首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   132240篇
  免费   17892篇
  国内免费   12868篇
工业技术   163000篇
  2024年   442篇
  2023年   2618篇
  2022年   4958篇
  2021年   5720篇
  2020年   5720篇
  2019年   4016篇
  2018年   3411篇
  2017年   3956篇
  2016年   4198篇
  2015年   4895篇
  2014年   8854篇
  2013年   7852篇
  2012年   10071篇
  2011年   10880篇
  2010年   8244篇
  2009年   8546篇
  2008年   8947篇
  2007年   9994篇
  2006年   8603篇
  2005年   7748篇
  2004年   6398篇
  2003年   5748篇
  2002年   4499篇
  2001年   3653篇
  2000年   3039篇
  1999年   2429篇
  1998年   1784篇
  1997年   1413篇
  1996年   1164篇
  1995年   873篇
  1994年   641篇
  1993年   454篇
  1992年   302篇
  1991年   187篇
  1990年   150篇
  1989年   127篇
  1988年   90篇
  1987年   40篇
  1986年   62篇
  1985年   57篇
  1984年   49篇
  1983年   40篇
  1982年   43篇
  1981年   19篇
  1980年   9篇
  1979年   13篇
  1978年   4篇
  1963年   4篇
  1959年   5篇
  1951年   6篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
11.
In this paper, the feature representation of an image by CNN is used to hide the secret image into the cover image. The style of the cover image hides the content of the secret image and produce a stego image using Neural Style Transfer (NST) algorithm, which resembles the cover image and also contains the semantic content of secret image. The main technical contributions are to hide the content of the secret image in the in-between hidden layered style features of the cover image, which is the first of its kind in the present state-of-art-technique. Also, to recover the secret image from the stego image, destylization is done with the help of conditional generative adversarial networks (GANs) using Residual in Residual Dense Blocks (RRDBs). Further, stego images from different layer combinations of content and style features are obtained and evaluated. Evaluation is based on the visual similarity and quality loss between the cover-stego pair and the secret-reconstructed secret pair of images. From the experiments, it has been observed that the proposed algorithm has 43.95 dB Peak Signal-to-Noise Ratio (PSNR)), .995 Structural Similarity Index (SSIM), and .993 Visual Information Fidelity (VIF) for the ImageNet dataset. The proposed algorithm is found to be more robust against StegExpose than the traditional methods.  相似文献   
12.
Aiming at the performance degradation of the existing presentation attack detection methods due to the illumination variation, a two-stream vision transformers framework (TSViT) based on transfer learning in two complementary spaces is proposed in this paper. The face images of RGB color space and multi-scale retinex with color restoration (MSRCR) space are fed to TSViT to learn the distinguishing features of presentation attack detection. To effectively fuse features from two sources (RGB color space images and MSRCR images), a feature fusion method based on self-attention is built, which can effectively capture the complementarity of two features. Experiments and analysis on Oulu-NPU, CASIA-MFSD, and Replay-Attack databases show that it outperforms most existing methods in intra-database testing and achieves good generalization performance in cross-database testing.  相似文献   
13.
In the present era of machines and edge-cutting technologies, still document frauds persist. They are done intuitively by using almost identical inks, that it becomes challenging to detect them—this demands an approach that efficiently investigates the document and leaves it intact. Hyperspectral imaging is one such a type of approach that captures the images from hundreds to thousands of spectral bands and analyzes the images through their spectral and spatial features, which is not possible by conventional imaging. Deep learning is an edge-cutting technology known for solving critical problems in various domains. Utilizing supervised learning imposes constraints on its usage in real scenarios, as the inks used in forgery are not known prior. Therefore, it is beneficial to use unsupervised learning. An unsupervised feature extraction through a Convolutional Autoencoder (CAE) followed by Logistic Regression (LR) for classification is proposed (CAE-LR). Feature extraction is evolved around spectral bands, spatial patches, and spectral-spatial patches. We inspected the impact of spectral, spatial, and spectral-spatial features by mixing inks in equal and unequal proportion using CAE-LR on the UWA writing ink hyperspectral images dataset for blue and black inks. Hyperspectral images are captured at multiple correlated spectral bands, resulting in information redundancy handled by restoring certain principal components. The proposed approach is compared with eight state-of-art approaches used by the researchers. The results depicted that by using the combination of spectral and spatial patches, the classification accuracy enhanced by 4.85% for black inks and 0.13% for blue inks compared to state-of-art results. In the present scenario, the primary area concern is to identify and detect the almost similar inks used in document forgery, are efficiently managed by the proposed approach.  相似文献   
14.
