全文获取类型
收费全文 | 21706篇 |
免费 | 3241篇 |
国内免费 | 2179篇 |
学科分类
工业技术 | 27126篇 |
出版年
2024年 | 74篇 |
2023年 | 542篇 |
2022年 | 960篇 |
2021年 | 1073篇 |
2020年 | 846篇 |
2019年 | 631篇 |
2018年 | 546篇 |
2017年 | 631篇 |
2016年 | 792篇 |
2015年 | 819篇 |
2014年 | 1447篇 |
2013年 | 1319篇 |
2012年 | 1488篇 |
2011年 | 1848篇 |
2010年 | 1298篇 |
2009年 | 1304篇 |
2008年 | 1462篇 |
2007年 | 1604篇 |
2006年 | 1481篇 |
2005年 | 1308篇 |
2004年 | 1060篇 |
2003年 | 988篇 |
2002年 | 772篇 |
2001年 | 576篇 |
2000年 | 420篇 |
1999年 | 373篇 |
1998年 | 301篇 |
1997年 | 214篇 |
1996年 | 150篇 |
1995年 | 145篇 |
1994年 | 97篇 |
1993年 | 78篇 |
1992年 | 55篇 |
1991年 | 55篇 |
1990年 | 62篇 |
1989年 | 40篇 |
1988年 | 17篇 |
1987年 | 26篇 |
1986年 | 36篇 |
1985年 | 38篇 |
1984年 | 20篇 |
1983年 | 16篇 |
1982年 | 29篇 |
1981年 | 33篇 |
1980年 | 12篇 |
1979年 | 8篇 |
1977年 | 5篇 |
1976年 | 4篇 |
1975年 | 4篇 |
1951年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
针对目标估计过程需要大量人工参与、自动化程度低的问题,提出了基于数据质量评价的目标估计方法。利用目标数据质量评价方法,对不同传感器得到的目标数据质量进行科学、有效的测度和评价,并根据质量得分动态调整各数据源在目标估计过程中所占的权重,从而减少人工干预,提高目标估计效能。仿真试验结果证明了该方法的有效性。 相似文献
2.
3.
4.
In this paper, the feature representation of an image by CNN is used to hide the secret image into the cover image. The style of the cover image hides the content of the secret image and produce a stego image using Neural Style Transfer (NST) algorithm, which resembles the cover image and also contains the semantic content of secret image. The main technical contributions are to hide the content of the secret image in the in-between hidden layered style features of the cover image, which is the first of its kind in the present state-of-art-technique. Also, to recover the secret image from the stego image, destylization is done with the help of conditional generative adversarial networks (GANs) using Residual in Residual Dense Blocks (RRDBs). Further, stego images from different layer combinations of content and style features are obtained and evaluated. Evaluation is based on the visual similarity and quality loss between the cover-stego pair and the secret-reconstructed secret pair of images. From the experiments, it has been observed that the proposed algorithm has 43.95 dB Peak Signal-to-Noise Ratio (PSNR)), .995 Structural Similarity Index (SSIM), and .993 Visual Information Fidelity (VIF) for the ImageNet dataset. The proposed algorithm is found to be more robust against StegExpose than the traditional methods. 相似文献
5.
Aiming at the performance degradation of the existing presentation attack detection methods due to the illumination variation, a two-stream vision transformers framework (TSViT) based on transfer learning in two complementary spaces is proposed in this paper. The face images of RGB color space and multi-scale retinex with color restoration (MSRCR) space are fed to TSViT to learn the distinguishing features of presentation attack detection. To effectively fuse features from two sources (RGB color space images and MSRCR images), a feature fusion method based on self-attention is built, which can effectively capture the complementarity of two features. Experiments and analysis on Oulu-NPU, CASIA-MFSD, and Replay-Attack databases show that it outperforms most existing methods in intra-database testing and achieves good generalization performance in cross-database testing. 相似文献
6.
《Current Opinion in Solid State & Materials Science》2022,26(6):101024
One of the main challenges in the laser powder bed fusion (LPBF) process is making dense and defect-free components. These porosity defects are dependent upon the melt pool geometry and the processing conditions. Power-velocity (PV) processing maps can aid in visualizing the effects of LPBF processing variables and mapping different defect regimes such as lack-of-fusion, under-melting, balling, and keyholing. This work presents an assessment of existing analytical equations and models that provide an estimate of the melt pool geometry as a function of material properties. The melt pool equations are then combined with defect criteria to provide a quick approximation of the PV processing maps for a variety of materials. Finally, the predictions of these processing maps are compared with experimental data from the literature. The predictive processing maps can be computed quickly and can be coupled with dimensionless numbers and high-throughput (HT) experiments for validation. The present work provides a boundary framework for designing the optimal processing parameters for new metals and alloys based on existing analytical solutions. 相似文献
7.
8.
9.
The combined effect of resistance spot welding and precipitation hardening on the localised corrosion of A286 superalloy is studied. The specimens tested by double loop electrochemical potentiokinetic reactivation were welded in the solution treated condition, and then subjected to different precipitation hardening treatments. For both base metal and weld nugget, the maximum localised corrosion is reached when η phase is clearly observable. The fact that the localised corrosion resistance of weld nugget is different from that shown by base metal may be explained by the segregation of Ni and Ti towards the interdendritic region of weld nugget (studied by using scanning electron microscope/energy dispersive X-ray analysis). 相似文献
10.
针对传统大数据特征加密方法中大数据精度较差、加密耗时较长的问题,提出基于信息熵抑制的大数据特征隐匿性加密方法。分析信息熵抑制相关理论,采用信息熵映射函数对大数据分类,将信息熵抑制过程转化为计算2个文件相似性的过程,并根据余弦相似度公式以及Hamming距离值计算数据相似度,完成数据消冗。在完成数据消冗的基础上,分析分组密码方法和ECC加密方法,结合两种方法得到大数据特征隐匿性加密处理计算公式,实现基于信息熵抑制的大数据特征隐匿性加密。实验研究结果表明,所提方法能够有效去除冗余数据,提升大数据精度,加快数据加密的处理速度,高效完成大数据加密过程。 相似文献