首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6137篇
  免费   319篇
  国内免费   59篇
电工技术   85篇
综合类   18篇
化学工业   1269篇
金属工艺   139篇
机械仪表   222篇
建筑科学   137篇
矿业工程   30篇
能源动力   308篇
轻工业   509篇
水利工程   64篇
石油天然气   46篇
无线电   709篇
一般工业技术   1414篇
冶金工业   568篇
原子能技术   70篇
自动化技术   927篇
  2024年   25篇
  2023年   138篇
  2022年   331篇
  2021年   493篇
  2020年   308篇
  2019年   351篇
  2018年   363篇
  2017年   306篇
  2016年   308篇
  2015年   206篇
  2014年   251篇
  2013年   461篇
  2012年   285篇
  2011年   319篇
  2010年   209篇
  2009年   169篇
  2008年   158篇
  2007年   147篇
  2006年   125篇
  2005年   89篇
  2004年   71篇
  2003年   82篇
  2002年   61篇
  2001年   54篇
  2000年   52篇
  1999年   64篇
  1998年   157篇
  1997年   128篇
  1996年   102篇
  1995年   75篇
  1994年   62篇
  1993年   58篇
  1992年   44篇
  1991年   48篇
  1990年   36篇
  1989年   36篇
  1988年   27篇
  1987年   30篇
  1986年   35篇
  1985年   34篇
  1984年   27篇
  1983年   30篇
  1982年   14篇
  1981年   13篇
  1980年   12篇
  1978年   16篇
  1977年   17篇
  1976年   23篇
  1973年   8篇
  1972年   8篇
排序方式: 共有6515条查询结果,搜索用时 15 毫秒
91.
In this paper, the problem of outsourcing the selective encryption of a medical image to cloud by resource-constrained devices such as smart phone is addressed, without revealing the cover image to cloud using steganography. In the proposed framework, the region of interest of the medical image is first detected using a visual saliency model. The detected important data is then embedded in a host image, producing a stego image which is outsourced to cloud for encryption. The cloud which has powerful resources, encrypts the image and sent back the encrypted marked image to the client. The client can then extract the selectively encrypted region of interest and can combine it with the region of non-interest to form a selectively encrypted image, which can be sent to medical specialists and healthcare centers. Experimental results and analysis validate the effectiveness of the proposed framework in terms of security, image quality, and computational complexity and verify its applicability in remote patient monitoring centers.  相似文献   
92.
Vertical handover gain significant importance due to the enhancements in mobility models by the Fourth Generation (4G) technologies. However, these enhancements are limited to specific scenarios and hence do not provide support for generic mobility. Similarly, various schemes are proposed based on these mobility models but most of them are suffered from the high packet loss, frequent handovers, too early and late handovers, inappropriate network selection, etc. To address these challenges, a generic vertical handover management scheme for heterogeneous wireless networks is proposed in this article. The proposed scheme works in three phases. In the first phase, a handover triggering approach is designed to identify the appropriate place for initiating handover based on the estimated coverage area of a WLAN access point or cellular base station. In the second phase, fuzzy rule based system is designed to eliminate the inappropriate networks before deciding an optimal network for handover. In the third phase, a network selection scheme is developed based on the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) decision mechanism. Various parameters such as delay, jitter, Bit Error Rate (BER), packet loss, communication cost, response time, and network load are considered for selecting an optimal network. The proposed scheme is tested in a mobility scenario with different speeds of a mobile node ranging from very low to very high. The simulation results are compared with the existing decision models used for network selection and handover triggering approaches. The proposed scheme outperforms these schemes in terms of energy consumption, handover delay and time, packet loss, good put, etc.  相似文献   
93.
94.
In the recent years, we have seen that Grover search algorithm (Proceedings, 28th annual ACM symposium on the theory of computing, pp. 212–219, 1996) by using quantum parallelism has revolutionized the field of solving huge class of NP problems in comparisons to classical systems. In this work, we explore the idea of extending Grover search algorithm to approximate algorithms. Here we try to analyze the applicability of Grover search to process an unstructured database with a dynamic selection function in contrast to the static selection function used in the original work (Grover in Proceedings, 28th annual ACM symposium on the theory of computing, pp. 212–219, 1996). We show that this alteration facilitates us to extend the application of Grover search to the field of randomized search algorithms. Further, we use the dynamic Grover search algorithm to define the goals for a recommendation system based on which we propose a recommendation algorithm which uses binomial similarity distribution space giving us a quadratic speedup over traditional classical unstructured recommendation systems. Finally, we see how dynamic Grover search can be used to tackle a wide range of optimization problems where we improve complexity over existing optimization algorithms.  相似文献   
95.
