首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19446篇
  免费   4789篇
  国内免费   3610篇
电工技术   1391篇
技术理论   2篇
综合类   2741篇
化学工业   485篇
金属工艺   489篇
机械仪表   1845篇
建筑科学   947篇
矿业工程   406篇
能源动力   163篇
轻工业   385篇
水利工程   239篇
石油天然气   876篇
武器工业   292篇
无线电   3554篇
一般工业技术   1293篇
冶金工业   449篇
原子能技术   48篇
自动化技术   12240篇
  2024年   329篇
  2023年   678篇
  2022年   1280篇
  2021年   1224篇
  2020年   1270篇
  2019年   1044篇
  2018年   849篇
  2017年   927篇
  2016年   1012篇
  2015年   1098篇
  2014年   1441篇
  2013年   1317篇
  2012年   1792篇
  2011年   1771篇
  2010年   1426篇
  2009年   1328篇
  2008年   1296篇
  2007年   1385篇
  2006年   1143篇
  2005年   1011篇
  2004年   797篇
  2003年   674篇
  2002年   554篇
  2001年   448篇
  2000年   400篇
  1999年   328篇
  1998年   234篇
  1997年   191篇
  1996年   160篇
  1995年   102篇
  1994年   88篇
  1993年   47篇
  1992年   51篇
  1991年   28篇
  1990年   28篇
  1989年   21篇
  1988年   5篇
  1986年   9篇
  1985年   11篇
  1984年   8篇
  1983年   10篇
  1982年   5篇
  1979年   4篇
  1977年   4篇
  1975年   2篇
  1963年   2篇
  1962年   2篇
  1961年   2篇
  1960年   2篇
  1959年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Small object detection is challenging and far from satisfactory. Most general object detectors suffer from two critical issues with small objects: (1) Feature extractor based on classification network cannot express the characteristics of small objects reasonably due to insufficient appearance information of targets and a large amount of background interference around them. (2) The detector requires a much higher location accuracy for small objects than for general objects. This paper proposes an effective and efficient small object detector YOLSO to address the above problems. For feature representation, we analyze the drawbacks in previous backbones and present a Half-Space Shortcut(HSSC) module to build a background-aware backbone. Furthermore, a coarse-to-fine Feature Pyramid Enhancement(FPE) module is introduced for layer-wise aggregation at a granular level to enhance the semantic discriminability. For loss function, we propose an exponential L1 loss to promote the convergence of regression, and a focal IOU loss to focus on prime samples with high classification confidence and high IOU. Both of them significantly improves the location accuracy of small objects. The proposed YOLSO sets state-of-the-art results on two typical small object datasets, MOCOD and VeDAI, at a speed of over 200 FPS. In the meantime, it also outperforms the baseline YOLOv3 by a wide margin on the common COCO dataset.  相似文献   
2.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
3.
Electromagnetic signal emitted by satellite communication (satcom) transmitters are used to identify specific individual uplink satcom terminals sharing the common transponder in real environment, which is known as specific emitter identification (SEI) that allows for early indications and warning (I&W) of the targets carrying satcom furnishment and furthermore the real time electromagnetic situation awareness in military operations. In this paper, the authors are the first to propose the identification of specific transmitters of satcom by using probabilistic neural networks (PNN) to reach the goal of target recognition. We have been devoted to the examination by exploring the feasibility of utilizing the Hilbert transform to signal preprocessing, applying the discrete wavelet transform to feature extraction, and employing the PNN to perform the classification of stationary signals. There are a total of 1000 sampling time series with binary phase shift keying (BPSK) modulation originated by five types of satcom transmitters in the test. The established PNNs classifier implements the data testing and finally yields satisfactory accuracy at 8 dB(±1 dB) carrier to noise ratio, which indicates the feasibility of our method, and even the keen insight of its application in military.  相似文献   
4.
Synthesis of nanocrystalline pristine and Mn-doped calcium copper titanate quadruple perovskites, CaCu3?xMnxTi4?xMnxO12 (x = 0, 0.5, and 1.0) by modified citrate solution combustion method has been reported. Powder X-ray diffraction patterns attest the phase purity of the perovskite materials. Average particle sizes of all the materials obtained from the Scherrer's formula are in the range of 55–70 nm. The specific surface areas for all the perovskites obtained from BET isotherms are found to be low as expected for the condensed oxide systems and fall in the range of 13–17 m2 g?1. Transmission electron microscopy studies show a reduction in particle size of CaCu3Ti4O12 with increase in Mn doping. Ca and Ti are present in +2 and +4 oxidation states in all the materials as demonstrated by X-ray photoelectron spectroscopy analyses. Cu2+ gets reduced in CaCu3Ti4O12 with higher Mn content. Mn is observed to be present only in +3 oxidation state. All the materials have been examined to be active in CO oxidation as well as H2 production from methanol steam reforming. CaCu3Ti4O12 with ~14 at.% Mn is found to show best catalytic activities among these materials. A comprehensive analysis of the catalytic activities of these perovskites toward CO oxidation and H2 production from MSR reveal the cooperative activity of copper-manganese in the doped perovskites and it is more effective at lower manganese content.  相似文献   
5.
