全文获取类型
收费全文 | 2026篇 |
免费 | 74篇 |
国内免费 | 35篇 |
专业分类
化学 | 319篇 |
晶体学 | 5篇 |
力学 | 104篇 |
综合类 | 9篇 |
数学 | 218篇 |
物理学 | 1480篇 |
出版年
2024年 | 1篇 |
2023年 | 13篇 |
2022年 | 24篇 |
2021年 | 34篇 |
2020年 | 40篇 |
2019年 | 24篇 |
2018年 | 22篇 |
2017年 | 87篇 |
2016年 | 92篇 |
2015年 | 71篇 |
2014年 | 269篇 |
2013年 | 150篇 |
2012年 | 98篇 |
2011年 | 151篇 |
2010年 | 100篇 |
2009年 | 125篇 |
2008年 | 104篇 |
2007年 | 130篇 |
2006年 | 99篇 |
2005年 | 80篇 |
2004年 | 69篇 |
2003年 | 48篇 |
2002年 | 40篇 |
2001年 | 40篇 |
2000年 | 21篇 |
1999年 | 30篇 |
1998年 | 29篇 |
1997年 | 24篇 |
1996年 | 19篇 |
1995年 | 15篇 |
1994年 | 11篇 |
1993年 | 5篇 |
1992年 | 14篇 |
1991年 | 5篇 |
1990年 | 12篇 |
1989年 | 10篇 |
1988年 | 9篇 |
1987年 | 4篇 |
1986年 | 4篇 |
1985年 | 3篇 |
1984年 | 4篇 |
1982年 | 3篇 |
1976年 | 1篇 |
1974年 | 1篇 |
排序方式: 共有2135条查询结果,搜索用时 62 毫秒
121.
As it is not possible to obtain an accurate point spread function (PSF) in remote sensing imaging, classic deconvolution methods such as Wiener filtering often introduce strong noise and ringing artifacts, which contaminate the restored images. In this paper, we modify the standard Richarson-Lucy (RL) algorithm with a piecewise local regularization term and combine it with residual deconvolution method. Experimental results show that it is effective in suppressing negative effects, and images with rich details and sharp edges are obtained. 相似文献
122.
Aviram Gur Zeev Zalevsky Vladimir G. Kutchoukov Javier Garcia 《Optics Communications》2011,284(14):3509-3517
We present a novel concept for microscopic imaging. The proposed microscope-like device does not include an objective lens neither a condenser. Instead, a metallic plate of sub-wavelength hole-array with a varying pitch is used to illuminate the inspected object that is mounted very close to it. As a result, the transmitted spectrum through each hole differs from the others and therefore, each spot of the detected object is illuminated with a unique spectrum. By measuring a single spectrum that is the sum of all the spectra that are transmitted through the sample and by using spectral decomposition algorithms, the spatial transmission pattern of the object can be extracted. 相似文献
123.
An information hiding method based on the optical interference principle is proposed. In this method, a secret image can be obtained by two light beams' interference. One of the beams is modulated by our assigned host image; and the other is modulated by a noise-like complex distribution, which is regard as the encrypted image. The transmission of the encrypted image can be implemented by hiding it in the host image to prevent the communication from being perceived by unauthorized person. In addition, this method can also realize simultaneous encryption and hiding for two images. A series of numerical simulation results are presented to verify the feasibility of our proposed method. 相似文献
124.
This paper investigates the misplacement issue presented on the detection of feature points by using the well-known Harris detector, under several watermarking attacks. Harris detector, as a powerful tool in finding image's points of high importance, called “interest points”, has been widely used to locate specific image portions where watermarks are embedded, according to some watermarking insertion procedure. Although Harris detector constitutes a significant part of a typical feature-based watermarking process, no work dealing with its performance under certain attacks has been reported yet. This work studies the accuracy of Harris detector in finding the feature points, which define the watermarked regions of attacked images, firstly as an individual processing module and secondly as a part of a feature-based watermarking methodology. Detailed theoretical analysis followed by appropriate simulation experiments has shown that the incorporation of the Harris detector into the watermarking procedure presents misplacement issues that can lead the watermarking algorithm to unreliable results. In the way of decreasing these misplacement errors, a novel algorithm that extracts more stable interest points, with promising performance is also proposed. 相似文献
125.
