首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19050篇
  免费   828篇
  国内免费   139篇
电工技术   324篇
综合类   32篇
化学工业   4231篇
金属工艺   589篇
机械仪表   628篇
建筑科学   370篇
矿业工程   48篇
能源动力   1364篇
轻工业   1156篇
水利工程   152篇
石油天然气   84篇
武器工业   1篇
无线电   2355篇
一般工业技术   4317篇
冶金工业   1437篇
原子能技术   172篇
自动化技术   2757篇
  2024年   101篇
  2023年   418篇
  2022年   995篇
  2021年   1156篇
  2020年   910篇
  2019年   938篇
  2018年   1214篇
  2017年   955篇
  2016年   924篇
  2015年   602篇
  2014年   842篇
  2013年   1513篇
  2012年   888篇
  2011年   1065篇
  2010年   853篇
  2009年   805篇
  2008年   710篇
  2007年   573篇
  2006年   474篇
  2005年   361篇
  2004年   272篇
  2003年   241篇
  2002年   188篇
  2001年   177篇
  2000年   169篇
  1999年   168篇
  1998年   291篇
  1997年   238篇
  1996年   219篇
  1995年   168篇
  1994年   157篇
  1993年   151篇
  1992年   103篇
  1991年   130篇
  1990年   99篇
  1989年   95篇
  1988年   79篇
  1987年   89篇
  1986年   76篇
  1985年   85篇
  1984年   73篇
  1983年   72篇
  1982年   61篇
  1981年   70篇
  1980年   48篇
  1979年   31篇
  1978年   27篇
  1977年   26篇
  1976年   35篇
  1971年   12篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
151.
Castor oil (CO) based polyurethane (PU)– polyester nonwoven fabric composites were fabricated by impregnating the polyester nonwoven fabric in a reactive composition containing CO and diisocyanate. Composites were fabricated with two different isocyanates such as toluene‐2, 4‐diisocyanate (TDI) and hexamethylene diisocyanate (HMDI). Thermogravimetric analysis (TGA) studies of the composites were performed to establish the thermal stability and their mode of thermal degradation. It was found that degradation of neat PU takes place in two steps and that of polyester nonwoven fabric reinforced PU composites takes place in three steps. From the TGA thermograms, a little improvement in thermal stability incase of polyester nonwoven fabric reinforced PU composites were noticed compared to unreinforced PUs. Degradation kinetic parameters were obtained for the composites using Broido, Coats and Redfern, and Horowitz and Metzger methods. Tensile fractured composite specimens were used to analyze the morphology of the composites by scanning electron microscopic technique. © 2007 Wiley Periodicals, Inc. J Appl Polym Sci, 2007  相似文献   
152.
Specific conductivities and viscosities of lithium perchlorate at four different concentrations (0.5, 1.0, 1.5 and 2.0 M) in ethylene carbonate (EC) based binary mixed solvent systems at 25°C are reported. The co-solvents chosen were tetrahydrofuran (THF), 1,2-dimethoxyethane (DME) and 1,3-dioxolane (DOL). Viscosity variations in all the three mixed solvent systems without electrolyte showed negative deviation from ideal behaviour thereby indicating the occurrence of a structure breaking effect in these three different binary systems. The increase in viscosity with increase in concentration of LiClO4 is attributed to the structural enhancement through the formation of a solvated complex which occupies interstitials in the solvent mixtures. 1 M LiClO4 solution shows maximum specific conductivity at 30 vol % EC for EC + DME and EC + DOL mixtures and at 50 vol % EC for EC + THF mixtures. Conductivity variations are explained on the basis of preferential solvation of lithium perchlorate by co-solvents (THF, DME and DOL) in their respective mixtures with ethylene carbonate.  相似文献   
153.
Multimedia Tools and Applications - Present era is marked by exponential growth in transfer of multimedia data through internet. Most of the Internet-of-Things(IoT) applications send images to...  相似文献   
154.

The development of digital technology is utilized by people to capture and share video frames. At present, rather than capturing images, people are interested in recording video footage for exploring information. Here, retrieval of video from large databases is challenging due to the continuous frame count. To overcome these challenges associated with the retrieval of video from available databases, this research proposed a likelihood-based regression approach for video processing. To improve the retrieval accuracy of video sequences, the proposed method utilizes a likelihood estimation technique integrated with a regression model. The likelihood estimate measures the pixel level roughly for estimating the pixel range, after which the regression approach measures the pixel level for transforming certainly blurred and unwanted pixels. In the proposed likelihood regression approach, the video is converted into a video frame and stored in a database. Query frames are taken into account by the generated database depending on the features which are used for a given video to be retrieved. The significant video retrieval performance obtained from the simulation results for the proposed likelihood-based regression model shows that the proposed model performs well over the other state-of-the-art techniques.

  相似文献   
155.

