全文获取类型
收费全文 | 7470篇 |
免费 | 935篇 |
国内免费 | 660篇 |
专业分类
电工技术 | 536篇 |
技术理论 | 1篇 |
综合类 | 561篇 |
化学工业 | 62篇 |
金属工艺 | 56篇 |
机械仪表 | 312篇 |
建筑科学 | 307篇 |
矿业工程 | 89篇 |
能源动力 | 60篇 |
轻工业 | 43篇 |
水利工程 | 108篇 |
石油天然气 | 37篇 |
武器工业 | 32篇 |
无线电 | 1993篇 |
一般工业技术 | 378篇 |
冶金工业 | 91篇 |
原子能技术 | 15篇 |
自动化技术 | 4384篇 |
出版年
2024年 | 26篇 |
2023年 | 94篇 |
2022年 | 218篇 |
2021年 | 247篇 |
2020年 | 274篇 |
2019年 | 157篇 |
2018年 | 167篇 |
2017年 | 221篇 |
2016年 | 332篇 |
2015年 | 350篇 |
2014年 | 572篇 |
2013年 | 516篇 |
2012年 | 558篇 |
2011年 | 645篇 |
2010年 | 465篇 |
2009年 | 481篇 |
2008年 | 510篇 |
2007年 | 579篇 |
2006年 | 475篇 |
2005年 | 399篇 |
2004年 | 387篇 |
2003年 | 309篇 |
2002年 | 247篇 |
2001年 | 171篇 |
2000年 | 144篇 |
1999年 | 123篇 |
1998年 | 85篇 |
1997年 | 77篇 |
1996年 | 42篇 |
1995年 | 41篇 |
1994年 | 38篇 |
1993年 | 29篇 |
1992年 | 13篇 |
1991年 | 13篇 |
1990年 | 6篇 |
1989年 | 8篇 |
1988年 | 10篇 |
1987年 | 1篇 |
1986年 | 3篇 |
1985年 | 8篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1979年 | 2篇 |
1978年 | 3篇 |
1977年 | 1篇 |
1976年 | 7篇 |
1974年 | 2篇 |
1973年 | 1篇 |
1972年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有9065条查询结果,搜索用时 0 毫秒
1.
In this paper we combine video compression and modern image processing methods. We construct novel iterative filter methods for prediction signals based on Partial Differential Equation (PDE) based methods. The mathematical framework of the employed diffusion filter class is given and some desirable properties are stated. In particular, two types of diffusion filters are constructed: a uniform diffusion filter using a fixed filter mask and a signal adaptive diffusion filter that incorporates the structures of the underlying prediction signal. The latter has the advantage of not attenuating existing edges while the uniform filter is less complex. The filters are embedded into a software based on HEVC with additional QTBT (Quadtree plus Binary Tree) and MTT (Multi-Type-Tree) block structure. In this setting, several measures to reduce the coding complexity of the tool are introduced, discussed and tested thoroughly. The coding complexity is reduced by up to 70% while maintaining over 80% of the gain. Overall, the diffusion filter method achieves average bitrate savings of 2.27% for Random Access having an average encoder runtime complexity of 119% and 117% decoder runtime complexity. For individual test sequences, results of 7.36% for Random Access are accomplished. 相似文献
2.
Basins with various mineral resources coexisting and enriching often occupy an important strategic position. The exploration of various mineral resources is repetitive at present due to unshared data and imperfect management mechanism. This situation greatly increases the cost of energy exploitation in the country. Traditional data-sharing mode has several disadvantages, such as high cost, difficulty in confirming the right of data, and lack of incentive mechanism, which make achieving real data sharing difficult. In this paper, we propose a data-sharing mechanism based on blockchain and provide implementation suggestions and technical key points. Compared with traditional data-sharing methods, the proposed data-sharing mechanism can realize data sharing, ensure data quality, and protect intellectual property. Moreover, key points in the construction are stated in the case study section to verify the feasibility of the data-sharing system based on blockchain proposed in this paper. 相似文献
3.
A double optimal projection method that involves projections for intra-cluster and inter-cluster dimensionality reduction are proposed for video fingerprinting. The video is initially set as a graph with frames as its vertices in a high-dimensional space. A similarity measure that can compute the weights of the edges is then proposed. Subsequently, the video frames are partitioned into different clusters based on the graph model. Double optimal projection is used to explore the optimal mapping points in a low-dimensional space to reduce the video dimensions. The statistics and geometrical fingerprints are generated to determine whether a query video is copied from one of the videos in the database. During matching, the video can be roughly matched by utilizing the statistics fingerprint. Further matching is thereafter performed in the corresponding group using geometrical fingerprints. Experimental results show the good performance of the proposed video fingerprinting method in robustness and discrimination. 相似文献
4.
ABSTRACTIn recent times, the applications of multimedia are rising in a greedy mode and hence the amount of video transactions is also increasing exponentially. This has shouted great demands on effective models on video encoding and also for reducing the transmission channel congestion. This research work introduces a managing technique termed weighted encoding for High-Efficiency Video Coding (HEVC). HEVC, also termed as MPEG-H Part 2 and H.265 is a video compression standard that is widely utilized AVC (H.264 or MPEG-4 Part 10). When compared to AVC, HEVC grants double the ratio of data compression at a similar level of quality of the video or considerably enhanced video quality at a similar bit rate. This work intends to optimize the weight that adopted in HEVC for encoding. For this, this paper proposes a new Iterative based propagation update in the water wave Optimization Algorithm (IPU-WWO), which is the improved form of Water wave Optimization (WWO). The performance of proposed IPU-WWO is compared over other conventional methods like Artificial Bee Colony (ABC), Firefly (FF), Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) with respect to Peak Signal to Noise Ratio (PSNR). By doing the encoding process, it minimizes the video size with perceptually better quality video or PSNR. 相似文献
5.
开关电源的平均电流自动均流技术 总被引:1,自引:0,他引:1
针对多个开关电源并联时易出现负载电流在各模块间分配不均的现象,介绍了常用的负载电流自动均流法——平均电流自动均流法及其工作特性。并针对其存在母线电压降低的缺陷,提出了一种改进的平均电流自动均流方法,经试验证明均流精度比较高。 相似文献
6.
7.
主要对各国3G许可证与使用技术标准的抽绑政策.各国对2G/3G网络漫游的管制规定。以及3G网络之间共享的种类及实施方式等方面做了详尽的讲解,并进行比较和分析。 相似文献
8.
9.
可验证秘密分享在实用密码学领域内是一个非常重要的工具,它在密钥管理协议、门限或分布式签名协议、电子商务、多方安全计算及团体式密码系统等许多方面都有极为广泛的应用。针对一类突发事务须及时、安全解决的特点, 利用离散对数问题的难解性,在假设初始化阶段和秘密恢复阶段始终有一位值得信赖的分发者参与的情况下,提出了一个可公开验证的门限秘密分享方案。 相似文献
10.
In this letter, a new sharing mechanism, SRLG sharing, is proposed, which allows the links of the same shared risk link group (SRLG) in a primary light tree to share protections in WDM optical networks. In previous studies, how to share spare resources with SRLG constraints has not been studied in multicast optical networks. In this letter, considering SRLG sharing, we propose a novel algorithm –multicast with SRLG sharing (MSS)– to establish a protection light tree. Finally, the algorithm MSS and the algorithm multicast with no SRLG sharing (MNSS) are compared through a simulation to show that our new sharing scheme of SRLG sharing is more efficient than that of no SRLG sharing in terms of spare resource utilization and blocking probability. 相似文献