全文获取类型
收费全文 | 12643篇 |
免费 | 1076篇 |
国内免费 | 657篇 |
专业分类
电工技术 | 141篇 |
综合类 | 399篇 |
化学工业 | 343篇 |
金属工艺 | 381篇 |
机械仪表 | 1048篇 |
建筑科学 | 314篇 |
矿业工程 | 97篇 |
能源动力 | 92篇 |
轻工业 | 234篇 |
水利工程 | 37篇 |
石油天然气 | 91篇 |
武器工业 | 76篇 |
无线电 | 2770篇 |
一般工业技术 | 946篇 |
冶金工业 | 61篇 |
原子能技术 | 97篇 |
自动化技术 | 7249篇 |
出版年
2024年 | 13篇 |
2023年 | 118篇 |
2022年 | 167篇 |
2021年 | 302篇 |
2020年 | 280篇 |
2019年 | 188篇 |
2018年 | 219篇 |
2017年 | 320篇 |
2016年 | 437篇 |
2015年 | 434篇 |
2014年 | 752篇 |
2013年 | 647篇 |
2012年 | 665篇 |
2011年 | 839篇 |
2010年 | 656篇 |
2009年 | 713篇 |
2008年 | 736篇 |
2007年 | 859篇 |
2006年 | 815篇 |
2005年 | 742篇 |
2004年 | 695篇 |
2003年 | 711篇 |
2002年 | 547篇 |
2001年 | 406篇 |
2000年 | 329篇 |
1999年 | 322篇 |
1998年 | 291篇 |
1997年 | 250篇 |
1996年 | 175篇 |
1995年 | 131篇 |
1994年 | 103篇 |
1993年 | 82篇 |
1992年 | 59篇 |
1991年 | 56篇 |
1990年 | 43篇 |
1989年 | 34篇 |
1988年 | 35篇 |
1987年 | 14篇 |
1986年 | 22篇 |
1985年 | 33篇 |
1984年 | 21篇 |
1983年 | 31篇 |
1982年 | 17篇 |
1981年 | 23篇 |
1980年 | 16篇 |
1979年 | 9篇 |
1978年 | 8篇 |
1977年 | 2篇 |
1974年 | 2篇 |
1973年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
To save bandwidth and storage space as well as speed up data transmission, people usually perform lossy compression on images. Although the JPEG standard is a simple and effective compression method, it usually introduces various visually unpleasing artifacts, especially the notorious blocking artifacts. In recent years, deep convolutional neural networks (CNNs) have seen remarkable development in compression artifacts reduction. Despite the excellent performance, most deep CNNs suffer from heavy computation due to very deep and wide architectures. In this paper, we propose an enhanced wide-activated residual network (EWARN) for efficient and accurate image deblocking. Specifically, we propose an enhanced wide-activated residual block (EWARB) as basic construction module. Our EWARB gives rise to larger activation width, better use of interdependencies among channels, and more informative and discriminative non-linearity activation features without more parameters than residual block (RB) and wide-activated residual block (WARB). Furthermore, we introduce an overlapping patches extraction and combination (OPEC) strategy into our network in a full convolution way, leading to large receptive field, enforced compatibility among adjacent blocks, and efficient deblocking. Extensive experiments demonstrate that our EWARN outperforms several state-of-the-art methods quantitatively and qualitatively with relatively small model size and less running time, achieving a good trade-off between performance and complexity. 相似文献
2.
Face aging (FA) for young faces refers to rendering the aging faces at target age for an individual, generally under 20s, which is an important topic of facial age analysis. Unlike traditional FA for adults, it is challenging to age children with one deep learning-based FA network, since there are deformations of facial shapes and variations of textural details. To alleviate the deficiency, a unified FA framework for young faces is proposed, which consists of two decoupled networks to apply aging image translation. It explicitly models transformations of geometry and appearance using two components: GD-GAN, which simulates the Geometric Deformation using Generative Adversarial Network; TV-GAN, which simulates the Textural Variations guided by the age-related saliency map. Extensive experiments demonstrate that our method has advantages over the state-of-the-art methods in terms of synthesizing visually plausible images for young faces, as well as preserving the personalized features. 相似文献
3.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)). 相似文献
4.