罗睿乔 《中州煤炭》2022,(2):220-226
为精确描述非常规气藏压裂后的复杂流动特征及定量评价储层改造体积(SRV),利用自主研发的缝网重构算法“破裂树生长法”建立压后缝网模型,并以此为基础提出了使用拟稳态流动时特定的压力等值线来确定SRV范围的定量评价方法,最后以长宁201井区为例进行了矿场实例分析。该方法根据微地震监测点的位置,重构出微裂缝网的连通关系。在复杂微裂缝网的基础上建立离散裂缝地质模型并进行生产数值模拟,根据数值模拟结果的压力分布精确划定SRV的范围。利用该方法计算出长宁201井区的SRV体积为0.052 1 km3,以该缝网模型的数值模拟产量预测结果符合实际生产规律,方法实用性较好。  相似文献   
15.
5G系统将移动通信服务从移动电话、移动宽带和大规模机器通信扩展到新的应用领域,即所谓对通信服务有特殊要求的垂直领域。对使能未来工厂的5G能力进行了全面的分析总结,包括弹性网络架构、灵活频谱、超可靠低时延通信、时间敏感网络、安全和定位,而弹性网络架构又包括对网络切片、非公共网络、5G局域网和边缘计算的支持。希望从广度到深度,对相关的理论及技术应用做透彻、全面的梳理,对其挑战做清晰的总结,从而为相关研究和工程技术人员提供借鉴。  相似文献   
16.
为了提高智能化光纤复合架空线路态势感知的实时性,将人工神经网络方法应用于光纤沿线应变解调,确定了神经网络的结构。编程实现了基于洛伦兹模型的最小二乘谱拟合方法和神经网络方法,采用不同信噪比和布里渊频移的布里渊谱训练神经网络,将它们应用于某光纤复合架空线路沿线光纤应变的测量,从不同角度比较了两种方法的计算结果。计算结果表明,神经网络方法能有效获得光纤沿线的布里渊频移进而获得应变,具有与谱拟合方法相似的准确性,但应变解调时间仅约为谱拟合方法的1/20000。研究结果为提高智能光纤复合架空线路态势感知的实时性提供了参考。  相似文献   
17.
采用整体式控制爆破拆除方案对华电扬州电厂钢筋混凝土框-排架结构厂房进行了爆破拆除。爆破前,对汽机房、厂房外墙和楼梯进行了预处理。将厂房划分为3个爆区,采用非电多回路网格式爆破网路,依靠东侧锅炉房倒塌施加在西侧锅炉房上的倾覆力矩,有效地克服了西侧锅炉房向西倒的难题,可为同类工程提供一定的参考。  相似文献   
18.
Ammonia is considered as a promising hydrogen or energy carrier. Ammonia absorption or adsorption is an important aspect for both ammonia removal, storage and separation applications. To these ends, a wide range of solid and liquid sorbents have been investigated. Among these, the deep eutectic solvent (DES) is emerging as a promising class of ammonia absorbers. Herein, we report a novel type of DES, i.e., metal-containing DESs for ammonia absorption. Specifically, the NH3 absorption capacity is enhanced by ca. 18.1–36.9% when a small amount of metal chlorides, such as MgCl2, MnCl2 etc., are added into a DES composed of resorcinol (Res) and ethylene glycol (EG). To our knowledge, the MgCl2/Res/EG (0.1:1:2) DES outperforms most of the reported DESs. The excellent NH3 absorption performances of metal–containing DESs have been attributed to the synergy of Lewis acid–base and hydrogen bonding interactions. Additionally, good reversibility and high NH3/CO2 selectivity are achieved over the MgCl2/Res/EG (0.1:1:2) DES, which enables it to be a potential NH3 absorber for further investigations.  相似文献   
19.
随着社会的进步和发展,计算机网络通信技术已被应用到实际生活、生产的各个方面,对人们的生活、生产等产生了深刻的影响。为此,文章就计算机通信及网络远程控制技术在实际生活中的应用问题进行了探究,旨在借助先进科技促进社会实现更优质发展。  相似文献   
20.
针对配电自动化终端优化布局问题,提出了一种基于重要度排序的终端优化布局方法。首先以等年值综合费用为目标函数,供电可靠性和投入产出比为双重约束建立了配电自动化终端优化布局模型。然后通过分析配电自动化终端对供电可靠性提升的影响,给出各个节点的“二遥”及“三遥”终端安装重要度定义及计算公式。最后采用枚举法确定最优终端安装数量,基于节点终端安装重要度排序确定终端的最优安装位置。该方法考虑了已布局节点对剩余节点终端安装重要度的影响,能够在降低计算量的同时兼顾布局合理性。运用所提方法RBTS-BUS2系统及扩充模型进行终端优化布局并与智能优化算法的布局结果进行对比,验证了本文方法的有效性及优越性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号