首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4582篇
  免费   1067篇
  国内免费   774篇
电工技术   182篇
综合类   556篇
化学工业   186篇
金属工艺   75篇
机械仪表   78篇
建筑科学   184篇
矿业工程   44篇
能源动力   39篇
轻工业   33篇
水利工程   37篇
石油天然气   15篇
武器工业   218篇
无线电   1213篇
一般工业技术   217篇
冶金工业   88篇
原子能技术   14篇
自动化技术   3244篇
  2024年   13篇
  2023年   128篇
  2022年   220篇
  2021年   238篇
  2020年   231篇
  2019年   177篇
  2018年   177篇
  2017年   194篇
  2016年   172篇
  2015年   244篇
  2014年   395篇
  2013年   376篇
  2012年   434篇
  2011年   509篇
  2010年   408篇
  2009年   391篇
  2008年   421篇
  2007年   418篇
  2006年   316篇
  2005年   260篇
  2004年   168篇
  2003年   164篇
  2002年   90篇
  2001年   70篇
  2000年   50篇
  1999年   37篇
  1998年   20篇
  1997年   20篇
  1996年   16篇
  1995年   13篇
  1994年   8篇
  1993年   8篇
  1992年   5篇
  1991年   7篇
  1990年   4篇
  1989年   2篇
  1988年   4篇
  1987年   1篇
  1985年   3篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1977年   2篇
  1963年   1篇
  1959年   1篇
  1956年   2篇
  1955年   1篇
排序方式: 共有6423条查询结果,搜索用时 15 毫秒
1.
Aiming at the performance degradation of the existing presentation attack detection methods due to the illumination variation, a two-stream vision transformers framework (TSViT) based on transfer learning in two complementary spaces is proposed in this paper. The face images of RGB color space and multi-scale retinex with color restoration (MSRCR) space are fed to TSViT to learn the distinguishing features of presentation attack detection. To effectively fuse features from two sources (RGB color space images and MSRCR images), a feature fusion method based on self-attention is built, which can effectively capture the complementarity of two features. Experiments and analysis on Oulu-NPU, CASIA-MFSD, and Replay-Attack databases show that it outperforms most existing methods in intra-database testing and achieves good generalization performance in cross-database testing.  相似文献   
2.
In this study, fluid flow over an array of eight, 0.029 m × 0.029 m, square cross‐section cylinders in an octagonal configuration is studied numerically. The mean force coefficients (drag and lift) and the vortex formation characteristics of the array are calculated numerically by utilizing a three‐dimensional large eddy simulation mathematical model for turbulence. The numerical simulation is performed with commercial software ANSYS Fluent 19R1. To investigate the parametric influences, three spacings between the cylinders (0.07, 0.14, and 0.2 m), two array attack angles (0° and 15°), and two Reynolds numbers (4060 and 45 800) are considered. The results comprise flow patterns and force coefficients' variations with Reynolds numbers. The lift force of the downstream cylinder reaches its maximum at α = 15°, and the drag force of the upstream cylinders finds its peak at α = 0°. It is observed through velocity and viscosity contour plots that vortex formation length near the cylinder increases at higher Reynolds number. Velocity vector plots are also presented to show fluid flow behavior near the cylinder. Furthermore, the predicted mean forces on the cylinders are slightly different for different Reynolds numbers, spacings, and angles of attack.  相似文献   
3.
