首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3908篇
  免费   191篇
  国内免费   63篇
化学   2605篇
晶体学   47篇
力学   125篇
综合类   3篇
数学   269篇
物理学   593篇
无线电   520篇
  2024年   20篇
  2023年   34篇
  2022年   165篇
  2021年   172篇
  2020年   141篇
  2019年   183篇
  2018年   192篇
  2017年   159篇
  2016年   242篇
  2015年   159篇
  2014年   221篇
  2013年   385篇
  2012年   310篇
  2011年   287篇
  2010年   208篇
  2009年   169篇
  2008年   215篇
  2007年   139篇
  2006年   114篇
  2005年   73篇
  2004年   82篇
  2003年   52篇
  2002年   75篇
  2001年   46篇
  2000年   41篇
  1999年   17篇
  1998年   24篇
  1997年   14篇
  1996年   12篇
  1995年   13篇
  1994年   11篇
  1993年   9篇
  1992年   7篇
  1991年   5篇
  1990年   14篇
  1989年   13篇
  1988年   9篇
  1987年   15篇
  1986年   7篇
  1985年   10篇
  1984年   11篇
  1983年   7篇
  1982年   6篇
  1981年   5篇
  1980年   6篇
  1979年   8篇
  1978年   5篇
  1974年   5篇
  1970年   10篇
  1969年   4篇
排序方式: 共有4162条查询结果,搜索用时 15 毫秒
11.
An adaptive spatial filtering method is proposed that takes into account contextual information in fMRI activation detection. This filter replaces the time series of each voxel with a weighted average of time series of a small neighborhood around it. The filter coefficients at each voxel are derived so as to maximize a test statistic designed to indicate the presence of activation. This statistic is the ratio of the energy of the filtered time series in a signal subspace to the energy of the residuals. It is shown that the filter coefficients and the maximum energy ratio can be found through a generalized eigenproblem. This approach equates the filter coefficients to the elements of an eigenvector corresponding to the largest eigenvalue of a specific matrix, while the largest eigenvalue itself becomes the maximum energy ratio that can be used as a statistic for detecting activation. The distribution of this statistic under the null hypothesis is derived by a nonparametric permutation technique in the wavelet domain. Also, in this paper we introduce a new set of basis vectors that define the signal subspace. The space spanned by these basis vectors covers a wide range of possible hemodynamic response functions (HRF) and is applicable to both event related and block design fMRI signal analysis. This approach circumvents the need for a priori assumptions about the exact shape of the HRF. Resting-state experimental fMRI data were used to assess the specificity of the method, showing that the actual false-alarm rate of the proposed method is equal or less than its expected value. Analysis of simulated data and motor task fMRI datasets from six volunteers using the method proposed here showed an improved sensitivity as compared to a conventional test with a similar statistic applied to spatially smoothed data.  相似文献   
12.
Quality-aware images.   总被引:4,自引:0,他引:4  
We propose the concept of quality-aware image, in which certain extracted features of the original (high-quality) image are embedded into the image data as invisible hidden messages. When a distorted version of such an image is received, users can decode the hidden messages and use them to provide an objective measure of the quality of the distorted image. To demonstrate the idea, we build a practical quality-aware image encoding, decoding and quality analysis system, which employs: 1) a novel reduced-reference image quality assessment algorithm based on a statistical model of natural images and 2) a previously developed quantization watermarking-based data hiding technique in the wavelet transform domain.  相似文献   
13.
14.
In classical public‐key infrastructure (PKI), the certificate authorities (CAs) are fully trusted, and the security of the PKI relies on the trustworthiness of the CAs. However, recent failures and compromises of CAs showed that if a CA is corrupted, fake certificates may be issued, and the security of clients will be at risk. As emerging solutions, blockchain‐ and log‐based PKI proposals potentially solved the shortcomings of the PKI, in particular, eliminating the weakest link security and providing a rapid remedy to CAs' problems. Nevertheless, log‐based PKIs are still exposed to split‐world attacks if the attacker is capable of presenting two distinct signed versions of the log to the targeted victim(s), while the blockchain‐based PKIs have scaling and high‐cost issues to be overcome. To address these problems, this paper presents a secure and accountable transport layer security (TLS) certificate management (SCM), which is a next‐generation PKI framework. It combines the two emerging architectures, introducing novel mechanisms, and makes CAs and log servers accountable to domain owners. In SCM, CA‐signed domain certificates are stored in log servers, while the management of CAs and log servers is handed over to a group of domain owners, which is conducted on the blockchain platform. Different from existing blockchain‐based PKI proposals, SCM decreases the storage cost of blockchain from several hundreds of GB to only hundreds of megabytes. Finally, we analyze the security and performance of SCM and compare SCM with previous blockchain‐ and log‐based PKI schemes.  相似文献   
15.

