首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20843篇
  免费   2766篇
  国内免费   2242篇
电工技术   967篇
技术理论   2篇
综合类   2218篇
化学工业   233篇
金属工艺   175篇
机械仪表   916篇
建筑科学   446篇
矿业工程   338篇
能源动力   59篇
轻工业   192篇
水利工程   158篇
石油天然气   100篇
武器工业   181篇
无线电   7949篇
一般工业技术   705篇
冶金工业   155篇
原子能技术   76篇
自动化技术   10981篇
  2024年   97篇
  2023年   265篇
  2022年   464篇
  2021年   575篇
  2020年   656篇
  2019年   477篇
  2018年   502篇
  2017年   712篇
  2016年   760篇
  2015年   961篇
  2014年   1659篇
  2013年   1578篇
  2012年   1753篇
  2011年   1738篇
  2010年   1426篇
  2009年   1363篇
  2008年   1578篇
  2007年   1719篇
  2006年   1394篇
  2005年   1356篇
  2004年   1121篇
  2003年   959篇
  2002年   676篇
  2001年   610篇
  2000年   367篇
  1999年   255篇
  1998年   185篇
  1997年   172篇
  1996年   130篇
  1995年   130篇
  1994年   64篇
  1993年   33篇
  1992年   29篇
  1991年   25篇
  1990年   18篇
  1989年   13篇
  1988年   9篇
  1987年   9篇
  1986年   4篇
  1985年   5篇
  1984年   1篇
  1983年   2篇
  1980年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
This paper presents a novel No-Reference Video Quality Assessment (NR-VQA) model that utilizes proposed 3D steerable wavelet transform-based Natural Video Statistics (NVS) features as well as human perceptual features. Additionally, we proposed a novel two-stage regression scheme that significantly improves the overall performance of quality estimation. In the first stage, transform-based NVS and human perceptual features are separately passed through the proposed hybrid regression scheme: Support Vector Regression (SVR) followed by Polynomial curve fitting. The two visual quality scores predicted from the first stage are then used as features for the similar second stage. This predicts the final quality scores of distorted videos by achieving score level fusion. Extensive experiments were conducted using five authentic and four synthetic distortion databases. Experimental results demonstrate that the proposed method outperforms other published state-of-the-art benchmark methods on synthetic distortion databases and is among the top performers on authentic distortion databases. The source code is available at https://github.com/anishVNIT/two-stage-vqa.  相似文献   
2.
The ability to detect gun and gun held in hand or other body parts is a typical human skill. The same problem presents an imperative task for computer vision system. Automatic observer independent detection of hand held gun or gun held in the other body part, whether it is visible or concealed, provides enhance security in vulnerable places and initiates appropriate action there. Compare to the automatic object detection systems, automatic detection of gun has very few successful attempts. In the present scope of this paper, we present an extensive survey on automatic detection of gun and define a taxonomy for this particular detection system. We also describe the inherent difficulties related with this problem. In this survey of published papers, we examine different approaches used in state-of-the-art attempts and compare performances of these approaches. Finally, this paper concludes pointing to the possible research gaps in related fields.  相似文献   
3.
The use of field robots can greatly decrease the amount of time, effort, and associated risk compared to if human workers were to carryout certain tasks such as disaster response. However, transportability and reliability remain two main issues for most current robot systems. To address the issue of transportability, we have developed a lightweight modularizable platform named AeroArm. To address the issue of reliability, we utilize a multimodal sensing approach, combining the use of multiple sensors and sensor types, and the use of different detection algorithms, as well as active continuous closed‐loop feedback to accurately estimate the state of the robot with respect to the environment. We used Challenge 2 of the 2017 Mohammed Bin Zayed International Robotics Competition as an example outdoor manipulation task, demonstrating the capabilities of our robot system and approach in achieving reliable performance in the fields, and ranked fifth place internationally in the competition.  相似文献   
4.
介绍了目前最炙手可热的REST架构风格,该风格顺应Web2.0的兴起,完美的匹配了云计算时代来临的可扩展要求,在各种应用场景中都得到了充分的表现。根据其技术特点,分析了该风格的API在移动通信网络管理中的应用,从网管系统内部、网管系统之间以及网管系统与上层APP应用之间等多方面对是否适用于REST风格以及如何在合适的位置使用REST API进行了分析。  相似文献   
5.
针对传统移动代理(MA)在监测无线传感器网络(WSNs)的感兴趣信息时产生的延迟较大和能耗较多问题,提出了基于三维胞元空间的MA双向并行(3D-BPMA)路由算法.3D-BPMA将MA与传统的客户/服务器(c/S)模式相结合,在胞元内利用C/S模式搜集信息,在单层胞元系统和路由器与路由器之间采用MA双向并行的策略进行传输.仿真结果表明:3D-BPMA与LCF,DSG-MIP算法相比减少了平均响应时间和网络平均能耗,提高了MA发送率.  相似文献   
6.
