首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13534篇
  免费   1281篇
  国内免费   791篇
电工技术   218篇
综合类   503篇
化学工业   313篇
金属工艺   339篇
机械仪表   949篇
建筑科学   247篇
矿业工程   67篇
能源动力   62篇
轻工业   242篇
水利工程   37篇
石油天然气   58篇
武器工业   78篇
无线电   3305篇
一般工业技术   914篇
冶金工业   215篇
原子能技术   99篇
自动化技术   7960篇
  2024年   28篇
  2023年   184篇
  2022年   215篇
  2021年   363篇
  2020年   340篇
  2019年   227篇
  2018年   259篇
  2017年   367篇
  2016年   510篇
  2015年   476篇
  2014年   813篇
  2013年   702篇
  2012年   768篇
  2011年   922篇
  2010年   714篇
  2009年   760篇
  2008年   798篇
  2007年   953篇
  2006年   865篇
  2005年   841篇
  2004年   766篇
  2003年   716篇
  2002年   562篇
  2001年   401篇
  2000年   331篇
  1999年   311篇
  1998年   280篇
  1997年   236篇
  1996年   165篇
  1995年   134篇
  1994年   97篇
  1993年   75篇
  1992年   60篇
  1991年   46篇
  1990年   39篇
  1989年   29篇
  1988年   35篇
  1987年   15篇
  1986年   23篇
  1985年   34篇
  1984年   22篇
  1983年   32篇
  1982年   21篇
  1981年   26篇
  1980年   16篇
  1979年   9篇
  1978年   9篇
  1977年   2篇
  1974年   2篇
  1973年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
2.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks.  相似文献   
3.
The knowledge of turbo code's minimum Hamming distance (dmin) and its corresponding codeword multiplicity (Amin) is of a great importance because the error correction capability of a code is strongly tied to the values of dmin and Amin. Unfortunately, the computational complexity associated with the search for dmin and Amin can be very high, especially for a turbo code that has high dmin value. This paper introduces some useful properties of turbo codes that use structured interleavers together with circular encoding. These properties allow for a significant reduction of search space and thus reduce significantly the computational complexity associated with the determination of dmin and Amin values. © 2014 The Authors. International Journal of Communication Systems published by John Wiley & Sons, Ltd.  相似文献   
4.
In this paper, we propose a novel change detection method for synthetic aperture radar images based on unsupervised artificial immune systems. After generating the difference image from the multitemporal images, we take each pixel as an antigen and build an immune model to deal with the antigens. By continuously stimulating the immune model, the antigens are classified into two groups, changed and unchanged. Firstly, the proposed method incorporates the local information in order to restrain the impact of speckle noise. Secondly, the proposed method simulates the immune response process in a fuzzy way to get an accurate result by retaining more image details. We introduce a fuzzy membership of the antigen and then update the antibodies and memory cells according to the membership. Compared with the clustering algorithms we have proposed in our previous works, the new method inherits immunological properties from immune systems and is robust to speckle noise due to the use of local information as well as fuzzy strategy. Experiments on real synthetic aperture radar images show that the proposed method performs well on several kinds of difference images and engenders more robust result than the other compared methods.  相似文献   
5.
Clip-art image segmentation is widely used as an essential step to solve many vision problems such as colorization and vectorization. Many of these applications not only demand accurate segmentation results, but also have little tolerance for time cost, which leads to the main challenge of this kind of segmentation. However, most existing segmentation techniques are found not sufficient for this purpose due to either their high computation cost or low accuracy. To address such issues, we propose a novel segmentation approach, ECISER, which is well-suited in this context. The basic idea of ECISER is to take advantage of the particular nature of cartoon images and connect image segmentation with aliased rasterization. Based on such relationship, a clip-art image can be quickly segmented into regions by re-rasterization of the original image and several other computationally efficient techniques developed in this paper. Experimental results show that our method achieves dramatic computational speedups over the current state-of-the-art approaches, while preserving almost the same quality of results.  相似文献   
6.
This paper summarizes the basics of pulsed thermal nondestructive testing (TNDT) including theoretical solutions, data processing algorithms and practical implementation. Typical defects are discussed along with 1D analytical and multi-dimensional numerical solutions. Special emphasis is focused on defect characterization by the use of inverse solutions. A list of TNDT terms is provided. Applications of active TNDT, mainly in the aerospace industry, are discussed briefly, and some trends in the further development of this technique are described.  相似文献   
7.
ABSTRACT

In recent times, the applications of multimedia are rising in a greedy mode and hence the amount of video transactions is also increasing exponentially. This has shouted great demands on effective models on video encoding and also for reducing the transmission channel congestion. This research work introduces a managing technique termed weighted encoding for High-Efficiency Video Coding (HEVC). HEVC, also termed as MPEG-H Part 2 and H.265 is a video compression standard that is widely utilized AVC (H.264 or MPEG-4 Part 10). When compared to AVC, HEVC grants double the ratio of data compression at a similar level of quality of the video or considerably enhanced video quality at a similar bit rate. This work intends to optimize the weight that adopted in HEVC for encoding. For this, this paper proposes a new Iterative based propagation update in the water wave Optimization Algorithm (IPU-WWO), which is the improved form of Water wave Optimization (WWO). The performance of proposed IPU-WWO is compared over other conventional methods like Artificial Bee Colony (ABC), Firefly (FF), Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) with respect to Peak Signal to Noise Ratio (PSNR). By doing the encoding process, it minimizes the video size with perceptually better quality video or PSNR.  相似文献   
8.
以一种新的距离度量作为反馈的相关跟踪方法   总被引:5,自引:1,他引:4  
基于相关的模板匹配方法在图像跟踪中得到了广泛的应用,但是这种方法的主要缺点是对图像噪声非常敏感,而且由这种方法得出的相关曲面比较平坦。为了有效抑制噪声和局部遮挡对图像的影响,提出用鲁棒统计中的一个值代替相关值作为距离度量。它不是计算两幅图像的对应像素差值,而是计算两幅图像中差别不大的对应像素对的个数。实验证明这样得到的曲面相对  收稿日期:2003 08 31; 修订日期:2003 10 28作者简介:张桂林(1944 ),男,天津人,教授,博士生导师,主要研究方向为自动识别、人体生物统计特征识别、图像处理算法与系统性能评估等。       要尖锐得多。当上述的距离度量应用于跟踪过程中时,模板的合理更新对跟踪非常重要。基于上述的距离度量方法,提出了一种新的模板更新策略。利用两幅图像中近似像素在整修匹配模板像素中所占的比例大小决定加权系数。这种加权策略可以自适应地根据图像序列的变化选择更新相关模板,同时在一定程度上减小模板漂移的危险。  相似文献   
9.
宋玉  崔晓燕 《信息技术》2006,30(11):57-60
WCDMA作为第三代移动通信系统的主流标准,能够提供多种类型的多媒体服务。为了实现各种用户平面数据的传输,系统会提前通过控制平面对所需的无线资源进行分配。由于配置过程是通过接口之间发送控制平面应用协议消息来实现的,因此能否正确有效地对信令消息进行编解码成为保证系统稳定工作的关键因素。3GPP标准中,ASN.1语言被用来描述接口信令消息。首先简要介绍了WCDMA系统结构以及主要接口协议,重点描述了ASN.1存在的意义及其编解码规则,最后给出了基于ASN.1的开发环境下应用层网络协议的开发流程。  相似文献   
10.
钟卫平 《光通信技术》2006,30(11):58-61
分析光折变三维存储器的机理,探讨了光折变三维存储器的编码方式、光折变材料的选择及存储技术,阐述了其产业化进程.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号