Wireless body area network (WBAN) has witnessed significant attentions in the healthcare domain using biomedical sensor-based monitoring of heterogeneous nature of vital signs of a patient’s body. The design of frequency band, MAC superframe structure, and slots allocation to the heterogeneous nature of the patient’s packets have become the challenging problems in WBAN due to the diverse QoS requirements. In this context, this paper proposes an Energy Efficient Traffic Prioritization for Medium Access Control (EETP-MAC) protocol, which provides sufficient slots with higher bandwidth and guard bands to avoid channels interference causing longer delay. Specifically, the design of EETP-MAC is broadly divided in to four folds. Firstly, patient data traffic prioritization is presented with broad categorization including Non-Constrained Data (NCD), Delay-Constrained Data (DCD), Reliability-Constrained Data (RCD) and Critical Data (CD). Secondly, a modified superframe structure design is proposed for effectively handling the traffic prioritization. Thirdly, threshold based slot allocation technique is developed to reduce contention by effectively quantifying criticality on patient data. Forth, an energy efficient frame design is presented focusing on beacon interval, superframe duration, and packet size and inactive period. Simulations are performed to comparatively evaluate the performance of the proposed EETP-MAC with the state-of-the-art MAC protocols. The comparative evaluation attests the benefit of EETP-MAC in terms of efficient slot allocation resulting in lower delay and energy consumption.

  相似文献   
16.
Wireless Personal Communications - Current research in wireless communication undoubtedly points towards the tremendous advantages of using visible light as a spectrum for significantly boosting...  相似文献   
17.

Considering the internet of things (IoT), end nodes such as wireless sensor network, RFID and embedded systems are used in many applications. These end nodes are known as resource-constrained devices in the IoT network. These devices have limitations such as computing and communication power, memory capacity and power. Key pre-distribution schemes (KPSs) have been introduced as a lightweight solution to key distribution in these devices. Key pre-distribution is a special type of key agreement that aims to select keys called session keys in order to establish secure communication between devices. One of these design types is the using of combinatorial designs in key pre-distribution, which is a deterministic scheme in key pre-distribution and has been considered in recent years. In this paper, by introducing a key pre-distribution scheme of this type, we stated that the model introduced in the two benchmarks of KPSs comparability had full connectivity and scalability among the designs introduced in recent years. Also, in recent years, among the combinatorial design-based key pre-distribution schemes, in order to increase resiliency as another criterion for comparing KPSs, attempts were made to include changes in combinatorial designs or they combine them with random key pre-distribution schemes and hybrid schemes were introduced that would significantly reduce the design connectivity. In this paper, using theoretical analysis and maintaining full connectivity, we showed that the strength of the proposed design was better than the similar designs while maintaining higher scalability.

  相似文献   
18.
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy.  相似文献   
19.
In this paper, the context of modeling of the impact of mismatch and statistical variations on analogue circuit building blocks is emphasized. The aim is to develop a new algorithm which predicts the statistical behavior of important parameters of an amplifier including output resistance, voltage gain and trans-conductance. The relative error of standard deviation of statistical parameters will remain less than 5% compared with the most accurate Monte-Carlo (MC) simulations using atomistic library model-cards. In comparison with other models which are based on the normal distribution of parameters, the proposed model does not need this limiting presumption. On the other hand, the proposed algorithm is more efficient compared with time consuming MC atomistic simulations.  相似文献   
20.
Wireless Personal Communications - The number of aged and disabled people has been increasing worldwide. To look after these people is a big challenge in this era. However, scientists overcome the...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号