首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   42353篇
  免费   9514篇
  国内免费   6709篇
工业技术   58576篇
  2024年   428篇
  2023年   1054篇
  2022年   1701篇
  2021年   2016篇
  2020年   1994篇
  2019年   1564篇
  2018年   1388篇
  2017年   1783篇
  2016年   1922篇
  2015年   2274篇
  2014年   3039篇
  2013年   2849篇
  2012年   3748篇
  2011年   3757篇
  2010年   3289篇
  2009年   3257篇
  2008年   3409篇
  2007年   3620篇
  2006年   2935篇
  2005年   2573篇
  2004年   2048篇
  2003年   1634篇
  2002年   1242篇
  2001年   987篇
  2000年   734篇
  1999年   579篇
  1998年   484篇
  1997年   423篇
  1996年   321篇
  1995年   268篇
  1994年   217篇
  1993年   183篇
  1992年   155篇
  1991年   108篇
  1990年   112篇
  1989年   84篇
  1988年   68篇
  1987年   42篇
  1986年   48篇
  1985年   54篇
  1984年   38篇
  1983年   45篇
  1982年   25篇
  1981年   20篇
  1980年   10篇
  1979年   6篇
  1965年   4篇
  1964年   3篇
  1960年   4篇
  1959年   6篇
排序方式: 共有10000条查询结果,搜索用时 8 毫秒
991.
992.
993.
《国际计算机数学杂志》2012,89(5):1040-1056
This paper presents a new technique for computed tomography that is based on moment reconstruction. The proposed technique employs the Fourier and Haar coefficients for spectral and spatial moment-based image analyses, respectively. It provides a new approach to the problem of tomographic image reconstruction, where an X-ray image is obtained from a set of line projections. The experimental evaluation includes reconstructions of standard tomographic images in the presence of blur, caused by uniform linear motions. The results lead to the conclusion that the proposed method is more selective, efficient and robust. Another issue considered is the noise associated with normal transmission.  相似文献   
994.
《国际计算机数学杂志》2012,89(10):2057-2071
Medical image data require strict security, confidentiality and integrity. To achieve these stringent requirements, we propose a hybrid watermarking method which embeds a robust watermark in the region of non-interest (RONI) for achieving security and confidentiality, while integrity control is achieved by inserting a fragile watermark into the region of the interest (ROI). First the information to be modified in ROI is separated and is inserted into RONI, which later is used in recovery of the original ROI. Secondly, to avoid the underflow and overflow, a location map is generated for embedding the watermark block-wise by leaving the suspected blocks. This avoids the preprocessing step of histogram modification. The image visual quality, as well as tamper localization, is evaluated. We use weighted peak signal to noise ratio for measuring image quality of watermarked images. Experimental results show that the proposed method outperforms the existing hybrid watermarking techniques.  相似文献   
995.
《国际计算机数学杂志》2012,89(5):1012-1029
Many problems in mathematics and engineering lead to Fredholm integral equations of the first kind, e.g. signal and image processing. These kinds of equations are difficult to solve numerically since they are ill-posed. Therefore, regularization is required to obtain a reasonable approximate solution. This paper presents a new regularization method based on a weighted H1 seminorm. Details of numerical implementation are given. Numerical examples, including one-dimensional and two-dimensional integral equations, are presented to illustrate the efficiency of the proposed approach. Numerical results show that the proposed regularization method can restore edges as well as details.  相似文献   
996.
Jan Wassenberg 《Software》2012,42(9):1095-1106
This report introduces a new lossless asymmetric single instruction multiple data codec designed for extremely efficient decompression of large satellite images. A throughput in excess of 3GB/s allows decompression to proceed in parallel with asynchronous transfers from fast block devices such as disk arrays. This is made possible by a simple and fast single instruction multiple data entropy coder that removes leading null bits. Our main contribution is a new approach for vectorized prediction and encoding. Unlike previous approaches that treat the entropy coder as a black box, we account for its properties in the design of the predictor. The resulting compressed stream is 1.2 to 1.5 times as large as JPEG‐2000, but can be decompressed 100 times as quickly – even faster than copying uncompressed data in memory. Applications include streaming decompression for out of core visualization. To the best of our knowledge, this is the first entirely vectorized algorithm for lossless compression. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
997.
998.
Information about rapidly changing slum areas may support the development of appropriate interventions by concerned authorities. Often, however, traditional data collection methods lack information on the spatial distribution of slum-dwellers. Remote sensing based methods could be used for a rapid inventory of the location and physical composition of slums. (Semi-)automatic detection of slums in image data is challenging, owing to the high variability in appearance and definitions across different contexts. This paper develops an ontological framework to conceptualize slums using input from 50 domain-experts covering 16 different countries. This generic slum ontology (GSO) comprises concepts identified at three levels that refer to the morphology of the built environment: the environs level, the settlement level and the object level. It serves as a comprehensive basis for image-based classification of slums, in particular, using object-oriented image analysis (OOA) techniques. This is demonstrated by with an example of local adaptation of GSO and OOA parameterization for a study area in Kisumu, Kenya. At the object level, building and road characteristics are major components of the ontology. At the settlement level, texture measures can be potentially used to represent the contrast between planned and unplanned settlements. At the environs level, factors which extend beyond the site itself are important indicators, e.g. hazards due to floods plains and marshy conditions. The GSO provides a comprehensive framework that includes all potentially relevant indicators that can be used for image-based slum identification. These characteristics may be different for other study areas, but show the applicability of the developed framework.  相似文献   
999.
齐晓明  韩丽 《计算机工程》2012,38(22):216-219
现有骨架驱动变形算法多以单一骨架驱动变形,且骨架预设十分复杂。为此,提出一种基于骨架的网格模型变形算法。结合多分辨率Reeb图方法提取模型的骨架结构,确定各骨架点对应的局部区域,将骨架点插值构造二次Bézier曲线,通过交互式拖动任意骨架点,计算与其相连多骨架点的动态变化情况,实现模型局部区域的自然形变。实验结果表明,该算法能获得较为自然平滑的变形结果。  相似文献   
1000.
龙卓珉  俞斌 《计算机工程》2012,38(17):148-151
超混沌系统图像加密算法HYPER_HIE由于采用初等变换和异或运算作为加密措施,因此很难抵抗各种攻击。针对该算法的3个步骤,即密钥生成、像素置乱、图像扩散与混乱,选择全零矩阵、行相同矩阵和列相同矩阵这3种明文矩阵,在未知加密密钥的前提下对该算法进行选择明文攻击。通过一个实例表明,该攻击方法仅以很小的计算代价破译了密文。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号