The purpose of feature construction is to create new higher-level features from original ones. Genetic Programming (GP) was usually employed to perform feature construction tasks due to its flexible representation. Filter-based approach and wrapper-based approach are two commonly used feature construction approaches according to their different evaluation functions. In this paper, we propose a hybrid feature construction approach using genetic programming (Hybrid-GPFC) that combines filter’s fitness function and wrapper’s fitness function, and propose a multiple feature construction method that stores top excellent individuals during a single GP run. Experiments on ten datasets show that our proposed multiple feature construction method (Fcm) can achieve better (or equivalent) classification performance than the single feature construction method (Fcs), and our Hybrid-GPFC can obtain better classification performance than filter-based feature construction approaches (Filter-GPFC) and wrapper-based feature construction approaches (Wrapper-GPFC) in most cases. Further investigations on combinations of constructed features and original features show that constructed features augmented with original features do not improve the classification performance comparing with constructed features only. The comparisons with three state-of-art methods show that in majority of cases, our proposed hybrid multiple feature construction approach can achieve better classification performance.  相似文献   
6.
An explicit extraction of the retinal vessel is a standout amongst the most significant errands in the field of medical imaging to analyze both the ophthalmological infections, for example, Glaucoma, Diabetic Retinopathy (DR), Retinopathy of Prematurity (ROP), Age-Related Macular Degeneration (AMD) as well as non retinal sickness such as stroke, hypertension and cardiovascular diseases. The state of the retinal vasculature is a significant indicative element in the field of ophthalmology. Retinal vessel extraction in fundus imaging is a difficult task because of varying size vessels, moderately low distinction, and presence of pathologies such as hemorrhages, microaneurysms etc. Manual vessel extraction is a challenging task due to the complicated nature of the retinal vessel structure, which also needs strong skill set and training. In this paper, a supervised technique for blood vessel extraction in retinal images using Modified Adaboost Extreme Learning Machine (MAD-ELM) is proposed. Firstly, the fundus image preprocessing is done for contrast enhancement and in-homogeneity correction. Then, a set of core features is extracted, and the best features are selected using “minimal Redundancy-maximum Relevance (mRmR).” Later, using MAD-ELM method vessels and non vessels are classified. DRIVE and DR-HAGIS datasets are used for the evaluation of the proposed method. The algorithm’s performance is assessed based on accuracy, sensitivity and specificity. The proposed technique attains accuracy of 0.9619 on the DRIVE database and 0.9519 on DR-HAGIS database, which contains pathological images. Our results show that, in addition to healthy retinal images, the proposed method performs well in extracting blood vessels from pathological images and is therefore comparable with state of the art methods.  相似文献   
7.
ABSTRACT

This paper proposes the multiple-hypotheses image segmentation and feed-forward neural network classifier for food recognition to improve the performance. Initially, the food or meal image is given as input. Then, the segmentation is applied to identify the regions, where a particular food item is located using salient region detection, multi-scale segmentation, and fast rejection. Then, the features of every food item are extracted by the global feature and local feature extraction. After the features are obtained, the classification is performed for each segmented region using a feed-forward neural network model. Finally, the calorie value is computed with the aid of (i) food volume and (ii) calorie and nutrition measure based on mass value. The experimental results and performance evaluation are validated. The outcome of the proposed method attains 0.947 for Macro Average Accuracy (MAA) and 0.959 for Standard Accuracy (SA), which provides better classification performance.  相似文献   
8.
论述了当前腐败现象的表现和特点,分析了产生腐败现象的主要原因,提出了治理腐败现象的对策措施: 建立有效的教育机制、严格的用人机制、规范的决策机制、健全的管理机制、完善的监督机制和有力的责任追究机制,建立科学的法人治理结构并实行纪检监察机构派驻制。  相似文献   
9.
协同作战能力简析   总被引:2,自引:0,他引:2  
协同作战能力(CEC)是一种充分利用网络技术的新型海岸防空技术,给系统的作战能力带来了革命性的交破。本文对协同作战能力的产生、功能、组成以及未来的发展趋势作了详细的介绍,阐述了CEC系统的总体设计思想。在此基础上,将CEC系统与传统的作战系统的性能和设计思想在各方面进行了比较,交出了CEC系统各方面的优越性能。协同作战能力是现代和未来作战系统的发展方向,CEC系统的发展必将成为衡量各国国防科技现代化的重要指标。  相似文献   
10.
本文提出了一种基于信息融合的物体三维特征的提取方法,该方法利用两幅互相配准的三维测距图像和灰度图像,来提取多面体的三维特征。首先,通过分析灰度图像中的灰度变化及测距图像中的测距值变化,分别求取各自图像中物体的特征点及特征边;然后,利用两配准图像之间的对应关系,求得所有特征点、面与多边形在三维测距图像中的三维表示;接着,通过分析三维测距图像中所测得的各候选平面上特定点与边处的曲率及法向,验证候选平面  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号