首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2150篇
  免费   102篇
  国内免费   36篇
化学   195篇
晶体学   3篇
力学   123篇
综合类   16篇
数学   256篇
物理学   1695篇
  2024年   2篇
  2023年   12篇
  2022年   25篇
  2021年   43篇
  2020年   39篇
  2019年   34篇
  2018年   24篇
  2017年   99篇
  2016年   111篇
  2015年   100篇
  2014年   285篇
  2013年   156篇
  2012年   97篇
  2011年   155篇
  2010年   106篇
  2009年   137篇
  2008年   108篇
  2007年   142篇
  2006年   99篇
  2005年   79篇
  2004年   73篇
  2003年   47篇
  2002年   46篇
  2001年   38篇
  2000年   24篇
  1999年   32篇
  1998年   33篇
  1997年   30篇
  1996年   20篇
  1995年   13篇
  1994年   9篇
  1993年   5篇
  1992年   15篇
  1991年   7篇
  1990年   8篇
  1989年   7篇
  1988年   7篇
  1987年   4篇
  1986年   7篇
  1985年   3篇
  1984年   5篇
  1983年   1篇
  1982年   1篇
排序方式: 共有2288条查询结果,搜索用时 46 毫秒
101.
We present a novel concept for microscopic imaging. The proposed microscope-like device does not include an objective lens neither a condenser. Instead, a metallic plate of sub-wavelength hole-array with a varying pitch is used to illuminate the inspected object that is mounted very close to it. As a result, the transmitted spectrum through each hole differs from the others and therefore, each spot of the detected object is illuminated with a unique spectrum. By measuring a single spectrum that is the sum of all the spectra that are transmitted through the sample and by using spectral decomposition algorithms, the spatial transmission pattern of the object can be extracted.  相似文献   
102.
An information hiding method based on the optical interference principle is proposed. In this method, a secret image can be obtained by two light beams' interference. One of the beams is modulated by our assigned host image; and the other is modulated by a noise-like complex distribution, which is regard as the encrypted image. The transmission of the encrypted image can be implemented by hiding it in the host image to prevent the communication from being perceived by unauthorized person. In addition, this method can also realize simultaneous encryption and hiding for two images. A series of numerical simulation results are presented to verify the feasibility of our proposed method.  相似文献   
103.
Ching-Chung Yang 《Optik》2011,122(18):1684-1687
We demonstrate a novel method to modify the mask-filtering approach by enlarging the gray-level difference of any two nearby pixels in an image. Derivatives are calculated in different directions respectively instead of isotropically. Some higher spatial frequencies are then selectively magnified. The final image has better sharpened fine characteristics than that enhanced by the conventional technique.  相似文献   
104.
A cascaded Fresnel digital hologram (CFDH) is proposed, together with its mathematical derivation. Its application to watermarking has been demonstrated by a simulation procedure, in which the watermark image to be hidden is encoded into the phase of the host image. The watermark image can be deciphered by the CFDH setup, the reconstructed image shows good quality and the error is almost closed to zeros. Compared with previous technique, this is a lensless architecture, which minimizes the hardware requirement.  相似文献   
105.
R. Bedogni   《Radiation measurements》2003,36(1-6):239-243
At the personal dosimetry service of the ENEA Radiation Protection Institute, a fast neutron dosemeter based on chemically etched CR-39 (Poly Allyl Diglycol Carbonate) is operating since more than 20 years. Since then the track counting has been performed with a system consisting of a microscope, a video camera and an image analyser. A new automatic analysis system has been developed, based on automatic motion and vision tools and the programming language Labview 6, from National Instruments. The system selects the correct number of reading fields on the basis of a preliminary scan of the dosemeter, therefore operating motion and vision procedures in order to perform the analysis. For each reading field the system collects the track area distribution to which a previously optimised algorithm is applied, in order to correct the energy dependence of the response. For each dosemeter, a record containing the barcode and all data necessary for assessing the personal dose equivalent is stored in a routine file. Taking advantage of automatic vision and motion, a CR-39 reader with innovative features in terms of reproducibility, velocity and accuracy is now available even for the routine purposes of dosimetric services.  相似文献   
106.
