收费全文 | 100799篇 |
免费 | 1913篇 |
国内免费 | 537篇 |
电工技术 | 1070篇 |
综合类 | 2346篇 |
化学工业 | 15316篇 |
金属工艺 | 5283篇 |
机械仪表 | 3601篇 |
建筑科学 | 2509篇 |
矿业工程 | 598篇 |
能源动力 | 2448篇 |
轻工业 | 4690篇 |
水利工程 | 1383篇 |
石油天然气 | 425篇 |
武器工业 | 1篇 |
无线电 | 11346篇 |
一般工业技术 | 20101篇 |
冶金工业 | 3932篇 |
原子能技术 | 417篇 |
自动化技术 | 27783篇 |
2024年 | 76篇 |
2023年 | 414篇 |
2022年 | 941篇 |
2021年 | 1150篇 |
2020年 | 907篇 |
2019年 | 939篇 |
2018年 | 15263篇 |
2017年 | 14026篇 |
2016年 | 10691篇 |
2015年 | 1182篇 |
2014年 | 1052篇 |
2013年 | 1681篇 |
2012年 | 3977篇 |
2011年 | 10306篇 |
2010年 | 8994篇 |
2009年 | 6274篇 |
2008年 | 7404篇 |
2007年 | 8256篇 |
2006年 | 576篇 |
2005年 | 1549篇 |
2004年 | 1376篇 |
2003年 | 1386篇 |
2002年 | 716篇 |
2001年 | 269篇 |
2000年 | 343篇 |
1999年 | 222篇 |
1998年 | 338篇 |
1997年 | 264篇 |
1996年 | 262篇 |
1995年 | 176篇 |
1994年 | 168篇 |
1993年 | 158篇 |
1992年 | 113篇 |
1991年 | 154篇 |
1990年 | 100篇 |
1989年 | 95篇 |
1988年 | 88篇 |
1987年 | 88篇 |
1986年 | 75篇 |
1985年 | 85篇 |
1984年 | 73篇 |
1983年 | 71篇 |
1982年 | 60篇 |
1981年 | 70篇 |
1980年 | 48篇 |
1968年 | 46篇 |
1966年 | 43篇 |
1965年 | 46篇 |
1955年 | 63篇 |
1954年 | 68篇 |
Digital image watermarking technique based on LSB Substitution and Hill Cipher is presented and examined in this paper. For better imperceptibility watermark is inserted in the spatial domain. Further the watermark is implanted in the Cover Image block having the highest entropy value. To improve the security of the watermark hill cipher encryption is used. Both subjective and objective image quality assessment technique has been used to evaluate the imperceptibility of the proposed scheme.Further, the perceptual perfection of the watermarked pictures accomplished in the proposed framework has been contrasted and some state-of-art watermarking strategies. Test results demonstrates that the displayed method is robust against different image processing attacks like Salt and Peppers, Gaussian filter attack, Median filter attacks, etc.
相似文献Over the last few years, there has been a rapid growth in digital data. Images with quotes are spreading virally through online social media platforms. Misquotes found online often spread like a forest fire through social media, which highlights the lack of responsibility of the web users when circulating poorly cited quotes. Thus, it is important to authenticate the content contained in the images being circulated online. So, there is a need to retrieve the information within such textual images to verify quotes before its usage in order to differentiate a fake or misquote from an authentic one. Optical Character Recognition (OCR) is used in this paper, for converting textual images into readable text format, but none of the OCR tools are perfect in extracting information from the images accurately. In this paper, a method of post-processing on the retrieved text to improve the accuracy of the detected text from images has been proposed. Google Cloud Vision has been used for recognizing text from images. It has also been observed that using post-processing on the extracted text improved the accuracy of text recognition by 3.5% approximately. A web-based text similarity approach (URLs and domain name) has been used to examine the authenticity of the content of the quoted images. Approximately, 96.26% accuracy has been achieved in classifying quoted images as verified or misquoted. Also, a ground truth dataset of authentic site names has been created. In this research, images with quotes by famous celebrities and global leaders have been used. A comparative analysis has been performed to show the effectiveness of our proposed algorithm.
相似文献With the advancement of image acquisition devices and social networking services, a huge volume of image data is generated. Using different image and video processing applications, these image data are manipulated, and thus, original images get tampered. These tampered images are the prime source of spreading fake news, defaming the personalities and in some cases (when used as evidence) misleading the law bodies. Hence before relying totally on the image data, the authenticity of the image must be verified. Works of the literature are reported for the verification of the authenticity of an image based on noise inconsistency. However, these works suffer from limitations of confusion between edges and noise, post-processing operation for localization and need of prior knowledge about an image. To handle these limitations, a noise inconsistency-based technique has been presented here to detect and localize a false region in an image. This work consists of three major steps of pre-processing, noise estimation and post-processing. For the experimental purpose two, publicly available datasets are used. The result is discussed in terms of precision, recall, accuracy and f1-score on the pixel level. The result of the presented work is also compared with the recent state-of-the-art techniques. The average accuracy of the proposed work on datasets is 91.70%, which is highest among state-of-the-art techniques.
相似文献Biometric applications are very sensitive to the process because of its complexity in presenting unstructured input to the processing. The existing applications of image processing are based on the implementation of different programing segments such as image acquisition, segmentation, extraction, and final output. The proposed model is designed with 2 convolution layers and 3 dense layers. We examined the module with 5 datasets including 3 benchmark datasets, namely CASIA, UBIRIS, MMU, random dataset, and the live video. We calculated the FPR, FNR, Precision, Recall, and accuracy of each dataset. The calculated accuracy of CASIA using the proposed system is 82.8%, for UBIRIS is 86%, MMU is 84%, and the random dataset is 84%. On live video with low resolution, calculated accuracy is 72.4%. The proposed system achieved better accuracy compared to existing state-of-the-art systems.
相似文献