Multi-channel and single-channel image denoising are on two important development fronts. Integrating multi-channel and single-channel image denoisers for further improvement is a valuable research direction. A natural assumption is that using more useful information is helpful to the output results. In this paper, a novel multi-channel and single-channel fusion paradigm (MSF) is proposed. The proposed MSF works by fusing the estimates of a multi-channel image denoiser and a single-channel image denoiser. The performance of recent multi-channel image denoising methods involved in the proposed MSF can be further improved at low additional time-consuming cost. Specifically, the validity principle of the proposed MSF is that the fused single-channel image denoiser can produce auxiliary estimate for the involved multi-channel image denoiser in a designed underdetermined transform domain. Based on the underdetermined transformation, we create a corresponding orthogonal transformation for fusion and better restore the multi-channel images. The quantitative and visual comparison results demonstrate that the proposed MSF can be effectively applied to several state-of-the-art multi-channel image denoising methods. 相似文献
5.
6.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks. 相似文献
7.
本文对国内外的电视技术发展现状进行了充分的研究和分析,并对超高清电视系统的相关图像技术参数进行了分析和介绍。 相似文献
8.
多井评价是建立在单井精细解释对比分析基础上的预测储层及含油气性平面分布规律的技术方法,而常规测井资料无法区分碳酸盐岩岩溶储层,因而利用多井评价结果确定岩溶发育程度在平面上的分布规律就显得十分重要。为此,在岩心标定成像测井的基础上,对四川盆地高石梯—磨溪地区15口井的成像测井岩溶发育特征进行分析,建立了中二叠统茅口组岩溶发育各分带的标准成像图版,利用交会图及直方图分析各分带的常规测井响应特征,在此基础上形成了电成像测井刻度常规测井识别岩溶发育带的新方法。研究结果表明:①高石梯—磨溪地区茅口组岩溶带自上而下可划分为风化壳残积带、垂直渗流岩溶带、水平潜流岩溶带以及受岩溶作用较弱的基岩;②风化壳残积带在成像测井图像显示为"暗—亮—暗"条带状模式,垂直渗流岩溶带为垂直线状与暗色斑状组合模式,水平潜流岩溶带为水平线状—层状与斑状组合模式,基岩整体显示为亮色块状模式偶见线状或斑状特征;③有效储层主要发育在垂直渗流带和水平潜流带的顶部;④该区茅口组岩溶发育主要受裂缝发育控制,而裂缝发育又与断层关系密切。结论认为,该新方法对碳酸盐岩岩溶储层的多井评价具有普遍适用性,为四川盆地中二叠统风险探井的部署提供了技术支撑。 相似文献
9.
We present a new image reconstruction method for Electrical Capacitance Tomography (ECT). ECT image reconstruction is generally ill-posed because the number of measurements is small whereas the image dimensions are large. Here, we present a sparsity-inspired approach to achieve better ECT image reconstruction from the small number of measurements. Our approach for ECT image reconstruction is based on Total Variation (TV) regularization. We apply an efficient Split-Bregman Iteration (SBI) approach to solve the problem. We also propose three metrics to evaluate image reconstruction performance, i.e., a joint metric of positive reconstruction rate (PRR) and false reconstruction rate (FRR), correlation coefficient, and a shape and location metric. The results on both synthetic and real data show that the proposed TV-SBI method can better preserve the edges of images and better resolve different objects within reconstructed images, as compared to a representative state-of-the-art ECT image reconstruction algorithm, Projected Landweber Iteration with Linear Back Projection initialization (LBP-PLI). 相似文献
10.
In this paper, we propose a novel change detection method for synthetic aperture radar images based on unsupervised artificial immune systems. After generating the difference image from the multitemporal images, we take each pixel as an antigen and build an immune model to deal with the antigens. By continuously stimulating the immune model, the antigens are classified into two groups, changed and unchanged. Firstly, the proposed method incorporates the local information in order to restrain the impact of speckle noise. Secondly, the proposed method simulates the immune response process in a fuzzy way to get an accurate result by retaining more image details. We introduce a fuzzy membership of the antigen and then update the antibodies and memory cells according to the membership. Compared with the clustering algorithms we have proposed in our previous works, the new method inherits immunological properties from immune systems and is robust to speckle noise due to the use of local information as well as fuzzy strategy. Experiments on real synthetic aperture radar images show that the proposed method performs well on several kinds of difference images and engenders more robust result than the other compared methods. 相似文献