全文获取类型
收费全文 | 31497篇 |
免费 | 7128篇 |
国内免费 | 5112篇 |
专业分类
电工技术 | 2165篇 |
综合类 | 4076篇 |
化学工业 | 1151篇 |
金属工艺 | 816篇 |
机械仪表 | 2692篇 |
建筑科学 | 1356篇 |
矿业工程 | 622篇 |
能源动力 | 439篇 |
轻工业 | 764篇 |
水利工程 | 402篇 |
石油天然气 | 1058篇 |
武器工业 | 565篇 |
无线电 | 5307篇 |
一般工业技术 | 2298篇 |
冶金工业 | 983篇 |
原子能技术 | 695篇 |
自动化技术 | 18348篇 |
出版年
2024年 | 375篇 |
2023年 | 988篇 |
2022年 | 1922篇 |
2021年 | 1901篇 |
2020年 | 1798篇 |
2019年 | 1442篇 |
2018年 | 1210篇 |
2017年 | 1375篇 |
2016年 | 1541篇 |
2015年 | 1690篇 |
2014年 | 2187篇 |
2013年 | 2256篇 |
2012年 | 2710篇 |
2011年 | 2744篇 |
2010年 | 2144篇 |
2009年 | 2128篇 |
2008年 | 2156篇 |
2007年 | 2345篇 |
2006年 | 1952篇 |
2005年 | 1749篇 |
2004年 | 1404篇 |
2003年 | 1139篇 |
2002年 | 940篇 |
2001年 | 737篇 |
2000年 | 600篇 |
1999年 | 486篇 |
1998年 | 397篇 |
1997年 | 319篇 |
1996年 | 237篇 |
1995年 | 167篇 |
1994年 | 149篇 |
1993年 | 102篇 |
1992年 | 79篇 |
1991年 | 61篇 |
1990年 | 75篇 |
1989年 | 40篇 |
1988年 | 17篇 |
1987年 | 17篇 |
1986年 | 33篇 |
1985年 | 20篇 |
1984年 | 13篇 |
1983年 | 14篇 |
1982年 | 22篇 |
1981年 | 17篇 |
1977年 | 4篇 |
1976年 | 4篇 |
1964年 | 4篇 |
1960年 | 3篇 |
1959年 | 5篇 |
1951年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
981.
With the development of information technologies, various types of streaming images are generated, such as videos, graphics, Virtual Reality (VR)/omnidirectional images (OIs), etc. Among them, the OIs usually have a broader view and a higher resolution, which provides human an immersive visual experience in a head-mounted display. However, the current image quality assessment works cannot achieve good performance without considering representative human visual features and visual viewing characteristics of OIs, which limited OIs’ further development. Motivated by the above problem, this work proposes a blind omnidirectional image quality assessment (BOIQA) model based on representative features and viewport oriented statistical features. Specifically, we apply the local binary pattern operator to encoder the cross-channel color information, and apply the weighted LBP to extract the structural features. Then the local natural scene statistics (NSS) features are extracted by using the viewport sampling to boost the performance. Finally, we apply support vector regression to predict the OIs’ quality score, and experimental results on CVIQD2018 and OIQA2018 Databases prove that the proposed model achieves better performance than state-of-the-art OIQA models. 相似文献
982.
Most recent occluded person re-identification (re-ID) methods usually learn global features directly from pedestrian images, or use additional pose estimation and semantic analysis model to learn local features, while ignoring the relationship between global and local features, thus incorrectly retrieving different pedestrians with similar attributes as the same pedestrian. Moreover, learning local features using auxiliary models brings additional computational cost. In this work, we propose a Transformer-based dual-branch feature learning model for occluded person re-ID. Firstly, we propose a global–local feature interaction module to learn the relationship between global and local features, thus enhancing the richness of information in pedestrian features. Secondly, we randomly erase local areas in the input image to simulate the real occlusion situation, thereby improving the model’s adaptability to the occlusion scene. Finally, a spilt group module is introduced to explore the local distinguishing features of pedestrian. Numerous experiments validate the effectiveness of our proposed method. 相似文献
983.