The operational planning of distribution network for automotive industry is complex with many conditions to consider, including heterogeneous fleet, enforcing the feasibility of 3D-packing of pallets into vehicles to address the vehicle's capacity in terms of weight and volume, compatibility of orders in a vehicle, returning empty pallets from assembly-plants backwards to suppliers, and delivery time windows. A mathematical model (MILP) is proposed that takes account of these conditions to minimise total transportation costs. The network structure can be a combination of direct shipment and milk-run for both forward and reverse flow of pallets. The model is solved optimally for small-size problems. For solving larger problems, a heuristic algorithm (in two versions) is proposed that uses a similarity measure to generate a reasonable list of orders. Best/first-fit strategies are employed to generate a feasible solution with the aid of a relaxed version of the proposed MILP. Improvement heuristics are also designed. Unlike most of existing constructive heuristics, our aim for developing the heuristic approach is to force routing decision, with all of its considerations, being made optimal. We also use the proposed best-fit strategy in the body of grouping evolution strategy (GES) algorithm to attain an effective meta-heuristic approach. The effectiveness of heuristics is tested on generated instances which demonstrates they are optimal for small-size problems. They are also tested on the data of daily auto-parts shipments gathered from the largest Iranian automobile company. Results demonstrate there exists a significant potential for cost saving through milk-run strategy compared with the direct shipping strategy.  相似文献   
4.
To improve the convertibility of reconfigurable manufacturing system (RMS), the concept of delayed reconfigurable manufacturing system (D-RMS) was proposed. RMS and D-RMS are both constructed around part family. However, D-RMS may suffer from ultra-long system problem with unacceptable idle machines using generic RMS part families. Besides, considering the complex basic system structure of D-RMS, machine selection of D-RMS should be addressed, including dedicated machine, flexible machine, and reconfigurable machine. Therefore, a system design method for D-RMS based on part family grouping and machine selection is proposed. Firstly, a part family grouping method is proposed for D-RMS that groups the parts with more former common operations into the same part family. The concept of longest relative position common operation subsequence (LPCS) is proposed. The similarity coefficient among the parts is calculated based on LPCS. The reciprocal value of the operation position of LPCS is adopted as the characteristic value. The average linkage clustering (ALC) algorithm is used to cluster the parts. Secondly, a machine selection method is proposed to complete the system design of D-RMS, including machine selection rules and the dividing point decision model. Finally, a case study is given to implement and verify the proposed system design method for D-RMS. The results show that the proposed system design method is effective, which can group parts with more former common operations into the same part family and select appropriate machine types.  相似文献   
5.
无证书签名具有基于身份密码体制和传统公钥密码体制的优点,可解决复杂的公钥证书管理和密钥托管问题.Wu和Jing提出了一种强不可伪造的无证书签名方案,其安全性不依赖于理想的随机预言机.针对该方案的安全性,提出了两类伪造攻击.分析结果表明,该方案无法实现强不可伪造性,并在"malicious-but-passive"的密钥生成中心攻击下也是不安全的.为了提升该方案的安全性,设计了一个改进的无证书签名方案.在标准模型中证明了改进的方案对于适应性选择消息攻击是强不可伪造的,还能抵抗恶意的密钥生成中心攻击.此外,改进的方案具有较低的计算开销和较短的私钥长度,可应用于区块链、车联网、无线体域网等领域.  相似文献   
6.
针对现实网络中诸如侧信道攻击、HID 攻击等传统的物理攻击,物理隔离被认为是一种较为彻底的抵御网络攻击的安全防护手段。2018 年,业界首次提出了一种物理隔离环境下的 Wi-Fi 隐蔽信道方法——Ghost Tunnel,即在Wi-Fi尚未连接的状态下,无线AP可成功将数据传给发起连接请求的计算机。提出了一种基于Ghost Tunnel方法的攻击框架—— GreyFan,利用该攻击框架攻击者可以对未连接Wi-Fi的用户实施无感知攻击,如文件隐蔽传输、任意代码执行等,并分析了相应的防御技术。  相似文献   
7.
陈皓  肖利雪  李广  潘跃凯  夏雨 《计算机应用》2019,39(8):2235-2241
针对人体攻击性行为识别问题,提出一种基于人体关节点数据的攻击性行为识别方法。首先,利用OpenPose获得单帧图像中的人体关节点数据,并通过最近邻帧特征加权法和分段多项式回归完成由人体自遮挡和环境因素所导致缺失值的补全;然后,对每个人体定义动态"安全距离"阈值,如果两人真实距离小于阈值,则构建行为特征矢量,其中包括帧间人体重心位移、人体关节旋转角角速度和发生交互时的最小攻击距离等;最后,提出改进的LightGBM算法w-LightGBM,并对攻击性行为进行识别。采用公共数据集UT-interaction对所提出的攻击性行为分类识别方法进行测试实验,准确率达到95.45%。实验结果表明,所提方法能够有效识别各种角度的攻击性行为。  相似文献   
8.