Fluorescence lifetime imaging methodology has been successfully implemented at Unilever Research in a frequency-domain manner. The experimental rig constructed comprises a wide-bandwidth electrooptic modulator operating on a CW argon-ion laser. The modulated excitation with a typical upper modulation frequency limit of 200 MHz falls on macroscopic samples and the resultant scattered light or fluorescence emission is then imaged onto a custom gain-modulatable image intensifier and slow-scan CCD camera combination. Phase adjustment of the image intensifier relative to the laser modulator is achieved by the RF function generator driving the intensifier. Both homodyne and heterodyne (500-Hz) strobing modes are employed to generate a double image stack (scattered light reference and fluorescence emission) comprising an image sequence as a function of instrumental phase difference. These image stacks are analyzed by Fourier least-squares methods to yield lifetime images by both phase delay and normalized demodulation. Correct operation of the apparatus is deduced from the direct imaging of a quencher-induced lifetime variation of BODIPY disulfonate over a range of concentrations. A typical industrially relevant sample, comprising an investigation of the lifetime aspects of human dental enamel autofluorescence at 50MHz modulation frequency, is given. This shows that there are real emission lifetime decreases of about 0.5 nsec in white-spot lesion areas compared to the surrounding sound enamel.  相似文献   
107.
一种改进的自适应模糊阈值图象分割方法   总被引:3,自引:5,他引:3  
自适应模糊阈值图象分割方法的关键和困难在于隶属函数窗宽的自动调整和阈值搜索范围的确定.依靠图象灰度的统计特性初步确定阈值搜索范围,提出了一种改进方法,进而得到隶属函数的窗宽.实验表明这种方法避免了确定图象灰度直方图峰位置的困难,对较低亮度图象分割效果良好.  相似文献   
108.
Computer Simulation of a 3-D Sensing System with Structured Illumination   总被引:1,自引:0,他引:1  
A computer simulation system of three-dimensional sensing with structured illumination is presented. It includes the generation of deformed fringe patterns from 3-D shapes and the reconstruction of 3-D shapes, conversely. Some experimental results of the deformed fringe pattern and the reconstructed object shapes are presented. We have also discussed the effect of some major system parameters on the measurement results and considered how to correct these parameters according to the measurement result of the standard plane. Using this simulation system, the major system parameters: environmental conditions, measurement accuracy and algorithm evaluation of the 3-D shape measurement system based on PMP, FTP, SPM, etc., can be researched. © 1997 Elsevier Science Ltd. All rights reserved.  相似文献   
109.
J. Mnich  M. Wing 《Pramana》2007,69(6):1185-1189
The goal of the EUDET project is the development and construction of infrastructure to permit detector R&D for the international linear collider (ILC) with larger scale prototypes. It encompasses major detector components: the vertex detector, the tracker and the calorimeters. We describe here the status and plans of the project with emphasis on issues related to data acquisition for future test beam experiments.   相似文献   
110.
Discrete fractional Hadamard transform (DFrHaT) is a generalization of the Hadamard transform, which has been widely used in signal processing. In this paper, we present the multiple-parameter discrete fractional Hadamard transform (MPDFrHaT), which has multiple order parameters instead of only one in DFrHaT. The proposed MPDFrHaT is shown to possess all of the desired properties of DFrHaT. In fact, it will reduce to DFrHaT when all of its order parameters are the same. We also propose a novel encryption technique, double random amplitude (DRA) encoding scheme, by cascading twofold random amplitude filtering. As a primary application, we exploit the multiple-parameter feature of MPDFrHaT and double random amplitude encoding scheme for digital image encryption in the MPDFrHaT domain. Results show that this method can enhance data security.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号