The technological innovations and wide use of Wireless Sensor Network (WSN) applications need to handle diverse data. These huge data possess network security issues as intrusions that cannot be neglected or ignored. An effective strategy to counteract security issues in WSN can be achieved through the Intrusion Detection System (IDS). IDS ensures network integrity, availability, and confidentiality by detecting different attacks. Regardless of efforts by various researchers, the domain is still open to obtain an IDS with improved detection accuracy with minimum false alarms to detect intrusions. Machine learning models are deployed as IDS, but their potential solutions need to be improved in terms of detection accuracy. The neural network performance depends on feature selection, and hence, it is essential to bring an efficient feature selection model for better performance. An optimized deep learning model has been presented to detect different types of attacks in WSN. Instead of the conventional parameter selection procedure for Convolutional Neural Network (CNN) architecture, a nature-inspired whale optimization algorithm is included to optimize the CNN parameters such as kernel size, feature map count, padding, and pooling type. These optimized features greatly improved the intrusion detection accuracy compared to Deep Neural network (DNN), Random Forest (RF), and Decision Tree (DT) models. 相似文献
984.
Yawar Abbas Bangash Waseem Iqbal Saddaf Rubab Abdul Waheed Khan Waqas Aman 《International Journal of Communication Systems》2023,36(17):e5601
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy. 相似文献
985.
Unsupervised person re-identification aims to distinguish different pedestrians from discriminative representations on the basis of unlabeled data. Currently, most unsupervised Re-ID approaches explore visual representations to generate pseudo-labels for model’s training, which may suffer from background noise and semantic loss. To tackle this problem, this paper proposes a High-level Semantic Property driven Multi-task Feature Learning Network (HSP-MFL) to firstly introduce three high-level semantic properties for unsupervised person Re-ID. Technically, we design a novel Multiple Feature Fusion Module (MFFM) to deeply explore the complex correlation among multiple semantic and visual features to capture the discriminative feature cues, as well as a multi-task training scheme to generate robust fusion features. The architecture is quite simple and does not consume extra labeling costs. Extensive experiments on three datasets demonstrate that both high-level semantic properties and multi-task learning are effective in performance improvement, yielding SOTA mAPs for unsupervised person Re-ID. 相似文献
986.
Vidit Kumar Hemant Petwal Ajay Krishan Gairola Pareshwar Prasad Barmola 《计算机系统科学与工程》2023,46(3):2711-2724
Fine-grained image search is one of the most challenging tasks
in computer vision that aims to retrieve similar images at the fine-grained
level for a given query image. The key objective is to learn discriminative
fine-grained features by training deep models such that similar images are
clustered, and dissimilar images are separated in the low embedding space.
Previous works primarily focused on defining local structure loss functions
like triplet loss, pairwise loss, etc. However, training via these approaches
takes a long training time, and they have poor accuracy. Additionally, representations learned through it tend to tighten up in the embedded space and
lose generalizability to unseen classes. This paper proposes a noise-assisted
representation learning method for fine-grained image retrieval to mitigate
these issues. In the proposed work, class manifold learning is performed
in which positive pairs are created with noise insertion operation instead
of tightening class clusters. And other instances are treated as negatives
within the same cluster. Then a loss function is defined to penalize when
the distance between instances of the same class becomes too small relative
to the noise pair in that class in embedded space. The proposed approach is
validated on CARS-196 and CUB-200 datasets and achieved better retrieval
results (85.38% recall@1 for CARS-196% and 70.13% recall@1 for CUB-200)
compared to other existing methods. 相似文献
987.
Mesfer Al Duhayyim Heba G. Mohamed Fadwa Alrowais Fahd N. Al-Wesabi Anwer Mustafa Hilal Abdelwahed Motwakel 《计算机系统科学与工程》2023,46(2):1293-1310
The Internet of Things (IoT) has gained more popularity in research because of its large-scale challenges and implementation. But security was the main concern when witnessing the fast development in its applications and size. It was a dreary task to independently set security systems in every IoT gadget and upgrade them according to the newer threats. Additionally, machine learning (ML) techniques optimally use a colossal volume of data generated by IoT devices. Deep Learning (DL) related systems were modelled for attack detection in IoT. But the current security systems address restricted attacks and can be utilized outdated datasets for evaluations. This study develops an Artificial Algae Optimization Algorithm with Optimal Deep Belief Network (AAA-ODBN) Enabled Ransomware Detection in an IoT environment. The presented AAA-ODBN technique mainly intends to recognize and categorize ransomware in the IoT environment. The presented AAA-ODBN technique follows a three-stage process: feature selection, classification, and parameter tuning. In the first stage, the AAA-ODBN technique uses AAA based feature selection (AAA-FS) technique to elect feature subsets. Secondly, the AAA-ODBN technique employs the DBN model for ransomware detection. At last, the dragonfly algorithm (DFA) is utilized for the hyperparameter tuning of the DBN technique. A sequence of simulations is implemented to demonstrate the improved performance of the AAA-ODBN algorithm. The experimental values indicate the significant outcome of the AAA-ODBN model over other models. 相似文献
988.
