全文获取类型
收费全文 | 121篇 |
免费 | 3篇 |
国内免费 | 12篇 |
专业分类
化学工业 | 14篇 |
金属工艺 | 6篇 |
建筑科学 | 10篇 |
矿业工程 | 14篇 |
石油天然气 | 2篇 |
无线电 | 17篇 |
一般工业技术 | 5篇 |
冶金工业 | 26篇 |
自动化技术 | 42篇 |
出版年
2024年 | 2篇 |
2023年 | 5篇 |
2022年 | 6篇 |
2021年 | 12篇 |
2020年 | 8篇 |
2019年 | 6篇 |
2018年 | 4篇 |
2017年 | 6篇 |
2016年 | 4篇 |
2015年 | 4篇 |
2014年 | 10篇 |
2013年 | 5篇 |
2012年 | 2篇 |
2011年 | 17篇 |
2010年 | 3篇 |
2009年 | 11篇 |
2008年 | 7篇 |
2007年 | 4篇 |
2006年 | 2篇 |
2005年 | 5篇 |
2004年 | 5篇 |
2003年 | 1篇 |
2002年 | 1篇 |
1999年 | 1篇 |
1995年 | 3篇 |
1992年 | 1篇 |
1981年 | 1篇 |
排序方式: 共有136条查询结果,搜索用时 15 毫秒
51.
TiAl合金是目前航空航天轻质高温结构的热点材料,其最终显微组织很大程度上决定于其冷却过程。由于TiAl合金相图和相变的复杂性,通过冷却过程控制,获得细晶组织结构成为关注的重要问题。综述了TiAl合金冷却相变的研究成果,并给出了关于Ti-48Al-4Nb-2Cr合金相关的进展:首先介绍了TiAl合金的凝固路径与相变行为,然后分别分析了连续冷却转变(CCT)和等温冷却转变(TTT)行为。进一步建立了Ti-48Al-4Nb-2Cr合金CCT图,并指导获得了一种细晶近片层组织。 相似文献
52.
53.
Currently, weakly supervised data augmentation network (WS-DAN) has been proved to be one of the state-of-the-art methods for fine-grained image classification due to its effectiveness on attention-guided data augmentation and bilinear attention pooling. Taking WS-DAN as the backbone, in this paper, we further propose a subtler WS-DAN recognition network, namely, SWS-DAN. Specifically, we first construct a novel “salience-guided data augmentation” scheme composed of cutblock, part-aware cropping, and SCutMix operations, which can more effectively expand the number of training dataset and improve the weakness addressed in the data augmentation procedure of WS-DAN. Meanwhile, the novel data-augmentation manner reduces background noise and mines more discriminative regions simultaneously, thereby avoiding the overfitting. In caring about the key issue in fine-grained image classification task is how to distinguish the extremely similar subclasses (e.g., Artic Tern, Elegant Tern, and Forsters Tern), we then design a “Top-k” loss function that mainly focuses on the similar classes so as to find their extraordinary subtle differences. Extensive experiments carried out on common fine-grained image datasets demonstrate that SWS-DAN can surpass WS-DAN with a significant margin in the classification performance. 相似文献
54.
In the field of affective computing (AC), coarse-grained AC has been developed and widely applied in many fields. Electroencephalogram (EEG) signals contain abundant emotional information. However, it is difficult to develop fine-grained AC due to the lack of fine-grained labeling data and suitable visualization methods for EEG data with fine labels. To achieve a fine mapping of EEG data directly to facial images, we propose a conditional generative adversarial network (cGAN) to establish the relationship between EEG data associated with emotions, a coarse label, and a facial expression image in this study. In addition, a corresponding training strategy is also proposed to realize the fine-grained estimation and visualization of EEG-based emotion. The experiments prove the reasonableness of the proposed method for the generation of fine-grained facial expressions. The image entropy of the generated image indicates that the proposed method can provide a satisfactory visualization of fine-grained facial expressions. 相似文献
55.
The results presented in this study were concerned with microstructures and mechanical properties of polycrystalline Cu subjected to plastic deformation by a compression with oscillatory torsion process. Different deformation parameters of the compression with oscillatory torsion process were adopted to study their effects on the microstructure and mechanical properties. The deformed microstructure was characterized quantita- tively by electron backscattered diffraction (EBSD) and scanning transmission electron microscopy (STEM). Mechanical properties were determined on an MTS QTest/10 machine equipped with digital image correlation. From the experimental results, processes performed at high compression speed and high torsion frequency are recommended for refining the grain size. The size of structure elements, such as average grain size (D) and subgrain size (d), reached 0.42 μm and 0.30 μm, respectively, and the fraction of high angle boundaries was 35% when the sample was deformed at a torsion frequency f = 1.6 Hz and compression rate v = 0.04 mm/s. These deformation parameters led to an improvement in the strength properties. The material exhibited an ultimate tensile strength (UTS) of 434 MPa and a yield strength (YS) of 418 MPa. These values were about two times greater than those of the initial state. 相似文献
56.
To protect personal privacy and confidential preservation, access control is used to authorize legal users for safe browsing the authorized contents on photos. The access control generates an authorization rule according to each permission assignment. However, the general access control is inappropriate to apply in some social services (e.g., photos posted on Flickr and Instagram, personal image management in mobile phone) because of the increasing popularity of digital images being stored and managed. With low maintenance loads, this paper integrates the data hiding technique to propose an access control mechanism for privacy preservation. The proposed scheme changes the partial regions of a given image as random pads (called selective image encryption) and only allows the authorized people to remedy the random pads back to meaningful ones which are with similar visual qualities of original ones. 相似文献
57.
电子病历是医学报告在云计算技术迅速发展下的一个重要产物,它的出现方便了医院和患者对病历的管理。然而, 患者的相关隐私数据存储在云上,就必然面临着隐私泄露、非法访问等隐患。为保护存储在云端的电子病历数据的私密性,提出了一个基于属性的可搜索加密方案,并给出了它在电子病历系统中的重要应用。与传统的可搜索加密方案相比,本方案降低了多用户环境下密钥管理的难度,且方案中的陷门可以在非安全信道上传输。此外,该方案可隐藏访问结构,具有细粒度访问控制,可根据数据拥有者的请求增加或撤销用户的访问权限。安全性分析表明,该方案保护了关键词的隐私性,可抵抗关键词猜测攻击,能有效防止隐私数据的泄露。关键词陷门匹配算法仅需一次双线性对运算,大大提高了搜索效率。 相似文献
58.
59.
Conditional proxy re-encryption (CPRE) enables fine-grained delegation of decryption rights, and has many real-world applications. In this paper, we present a ciphertext-policy attribute based CPRE scheme, together with a formalization of the primitive and its security analysis. We demonstrate the utility of the scheme in a cloud deployment, which achieves fine-grained data sharing. This application implements cloud server-enabled user revocation, offering an alternative yet more efficient solution to the user revocation problem in the context of fine-grained encryption of cloud data. High user-side efficiency is another prominent feature of the application, which makes it possible for users to use resource constrained devices, e.g., mobile phones, to access cloud data. Our evaluations show promising results on the performance of the proposed scheme. 相似文献
60.