大量的研究行为识别方法集中在检测简单的动作,如:步行,慢跑或者跳跃等;针对于打斗或者动作复杂的攻击性行为则研究较少;而这些研究在某些监控场景下非常有用,如:监狱,自助银行,商场等. 传统的暴力行为识别研究方法主要利用先验知识来手动设计特征,而本文提出了一种基于3D-CNN结构的暴力检测方法,通过三维深度神经网络直接对输入进行操作,能够很好的提取暴力行为的时空特征信息,从而进行检测. 从实验结果可以看出,本文方法能较好地识别出暴力行为,准确率要高于人工设计特征的方法.  相似文献   
96.
 High-aspect ratio microelectroforming is one of the most challenging techniques in MEMS microfabrication. This is particularly true with plating metal into the very tall micropatterned polymer molds made by X-ray lithography for primary or secondary metal structures or metal mold inserts within the framework of the LIGA process. Among various problems are: (1) the time consumption in plating very tall parts or using microelectroplating as a replication technique; (2) the cost of material, in particular in the formation of very high-aspect-ratio absorber structures for X-ray masks in the deep and ultra-deep X-ray lithography step. Received: 7 July 2000/Accepted: 23 August 2000  相似文献   
97.
This paper proposes a framework to aid video analysts in detecting suspicious activity within the tremendous amounts of video data that exists in today’s world of omnipresent surveillance video. Ideas and techniques for closing the semantic gap between low-level machine readable features of video data and high-level events seen by a human observer are discussed. An evaluation of the event classification and detection technique is presented and a future experiment to refine this technique is proposed. These experiments are used as a lead to a discussion on the most optimal machine learning algorithm to learn the event representation scheme proposed in this paper.
Bhavani ThuraisinghamEmail:
  相似文献   
98.
In several multitarget tracking applications, a target may return more than one measurement per target and interacting targets may return multiple merged measurements between targets. Existing algorithms for tracking and data association, initially applied to radar tracking, do not adequately address these types of measurements. Here, we introduce a probabilistic model for interacting targets that addresses both types of measurements simultaneously. We provide an algorithm for approximate inference in this model using a Markov chain Monte Carlo (MCMC)-based auxiliary variable particle filter. We Rao-Blackwellize the Markov chain to eliminate sampling over the continuous state space of the targets. A major contribution of this work is the use of sparse least squares updating and downdating techniques, which significantly reduce the computational cost per iteration of the Markov chain. Also, when combined with a simple heuristic, they enable the algorithm to correctly focus computation on interacting targets. We include experimental results on a challenging simulation sequence. We test the accuracy of the algorithm using two sensor modalities, video, and laser range data. We also show the algorithm exhibits real time performance on a conventional PC  相似文献   
99.
100.
The present research focused on wet process synthesis of visible light active carbon-modified (CM)-n-TiO2 nanoparticles and their photocatalytic activity. The CM-n-TiO2 was synthesized by hydrolysis of TiCl4 in the presence of tetrabutylammonium hydroxide and also in the presence of glucose and sodium hydroxide. UV–vis spectra, X-ray diffraction (XRD), and FT-IR were used to characterize these photocatalysts. It was found that the CM-n-TiO2 nanoparticles synthesized by hydrolysis with tetrabutylammonium hydroxide or with sodium hydroxide and glucose when subjected to extended aging and subsequent calcinations absorb well into the visible to near infrared region up to 800 nm and exhibit enhanced visible light photocatalytic activity on degradation of 4-chlorophenol. CM-n-TiO2 synthesized using glucose as the carbon source generated 13-fold increase in the initial rate of photodegradation of 4-chlorophenol compared to those by regular n-TiO2, whereas, it increased only eight-fold when tetrabutylammonium hydroxide was used as the carbon source.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号