The human liver disorder is a genetic problem due to the habituality of alcohol or effect by the virus. It can lead to liver failure or liver cancer, if not been detected in initial stage. The aim of the proposed method is to detect the liver disorder in initial stage using liver function test dataset. The problem with many real-world datasets including liver disease diagnosis data is class imbalanced. The word imbalance refers to the conditions that the number of observations belongs to one class having more or less than the other class(es). Traditional K- Nearest Neighbor (KNN) or Fuzzy KNN classifier does not work well on the imbalanced dataset because they treat the neighbor equally. The weighted variant of Fuzzy KNN assign a large weight for the neighbor belongs to the minority class data and relatively small weight for the neighbor belongs to the majority class to resolve the issues with data imbalance. In this paper, Variable- Neighbor Weighted Fuzzy K Nearest Neighbor Approach (Variable-NWFKNN) is proposed, which is an improved variant of Fuzzy-NWKNN. The proposed Variable-NWFKNN method is implemented on three real-world imbalance liver function test datasets BUPA, ILPD from UCI and MPRLPD. The Variable-NWFKNN is compared with existing NWKNN and Fuzzy-NWKKNN methods and found accuracy 73.91% (BUPA Dataset), 77.59% (ILPD Dataset) and 87.01% (MPRLPD Dataset). Further, TL_RUS method is used for preprocessing and it improved the accuracy as 78.46% (BUPA Dataset), 78.46% (ILPD Dataset) and 95.79% (MPRLPD Dataset).

  相似文献   
156.

Image Completion plays a vital role in compressed sensing, machine learning, and computer vision applications. The Rank Minimization algorithms are used to perform the image completion. The major problem with rank minimization algorithms is the loss of information in the recovered image at high corruption ratios. To overcome this problem Lifting wavelet transform based Rank Minimization (LwRM), and Discrete wavelet transform based Rank Minimization (DwRM) methods are proposed, which can recover the image, if the corrupted observations are more than 80%. The evaluation of the proposed methods are accomplished by Full Reference Image Quality Assessment (FRIQA) and No Reference Image Quality Assessment (NR-IQA) metrics. The simulation results of proposed methods are superior to state-of-the-art methods.

  相似文献   
157.

Digital image watermarking technique based on LSB Substitution and Hill Cipher is presented and examined in this paper. For better imperceptibility watermark is inserted in the spatial domain. Further the watermark is implanted in the Cover Image block having the highest entropy value. To improve the security of the watermark hill cipher encryption is used. Both subjective and objective image quality assessment technique has been used to evaluate the imperceptibility of the proposed scheme.Further, the perceptual perfection of the watermarked pictures accomplished in the proposed framework has been contrasted and some state-of-art watermarking strategies. Test results demonstrates that the displayed method is robust against different image processing attacks like Salt and Peppers, Gaussian filter attack, Median filter attacks, etc.

  相似文献   
158.

Over the last few years, there has been a rapid growth in digital data. Images with quotes are spreading virally through online social media platforms. Misquotes found online often spread like a forest fire through social media, which highlights the lack of responsibility of the web users when circulating poorly cited quotes. Thus, it is important to authenticate the content contained in the images being circulated online. So, there is a need to retrieve the information within such textual images to verify quotes before its usage in order to differentiate a fake or misquote from an authentic one. Optical Character Recognition (OCR) is used in this paper, for converting textual images into readable text format, but none of the OCR tools are perfect in extracting information from the images accurately. In this paper, a method of post-processing on the retrieved text to improve the accuracy of the detected text from images has been proposed. Google Cloud Vision has been used for recognizing text from images. It has also been observed that using post-processing on the extracted text improved the accuracy of text recognition by 3.5% approximately. A web-based text similarity approach (URLs and domain name) has been used to examine the authenticity of the content of the quoted images. Approximately, 96.26% accuracy has been achieved in classifying quoted images as verified or misquoted. Also, a ground truth dataset of authentic site names has been created. In this research, images with quotes by famous celebrities and global leaders have been used. A comparative analysis has been performed to show the effectiveness of our proposed algorithm.

  相似文献   
159.
In this paper, three new Gramians are introduced namely ‐ limited‐time interval impulse response Gramians (LTIRG), generalized limited‐time Gramians (GLTG) and generalized limited‐time impulse response Gramians (GLTIRG). GLTG and GLTIRG are applicable to both unstable systems and also to systems which have eigenvalues of opposite polarities and equal magnitude. The concept of these Gramians is utilized to develop model reduction algorithms for linear time‐invariant continuous‐time single‐input single‐output (SISO) systems. In the cases of GLTIRG and GLTG based model reduction, the standard time‐limited Gramians are generalized to be applied to unstable systems by transforming the original system into a new system which requires the solution of two Riccati equations. Two numerical examples are included to illustrate the proposed methods. The results are also compared with standard techniques.  相似文献   
160.

Biometric applications are very sensitive to the process because of its complexity in presenting unstructured input to the processing. The existing applications of image processing are based on the implementation of different programing segments such as image acquisition, segmentation, extraction, and final output. The proposed model is designed with 2 convolution layers and 3 dense layers. We examined the module with 5 datasets including 3 benchmark datasets, namely CASIA, UBIRIS, MMU, random dataset, and the live video. We calculated the FPR, FNR, Precision, Recall, and accuracy of each dataset. The calculated accuracy of CASIA using the proposed system is 82.8%, for UBIRIS is 86%, MMU is 84%, and the random dataset is 84%. On live video with low resolution, calculated accuracy is 72.4%. The proposed system achieved better accuracy compared to existing state-of-the-art systems.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号