全文获取类型
收费全文 | 156966篇 |
免费 | 13365篇 |
国内免费 | 7401篇 |
专业分类
电工技术 | 10482篇 |
技术理论 | 11篇 |
综合类 | 10561篇 |
化学工业 | 24983篇 |
金属工艺 | 9076篇 |
机械仪表 | 10141篇 |
建筑科学 | 12293篇 |
矿业工程 | 4160篇 |
能源动力 | 4719篇 |
轻工业 | 9680篇 |
水利工程 | 3313篇 |
石油天然气 | 7901篇 |
武器工业 | 1481篇 |
无线电 | 18825篇 |
一般工业技术 | 18325篇 |
冶金工业 | 7930篇 |
原子能技术 | 1728篇 |
自动化技术 | 22123篇 |
出版年
2024年 | 583篇 |
2023年 | 2121篇 |
2022年 | 4079篇 |
2021年 | 5710篇 |
2020年 | 4305篇 |
2019年 | 3540篇 |
2018年 | 3943篇 |
2017年 | 4632篇 |
2016年 | 4379篇 |
2015年 | 5825篇 |
2014年 | 7762篇 |
2013年 | 9382篇 |
2012年 | 10755篇 |
2011年 | 11282篇 |
2010年 | 10431篇 |
2009年 | 10022篇 |
2008年 | 9676篇 |
2007年 | 9313篇 |
2006年 | 9156篇 |
2005年 | 7813篇 |
2004年 | 5658篇 |
2003年 | 5150篇 |
2002年 | 5019篇 |
2001年 | 4463篇 |
2000年 | 3750篇 |
1999年 | 3574篇 |
1998年 | 2916篇 |
1997年 | 2366篇 |
1996年 | 2142篇 |
1995年 | 1755篇 |
1994年 | 1449篇 |
1993年 | 1035篇 |
1992年 | 768篇 |
1991年 | 629篇 |
1990年 | 489篇 |
1989年 | 428篇 |
1988年 | 356篇 |
1987年 | 210篇 |
1986年 | 190篇 |
1985年 | 119篇 |
1984年 | 110篇 |
1983年 | 76篇 |
1982年 | 70篇 |
1981年 | 63篇 |
1980年 | 46篇 |
1979年 | 37篇 |
1978年 | 15篇 |
1977年 | 34篇 |
1976年 | 16篇 |
1975年 | 18篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
992.
Recently, compressive sensing-based encryption methods which combine sampling, compression and encryption together have been proposed. However, since the quantized measurement data obtained from linear dimension reduction projection directly serve as the encrypted image, the existing compressive sensing-based encryption methods fail to resist against the chosen-plaintext attack. To enhance the security, a block cipher structure consisting of scrambling, mixing, S-box and chaotic lattice XOR is designed to further encrypt the quantized measurement data. In particular, the proposed method works efficiently in the parallel computing environment. Moreover, a communication unit exchanges data among the multiple processors without collision. This collision-free property is equivalent to optimal diffusion. The experimental results demonstrate that the proposed encryption method not only achieves the remarkable confusion, diffusion and sensitivity but also outperforms the existing parallel image encryption methods with respect to the compressibility and the encryption speed. 相似文献
993.
In this paper, we address a new problem of noisy images which present in the procedure of relevance feedback for medical image retrieval. We concentrate on the noisy images, caused by the users mislabeling some irrelevant images as relevant ones, and a noisy-smoothing relevance feedback (NS-RF) method is proposed. In NS-RF, a two-step strategy is proposed to handle the noisy images. In step 1, a noisy elimination algorithm is adopted to identify and eliminate the noisy images. In step 2, to further alleviate the influence of noisy images, a fuzzy membership function is employed to estimate the relevance probabilities of retained relevant images. After noisy handling, the fuzzy support vector machine, which can take into account different relevant images with different relevance probabilities, is adopted to re-rank the images. The experimental results on the IRMA medical image collection demonstrate that the proposed method can deal with the noisy images effectively. 相似文献
994.
