全文获取类型
收费全文 | 291篇 |
免费 | 33篇 |
国内免费 | 7篇 |
专业分类
化学 | 50篇 |
力学 | 2篇 |
综合类 | 17篇 |
数学 | 27篇 |
物理学 | 235篇 |
出版年
2023年 | 2篇 |
2022年 | 16篇 |
2021年 | 8篇 |
2020年 | 10篇 |
2019年 | 2篇 |
2018年 | 4篇 |
2017年 | 12篇 |
2016年 | 5篇 |
2015年 | 9篇 |
2014年 | 21篇 |
2013年 | 18篇 |
2012年 | 11篇 |
2011年 | 28篇 |
2010年 | 20篇 |
2009年 | 16篇 |
2008年 | 8篇 |
2007年 | 22篇 |
2006年 | 22篇 |
2005年 | 9篇 |
2004年 | 12篇 |
2003年 | 5篇 |
2002年 | 9篇 |
2001年 | 7篇 |
2000年 | 2篇 |
1999年 | 7篇 |
1998年 | 8篇 |
1997年 | 8篇 |
1996年 | 5篇 |
1995年 | 5篇 |
1994年 | 1篇 |
1993年 | 3篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1983年 | 1篇 |
1981年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有331条查询结果,搜索用时 8 毫秒
51.
The encoding process of finding the best-matched codeword (winner) for a certain input vector in image vector quantization (VQ) is computationally very expensive due to a lot of k-dimensional Euclidean distance computations. In order to speed up the VQ encoding process, it is beneficial to firstly estimate how large the Euclidean distance is between the input vector and a candidate codeword by using appropriate low dimensional features of a vector instead of an immediate Euclidean distance computation. If the estimated Euclidean distance is large enough, it implies that the current candidate codeword could not be a winner so that it can be rejected safely and thus avoid actual Euclidean distance computation. Sum (1-D), L2 norm (1-D) and partial sums (2-D) of a vector are used together as the appropriate features in this paper because they are the first three simplest features. Then, four estimations of Euclidean distance between the input vector and a codeword are connected to each other by the Cauchy–Schwarz inequality to realize codeword rejection. For typical standard images with very different details (Lena, F-16, Pepper and Baboon), the final remaining must-do actual Euclidean distance computations can be eliminated obviously and the total computational cost including all overhead can also be reduced obviously compared to the state-of-the-art EEENNS method meanwhile keeping a full search (FS) equivalent PSNR. 相似文献
52.
Quantum Bayesian computation is an emerging field that levers the computational gains available from quantum computers. They promise to provide an exponential speed-up in Bayesian computation. Our article adds to the literature in three ways. First, we describe how quantum von Neumann measurement provides quantum versions of popular machine learning algorithms such as Markov chain Monte Carlo and deep learning that are fundamental to Bayesian learning. Second, we describe quantum data encoding methods needed to implement quantum machine learning including the counterparts to traditional feature extraction and kernel embeddings methods. Third, we show how quantum algorithms naturally calculate Bayesian quantities of interest such as posterior distributions and marginal likelihoods. Our goal then is to show how quantum algorithms solve statistical machine learning problems. On the theoretical side, we provide quantum versions of high dimensional regression, Gaussian processes and stochastic gradient descent. On the empirical side, we apply a quantum FFT algorithm to Chicago house price data. Finally, we conclude with directions for future research. 相似文献
53.
A phase-only encryption scheme using phase-encoded exclusive-OR (XOR) rules in a Fourier plane and a single path decryption
system are presented. To generate phase-only encrypted data, a zero-padded original image, multiplied by a random phase image,
is Fourier transformed and its real-valued data is encrypted with key data by using phase-encoded XOR rules. Since the original
information is encrypted on the Fourier plane, the proposed encryption is more tolerant to loss of key information by scratching
or cutting than previous XOR encryption in a space domain. A decryption is simply performed based on 2-f setup with spatial
filter by Fourier transform for multiplication phase-only encrypted data with phase-only key data. Due to single path architecture
without a reference wave, the proposed system is resistant to mechanical vibrations and fluctuation. Numerical simulations
have confirmed the validity of the proposed encryption scheme and simple decryption architecture. 相似文献
54.
55.
A novel nonlinear image encryption scheme based on a fully phase nonzero-order joint transform correlator architecture (JTC) in the Gyrator domain (GD) is proposed. In this encryption scheme, the two non-overlapping data distributions of the input plane of the JTC are fully encoded in phase and this input plane is transformed using the Gyrator transform (GT); the intensity distribution captured in the GD represents a new definition of the joint Gyrator power distribution (JGPD). The JGPD is modified by two nonlinear operations with the purpose of retrieving the encrypted image, with enhancement of the decrypted signal quality and improvement of the overall security. There are three keys used in the encryption scheme, two random phase masks and the rotation angle of the GT, which are all necessary for a proper decryption. Decryption is highly sensitivity to changes of the rotation angle of the GT as well as to little changes in other parameters or keys. The proposed encryption scheme in the GD still preserves the shift-invariance properties originated in the JTC-based encryption in the Fourier domain. The proposed encryption scheme is more resistant to brute force attacks, chosen-plaintext attacks, known-plaintext attacks, and ciphertext-only attacks, as they have been introduced in the cryptanalysis of the JTC-based encryption system. Numerical results are presented and discussed in order to verify and analyze the feasibility and validity of the novel encryption–decryption scheme. 相似文献
56.
研究了液晶空间光调制器(LC-SLM)作为固定不动的编码模板应用于阿达玛变换光谱仪(HTS),提出了快速精确的解码方法,给出了由液晶空间光调制器编码模板所带来的均方根信噪比的改善. 相似文献
57.
58.
59.
基于生物电的人-机交互(HCI)技术作为特殊场景下常规人-机交互方法的一种补充,具有非常广阔的应用前景。为了解决基于生物电的HCI系统中多用户通信问题,文章设计并实现了一种基于ZigBee技术的信息交互系统。该系统主要由ZigBee无线通信模块、信息生成/处理模块、串口通信模块三部分组成,用以实现多用户间使用眼电信号(EOG)进行无线信息交互。在实验室环境下,眼电信号有效检出率98.2%,传输距离在无遮挡、无路由的情况下可达到70m。实验结果表明该系统具有识别率高、稳定性好、配置简单、使用方便等优点,具有较强的实际应用价值。 相似文献
60.