首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6673篇
  免费   583篇
  国内免费   357篇
化学   1227篇
晶体学   13篇
力学   325篇
综合类   200篇
数学   4014篇
物理学   1834篇
  2024年   11篇
  2023年   70篇
  2022年   201篇
  2021年   234篇
  2020年   160篇
  2019年   192篇
  2018年   200篇
  2017年   271篇
  2016年   276篇
  2015年   236篇
  2014年   351篇
  2013年   639篇
  2012年   307篇
  2011年   382篇
  2010年   300篇
  2009年   362篇
  2008年   398篇
  2007年   378篇
  2006年   327篇
  2005年   298篇
  2004年   261篇
  2003年   234篇
  2002年   210篇
  2001年   168篇
  2000年   136篇
  1999年   146篇
  1998年   153篇
  1997年   99篇
  1996年   92篇
  1995年   93篇
  1994年   72篇
  1993年   53篇
  1992年   41篇
  1991年   37篇
  1990年   23篇
  1989年   20篇
  1988年   23篇
  1987年   20篇
  1986年   20篇
  1985年   17篇
  1984年   27篇
  1983年   8篇
  1982年   15篇
  1981年   10篇
  1980年   7篇
  1979年   8篇
  1978年   8篇
  1977年   5篇
  1976年   3篇
  1973年   4篇
排序方式: 共有7613条查询结果,搜索用时 0 毫秒
21.
In recent studies of generative adversarial networks (GAN), researchers have attempted to combine adversarial perturbation with data hiding in order to protect the privacy and authenticity of the host image simultaneously. However, most of the studied approaches can only achieve adversarial perturbation through a visible watermark; the quality of the host image is low, and the concealment of data hiding cannot be achieved. In this work, we propose a true data hiding method with adversarial effect for generating high-quality covers. Based on GAN, the data hiding area is selected precisely by limiting the modification strength in order to preserve the fidelity of the image. We devise a genetic algorithm that can explore decision boundaries in an artificially constrained search space to improve the attack effect as well as construct aggressive covert adversarial samples by detecting “sensitive pixels” in ordinary samples to place discontinuous perturbations. The results reveal that the stego-image has good visual quality and attack effect. To the best of our knowledge, this is the first attempt to use covert data hiding to generate adversarial samples based on GAN.  相似文献   
22.
Feature selection (FS) is a vital step in data mining and machine learning, especially for analyzing the data in high-dimensional feature space. Gene expression data usually consist of a few samples characterized by high-dimensional feature space. As a result, they are not suitable to be processed by simple methods, such as the filter-based method. In this study, we propose a novel feature selection algorithm based on the Explosion Gravitation Field Algorithm, called EGFAFS. To reduce the dimensions of the feature space to acceptable dimensions, we constructed a recommended feature pool by a series of Random Forests based on the Gini index. Furthermore, by paying more attention to the features in the recommended feature pool, we can find the best subset more efficiently. To verify the performance of EGFAFS for FS, we tested EGFAFS on eight gene expression datasets compared with four heuristic-based FS methods (GA, PSO, SA, and DE) and four other FS methods (Boruta, HSICLasso, DNN-FS, and EGSG). The results show that EGFAFS has better performance for FS on gene expression data in terms of evaluation metrics, having more than the other eight FS algorithms. The genes selected by EGFAGS play an essential role in the differential co-expression network and some biological functions further demonstrate the success of EGFAFS for solving FS problems on gene expression data.  相似文献   
23.
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted image steganography to a new stage. To improve the performance of steganography, this paper proposes a novel scheme that uses the Transformer for feature extraction in steganography. In addition, an image encryption algorithm using recursive permutation is proposed to further enhance the security of secret images. We conduct extensive experiments to demonstrate the effectiveness of the proposed scheme. We reveal that the Transformer is superior to the compared state-of-the-art deep-learning models in feature extraction for steganography. In addition, the proposed image encryption algorithm has good attributes for image security, which further enhances the performance of the proposed scheme of steganography.  相似文献   
24.
