首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6071篇
  免费   258篇
  国内免费   244篇
电工技术   166篇
综合类   400篇
化学工业   118篇
金属工艺   202篇
机械仪表   522篇
建筑科学   304篇
矿业工程   139篇
能源动力   56篇
轻工业   143篇
水利工程   84篇
石油天然气   50篇
武器工业   33篇
无线电   730篇
一般工业技术   240篇
冶金工业   36篇
原子能技术   18篇
自动化技术   3332篇
  2024年   11篇
  2023年   81篇
  2022年   77篇
  2021年   138篇
  2020年   125篇
  2019年   94篇
  2018年   61篇
  2017年   95篇
  2016年   122篇
  2015年   167篇
  2014年   287篇
  2013年   284篇
  2012年   391篇
  2011年   405篇
  2010年   362篇
  2009年   427篇
  2008年   378篇
  2007年   414篇
  2006年   462篇
  2005年   433篇
  2004年   314篇
  2003年   347篇
  2002年   305篇
  2001年   188篇
  2000年   202篇
  1999年   116篇
  1998年   76篇
  1997年   34篇
  1996年   26篇
  1995年   27篇
  1994年   17篇
  1993年   18篇
  1992年   18篇
  1991年   8篇
  1990年   9篇
  1989年   9篇
  1988年   4篇
  1987年   1篇
  1986年   5篇
  1985年   6篇
  1984年   5篇
  1983年   6篇
  1982年   8篇
  1981年   5篇
  1980年   1篇
  1979年   1篇
  1977年   1篇
  1976年   2篇
排序方式: 共有6573条查询结果,搜索用时 31 毫秒
1.
The ability to detect gun and gun held in hand or other body parts is a typical human skill. The same problem presents an imperative task for computer vision system. Automatic observer independent detection of hand held gun or gun held in the other body part, whether it is visible or concealed, provides enhance security in vulnerable places and initiates appropriate action there. Compare to the automatic object detection systems, automatic detection of gun has very few successful attempts. In the present scope of this paper, we present an extensive survey on automatic detection of gun and define a taxonomy for this particular detection system. We also describe the inherent difficulties related with this problem. In this survey of published papers, we examine different approaches used in state-of-the-art attempts and compare performances of these approaches. Finally, this paper concludes pointing to the possible research gaps in related fields.  相似文献   
2.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)).  相似文献   
3.
4.
5.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks.  相似文献   
6.
The majority of visualizations on the web are still stored as raster images, making them inaccessible to visually impaired users. We propose a deep‐neural‐network‐based approach that automatically recognizes key elements in a visualization, including a visualization type, graphical elements, labels, legends, and most importantly, the original data conveyed in the visualization. We leverage such extracted information to provide visually impaired people with the reading of the extracted information. Based on interviews with visually impaired users, we built a Google Chrome extension designed to work with screen reader software to automatically decode charts on a webpage using our pipeline. We compared the performance of the back‐end algorithm with existing methods and evaluated the utility using qualitative feedback from visually impaired users.  相似文献   
7.
陆斌  何志强 《信息技术》2003,27(7):95-97
交互控制是计算机程序的重要功能 ,也是实现人—机对话的基本途径。VisualBasic编程语言以其易学习掌握、开发灵活的特点而成为目前流行的程序开发工具 ,本文以VisualBasic语言为例介绍了交互控制程序编程方法 ,并对具体的每一种方法编写了相应的示例。  相似文献   
8.
数据采集与监控软件Genie   总被引:2,自引:0,他引:2  
缑西梅 《机床电器》2002,29(3):24-25,38
Genie是具有国际先进水平的数据采集与监控软件,它提供了一个面向对象的图形化用户界面,因此简化了数据采集过程、控制应用程序开发和操作员界面。本文介绍了Genie的特点、功能、基本用途以及VISUALBA-SIC在设计这类监控软件中的作用。  相似文献   
9.
曹瑞忻 《包装工程》2002,23(3):157-158,161
阐述了视觉符号语言在版面设计中的编码与各种表现形式,强调信息社会的来临,以视觉为形态的符号语言将有效加速信息的传递。  相似文献   
10.
This paper presents a quantum protocol that demonstrates that weak coin flipping with bias ≈0.239, less than 1/4, is possible. A bias of 1/4 was the smallest known, and followed from the strong coin flipping protocol of Ambainis in [33rd STOC, 2001] (also proposed by Spekkens and Rudolph [Phys. Rev. A 65 (2002) 012310]). Protocols with yet smaller bias ≈0.207 have independently been discovered by Ambainis (2001) and Spekkens and Rudolph [Phys. Rev. Lett. 89 (2002) 227901]. We also present an alternative strong coin flipping protocol with bias 1/4 with analysis simpler than that of Ambainis [33rd STOC, 2001].  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号