首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   22298篇
  免费   1388篇
  国内免费   922篇
电工技术   333篇
技术理论   1篇
综合类   963篇
化学工业   1445篇
金属工艺   928篇
机械仪表   1922篇
建筑科学   964篇
矿业工程   403篇
能源动力   394篇
轻工业   1402篇
水利工程   91篇
石油天然气   448篇
武器工业   111篇
无线电   3575篇
一般工业技术   1403篇
冶金工业   384篇
原子能技术   143篇
自动化技术   9698篇
  2024年   23篇
  2023年   189篇
  2022年   237篇
  2021年   492篇
  2020年   512篇
  2019年   333篇
  2018年   339篇
  2017年   443篇
  2016年   644篇
  2015年   665篇
  2014年   1253篇
  2013年   1066篇
  2012年   1279篇
  2011年   1643篇
  2010年   1245篇
  2009年   1179篇
  2008年   1202篇
  2007年   1493篇
  2006年   1417篇
  2005年   1269篇
  2004年   1106篇
  2003年   1122篇
  2002年   922篇
  2001年   768篇
  2000年   614篇
  1999年   594篇
  1998年   521篇
  1997年   414篇
  1996年   323篇
  1995年   255篇
  1994年   192篇
  1993年   153篇
  1992年   112篇
  1991年   91篇
  1990年   78篇
  1989年   68篇
  1988年   41篇
  1987年   31篇
  1986年   34篇
  1985年   40篇
  1984年   37篇
  1983年   40篇
  1982年   31篇
  1981年   33篇
  1980年   25篇
  1979年   15篇
  1978年   8篇
  1976年   5篇
  1974年   3篇
  1973年   5篇
排序方式: 共有10000条查询结果,搜索用时 109 毫秒
1.
To save bandwidth and storage space as well as speed up data transmission, people usually perform lossy compression on images. Although the JPEG standard is a simple and effective compression method, it usually introduces various visually unpleasing artifacts, especially the notorious blocking artifacts. In recent years, deep convolutional neural networks (CNNs) have seen remarkable development in compression artifacts reduction. Despite the excellent performance, most deep CNNs suffer from heavy computation due to very deep and wide architectures. In this paper, we propose an enhanced wide-activated residual network (EWARN) for efficient and accurate image deblocking. Specifically, we propose an enhanced wide-activated residual block (EWARB) as basic construction module. Our EWARB gives rise to larger activation width, better use of interdependencies among channels, and more informative and discriminative non-linearity activation features without more parameters than residual block (RB) and wide-activated residual block (WARB). Furthermore, we introduce an overlapping patches extraction and combination (OPEC) strategy into our network in a full convolution way, leading to large receptive field, enforced compatibility among adjacent blocks, and efficient deblocking. Extensive experiments demonstrate that our EWARN outperforms several state-of-the-art methods quantitatively and qualitatively with relatively small model size and less running time, achieving a good trade-off between performance and complexity.  相似文献   
2.
Bioactive ceramic scaffolds for bone regeneration consisting of a three-dimensional mesh of interpenetrating struts with square section were fabricated via Digital Light Processing (DLP). The ability of the technique to manufacture 3D porous structures from β-tricalcium phosphate (β-TCP) powders with different dimensions of struts and pores was evaluated, identifying the possibilities and limitations of the manufacturing process. Small pore sizes were found to seriously complicate the elimination of excess slurry from the scaffold’s innermost pores. The effect of the strut/pore size on the mechanical performance of the scaffolds under compressive stresses was also evaluated, but no significant influence was found. Under compressive stresses, the structures resulted weaker when tested perpendicularly to the printing plane due to interlayer shear failure. Interlayer superficial grooves are proposed as potential failure-controlling defects, which could also explain the lack of a Weibull size effect on the mechanical strength of the fabricated DLP scaffolds.  相似文献   
3.
