全文获取类型
收费全文 | 165篇 |
免费 | 19篇 |
国内免费 | 7篇 |
专业分类
化学 | 47篇 |
综合类 | 20篇 |
数学 | 61篇 |
物理学 | 63篇 |
出版年
2024年 | 1篇 |
2023年 | 5篇 |
2022年 | 12篇 |
2021年 | 6篇 |
2020年 | 5篇 |
2019年 | 5篇 |
2018年 | 4篇 |
2017年 | 8篇 |
2016年 | 4篇 |
2015年 | 1篇 |
2014年 | 10篇 |
2013年 | 10篇 |
2012年 | 10篇 |
2011年 | 9篇 |
2010年 | 8篇 |
2009年 | 14篇 |
2008年 | 10篇 |
2007年 | 12篇 |
2006年 | 9篇 |
2005年 | 10篇 |
2004年 | 6篇 |
2003年 | 2篇 |
2002年 | 1篇 |
2001年 | 5篇 |
2000年 | 5篇 |
1999年 | 3篇 |
1998年 | 10篇 |
1997年 | 3篇 |
1996年 | 1篇 |
1995年 | 2篇 |
排序方式: 共有191条查询结果,搜索用时 31 毫秒
71.
利用群在集合上的共轭作用,给出了一种由2 -Jordan型幂零矩阵构造Cartesian认证码的新方案,计算了相关参数,并在假定编码规则按等概率分布选取时分析了模仿攻击和替换攻击成功的概率. 相似文献
72.
A-Codes from Rational Functions over Galois Rings 总被引:1,自引:0,他引:1
Gilberto Bini 《Designs, Codes and Cryptography》2006,39(2):207-214
In this paper, we describe authentication codes via (generalized) Gray images of suitable codes over Galois rings. Exponential
sums over these rings help determine—or bound—the parameters of such codes. 相似文献
73.
García-Ruiz S Moldovan M Fortunato G Wunderli S García Alonso JI 《Analytica chimica acta》2007,590(1):55-66
In order to evaluate alternative analytical methodologies to study the geographical origin of ciders, both multi-elemental analysis and Sr isotope abundance ratios in combination with multivariate statistical analysis were estimated in 67 samples from England, Switzerland, France and two Spanish regions (Asturias and the Basque Country). A methodology for the precise and accurate determination of the 87Sr/86Sr isotope abundance ratio in ciders by multicollector inductively coupled plasma mass spectrometry (MC-ICP-MS) was developed. Major elements (Na, K, Ca and Mg) were measured by ICP-AES and minor and trace elements (Li, Be, B, Al, Sc, Ti, V, Cr, Mn, Fe, Co, Ni, Cu, Zn, Ga, As, Se, Rb, Sr, Y, Mo, Cd, Sn, Sb, Cs, Ba, La, Ce, W, Tl, Pb, Bi, Th and U) were measured by ICP-MS using a collision cell instrument operated in multitune mode. An analysis of variance (ANOVA test) indicated that group means for B, Cr, Fe, Ni, Cu, Se, Cd, Cs, Ce, W, Pb, Bi and U did not show any significant differences at the 95% confidence level, so these elements were rejected for further statistical analysis. Another group of elements (Li, Be, Sc, Co, Ga, Y, Sn, Sb, La, Tl, Th) was removed from the data set because concentrations were close to the limits of detection for many samples. Therefore, the remaining elements (Na, Mg, Al, K, Ca, Ti, V, Mn, Zn, As, Rb, Sr, Mo, Ba) together with 87Sr/86Sr isotope abundance ratio were considered for principal component analysis (PCA) and linear discriminant analysis (LDA). Finally, LDA was able to classify correctly 100% of cider samples coming from different Spanish regions, France, England and Switzerland when considering Na, Mg, Al, K, Ca, Ti, V, Mn, Zn, As, Rb, Sr, Mo, Ba and 87Sr/86Sr isotope abundance ratio as original variables. 相似文献
74.
In recent years the number of spectroscopic studies utilizing multivariate techniques and involving different laboratories has been dramatically increased. In this paper the protocol for calibration transfer of partial least square regression model between high‐resolution nuclear magnetic resonance (NMR) spectrometers of different frequencies and equipped with different probes was established. As the test system previously published quantitative model to predict the concentration of blended soy species in sunflower lecithin was used. For multivariate modelling piecewise direct standardization (PDS), direct standardization, and hybrid calibration were employed. PDS showed the best performance for estimating lecithin falsification regarding its vegetable origin resulting in a significant decrease in root mean square error of prediction from 5.0 to 7.3% without standardization to 2.9–3.2% for PDS. Acceptable calibration transfer model was obtained by direct standardization, but this standardization approach introduces unfavourable noise to the spectral data. Hybrid calibration is least recommended for high‐resolution NMR data. The sensitivity of instrument transfer methods with respect to the type of spectrometer, the number of samples and the subset selection was also discussed. The study showed the necessity of applying a proper standardization procedure in cases when multivariate model has to be applied to the spectra recorded on a secondary NMR spectrometer even with the same magnetic field strength. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献
75.
