全文获取类型
收费全文 | 17319篇 |
免费 | 778篇 |
国内免费 | 788篇 |
专业分类
电工技术 | 822篇 |
技术理论 | 1篇 |
综合类 | 2094篇 |
化学工业 | 763篇 |
金属工艺 | 593篇 |
机械仪表 | 1514篇 |
建筑科学 | 1815篇 |
矿业工程 | 591篇 |
能源动力 | 271篇 |
轻工业 | 442篇 |
水利工程 | 321篇 |
石油天然气 | 564篇 |
武器工业 | 151篇 |
无线电 | 1482篇 |
一般工业技术 | 654篇 |
冶金工业 | 635篇 |
原子能技术 | 210篇 |
自动化技术 | 5962篇 |
出版年
2024年 | 17篇 |
2023年 | 118篇 |
2022年 | 168篇 |
2021年 | 253篇 |
2020年 | 239篇 |
2019年 | 198篇 |
2018年 | 149篇 |
2017年 | 236篇 |
2016年 | 291篇 |
2015年 | 359篇 |
2014年 | 864篇 |
2013年 | 711篇 |
2012年 | 1126篇 |
2011年 | 1197篇 |
2010年 | 1110篇 |
2009年 | 1107篇 |
2008年 | 1036篇 |
2007年 | 1285篇 |
2006年 | 1202篇 |
2005年 | 1137篇 |
2004年 | 918篇 |
2003年 | 896篇 |
2002年 | 764篇 |
2001年 | 630篇 |
2000年 | 592篇 |
1999年 | 445篇 |
1998年 | 298篇 |
1997年 | 279篇 |
1996年 | 204篇 |
1995年 | 182篇 |
1994年 | 133篇 |
1993年 | 126篇 |
1992年 | 100篇 |
1991年 | 69篇 |
1990年 | 49篇 |
1989年 | 62篇 |
1988年 | 39篇 |
1987年 | 36篇 |
1986年 | 29篇 |
1985年 | 27篇 |
1984年 | 22篇 |
1982年 | 13篇 |
1981年 | 14篇 |
1980年 | 10篇 |
1979年 | 15篇 |
1976年 | 10篇 |
1975年 | 9篇 |
1973年 | 11篇 |
1966年 | 9篇 |
1965年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
1.
The ability to detect gun and gun held in hand or other body parts is a typical human skill. The same problem presents an imperative task for computer vision system. Automatic observer independent detection of hand held gun or gun held in the other body part, whether it is visible or concealed, provides enhance security in vulnerable places and initiates appropriate action there. Compare to the automatic object detection systems, automatic detection of gun has very few successful attempts. In the present scope of this paper, we present an extensive survey on automatic detection of gun and define a taxonomy for this particular detection system. We also describe the inherent difficulties related with this problem. In this survey of published papers, we examine different approaches used in state-of-the-art attempts and compare performances of these approaches. Finally, this paper concludes pointing to the possible research gaps in related fields. 相似文献
2.
3.
4.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks. 相似文献
5.
Transportation demand of shipping container fluctuates due to the seasonality of international trade, thus, every 3–6 months, the liner company has to alter its current liner shipping service network, redeploy ships and design cargo routes with the objective of minimizing the total cost. To solve the problem, the paper presents a mixed integer linear program model. The proposed model incorporates several relevant constraints, such as weekly frequency, the transshipment of cargo between two or more service routes, and transport time. Extensive numerical experiments based on realistic date of Asia–Europe–Oceania shipping operations show that the proposed model can solve real-case problems efficiently by CPLEX. The results demonstrate that the model can reduce ship’s capacity consumption and raise ships’ capacity utilization. 相似文献
6.
"如何构造高可信的软件系统"已成为学术界和工业界的研究热点.操作系统内核作为软件系统的基础组件,它的安全可靠是构造高可信软件系统的重要环节.为了确保操作系统内核的安全可靠,将形式化方法引入到操作系统内核验证中,提出了一个自动化验证操作系统内核的框架.该验证框架包括:(1)分别对C语言程序和混合语言程序(C语言和汇编语言)进行验证;(2)在混合语言程序验证中,为汇编程序建立抽象模型,并将C语言程序和抽象模型粘合形成基于C语言验证工具可接收的验证模型;(3)从规范中提取性质,基于该自动验证工具,对性质完成自动验证;(4)该框架不限于特定的硬件架构.成功地运用该验证框架对两种不同硬件平台的嵌入式实时操作系统内核μC/OS-II进行了验证.结果显示:利用该框架在对两个不同的硬件平台上内核验证时,框架的可重复利用率很高,高达到88%,虽然其抽象模型需要根据不同的硬件平台进行重构.在对基于这两种平台的操作系统内核验证中,分别发现了10~12处缺陷.其中,在ARM平台上两处与硬件相关的问题被发现.实验表明,该方法对不同硬件平台的同一个操作系统分析验证具有一定的通用性. 相似文献
7.
Jinho Choi Sanghun Jung Deok Gun Park Jaegul Choo Niklas Elmqvist 《Computer Graphics Forum》2019,38(3):249-260
The majority of visualizations on the web are still stored as raster images, making them inaccessible to visually impaired users. We propose a deep‐neural‐network‐based approach that automatically recognizes key elements in a visualization, including a visualization type, graphical elements, labels, legends, and most importantly, the original data conveyed in the visualization. We leverage such extracted information to provide visually impaired people with the reading of the extracted information. Based on interviews with visually impaired users, we built a Google Chrome extension designed to work with screen reader software to automatically decode charts on a webpage using our pipeline. We compared the performance of the back‐end algorithm with existing methods and evaluated the utility using qualitative feedback from visually impaired users. 相似文献
8.
简要论述了集散控制系统的发展 ,根据火力发电厂的现场环境及实际情况 ,提出了火力发电厂集散控制系统的设计原则 ,并展望了集散控制系统的发展 相似文献
9.
10.
实验室质量体系的建立与运行 总被引:2,自引:0,他引:2
详细论述了质量和质量体系的基本概念、建立质量体系的必要性、质量体系的构成和建立过程、质量体系文件的编制、质量体系的运行和持续改进以及中国实验室国家认可委员会的有关政策。 相似文献