In 2010, Shiu et al. proposed three DNA-based reversible data hiding schemes with high embedding capacity. However, their schemes were not focused on DNA modification rate or the expansion problem. Therefore, we propose a novel reversible data hiding scheme based on histogram technique to solve the weaknesses of Shiu et al.’s schemes. The proposed scheme transforms the DNA sequence into a binary string and then combines several bits into a decimal integer. These decimal integers are used to generate a histogram. Afterwards, the proposed scheme uses a histogram technique to embed secret data. The experimental results show that the modification rate of our proposed scheme is 69 % lower than that of Shiu et al.’s schemes for the same embedding capacity. In addition, the length of the DNA sequence remains unchanged in the proposed scheme. 相似文献
995.
Video frame-rate up-conversion is one of the common operations for tampering digital videos in the temporal domain, such as creating fake high-quality videos and splicing two video clips with different frame rates. However, few existing works have been proposed for detecting this form of tampering operation. Based on the analysis of extensive experiments, we found that frame-rate up-conversion algorithms employed in most current video editing softwares will inevitably introduce some periodic artifacts into inter-frame similarity in the resulting video frame sequence. By analyzing such artifacts, we propose a simple yet very effective method to expose video after frame-rate up-conversion, and further estimate its original frame rate. The experimental results evaluated on 100 original videos at different frame rates have shown the effectiveness of the proposed method. The average detection accuracy can achieve as high as 99 % on noise-free videos in uncompressed and H.264/AVC formats. Besides, the proposed method is robust to noise as the detection accuracy could reach over 85 % and 95 % on noised videos with Gaussian white noise when SNR is 33 db and 36 db respectively. 相似文献
996.
Guangyan Huang Yanchun Zhang Jie Cao Michael Steyn Kersi Taraporewalla 《World Wide Web》2014,17(4):569-587
With the advanced technology of medical devices and sensors, an abundance of medical data streams are available. However, data analysis techniques are very limited, especially for processing massive multiple physiological streams that may only be understood by medical experts. The state-of-the-art techniques only allow multiple medical devices to independently monitor different physiological parameters for the patient’s status, thus they signal too many false alarms, creating unnecessary noise, especially in the Intensive Care Unit (ICU). An effective solution which has been recently studied is to integrate information from multiple physiologic parameters to reduce alarms. But it is a challenge to detect abnormalities from high frequently changed physiological streams data, since abnormalities occur gradually due to the complex situation of patients. An analysis of ICU physiological data streams shows that many vital physiological parameters are changed periodically (such as heart rate, arterial pressure, and respiratory impedance) and thus abnormalities are generally abnormal period patterns. In this paper, we develop a Mining Abnormal Period Patterns from Multiple Physiological Streams (MAPPMPS) method to detect and rank abnormalities in medical sensor streams. The efficiency and effectiveness of the MAPPMPS method is demonstrated by a real-world massive database of multiple physiological streams sampled in ICU, comprising 250 patients’ streams (each stream involving over 1.3 million data points) with a total size of 28 GB data. 相似文献
997.
高支模工程安全管理不仅需要很高的技术,而且安全管理本身也具有较大的随机性,这就导致相关人员在开展安全管理工作时具有一定的难度。面对这一问题,相关监理人员必须从施工方案的审批、应急预案的落实、质量安全作业的施工技术交底和施工过程中所需要的各种原材料进场前的检验等方面加强管理。 相似文献
998.
在实际操作中,由于变电运行非常复杂,很容易出现危险,因此,做好相关危险点的分析和预防工作,对保证电力系统运行安全有着非常重要的意义。结合变电运行倒闸操作中的危险点,对其预防对策进行了分析和探讨。 相似文献
999.
煤炭资源是我国社会发展的重要能源之一,在煤炭资源开采过程中,必须对煤矿的地质结构进行认真分析。重点分析了煤矿地质结构与煤矿开采的关系,通过对煤矿地质结构的发展规律进行分析,建立了一套完善的煤矿地质构造评价指标系统,从而为煤矿资源的安全开采提供了保障。 相似文献
1000.