Nedim Muzoğlu Ahmet Mesrur Halefoğlu Muhammed Onur Avci Melike Kaya Karaaslan Bekir Sıddık Binboğa Yarman 《Expert Systems》2023,40(1):e13141
Since the first case of COVID-19 was reported in December 2019, many studies have been carried out on artificial intelligence for the rapid diagnosis of the disease to support health services. Therefore, in this study, we present a powerful approach to detect COVID-19 and COVID-19 findings from computed tomography images using pre-trained models using two different datasets. COVID-19, influenza A (H1N1) pneumonia, bacterial pneumonia and healthy lung image classes were used in the first dataset. Consolidation, crazy-paving pattern, ground-glass opacity, ground-glass opacity and consolidation, ground-glass opacity and nodule classes were used in the second dataset. The study consists of four steps. In the first two steps, distinctive features were extracted from the final layers of the pre-trained ShuffleNet, GoogLeNet and MobileNetV2 models trained with the datasets. In the next steps, the most relevant features were selected from the models using the Sine–Cosine optimization algorithm. Then, the hyperparameters of the Support Vector Machines were optimized with the Bayesian optimization algorithm and used to reclassify the feature subset that achieved the highest accuracy in the third step. The overall accuracy obtained for the first and second datasets is 99.46% and 99.82%, respectively. Finally, the performance of the results visualized with Occlusion Sensitivity Maps was compared with Gradient-weighted class activation mapping. The approach proposed in this paper outperformed other methods in detecting COVID-19 from multiclass viral pneumonia. Moreover, detecting the stages of COVID-19 in the lungs was an innovative and successful approach. 相似文献
989.
Feature extraction is the most critical step in classification of multispectral image. The classification accuracy is mainly influenced by the feature sets that are selected to classify the image. In the past, handcrafted feature sets are used which are not adaptive for different image domains. To overcome this, an evolutionary learning method is developed to automatically learn the spatial-spectral features for classification. A modified Firefly Algorithm (FA) which achieves maximum classification accuracy with reduced size of feature set is proposed to gain the interest of feature selection for this purpose. For extracting the most efficient features from the data set, we have used 3-D discrete wavelet transform which decompose the multispectral image in all three dimensions. For selecting spatial and spectral features we have studied three different approaches namely overlapping window (OW-3DFS), non-overlapping window (NW-3DFS) adaptive window cube (AW-3DFS) and Pixel based technique. Fivefold Multiclass Support Vector Machine (MSVM) is used for classification purpose. Experiments conducted on Madurai LISS IV multispectral image exploited that the adaptive window approach is used to increase the classification accuracy. 相似文献
990.
Ashit Kumar Dutta Mazen Mushabab Alqahtani Yasser Albagory Abdul Rahaman Wahab Sait Majed Alsanea 《计算机系统科学与工程》2023,44(3):2277-2292
Learning Management System (LMS) is an application software that is used in automation, delivery, administration, tracking, and reporting of courses and programs in educational sector. The LMS which exploits machine learning (ML) has the ability of accessing user data and exploit it for improving the learning experience. The recently developed artificial intelligence (AI) and ML models helps to accomplish effective performance monitoring for LMS. Among the different processes involved in ML based LMS, feature selection and classification processes find beneficial. In this motivation, this study introduces Glowworm-based Feature Selection with Machine Learning Enabled Performance Monitoring (GSO-MFWELM) technique for LMS. The key objective of the proposed GSO-MFWELM technique is to effectually monitor the performance in LMS. The proposed GSO-MFWELM technique involves GSO-based feature selection technique to select the optimal features. Besides, Weighted Extreme Learning Machine (WELM) model is applied for classification process whereas the parameters involved in WELM model are optimally fine-tuned with the help of Mayfly Optimization (MFO) algorithm. The design of GSO and MFO techniques result in reduced computation complexity and improved classification performance. The presented GSO-MFWELM technique was validated for its performance against benchmark dataset and the results were inspected under several aspects. The simulation results established the supremacy of GSO-MFWELM technique over recent approaches with the maximum classification accuracy of 0.9589. 相似文献