首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1807篇
  免费   53篇
  国内免费   7篇
电工技术   30篇
化学工业   343篇
金属工艺   80篇
机械仪表   35篇
建筑科学   29篇
能源动力   83篇
轻工业   43篇
水利工程   6篇
石油天然气   7篇
无线电   266篇
一般工业技术   389篇
冶金工业   288篇
原子能技术   15篇
自动化技术   253篇
  2023年   20篇
  2022年   30篇
  2021年   40篇
  2020年   42篇
  2019年   34篇
  2018年   58篇
  2017年   34篇
  2016年   48篇
  2015年   41篇
  2014年   35篇
  2013年   109篇
  2012年   71篇
  2011年   95篇
  2010年   65篇
  2009年   72篇
  2008年   86篇
  2007年   87篇
  2006年   53篇
  2005年   48篇
  2004年   29篇
  2003年   30篇
  2002年   29篇
  2001年   20篇
  2000年   22篇
  1999年   35篇
  1998年   61篇
  1997年   59篇
  1996年   42篇
  1995年   38篇
  1994年   38篇
  1993年   36篇
  1992年   18篇
  1991年   25篇
  1990年   21篇
  1989年   13篇
  1988年   24篇
  1987年   18篇
  1986年   18篇
  1985年   25篇
  1984年   22篇
  1983年   17篇
  1982年   14篇
  1981年   21篇
  1980年   21篇
  1979年   13篇
  1978年   14篇
  1977年   12篇
  1976年   22篇
  1975年   6篇
  1974年   12篇
排序方式: 共有1867条查询结果,搜索用时 15 毫秒
41.
42.
Self-recoverable fragile watermarking is meant for accurate tamper localization as well as image recovery with superior visual quality. However, most of the existing state of art approaches perform authentication and recovery on block basis owing to which the entire block is categorized as tampered in case of alteration of one or more pixels of it. This, results in staircase formation of tamper detected regions, hence lacking in accuracy. Furthermore, the visual quality of the recovered image also deteriorates as an approximate value is assigned to all the block pixels corresponding to the altered region. The proposed watermarking scheme performs both authentication and recovery pixelwise. The authentication of each pixel is done via multi level tamper detection(MLTD) through three authentication bits based on value, location and neighbourhood information. The domain for image recovery is chosen dynamically based on the content of the block, may it be in spatial domain for smooth blocks or frequency domain for the rough ones. This provides high accuracy in recovery. As the embedding of recovery information is done in the frequency domain, the imperceptibility of the watermarked image scheme remains high. Also, embedding of authentication information in the spatial domain maintains its fragile nature. Even for higher tampering ratios, the lost content is rebuilt with high peak signal to noise ratio(PSNR) of the recovered image. The probabilities of false rejection and false acceptance head towards the ideal value for most of the empirical analysis. Comparative study via metric evaluation of probability of false rejection (PFR), probability of false acceptance (PFA) and PSNR of recovered image for different standard test cover images demonstrate the efficacy of the proposed scheme over other existing state of art approaches. Further, the security of the proposed scheme remains high due to usage of multi-layered secret keys and chaos based random mapping handling worst tamper scenarios.  相似文献   
43.
Detailed measurements of the flow instability of dilute shear-thinning viscoelastic aqueous solutions, with relatively low zero-shear viscosities, in an obstructed microchannel flow are reported. We examine the flow behaviour resulting from a 100 μm post placed in the channel centreline over a range of Reynolds numbers (\(5<Re<300\)) and Weissenberg numbers (\(20<Wi<10^3\)). Micro-particle image velocimetry measurements show the onset of an upstream instability within a Reynolds number range and at a critical elasticity number corresponding to polymer concentrations above 25 ppm of long-chain polyacrylamide. The instability results in significant local fluctuations in the flow field approaching 30 % of the mean velocity. The magnitude of the local viscosity ratio in the region upstream of the post is proposed as a driving mechanism for the instability which resembles a buckling flow. Additionally, the classical instability owing to separation and vortex formation downstream of the post in Newtonian flow is suppressed and a very long stable wake is observed extending over 10 post-diameters downstream.  相似文献   
44.
Given a set of points with uncertain locations, we consider the problem of computing the probability of each point lying on the skyline, that is, the probability that it is not dominated by any other input point. If each point’s uncertainty is described as a probability distribution over a discrete set of locations, we improve the best known exact solution. We also suggest why we believe our solution might be optimal. Next, we describe simple, near-linear time approximation algorithms for computing the probability of each point lying on the skyline. In addition, some of our methods can be adapted to construct data structures that can efficiently determine the probability of a query point lying on the skyline.  相似文献   
45.
46.
Twitter is a radiant platform with a quick and effective technique to analyze users’ perceptions of activities on social media. Many researchers and industry experts show their attention to Twitter sentiment analysis to recognize the stakeholder group. The sentiment analysis needs an advanced level of approaches including adoption to encompass data sentiment analysis and various machine learning tools. An assessment of sentiment analysis in multiple fields that affect their elevations among the people in real-time by using Naive Bayes and Support Vector Machine (SVM). This paper focused on analysing the distinguished sentiment techniques in tweets behaviour datasets for various spheres such as healthcare, behaviour estimation, etc. In addition, the results in this work explore and validate the statistical machine learning classifiers that provide the accuracy percentages attained in terms of positive, negative and neutral tweets. In this work, we obligated Twitter Application Programming Interface (API) account and programmed in python for sentiment analysis approach for the computational measure of user’s perceptions that extract a massive number of tweets and provide market value to the Twitter account proprietor. To distinguish the results in terms of the performance evaluation, an error analysis investigates the features of various stakeholders comprising social media analytics researchers, Natural Language Processing (NLP) developers, engineering managers and experts involved to have a decision-making approach.  相似文献   
47.
Wireless Personal Communications - Finding the best path between a given source and a destination in a road network is an important problem. It has its applications in various map services and...  相似文献   
48.
Wireless Personal Communications - This work aims to implement a clustering scheme to separate vehicles into a cluster that is based on various parameters, such as the total number of relay nodes,...  相似文献   
49.

Change point detection algorithms have numerous applications in areas of medical condition monitoring, fault detection in industrial processes, human activity analysis, climate change detection, and speech recognition. We consider the problem of change point detection on compositional multivariate data (each sample is a probability mass function), which is a practically important sub-class of general multivariate data. While the problem of change-point detection is well studied in univariate setting, and there are few viable implementations for a general multivariate data, the existing methods do not perform well on compositional data. In this paper, we propose a parametric approach for change point detection in compositional data. Moreover, using simple transformations on data, we extend our approach to handle any general multivariate data. Experimentally, we show that our method performs significantly better on compositional data and is competitive on general data compared to the available state of the art implementations.

  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号