全文获取类型
收费全文 | 4868篇 |
免费 | 794篇 |
国内免费 | 320篇 |
专业分类
化学 | 435篇 |
晶体学 | 20篇 |
力学 | 598篇 |
综合类 | 166篇 |
数学 | 599篇 |
物理学 | 4164篇 |
出版年
2025年 | 3篇 |
2024年 | 63篇 |
2023年 | 81篇 |
2022年 | 219篇 |
2021年 | 185篇 |
2020年 | 123篇 |
2019年 | 139篇 |
2018年 | 153篇 |
2017年 | 208篇 |
2016年 | 229篇 |
2015年 | 226篇 |
2014年 | 369篇 |
2013年 | 351篇 |
2012年 | 249篇 |
2011年 | 291篇 |
2010年 | 242篇 |
2009年 | 280篇 |
2008年 | 309篇 |
2007年 | 314篇 |
2006年 | 269篇 |
2005年 | 236篇 |
2004年 | 191篇 |
2003年 | 193篇 |
2002年 | 172篇 |
2001年 | 102篇 |
2000年 | 102篇 |
1999年 | 94篇 |
1998年 | 81篇 |
1997年 | 92篇 |
1996年 | 87篇 |
1995年 | 65篇 |
1994年 | 49篇 |
1993年 | 38篇 |
1992年 | 37篇 |
1991年 | 33篇 |
1990年 | 18篇 |
1989年 | 19篇 |
1988年 | 18篇 |
1987年 | 19篇 |
1986年 | 10篇 |
1985年 | 6篇 |
1983年 | 4篇 |
1982年 | 1篇 |
1981年 | 3篇 |
1979年 | 2篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1959年 | 5篇 |
排序方式: 共有5982条查询结果,搜索用时 15 毫秒
21.
22.
23.
Xin Meng Jinqing Li Xiaoqiang Di Yaohui Sheng Donghua Jiang 《Entropy (Basel, Switzerland)》2022,24(7)
Today, with the rapid development of the Internet, improving image security becomes more and more important. To improve image encryption efficiency, a novel region of interest (ROI) encryption algorithm based on a chaotic system was proposed. First, a new 1D -cos-cot (1D-ECC) with better chaotic performance than the traditional chaotic system is proposed. Second, the chaotic system is used to generate a plaintext-relate keystream based on the label information of a medical image DICOM (Digital Imaging and Communications in Medicine) file, the medical image is segmented using an adaptive threshold, and the segmented region of interest is encrypted. The encryption process is divided into two stages: scrambling and diffusion. In the scrambling stage, helical scanning and index scrambling are combined to scramble. In the diffusion stage, two-dimensional bi-directional diffusion is adopted, that is, the image is bi-directionally diffused row by column to make image security better. The algorithm offers good encryption speed and security performance, according to simulation results and security analysis. 相似文献
24.
In order to improve the transmission efficiency and security of image encryption, we combined a ZUC stream cipher and chaotic compressed sensing to perform image encryption. The parallel compressed sensing method is adopted to ensure the encryption and decryption efficiency. The ZUC stream cipher is used to sample the one-dimensional chaotic map to reduce the correlation between elements and improve the randomness of the chaotic sequence. The compressed sensing measurement matrix is constructed by using the sampled chaotic sequence to improve the image restoration effect. In order to reduce the block effect after the parallel compressed sensing operation, we also propose a method of a random block of images. Simulation analysis shows that the algorithm demonstrated better encryption and compression performance. 相似文献
25.
Rafael Rojas-Hernndez Juan Luis Díaz-de-Len-Santiago Grettel Barcel-Alonso Jorge Bautista-Lpez Valentin Trujillo-Mora Julio Csar Salgado-Ramírez 《Entropy (Basel, Switzerland)》2022,24(7)
This paper introduces a new method of compressing digital images by using the Difference Transform applied in medical imaging. The Difference Transform algorithm performs the decorrelation process of image data, and in this way improves the encoding process, achieving a file with a smaller size than the original. The proposed method proves to be competitive and in many cases better than the standards used for medical images such as TIFF or PNG. In addition, the Difference Transform can replace other transforms like Cosine or Wavelet. 相似文献
26.
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted image steganography to a new stage. To improve the performance of steganography, this paper proposes a novel scheme that uses the Transformer for feature extraction in steganography. In addition, an image encryption algorithm using recursive permutation is proposed to further enhance the security of secret images. We conduct extensive experiments to demonstrate the effectiveness of the proposed scheme. We reveal that the Transformer is superior to the compared state-of-the-art deep-learning models in feature extraction for steganography. In addition, the proposed image encryption algorithm has good attributes for image security, which further enhances the performance of the proposed scheme of steganography. 相似文献
27.
在部分相干理论的基础上,分别用表观传递函数和能量分布作评价指标,计算了部分相干光学系统的最佳象面位置,并讨论了其与相干度、空间频率及象差的关系。 相似文献
28.
Raymond H. Chan Michael K. Ng Robert J. Plemmons 《Numerical Linear Algebra with Applications》1996,3(1):45-64
In this paper, we propose a method to generalize Strang's circulant preconditioner for arbitrary n-by-n matrices An. The th column of our circulant preconditioner Sn is equal to the th column of the given matrix An. Thus if An is a square Toeplitz matrix, then Sn is just the Strang circulant preconditioner. When Sn is not Hermitian, our circulant preconditioner can be defined as . This construction is similar to the forward-backward projection method used in constructing preconditioners for tomographic inversion problems in medical imaging. We show that if the matrix An has decaying coefficients away from the main diagonal, then is a good preconditioner for An. Comparisons of our preconditioner with other circulant-based preconditioners are carried out for some 1-D Toeplitz least squares problems: min ∥ b - Ax∥2. Preliminary numerical results show that our preconditioner performs quite well, in comparison to other circulant preconditioners. Promising test results are also reported for a 2-D deconvolution problem arising in ground-based atmospheric imaging. 相似文献
29.
基于聚类分割和形态学的可见光与SAR图像配准 总被引:1,自引:0,他引:1
针对可见光与SAR图像灰度差异大,共有特征提取难的问题,提出了一种基于k-均值聚类分割和形态学处理的轮廓特征配准方法。利用k-均值聚类算法对两类图像进行分割,得到图像分割区域;通过形态学处理,有效减少SAR图像斑点噪声影响,准确提取两类图像的封闭轮廓;采用轮廓不变矩理论,引入矩变量距离均值、方差约束机制和一致性检查的匹配策略,获取最佳匹配对,实现了两类图像的配准。通过实验,三组图像的配准精度分别达到0.3450、0.2163和0.1810,结果表明该法可行且能达到亚像素的配准精度。 相似文献
30.
在红外探测器的应用中,常用统计分析、算例验证等方法研究目标成像精确定位问题。鉴于上述方法难以充分阐释物理意义与揭示普遍规律,提出基于能量分布及成像特征的分析方法,针对红外探测目标成像精确定位问题,利用能量分布和数字图像中成像规律,研究像点定位及精度分析。研究了红外目标成像和数字图像特点,建立了定位模型和方法流程;分析了定位误差影响因素,实现了定位结果精度评定;最后结合典型应用实例,进行了计算验证。该方法与已有方法相比,分析过程更直观,获取了红外像点定位分析的理论依据,并给出了定位结果的精度水平:通常红外成像应用中,精度优于1/6像元;在成像较大时,精度可达1/10像元以上。该研究结论对红外探测应用中目标准确定位具有重要意义。 相似文献