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time.  相似文献   
9.
In this paper, we propose a new angle quantization index modulation (AQIM) method, called the difference AQIM (DAQIM) method. The proposed method aims to improve the watermarking performance against gain attacks. Unlike the original AQIM method (Ourique et al., Angle QIM: a novel watermark embedding scheme robust against amplitude scaling distortions, in: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 2, 2005, pp. 797–800), the DAQIM method quantizes the difference of the two angles instead of the angles themselves. The main advantage of the DAQIM method is to disperse the interference to the watermark signal from one angle to more angles. Thus, the watermark has a higher ability to resist attacks. We perform a theoretical analysis of the document-to-watermark ratio (DWR) based on our proposed method. We show that our proposed method can obtain a lower embedding distortion compared to the AQIM and the gradient direction watermarking (GDWM) (Nezhadarya et al., IEEE Trans. Inf. Forensics Secur., 6(4), 2011, 1200–1213), methods under the same robustness and payload conditions. The experimental results demonstrate that our proposed method outperforms common existing methods in terms of the robustness against various attacks such as the JPEG quantization noise, additive white Gaussian noise (AWGN), cropping effect and mean filtering.  相似文献   
10.
《Journal of dairy science》2021,104(12):12912-12924
The objective of this study was to evaluate the effect of an ultra-diluted complex supplemented as a prophylactic strategy on the incidence risk of diseases, metabolism, and performance of weaned Holstein calves immediately after grouping. Additionally, the objective was to investigate the carryover effects on heifer-raising and first-lactation periods, in a double-blind, placebo-controlled trial. A total of 184 weaned Holstein calves (83 ± 7.9 d of life; 112.5 ± 11.7 kg of body weight; values are mean ± standard deviation) were allocated to 8 paddocks in a completely randomized block design experiment. During a 112-d period, animals received a total mixed ration and were randomly allocated into 2 groups: (1) CON: placebo-control (basal diet + calcium carbonate, top-dressed at 30 g/animal per day of placebo), or (2) UD: ultra-diluted complex (basal diet + TopVita-Real H, top-dressed at 30 g/animal per day of sulfur (10−60) + viola tricolor (10−14) + caladium seguinum (10−30) + zincum oxydatum (10−30) + phosphorus (10−60) + carduus marianus (10−60) + colibacillinum (10−30) + podophyllum (10−30) + vehicle: calcium carbonate; quantum sufficit 1 kg). Incidence risk of diseases, number of days with disease, and mortality events were recorded daily. Performance measurements and blood collection were carried out at enrollment and every 28 d until the end of the study period. The incidence risk of digestive problems was higher for the CON group. Additionally, the CON group had higher cumulative number of days per calf affected by tick-borne disease. Blood analysis revealed that CON calves had increased mean corpuscular hemoglobin amount and concentration than UD calves on d 28 after enrollment and had increased serum albumin and total protein concentration on d 84. Furthermore, higher albumin to globulin ratio was found in CON calves than in those of UD group at enrollment; however, on d 56, the inverse was observed. On d 28 after enrollment, CON calves had increased serum cortisol concentration. Regarding body measurements, higher withers height and body depth were detected in UD calves, on d 28 and d 84, respectively. Finally, higher culling risk was observed in the CON group during the heifer-raising period. In conclusion, a lower incidence risk of digestive problems and days with tick-borne disease were detected in the UD group. Additionally, systemic inflammation was improved by UD complex based on circulating inflammation and stress biomarkers on specific days after enrollment. However, UD product did not improve performance at the post-weaning, heifer-raising, and first-lactation periods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号