首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3369篇
  免费   556篇
  国内免费   403篇
电工技术   87篇
综合类   445篇
化学工业   220篇
金属工艺   106篇
机械仪表   70篇
建筑科学   110篇
矿业工程   52篇
能源动力   35篇
轻工业   57篇
水利工程   25篇
石油天然气   36篇
武器工业   26篇
无线电   783篇
一般工业技术   254篇
冶金工业   94篇
原子能技术   2篇
自动化技术   1926篇
  2024年   4篇
  2023年   25篇
  2022年   37篇
  2021年   52篇
  2020年   72篇
  2019年   85篇
  2018年   64篇
  2017年   93篇
  2016年   119篇
  2015年   130篇
  2014年   176篇
  2013年   205篇
  2012年   260篇
  2011年   286篇
  2010年   251篇
  2009年   283篇
  2008年   349篇
  2007年   357篇
  2006年   273篇
  2005年   281篇
  2004年   212篇
  2003年   206篇
  2002年   162篇
  2001年   135篇
  2000年   93篇
  1999年   40篇
  1998年   23篇
  1997年   23篇
  1996年   11篇
  1995年   1篇
  1994年   3篇
  1993年   3篇
  1992年   3篇
  1991年   5篇
  1990年   1篇
  1989年   1篇
  1988年   2篇
  1987年   1篇
  1985年   1篇
排序方式: 共有4328条查询结果,搜索用时 15 毫秒
21.
本文用超声浸液法测量了单向纤维增强热塑性树脂及其半互穿聚合物网络(Semi-IPN)复合材料的杨氏模量、剪切模量、泊松比和内耗,并对不同树脂、纤维和Semi-IPN中共混组成比对弹性性能的影响进行了研究。  相似文献   
22.
数字水印技术作为数字媒体版权保护的重要手段越来越引起人们的重视。文章讨论了数字水印的概念、特征,重点介绍了数字水印的鲁棒性及影响数字水印鲁棒性的因素,总结和分析了数字水印主要攻击方式并提出相应的应对措施。  相似文献   
23.
As one of the famous block-based image coding schemes,block truncation coding(BTC) has been also applied in digital watermarking.Previous BTC-based watermarking or hiding schemes usually embed secret data by modifying the BTC encoding stage or BTC-compressed data,obtaining the watermarked image with poorer quality than the BTC-compressed version.This paper presents a new oblivious image watermarking scheme by exploiting BTC bitmaps.Unlike the traditional schemes,our approach does not really perform the BTC compression on images during the embedding process but utilizes the parity of the number of horizontal edge transitions in each BTC bitmap to guide the watermark embedding and extraction processes.The embedding process starts by partitioning the original cover image into non-overlapping 4×4 blocks and performing BTC on each block to obtain its BTC bitmap.One watermark bit is embedded in each block by modifying at most three pixel values in the block to make sure that the parity of the number of horizontal edge transitions in the bitmap of the modified block is equal to the embedded watermark bit.In the extraction stage,the suspicious image is first partitioned into non-overlapping 4×4 blocks and BTC is performed on each block to obtain its bitmap.Then,by checking the parity of the number of horizontal edge transitions in the bitmap,we can extract one watermark bit in each block.Experimental results demonstrate that the proposed watermarking scheme is fragile to various image processing operations while keeping the transparency very well.  相似文献   
24.
We propose a robust digital watermarking algorithm for copyright protection.A stable feature is obtained by utilizing QR factorization and discrete cosine transform(DCT) techniques,and a meaningful watermark image is embedded into an image by modifying the stable feature with a quantization index modulation(QIM) method.The combination of QR factorization,DCT,and QIM techniques guarantees the robustness of the algorithm.Furthermore,an embedding location selection method is exploited to select blocks with small modifications as the embedding locations.This can minimize the embedding distortion and greatly improve the imperceptibility of our scheme.Several standard images were tested and the experimental results were compared with those of other published schemes.The results demonstrate that our proposed scheme can achieve not only better imperceptibility,but also stronger robustness against common signal processing operations and lossy compressions,such as filtering,noise addition,scaling,sharpening,rotation,cropping,and JPEG/JPEG2000 compression.  相似文献   
25.
