首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7223篇
  免费   434篇
  国内免费   365篇
电工技术   288篇
技术理论   1篇
综合类   513篇
化学工业   155篇
金属工艺   208篇
机械仪表   581篇
建筑科学   407篇
矿业工程   180篇
能源动力   61篇
轻工业   221篇
水利工程   122篇
石油天然气   60篇
武器工业   66篇
无线电   1223篇
一般工业技术   324篇
冶金工业   60篇
原子能技术   56篇
自动化技术   3496篇
  2024年   19篇
  2023年   108篇
  2022年   127篇
  2021年   185篇
  2020年   177篇
  2019年   135篇
  2018年   111篇
  2017年   149篇
  2016年   174篇
  2015年   264篇
  2014年   395篇
  2013年   408篇
  2012年   559篇
  2011年   507篇
  2010年   473篇
  2009年   481篇
  2008年   473篇
  2007年   511篇
  2006年   497篇
  2005年   468篇
  2004年   356篇
  2003年   368篇
  2002年   298篇
  2001年   205篇
  2000年   201篇
  1999年   120篇
  1998年   73篇
  1997年   35篇
  1996年   27篇
  1995年   26篇
  1994年   13篇
  1993年   17篇
  1992年   16篇
  1991年   9篇
  1990年   7篇
  1989年   8篇
  1988年   3篇
  1986年   4篇
  1985年   2篇
  1984年   3篇
  1983年   1篇
  1982年   2篇
  1981年   3篇
  1980年   1篇
  1977年   1篇
  1976年   2篇
排序方式: 共有8022条查询结果,搜索用时 10 毫秒
1.
The ability to detect gun and gun held in hand or other body parts is a typical human skill. The same problem presents an imperative task for computer vision system. Automatic observer independent detection of hand held gun or gun held in the other body part, whether it is visible or concealed, provides enhance security in vulnerable places and initiates appropriate action there. Compare to the automatic object detection systems, automatic detection of gun has very few successful attempts. In the present scope of this paper, we present an extensive survey on automatic detection of gun and define a taxonomy for this particular detection system. We also describe the inherent difficulties related with this problem. In this survey of published papers, we examine different approaches used in state-of-the-art attempts and compare performances of these approaches. Finally, this paper concludes pointing to the possible research gaps in related fields.  相似文献   
2.
3.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks.  相似文献   
4.
This study proposes an analytical and flexible terrain risk assessment method for military surveillance applications for mobile assets. Considering the risk as the degree of possibility of insurgent presence, the assessment method offers an efficient evaluation of risk in the surrounding terrain for military combat operating posts or observation posts. The method is designed for unmanned aerial vehicles as the surveillance assets of choice to improve the effectiveness of their use. Starting with the area map and geographical data, the target terrain is first digitized for space representation. Then the data of nine geographical parameters are used to formulate five contributing risk factors. These factors are incorporated in an analytical framework to generate a composite map with risk scores that reveal the potential high-risk spots in the terrain. The proposed method is also applied to a real-life case study of COP Kahler in Afghanistan, which was a target for insurgent attacks in 2008. The results confirm that when evaluated with the developed method, the region that the insurgents used to approach COP Kahler has high concentration of high-risk cells.  相似文献   
5.
The majority of visualizations on the web are still stored as raster images, making them inaccessible to visually impaired users. We propose a deep‐neural‐network‐based approach that automatically recognizes key elements in a visualization, including a visualization type, graphical elements, labels, legends, and most importantly, the original data conveyed in the visualization. We leverage such extracted information to provide visually impaired people with the reading of the extracted information. Based on interviews with visually impaired users, we built a Google Chrome extension designed to work with screen reader software to automatically decode charts on a webpage using our pipeline. We compared the performance of the back‐end algorithm with existing methods and evaluated the utility using qualitative feedback from visually impaired users.  相似文献   
6.
基于流媒体的网络视频监控系统研究与实现   总被引:6,自引:2,他引:4  
宋智 《现代电子技术》2006,29(8):66-67,70
介绍了流媒体网络视频监控系统的原理、设计方案和具体实现,给出了用流媒体进行视频数据的采集、显示、传输和控制的方案和实现方法,充分利用了流媒体网络传输特性和Windows多线程机制,详细介绍了如何把DirectShow和WinSock技术相结合,综合使用TCP和UDP多播通信方式,用双缓冲队列进行数据的控制,采用VC 实现了流媒体网络视频监控系统。  相似文献   
7.
数据采集与监控软件Genie   总被引:2,自引:0,他引:2  
缑西梅 《机床电器》2002,29(3):24-25,38
Genie是具有国际先进水平的数据采集与监控软件,它提供了一个面向对象的图形化用户界面,因此简化了数据采集过程、控制应用程序开发和操作员界面。本文介绍了Genie的特点、功能、基本用途以及VISUALBA-SIC在设计这类监控软件中的作用。  相似文献   
8.
曹瑞忻 《包装工程》2002,23(3):157-158,161
阐述了视觉符号语言在版面设计中的编码与各种表现形式,强调信息社会的来临,以视觉为形态的符号语言将有效加速信息的传递。  相似文献   
9.
In this article, we describe a knowledge-based controlled platform using program supervision techniques. This platform eases the creation and the configuration of video surveillance systems. Several issues need to be addressed to provide a correct system configuration: (1) to choose, among a library of programs, those which are best satisfying a given user request, (2) to assign a correct value for each program parameter, (3) to evaluate performances and to guarantee a performance rate which is satisfactory regarding end-user requirements. This platform is composed of three main components: the library of programs, the knowledge base and the control component. The knowledge is either given by experts or learnt by the system. The control is generic in the sense that it is independent of any application. To validate this platform, we have built and evaluated six video surveillance systems which are featured with three properties: adaptability, reliability and real-time processing.  相似文献   
10.
实用户外视频监控异常检测策略   总被引:2,自引:0,他引:2  
周兵  李晓强  苏士美 《计算机工程》2003,29(16):16-17,121
树枝叶等植物的晃动是造成户外监控背景复杂性的主要因素。该文提出一种基于视频分析的运动对象检测策略,利用快慢双背射模型检测运动变化像素,并通过邻域像素的棚关性检测消除虚假运动对象。实验表明此算法对户外监控不但速度快而且检测效果理想,满足实用化要求。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号