In the past, thinking of carrying electronic devices inside our bodies was only posed by non-real scenarios. The emergence of insertable devices has changed this. Since this technology is still in its initial development stages, few studies have investigated factors that influence its acceptance. This paper analyzes the predictors of the intention to use non-medical insertable devices in two Latin American contexts. We used partial least squares structural equation modeling to examine whether six constructs predicted intention to use insertable devices. A questionnaire was administered to undergraduate students located in Colombia and Chile (n = 672). We also examined whether these predictors influenced intention differently for both of them. Four common constructs significantly and positively influenced both Chilean and Colombian respondents to use insertable devices (hedonic motivation, habit, performance expectancy, and social influence). Also, the habit has a complementary mediating effect on the relationship between social influence and behavioral intention. By contrast, effort expectations were a positive and significant predictor, but only among Chilean respondents. Findings suggest that when technologies are emerging, well-known predictors of intention (e.g., performance and effort expectations) are less influential than predictors related to self-efficacy (e.g., habit and hedonic motivation). The use of insertable devices has a significant impact on society. Thus, a better understanding of what motivates their use has implications for both academia and industry.  相似文献   
4.
Face aging (FA) for young faces refers to rendering the aging faces at target age for an individual, generally under 20s, which is an important topic of facial age analysis. Unlike traditional FA for adults, it is challenging to age children with one deep learning-based FA network, since there are deformations of facial shapes and variations of textural details. To alleviate the deficiency, a unified FA framework for young faces is proposed, which consists of two decoupled networks to apply aging image translation. It explicitly models transformations of geometry and appearance using two components: GD-GAN, which simulates the Geometric Deformation using Generative Adversarial Network; TV-GAN, which simulates the Textural Variations guided by the age-related saliency map. Extensive experiments demonstrate that our method has advantages over the state-of-the-art methods in terms of synthesizing visually plausible images for young faces, as well as preserving the personalized features.  相似文献   
5.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)).  相似文献   
6.
洛钼集团矿山公司三道庄矿区由于历史原因,露天开采境界地下内存在的采空区已危及矿山公司的正常安全生产,阻碍了洛钼集团可持续发展。为解决这一重大问题,经过充分调研和多方论证,认为深孔一次爆破成井技术是解决此类采空区难题唯一的经济上合理、技术可行、安全可靠的手段与途径。深孔爆破成井实现与采空区顶板的贯通,使采空区边岩稳定,顶岩暴露面积缩小,确保了采空区的稳定;保证了台阶正常推进。  相似文献   
7.
Multi-channel and single-channel image denoising are on two important development fronts. Integrating multi-channel and single-channel image denoisers for further improvement is a valuable research direction. A natural assumption is that using more useful information is helpful to the output results. In this paper, a novel multi-channel and single-channel fusion paradigm (MSF) is proposed. The proposed MSF works by fusing the estimates of a multi-channel image denoiser and a single-channel image denoiser. The performance of recent multi-channel image denoising methods involved in the proposed MSF can be further improved at low additional time-consuming cost. Specifically, the validity principle of the proposed MSF is that the fused single-channel image denoiser can produce auxiliary estimate for the involved multi-channel image denoiser in a designed underdetermined transform domain. Based on the underdetermined transformation, we create a corresponding orthogonal transformation for fusion and better restore the multi-channel images. The quantitative and visual comparison results demonstrate that the proposed MSF can be effectively applied to several state-of-the-art multi-channel image denoising methods.  相似文献   
8.
9.
张小强  赵娜  徐雪飞 《冶金设备》2020,(1):17-20,45
薄壁钢套类零件是机械制造中常碰到的一类难加工零件,由于其不同的功能用途和典型结构特点,其制造有一定难度,在实际生产过程中,经常出现加工制造后的零件尺寸精度、形状精度、形位精度达不到使用及设计要求。本文较系统地阐述了薄壁钢套类零件的典型制造工艺方法以及在制造过程中的变形分析和应对措施。  相似文献   
10.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号