We propose a new multipurpose audio watermarking scheme in which two complementary watermarks are used.For audio copyright protection,the watermark data with copyright information or signature are first encrypted by Arnold transformation.Then the watermark data are inserted in the low frequency largest significant discrete cosine transform(DCT) coefficients to obtain robustness performance.For audio authentication,a chaotic signal is inserted in the high frequency insignificant DCT coefficients to detect tampered regions.Furthermore,the synchronization code is embedded in the audio statistical characteristics to resist desynchronization attacks.Experimental results show that our proposed method can not only obtain satisfactory detection and tampered location,but also achieve imperceptibility and robustness to common signal processing attacks,such as cropping,shifting,and time scale modification(TSM).Comparison results show that our method outperforms some existing methods.  相似文献   
26.
在数字水印研究中,一个重要的问题是水印的不可见性与鲁棒性之间的折中。根据实际应用,数字水印的嵌入规则主要有乘性规则、加性规则和一种区域融合嵌入规则。本文主要从数字水印的抗攻击性方面,结合不同的嵌入规则,对各种常见图像攻击进行测试,在检测不同嵌入规则性能优劣的同时,为水印方法的选择与应用,提供指导和参考,以达到最佳的使用目的。  相似文献   
27.
一种基于Matlab图形用户界面的数字水印系统   总被引:1,自引:0,他引:1  
数字水印技术是一种典型的信息网络安全有效保护措施。文章运用Maflab软件强大的GUI(图形用户界面)功能开发出一种基于小波变换的数字水印系统,该系统的构建是通过对载体彩色图像进行小波变换,然后将二值水印图像嵌入到小波变换后载体图像的低频子带中。实验结果证明,文章利用Matlab软件构建的数字水印系统在抗噪声攻击、JPEG压缩、小幅度剪切方面效果良好,稳健性强。  相似文献   
28.
对多媒体产品进行数字水印处理是解决这类产品的版权保护的有效途径。从数字水印的概念、原理和基本特性出发,探讨了如何构造版权水印信息、嵌入用户指定的授权信息、版权水印鉴定等问题。  相似文献   
29.
This paper addresses the problem of semi‐global stabilization by output feedback for a class of nonlinear systems whose output gains are unknown. For each subsystem, we first design a state compensator and use the compensator states to construct a control law to stabilize the nominal linear system without the perturbing nonlinearities. Then, combining the output feedback domination approach with block‐backstepping scheme, a series of homogeneous output feedback controllers are constructed recursively for each subsystem and the closed‐loop system is rendered semi‐globally asymptotically stable.  相似文献   
30.
In this paper, a feedback model predictive control method is presented to tackle control problems with constrained multivariables for uncertain discrete‐time nonlinear Markovian jump systems. An uncertain Markovian jump fuzzy system (MJFS) is obtained by employing the Takagi‐Sugeno (T‐S) fuzzy model to represent a discrete‐time nonlinear system with norm bounded uncertainties and Markovain jump parameters. To achieve more generality, the transition probabilities of the Markov chain are assumed to be partly unknown and partly accessible. The predictive formulation adopts an on‐line optimization paradigm that utilizes the closed‐loop state feedback controller and is solved using the standard semi‐definite programming (SDP). To reduce the on‐line computational burden, a mode independent control move is calculated at every sampling time based on a stochastic fuzzy Lyapunov function (FLF) and a parallel distributed compensation (PDC) scheme. The robust mean square stability, performance minimization and constraint satisfaction properties are guaranteed under the control move for all admissible uncertainties. A numerical example is given to show the efficiency of the developed approach. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号