首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   876篇
  免费   29篇
  国内免费   25篇
化学   138篇
晶体学   1篇
力学   95篇
综合类   3篇
数学   80篇
物理学   613篇
  2024年   2篇
  2023年   9篇
  2022年   9篇
  2021年   13篇
  2020年   20篇
  2019年   9篇
  2018年   7篇
  2017年   41篇
  2016年   39篇
  2015年   58篇
  2014年   67篇
  2013年   47篇
  2012年   33篇
  2011年   65篇
  2010年   40篇
  2009年   57篇
  2008年   62篇
  2007年   63篇
  2006年   48篇
  2005年   29篇
  2004年   40篇
  2003年   21篇
  2002年   20篇
  2001年   26篇
  2000年   17篇
  1999年   15篇
  1998年   11篇
  1997年   13篇
  1996年   12篇
  1995年   7篇
  1994年   8篇
  1993年   4篇
  1992年   10篇
  1991年   3篇
  1990年   4篇
  1986年   1篇
排序方式: 共有930条查询结果,搜索用时 15 毫秒
91.
Holographic watermarking for authentication of cut images   总被引:3,自引:0,他引:3  
A watermarking technique, with a Computer Generated Hologram (CGH) coding system of the mark, is introduced and tested. The CGH watermarking can be used to authenticate parts of the original image. The hologram of the mark is embedded in the spatial domain by a blind additive embedding technique. The use of holography allows authenticating cuts of the original image, is the major novelty of this paper. The proposed methodology is characterized as an authentication technique, since it does not rely on the original image to decide whether the watermarked image has been altered or not and at the same time it is able to detect and localize any possible malicious change. Asymmetric cryptography is used to hide the hash information in an unambiguous way (non-repudiation property).  相似文献   
92.
Freehand 3D ultrasound is increasingly being introduced in the clinic for diagnostics and image-assisted interventions. Various algorithms exist for combining 2D images of regular ultrasound probes to 3D volumes, being either voxel-, pixel- or function-based. Previously, the most commonly used input to 3D ultrasound reconstruction has been digitized analog video. However, recent scanners that offer access to digital image frames exist, either as processed or unprocessed data. To our knowledge, no comparison has been performed to determine which data source gives the best reconstruction quality. In the present study we compared both reconstruction algorithms and data sources using novel comparison methods for detecting potential differences in image quality of the reconstructed volumes. The ultrasound scanner used in this study was the Sonix RP from Ultrasonix Medical Corp (Richmond, Canada), a scanner that allow third party access to unprocessed and processed digital data. The ultrasound probe used was the L14-5/38 linear probe. The assessment is based on a number of image criteria: detectability of wire targets, spatial resolution, detectability of small barely visible structures, subjective tissue image quality, and volume geometry. In addition we have also performed the more “traditional” comparison of reconstructed volumes by removing a percentage of the input data. By using these evaluation methods and data from the specific scanner, the results showed that the processed video performed better than the digital scan-line data, digital video being better than analog video. Furthermore, the results showed that the choice of video source was more important than the choice of tested reconstruction algorithms.  相似文献   
93.
By using a digital image correlation technique, the full/local field strain in a brittle coating/ductile substrate system during tension has been successfully monitored. One of the most important experimental results indicates that the distribution of interfacial shear stress in the segmented coating is antisymmetric about the center, which clarifies several controversial assumptions introduced in theoretical models. Two key mechanical properties of thermal barrier coatings, fracture strength in coating and interfacial adhesion strength, were determined as 35.0 ± 4.6 and 14.1 ± 3.2 MPa, respectively, which are consistent with available experimental data.  相似文献   
94.
《Applied Mathematical Modelling》2014,38(19-20):4717-4732
In this paper, a communication scheme that could use a nonlinear dynamical system to create encrypted keys with an additional dimension is proposed, and the scheme could keep encrypted keys not to diverge. Since the divergence of encrypted keys (nonlinear signals) easily happens in non-linear systems coupled with other systems, the adaptive control approach, proposed in this paper, uses the universal state-space adaptive observer-based fault diagnosis/estimator and the high-performance tracker to eliminate the divergence of encrypted keys. At the same time, the receiver of communication retrieves informal messages by the universal state-space adaptive observer-based fault diagnosis/estimator and the high-performance tracker. Thus, this paper takes advantage of the merit of digital redesign methodology for a practical implementation of secure-communication, and the estimator solves the problem of secure communication. Thus developed a new approach could add more dimensions into nonlinear secure-communication systems without having the problem of divergence of encrypted keys.  相似文献   
95.
