首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5582篇
  免费   214篇
  国内免费   201篇
电工技术   164篇
综合类   399篇
化学工业   118篇
金属工艺   204篇
机械仪表   519篇
建筑科学   305篇
矿业工程   141篇
能源动力   56篇
轻工业   143篇
水利工程   84篇
石油天然气   50篇
武器工业   33篇
无线电   564篇
一般工业技术   229篇
冶金工业   36篇
原子能技术   18篇
自动化技术   2934篇
  2024年   8篇
  2023年   76篇
  2022年   71篇
  2021年   127篇
  2020年   117篇
  2019年   85篇
  2018年   54篇
  2017年   81篇
  2016年   114篇
  2015年   157篇
  2014年   245篇
  2013年   241篇
  2012年   369篇
  2011年   332篇
  2010年   317篇
  2009年   369篇
  2008年   340篇
  2007年   383篇
  2006年   412篇
  2005年   396篇
  2004年   288篇
  2003年   308篇
  2002年   281篇
  2001年   183篇
  2000年   196篇
  1999年   114篇
  1998年   75篇
  1997年   32篇
  1996年   29篇
  1995年   29篇
  1994年   21篇
  1993年   26篇
  1992年   28篇
  1991年   17篇
  1990年   21篇
  1989年   11篇
  1988年   6篇
  1987年   6篇
  1986年   8篇
  1985年   6篇
  1984年   5篇
  1983年   3篇
  1982年   2篇
  1981年   3篇
  1980年   2篇
  1977年   1篇
  1976年   2篇
排序方式: 共有5997条查询结果,搜索用时 85 毫秒
1.
The ability to detect gun and gun held in hand or other body parts is a typical human skill. The same problem presents an imperative task for computer vision system. Automatic observer independent detection of hand held gun or gun held in the other body part, whether it is visible or concealed, provides enhance security in vulnerable places and initiates appropriate action there. Compare to the automatic object detection systems, automatic detection of gun has very few successful attempts. In the present scope of this paper, we present an extensive survey on automatic detection of gun and define a taxonomy for this particular detection system. We also describe the inherent difficulties related with this problem. In this survey of published papers, we examine different approaches used in state-of-the-art attempts and compare performances of these approaches. Finally, this paper concludes pointing to the possible research gaps in related fields.  相似文献   
2.
3.
4.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks.  相似文献   
5.
The majority of visualizations on the web are still stored as raster images, making them inaccessible to visually impaired users. We propose a deep‐neural‐network‐based approach that automatically recognizes key elements in a visualization, including a visualization type, graphical elements, labels, legends, and most importantly, the original data conveyed in the visualization. We leverage such extracted information to provide visually impaired people with the reading of the extracted information. Based on interviews with visually impaired users, we built a Google Chrome extension designed to work with screen reader software to automatically decode charts on a webpage using our pipeline. We compared the performance of the back‐end algorithm with existing methods and evaluated the utility using qualitative feedback from visually impaired users.  相似文献   
6.
陆斌  何志强 《信息技术》2003,27(7):95-97
交互控制是计算机程序的重要功能 ,也是实现人—机对话的基本途径。VisualBasic编程语言以其易学习掌握、开发灵活的特点而成为目前流行的程序开发工具 ,本文以VisualBasic语言为例介绍了交互控制程序编程方法 ,并对具体的每一种方法编写了相应的示例。  相似文献   
7.
数据采集与监控软件Genie   总被引:2,自引:0,他引:2  
缑西梅 《机床电器》2002,29(3):24-25,38
Genie是具有国际先进水平的数据采集与监控软件,它提供了一个面向对象的图形化用户界面,因此简化了数据采集过程、控制应用程序开发和操作员界面。本文介绍了Genie的特点、功能、基本用途以及VISUALBA-SIC在设计这类监控软件中的作用。  相似文献   
8.
曹瑞忻 《包装工程》2002,23(3):157-158,161
阐述了视觉符号语言在版面设计中的编码与各种表现形式,强调信息社会的来临,以视觉为形态的符号语言将有效加速信息的传递。  相似文献   
9.
Jonathan J. Cook 《Software》2004,34(9):815-845
We discuss P#, our implementation of a tool that allows interoperation between a concurrent superset of the Prolog programming language and C#. This enables Prolog to be used as a native implementation language for Microsoft's .NET platform. P# compiles a linear logic extension of Prolog to C# source code. We can thus create C# objects from Prolog and use C#'s graphical, networking and other libraries. We add language constructs on the Prolog side that allow concurrent Prolog code to be written. A primitive predicate is provided that evaluates a Prolog structure on a newly forked thread. Communication between threads is based on the unification of variables contained in such a structure. It is also possible for threads to communicate through a globally accessible table. All of the new features are available to the programmer through new built-in Prolog predicates. We discuss two software engineering tools implemented using P#. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
10.
The worldwide proliferation of fraudulent materials has brought about the need for a new approach to the control of purchased material quality. Nuclear power, defense, aerospace and many other industries are affected by the supply of poor quality clones that presume to be original replacement parts. Safety considerations abound as these highly defective materials are used in systems that are critical to the preservation of human lives. Commonly utilized quality assurance programs have not effectively stopped the influx of fraudulent materials. These programs fail to concentrate inspection efforts on materials and inspection attributes that would effectively prevent the acceptance of fraudulent materials. herein a solution is presented to this problem in the form of an expert system application. Information commonly available in industry is formulated into a knowledge based system wherein advisories are given to the user regarding key purchased material receipt inspection strategies.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号