关联规则是数据挖掘中的重要研究内容之一,对在事务数据库不变,只对最小支持度和最小可信度进行改变的情况下,针对关联规则的维护问题,设计了一个增量式更新的改进算法AIUA。  相似文献   
25.
选取山西省为研究对象,以美国国家极轨合作仪件-可见红外成像辐射计套件(NPP-VIIRS)夜间灯光数据、GDP统计数据等为数据源,构建GDP空间化拟合模型,建立山西省GDP密度图,据此研究山西省经济的空间差异性。通过对NPP-VIIRS夜间灯光数据的空间化处理,提取灯光指数,并将其与GDP进行回归拟合,建立最佳回归模型,得到GDP密度拟合图;利用县级GDP数据进行线性纠正,从而提高GDP的模拟精度。结果表明:(1)NPP-VIIRS夜间灯光数据与GDP的相关性较高,可用于山西省GDP模拟;(2)与GDP分区建模相比,GDP整体建模的精度更高;(3)山西省GDP的空间分布整体呈由城市中心逐渐向周边辐射的特点,构成GDP过渡带。  相似文献   
26.
数字全息图在微电路检测、粒度分析、透明场测量等小孔径、小视场对象测量和细胞观测等显微测量方面有着广泛的应用前景。根据离轴数字全息图的频谱特点,提出采用复数滤波器,利用计算机及相关算法对离轴数字全息图进行滤波,消除其零级及共轭像,同时可以得到全息图的相位分布。讨论了复数滤波器的设计方法,给出了实验结果。为数字全息图的压缩、再现和相息图制作提供了方便。  相似文献   
27.
For this study, a 4 stage electrical low pressure impactor was designed to measure the real‐time size distribution of diesel particulate matter (DPM). For the performance evaluation, sodium chloride (NaCl) particles and dioctyl sebacate (DOS) particles were used. After evaluating the collection efficiency of each stage of the impactor, the size distributions of test particles were estimated using electrical current data and their inversion algorithm, and this was found to agree with the results obtained by a scanning mobility particle sizer (SMPS). For measurement of DPM, a common‐rail direct injection (CRDI) diesel engine, for engine speeds of 1,200 rpm and 1,500 rpm at 2.7 kgf·m, was used. Therefore, it was found that the size distribution of the DPM could be easily obtained, with the currents measured by the impactor and the data inversion algorithm, in less than 5 seconds. Furthermore, the effective density of the DPM could be obtained using the calculated results and the SMPS data.  相似文献   
28.
提出了一种结合摄动法和L1正则化方法的随机梁式结构静力损伤识别方法。考虑初始模型误差和测量误差的影响,建立了关于随机损伤指数的控制方程,并将摄动法和L1正则化方法相结合,对随机损伤指数的控制方程进行求解,进而从概率的角度对结构的损伤进行识别。损伤试验结果表明,和传统的最小二乘求解法相比,本文方法能够更为准确地识别多处局部损伤的位置及大小,对实际结构损伤检测具有较好的参考价值。  相似文献   
29.
The aim of this paper is to present a new classification and regression algorithm based on Artificial Intelligence. The main feature of this algorithm, which will be called Code2Vect, is the nature of the data to treat: qualitative or quantitative and continuous or discrete. Contrary to other artificial intelligence techniques based on the “Big-Data,” this new approach will enable working with a reduced amount of data, within the so-called “Smart Data” paradigm. Moreover, the main purpose of this algorithm is to enable the representation of high-dimensional data and more specifically grouping and visualizing this data according to a given target. For that purpose, the data will be projected into a vectorial space equipped with an appropriate metric, able to group data according to their affinity (with respect to a given output of interest). Furthermore, another application of this algorithm lies on its prediction capability. As it occurs with most common data-mining techniques such as regression trees, by giving an input the output will be inferred, in this case considering the nature of the data formerly described. In order to illustrate its potentialities, two different applications will be addressed, one concerning the representation of high-dimensional and categorical data and another featuring the prediction capabilities of the algorithm.  相似文献   
30.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号