In this paper we combine video compression and modern image processing methods. We construct novel iterative filter methods for prediction signals based on Partial Differential Equation (PDE) based methods. The mathematical framework of the employed diffusion filter class is given and some desirable properties are stated. In particular, two types of diffusion filters are constructed: a uniform diffusion filter using a fixed filter mask and a signal adaptive diffusion filter that incorporates the structures of the underlying prediction signal. The latter has the advantage of not attenuating existing edges while the uniform filter is less complex. The filters are embedded into a software based on HEVC with additional QTBT (Quadtree plus Binary Tree) and MTT (Multi-Type-Tree) block structure. In this setting, several measures to reduce the coding complexity of the tool are introduced, discussed and tested thoroughly. The coding complexity is reduced by up to 70% while maintaining over 80% of the gain. Overall, the diffusion filter method achieves average bitrate savings of 2.27% for Random Access having an average encoder runtime complexity of 119% and 117% decoder runtime complexity. For individual test sequences, results of 7.36% for Random Access are accomplished.  相似文献   
7.
在通讯设备爆炸式增长的时代,移动边缘计算作为5G通讯技术的核心技术之一,对其进行合理的资源分配显得尤为重要。移动边缘计算的思想是把云计算中心下沉到基站部署(边缘云),使云计算中心更加靠近用户,以快速解决计算资源分配问题。但是,相对于大型的云计算中心,边缘云的计算资源有限,传统的虚拟机分配方式不足以灵活应对边缘云的计算资源分配问题。为解决此问题,提出一种根据用户综合需求变化的动态计算资源和频谱分配算法(DRFAA),采用"分治"策略,并将资源模拟成"流体"资源进行分配,以寻求较大的吞吐量和较低的传输时延。实验仿真结果显示,动态计算资源和频谱分配算法可以有效地降低用户与边缘云之间的传输时延,也可以提高边缘云的吞吐量。  相似文献   
8.
Many studies have demonstrated the crucial role of vocabulary in predicting reading performance in general. More recent work has indicated that one particular facet of vocabulary (its depth) is more closely related to language comprehension, especially inferential comprehension. On this basis, we developed a training application to specifically improve vocabulary depth. The objective of this study was to test the effectiveness of a mobile application designed to improve vocabulary depth. The effectiveness of this training was examined on 3rd and 4th grade children's vocabulary (breadth and depth), decoding and comprehension performances. A randomized waiting-list control paradigm was used in which an experimental group first received the intervention during the first 4 weeks (between pretest and post-test1), thereafter, a waiting control group received the training for the next 4 weeks (between postest1 and posttest2). Results showed that the developed application led to significant improvements in terms of vocabulary depth performance, as well as a significant transfer effect to reading comprehension. However, we did not observe such a beneficial effect on either vocabulary breadth or written word identification. These results are discussed in terms of the links between vocabulary depth and comprehension, and the opportunities the app presents for remedying language comprehension deficits in children.  相似文献   
9.
This study proposes an analytical and flexible terrain risk assessment method for military surveillance applications for mobile assets. Considering the risk as the degree of possibility of insurgent presence, the assessment method offers an efficient evaluation of risk in the surrounding terrain for military combat operating posts or observation posts. The method is designed for unmanned aerial vehicles as the surveillance assets of choice to improve the effectiveness of their use. Starting with the area map and geographical data, the target terrain is first digitized for space representation. Then the data of nine geographical parameters are used to formulate five contributing risk factors. These factors are incorporated in an analytical framework to generate a composite map with risk scores that reveal the potential high-risk spots in the terrain. The proposed method is also applied to a real-life case study of COP Kahler in Afghanistan, which was a target for insurgent attacks in 2008. The results confirm that when evaluated with the developed method, the region that the insurgents used to approach COP Kahler has high concentration of high-risk cells.  相似文献   
10.
近年来深度学习迅猛发展,颠覆了语音识别、图像分类、文本理解等领域的算法设计思路。深度学习因其具备强大的特征提取能力,在图像识别领域的成绩尤为突出。然而深度学习与视频监控领域的结合并不多,由于深度模型具有多层网络结构,算法复杂度大,训练和更新模型时比较耗时,很难满足实时性要求。回顾了深度学习的发展史,介绍了最近10年来国内外深度学习主要模型,论述了基于深度学习的目标跟踪算法,指出了各算法的优缺点,最后对当前该领域存在的问题和发展前景进行了总结和展望。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号