Research findings have shown that microphones can be uniquely identified by audio recordings since physical features of the microphone components leave repeatable and distinguishable traces on the audio stream. This property can be exploited in security applications to perform the identification of a mobile phone through the built-in microphone. The problem is to determine an accurate but also efficient representation of the physical characteristics, which is not known a priori. Usually there is a trade-off between the identification accuracy and the time requested to perform the classification. Various approaches have been used in literature to deal with it, ranging from the application of handcrafted statistical features to the recent application of deep learning techniques. This paper evaluates the application of different entropy measures (Shannon Entropy, Permutation Entropy, Dispersion Entropy, Approximate Entropy, Sample Entropy, and Fuzzy Entropy) and their suitability for microphone classification. The analysis is validated against an experimental dataset of built-in microphones of 34 mobile phones, stimulated by three different audio signals. The findings show that selected entropy measures can provide a very high identification accuracy in comparison to other statistical features and that they can be robust against the presence of noise. This paper performs an extensive analysis based on filter features selection methods to identify the most discriminating entropy measures and the related hyper-parameters (e.g., embedding dimension). Results on the trade-off between accuracy and classification time are also presented. 相似文献
76.
Ching-Sheng Hsu 《Optics Communications》2010,283(9):1737-108
In recent years, digital watermarking technology has been widely used for property rights protection and integrity authentication of digital images. Image integrity authentication is usually done by a fragile watermarking scheme. When authenticating image integrity, one must extract the embedded authentication message from the image for comparison with the image feature to identify whether the image has been tampered with, and if so, locate the affected area. However, such authentication schemes may result in detection error problems. Namely, the tampered area may be misjudged as not having been tampered with, or vice versa. Hence, methods that effectively reduce errors in tampering detection have become an important research topic. This study aims to integrate a probability theory to improve image tampering detection accuracy and precision. The scheme includes two processes: the embedding of an image authentication message and tampering detection. In the image tampering detection process, in addition to identifying whether the image has been tampered with and locating the tampered area, through the authentication message embedded in the image, a probability theory is employed to improve previously obtained detection results to enhance authentication accuracy. The experimental results reveal that the proposed scheme performs well in terms of detection precision and authentication accuracy rate. 相似文献
77.
R. M. Sillitto 《Contemporary Physics》2013,54(5):331-333
A laser-based security technique called Laser Surface Authentication (LSA) is described in which diffuse laser scattering is used as a probe of the naturally-occurring randomness present in virtually all surfaces. LSA brings the principles of biometric identification currently used in human fingerprint- or iris-recognition to the world of inanimate objects such as paper documents, plastic cards, high value branded products and a range of other things that are commonly counterfeited or smuggled. 相似文献
78.
AbstractFish is a highly perishable product and it is particularly important to pay attention to its quality changes. Maintenance of the high quality of fish and fishery products necessitates development of means for precise and rapid quality evaluation. Near-infrared (NIR) spectroscopy and imaging techniques are proven technologies that can provide useful information for the estimation of quality attributes in fish and fishery products due to fast speed, noninvasiveness, ease of use, and minimal sample preparation. The aim of this review is to communicate perspectives and aspects relating to NIR spectroscopy and imaging techniques with regard to evaluation of chemical composition (fat, protein, and moisture), microbiological (freshness, spoilage, and nematodes), and sensory (flavor, texture, and color) attributes of fish and fishery products. Moreover, the usefulness of NIR spectroscopy and imaging techniques for fish authentication and classification are presented. Finally, some viewpoints on the current situation and suggestions for future research directions are proposed. 相似文献
79.
Abstract: One of the emerging issues in herbal medicine is its authenticity. The substitution of highly valuable materials in herbal medicine with lower ones is common practice in the herbal medicine industry. This practice can cause serious effects or be harmful to human health; therefore, the authentication of herbal medicine using analytical techniques is necessary. Due to its capability as fingerprint technique, vibrational spectroscopy (infrared and Raman), especially in combination with several chemometrics techniques, is the method of choice for authentication purposes. This review highlights the use of mid-infrared, near-infrared, and Raman spectroscopy for authentication of herbal medicine, either in raw materials or in final products. 相似文献
80.
A new method to eliminate the security risk of the well-known interference-based optical cryptosystem is proposed. In this method, which is suitable for security authentication application, two phase-only masks are separately placed at different distances from the output plane, where a certification image (public image) can be obtained. To further increase the security and flexibility of this authentication system, we employ one more validation image (secret image), which can be observed at another output plane, for confirming the identity of the user. Only if the two correct masks are properly settled at their positions one could obtain two significant images. Besides, even if the legal users exchange their masks (keys), the authentication process will fail and the authentication results will not reveal any information. Numerical simulations are performed to demonstrate the validity and security of the proposed method. 相似文献