首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1712篇
  免费   51篇
  国内免费   25篇
化学   126篇
晶体学   3篇
力学   96篇
综合类   6篇
数学   218篇
物理学   1339篇
  2024年   1篇
  2023年   8篇
  2022年   16篇
  2021年   32篇
  2020年   31篇
  2019年   21篇
  2018年   12篇
  2017年   74篇
  2016年   80篇
  2015年   56篇
  2014年   250篇
  2013年   129篇
  2012年   77篇
  2011年   122篇
  2010年   89篇
  2009年   115篇
  2008年   97篇
  2007年   106篇
  2006年   85篇
  2005年   64篇
  2004年   55篇
  2003年   39篇
  2002年   31篇
  2001年   31篇
  2000年   16篇
  1999年   21篇
  1998年   26篇
  1997年   20篇
  1996年   15篇
  1995年   14篇
  1994年   6篇
  1993年   3篇
  1992年   11篇
  1991年   3篇
  1990年   8篇
  1989年   6篇
  1988年   5篇
  1987年   3篇
  1986年   3篇
  1985年   2篇
  1984年   4篇
  1982年   1篇
排序方式: 共有1788条查询结果,搜索用时 187 毫秒
101.
Using a new method based on generalized sections of feasible sets, we obtain optimality conditions for vector optimization of objective multifunctions with multivalued constraints. The authors express their sincere gratitude to Professor F. Giannessi and the referees for comments and valuable suggestions. The second author was partially supported by the Center of Excellence for Mathematics (University of Isfahan).  相似文献   
102.
This paper presents a double shearographic configuration based on the optical method by using two Michelson interferometers in tandem. The problems associated with the extraction of second order derivatives by optical means and a comparison with the proposed novel approach by digital means are discussed in this paper.  相似文献   
103.
Optical image encryption using fractional Fourier transform and chaos   总被引:4,自引:2,他引:2  
We propose a new method for image encryption using fractional Fourier transform and chaos theory. Random phase masks are generated using iterative chaos functions. The input image is combined with the first random phase mask at the object plane and is then transformed using the fractional Fourier transform. After the first fractional Fourier transform, the second random phase mask, again generated by using the chaos functions, is used at the fractional plane. The second fractional Fourier transform operation is then carried out to obtain the encrypted image. Three types of chaos functions have been used: the logistic map, the tent map and the Kaplan–Yorke map. The mean square error and the signal-to-noise ratio between the decrypted image and the input image for the correct order and the incorrect order of the fractional Fourier transform have been calculated. The computer simulations are presented to verify the validity of the proposed technique.  相似文献   
104.
During the high cycle fatigue of aluminium alloys, an energy dissipation occurs. This dissipation is hard to be estimated because of the high diffusivity of such alloys and the importance of the thermoelasticity effects in comparison with others standard metallic materials (e.g., steels). Nevertheless the study of the energy balance gives valuable information about the nature of deformation mechanisms facilitating the construction of constitutive models associated with the microplasticity and damage of the aluminium alloy. In this work, the different energies involved in the energy balance were deduced from two complementary imaging techniques. The dissipation and thermoelastic sources were derived from an infrared thermography system, while the deformation energy was estimated from a digital image correlation system. Three tests with various loading blocks were carried out and a comparison between deformation and dissipation energies was systematically performed.  相似文献   
105.
Branch length similarity (BLS) entropy is defined in a network consisting of a single node and branches. In this study, we mapped the binary time-series signal to the circumference of the time circle so that the BLS entropy can be calculated for the binary time-series. We obtained the BLS entropy values for “1” signals on the time circle. The set of values are the BLS entropy profile. We selected the local maximum (minimum) point, slope, and inflection point of the entropy profile as the characteristic features of the binary time-series and investigated and explored their significance. The local maximum (minimum) point indicates the time at which the rate of change in the signal density becomes zero. The slope and inflection points correspond to the degree of change in the signal density and the time at which the signal density changes occur, respectively. Moreover, we show that the characteristic features can be widely used in binary time-series analysis by characterizing the movement trajectory of Caenorhabditis elegans. We also mention the problems that need to be explored mathematically in relation to the features and propose candidates for additional features based on the BLS entropy profile.  相似文献   
106.
An image processing approach originating from the proteomics field has been transferred successfully to the processing of data obtained with comprehensive two-dimensional gas chromatographic separations data. The approach described here has proven to be a useful analytical tool for unbiased pattern comparison or profiling analyses, as demonstrated with the differentiation of volatile patterns (“aroma”) from fruits such as apples, pears, and quince fruit. These volatile patterns were generated by headspace solid phase microextraction coupled to comprehensive two-dimensional gas chromatography (HS-SPME-GC × GC). The data obtained from GC × GC chromatograms were used as contour plots which were then converted to gray-scale images and analyzed utilizing a workflow derived from 2D gel-based proteomics. Run-to-run variations between GC × GC chromatograms, respectively their contour plots, have been compensated by image warping. The GC × GC images were then merged into a fusion image yielding a defined and project-wide spot (peak) consensus pattern. Within detected spot boundaries of this consensus pattern, relative quantities of the volatiles from each GC × GC image have been calculated, resulting in more than 700 gap free volatile profiles over all samples. These profiles have been used for multivariate statistical analysis and allowed clustering of comparable sample origins and prediction of unknown samples. At present state of development, the advantage of using mass spectrometric detection can only be realized by data processing off-line from the identified software packages. However, such information provides a substantial basis for identification of statistically relevant compounds or for a targeted analysis.  相似文献   
107.
于洋  陈亮  蒋诗平 《光谱实验室》2011,28(6):3239-3242
镊是近年发展起来的一种用于生命科学研究领域的微操纵技术.简要介绍了所搭建的磁镊装置及利用2.8μm直径的磁珠进行的操纵实验;利用一种搜索算法分析所记录的磁珠运动视频,得出磁珠的运动轨迹和运动速度,并与理论分析相验证.研究结果表明该磁镊装置具有一定的实用性.  相似文献   
108.
As it is not possible to obtain an accurate point spread function (PSF) in remote sensing imaging, classic deconvolution methods such as Wiener filtering often introduce strong noise and ringing artifacts, which contaminate the restored images. In this paper, we modify the standard Richarson-Lucy (RL) algorithm with a piecewise local regularization term and combine it with residual deconvolution method. Experimental results show that it is effective in suppressing negative effects, and images with rich details and sharp edges are obtained.  相似文献   
109.
We present a novel concept for microscopic imaging. The proposed microscope-like device does not include an objective lens neither a condenser. Instead, a metallic plate of sub-wavelength hole-array with a varying pitch is used to illuminate the inspected object that is mounted very close to it. As a result, the transmitted spectrum through each hole differs from the others and therefore, each spot of the detected object is illuminated with a unique spectrum. By measuring a single spectrum that is the sum of all the spectra that are transmitted through the sample and by using spectral decomposition algorithms, the spatial transmission pattern of the object can be extracted.  相似文献   
110.
An information hiding method based on the optical interference principle is proposed. In this method, a secret image can be obtained by two light beams' interference. One of the beams is modulated by our assigned host image; and the other is modulated by a noise-like complex distribution, which is regard as the encrypted image. The transmission of the encrypted image can be implemented by hiding it in the host image to prevent the communication from being perceived by unauthorized person. In addition, this method can also realize simultaneous encryption and hiding for two images. A series of numerical simulation results are presented to verify the feasibility of our proposed method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号