Applying the pulse laser to speckle methods, non-uniformities of the laser beam profiles and the intensities between each laser pulse have unpleasant consequences on the intensity distribution of the recorded images and following on the assigned fringes of the corresponding subtractive result. This contribution introduces a computer-based technique for compensating this technical and physical problem, so that the fringe quality is improved, even if the homogeneity of the laser beam profiles is on such low level, that the conventional (subtractive) technique fails. The solution is based on algorithms, which refines each intensity distribution and is comparable with the known shading correction.  相似文献   
96.
A CR-39 track detector was successfully used to measure the outline of thin low-energy ion beams. After the etching, the surface of the detector was examined with an observation system composed of a Normarski microscope, a CCD camera and a digital image processing computer. Beam images obtained with the system were in good agreement on the outline of the beam formed with a beam aperture. Also, the resolving power in the beam outline measurement was roughly explained from the consideration of the ion range and the etch-pit growth in the chemical etching for the CR-39 detector.  相似文献   
97.
This paper presents an improved block-pulse function approach to convert a continuous-time (respectively, discrete-time) structured uncertain linear system into an equivalent discrete-time (respectively, continuous-time) structured uncertain linear model. The concept of the principle of equivalent areas is utilized for the uncertain model conversions. This allows the use of well-established theorems and algorithms in the discrete-time (respectively, continuous-time) domain to indirectly solve the continuous-time (respectively, discrete-time) domain problems. A numerical example is given to demonstrate the effectiveness of the proposed method.  相似文献   
98.
Present contribution briefly describes some historical features, which are focused back to the history of the Middle European learning as promoted by the foundation of the Charles University in Prague 1348. Physics and its neighboring areas are mentioned discussing some crucial scientific contributions and stressing out some prominent scholars, such as Tycho de Brahe, Johannes Kepler, Tadeáš Hájek, Marcus Marci, Jan A. Commenius (caloric), Prokop Diviš, Bernard Bolzano, Christian Doppler, Ernst Mach, Albert Einstein, Václav Šimerka, František Záviška, Čeněk Strouhal, Reinhold Fürst or Stanislav Škramovsky (statmograph) and Jaroslav Heyrovsky (polarography), the latter being already the representative of modern age.  相似文献   
99.
Fine-grained forward-secure signature schemes without random oracles   总被引:1,自引:0,他引:1  
We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide non-repudiation w.r.t. past time periods the way ordinary forward-secure signature schemes do but, in addition, allow the signer to specify which signatures of the current time period remain valid when revoking the public key. This is an important advantage if the signer produces many signatures per time period as otherwise the signer would have to re-issue those signatures (and possibly re-negotiate the respective messages) with a new key.Apart from a formal model for fine-grained forward-secure signature schemes, we present practical schemes and prove them secure under the strong RSA assumption only, i.e., we do not resort to the random oracle model to prove security. As a side-result, we provide an ordinary forward-secure scheme whose key-update time is significantly smaller than that of known schemes which are secure without assuming random oracles.  相似文献   
100.
This paper discusses the effect of intensity pattern noise on the displacement measurement precision of digital image correlation (DIC). Through mathematical deduction, a formula is presented to estimate the displacement measurement error caused by intensity pattern noise. The resulting formula synthetically reflects the effects of the variance of noise, the intensity variance and the subset size on the displacement measurement precision. To verify the correctness of the resulting formula, two experiments are done. The first one is a real self-correlation experiment, and aims to analyze the effect of the subset size, while the second is a numerical self-correlation experiment, and is to analyze to the effect of the different noise levels. The experimental results are in good agreement with the theoretical predictions. The project is supported by the National Science Foundation of China (10572103).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号