Application of homomorphism to secure image sharing 总被引:1,自引:0,他引:1
In this paper, we present a new approach for sharing images between l players by exploiting the additive and multiplicative homomorphic properties of two well-known public key cryptosystems, i.e. RSA and Paillier. Contrary to the traditional schemes, the proposed approach employs secret sharing in a way that limits the influence of the dealer over the protocol and allows each player to participate with the help of his key-image. With the proposed approach, during the encryption step, each player encrypts his own key-image using the dealer's public key. The dealer encrypts the secret-to-be-shared image with the same public key and then, the l encrypted key-images plus the encrypted to-be shared image are multiplied homomorphically to get another encrypted image. After this step, the dealer can safely get a scrambled image which corresponds to the addition or multiplication of the l + 1 original images (l key-images plus the secret image) because of the additive homomorphic property of the Paillier algorithm or multiplicative homomorphic property of the RSA algorithm. When the l players want to extract the secret image, they do not need to use keys and the dealer has no role. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own key-image with no specific order from the scrambled image. Thus, the proposed approach provides an opportunity to use operators like multiplication on encrypted images for the development of a secure privacy preserving protocol in the image domain. We show that it is still possible to extract a visible version of the secret image with only l-1 key-images (when one key-image is missing) or when the l key-images used for the extraction are different from the l original key-images due to a lossy compression for example. Experimental results and security analysis verify and prove that the proposed approach is secure from cryptographic viewpoint. 相似文献
126.
A novel algorithm of image fusion using shearlets 总被引:2,自引:0,他引:2
As a novel MGA (Multiscale Geometric Analysis) tool, shearlets are equipped with a rich mathematical structure similar to wavelets, which are associated to a multi-resolution analysis. Recently, shearlets have been used in image denoising, sparse image representation and edge detection. In this paper, as shearlet transform has the features of directionality, localization, anisotropy and multiscale, it is introduced into image fusion to obtain a fused image. The image could be decomposed by shearlet transform in any scale and any direction, and the detail information can be caught easily. Several different experiments are adopted to demonstrate that the fusion results based on shearlet transform contain more detail and smaller distortion information than any other methods does. 相似文献
127.
We present an optical processor capable to perform partial second derivatives of an image working with partially coherent illumination. The proposed system utilizes a liquid crystal display, onto which images to be derived are displayed. The method is based on the capacity of these devices to generate simultaneously a contrast reverted replica of the image displayed on it. A positive replica of original image is obtained when the LCD is between crossed polarizers, while the negative one is obtained with the LCD is between parallel polarizers. Since the LCD is a diffraction element, both polarizer arrangements may be simultaneously implemented, for example, in a 4f optical processor using polarization filtering of the different diffraction orders. When three images (two replicas of original image displaced in opposite direction and the other one with contrast reverted and centered at the origin.) are imagined across a slightly defocused plane, one obtains an image with enhanced second derivatives in a given direction. No other incoherent (or partially coherent) optical system is presently known which can perform partial second-order derivatives of an image. Experimental results obtained are presented. 相似文献
128.
We present a novel multi-image encryption and decryption algorithm based on Fourier transform and fractional Fourier transforms. Lower frequency parts of the original images are selected, frequency shifted and encrypted by using double phase encoding in fractional Fourier domains. Multiple images are encrypted together into a single one. A simple optical setup is given to implement the proposed algorithm. This scheme has features of enhancement in decryption accuracy and high optical efficiency. Numerical results have been given to verify the validity and efficiency of the proposed scheme. 相似文献
129.
130.
Thermographic signal reconstruction for vibrothermography 总被引:1,自引:0,他引:1
Stephen D. Holland 《Infrared Physics & Technology》2011,54(6):503-511
Vibrothermography, also known as thermosonics or sonic infrared, is a method of nondestructive evaluation that finds cracks or delaminations from the heat given off in response to vibration. In vibrothermography, finding cracks requires identifying and localizing pulsed surface and subsurface heat sources from a time sequence of infrared images. Traditionally this identification involves manually stepping through and studying the images. Careful observation of the heating and subsequent cooling is needed to distinguish cracks from false indications. In this paper, we present an algorithm that reduces the entire time sequence to a single static plot. The plot uses only a few coefficients per pixel to reconstruct the original sequence; this is possible because the reduction is based on a physical model. As an added bonus, the algorithm reduces noise and improves sensitivity. A single false-color image summarizes all the information from the entire sequence, simplifying the task of identifying cracks. 相似文献