studies have been reported on low and medium Z objects at the centimeter scale. This paper presents an imaging system that consists of three layers of a position-sensitive detector and four plastic scintillation detectors. It acquires data by co...  相似文献   
6.
为了探讨在安卓平台上构建医用图像采集系统的开发个案,分析通过以智能手机、平板电脑为核心安卓设备通过拍照获得化验单数据后进行文本识别并提交智慧医疗系统的解决方案。本文首先通过二值化算法形成低阈值图像数据,使用卷积神经元网络算法对文本进行逐一识别,使用K-means算法对识别后的单字文本进行字段记录值的整合并形成元数据库服务于其他智慧医疗系统模块。在使用9000组数据对神经元网络进行前期训练的前提下,该系统的识别准确率达到了99.5%以上。本系统具有一定的可行性,对未来智慧医疗的系统开发有实践意义。  相似文献   
7.
To save bandwidth and storage space as well as speed up data transmission, people usually perform lossy compression on images. Although the JPEG standard is a simple and effective compression method, it usually introduces various visually unpleasing artifacts, especially the notorious blocking artifacts. In recent years, deep convolutional neural networks (CNNs) have seen remarkable development in compression artifacts reduction. Despite the excellent performance, most deep CNNs suffer from heavy computation due to very deep and wide architectures. In this paper, we propose an enhanced wide-activated residual network (EWARN) for efficient and accurate image deblocking. Specifically, we propose an enhanced wide-activated residual block (EWARB) as basic construction module. Our EWARB gives rise to larger activation width, better use of interdependencies among channels, and more informative and discriminative non-linearity activation features without more parameters than residual block (RB) and wide-activated residual block (WARB). Furthermore, we introduce an overlapping patches extraction and combination (OPEC) strategy into our network in a full convolution way, leading to large receptive field, enforced compatibility among adjacent blocks, and efficient deblocking. Extensive experiments demonstrate that our EWARN outperforms several state-of-the-art methods quantitatively and qualitatively with relatively small model size and less running time, achieving a good trade-off between performance and complexity.  相似文献   
8.
With the deepening of social information, the panoramic image has drawn a significant interest of viewers and researchers as it can provide a very wide field of view (FoV). Since panoramic images are usually obtained by capturing images with the overlapping regions and then stitching them together, image stitching plays an important role in generating panoramic images. In order to effectively evaluate the quality of stitched images, a novel quality assessment method based on bi-directional matching is proposed for stitched images. Specifically, dense correspondences between the testing and benchmark stitched images are first established by bi-directional SIFT-flow matching. Then, color-aware, geometric-aware and structure-aware features are respectively extracted and fused via support vector regression (SVR) to obtain the final quality score. Experiments on our newly constructed database and ISIQA database demonstrate that the proposed method can achieve comparable performance compared with the conventional blind quality metrics and the quality metrics specially designed for stitched images.  相似文献   
9.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)).  相似文献   
10.
In recent years, the light field (LF) as a new imaging modality has attracted wide interest. The large data volume of LF images poses great challenge to LF image coding, and the LF images captured by different devices show significant differences in angular domain. In this paper we propose a view prediction framework to handle LF image coding with various sampling density. All LF images are represented as view arrays. We first partition the views into reference view (RV) set and intermediate view (IV) set. The RVs are rearranged into a pseudo sequence and directly compressed by a video encoder. Other views are then predicted by the RVs. To exploit the four dimensional signal structure, we propose the linear approximation prior (LAP) to reveal the correlation among LF views and efficiently remove the LF data redundancy. Based on the LAP, a distortion minimization interpolation (DMI) method is used to predict IVs. To robustly handle the LF images with different sampling density, we propose an Iteratively Updating depth image based rendering (IU-DIBR) method to extend our DMI. Some auxiliary views are generated to cover the target region and then the DMI calculates reconstruction coefficients for the IVs. Different view partition patterns are also explored. Extensive experiments on different types LF images also valid the efficiency of the proposed method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号