首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4174篇
  免费   438篇
  国内免费   30篇
化学   56篇
力学   27篇
综合类   50篇
数学   131篇
物理学   521篇
无线电   3857篇
  2024年   3篇
  2023年   30篇
  2022年   57篇
  2021年   85篇
  2020年   79篇
  2019年   39篇
  2018年   60篇
  2017年   111篇
  2016年   151篇
  2015年   197篇
  2014年   287篇
  2013年   252篇
  2012年   279篇
  2011年   259篇
  2010年   222篇
  2009年   219篇
  2008年   251篇
  2007年   233篇
  2006年   243篇
  2005年   239篇
  2004年   199篇
  2003年   176篇
  2002年   178篇
  2001年   119篇
  2000年   118篇
  1999年   83篇
  1998年   98篇
  1997年   94篇
  1996年   50篇
  1995年   69篇
  1994年   35篇
  1993年   43篇
  1992年   18篇
  1991年   10篇
  1990年   11篇
  1989年   11篇
  1988年   5篇
  1987年   1篇
  1986年   4篇
  1985年   4篇
  1984年   5篇
  1983年   3篇
  1982年   3篇
  1981年   2篇
  1980年   4篇
  1975年   1篇
  1971年   1篇
  1969年   1篇
排序方式: 共有4642条查询结果,搜索用时 406 毫秒
71.
In this paper, we propose a novel image encryption scheme based on DNA (Deoxyribonucleic acid) sequence operations and chaotic system. Firstly, we perform bitwise exclusive OR operation on the pixels of the plain image using the pseudorandom sequences produced by the spatiotemporal chaos system, i.e., CML (coupled map lattice). Secondly, a DNA matrix is obtained by encoding the confused image using a kind of DNA encoding rule. Then we generate the new initial conditions of the CML according to this DNA matrix and the previous initial conditions, which can make the encryption result closely depend on every pixel of the plain image. Thirdly, the rows and columns of the DNA matrix are permuted. Then, the permuted DNA matrix is confused once again. At last, after decoding the confused DNA matrix using a kind of DNA decoding rule, we obtain the ciphered image. Experimental results and theoretical analysis show that the scheme is able to resist various attacks, so it has extraordinarily high security.  相似文献   
72.
We present CARTscans, a graphical tool that displays predicted values across a fourdimensional subspace. We show how these plots are useful for understanding the structure and relationships between variables in a wide variety of models, including (but not limited to) regression trees, ensembles of trees, and linear regressions with varying degrees of interactions. In addition, the common visualization framework allows diverse complex models to be visually compared in a way that illuminates the similarities and differences in the underlying methods, facilitates the choice of a particular model structure, and provides a useful check for implausible predictions of future observations in regions with little or no data.  相似文献   
73.
Noise feedback coding(NFC) has attracted renewed interest with the recent standardization of backward-compatible enhancements for ITU-T G.711 and G.722.It has also been revisited with the emergence of proprietary speech codecs,such as BV16,BV32,and SILK,that have structures different from CELP coding.In this article,we review NFC and describe a novel coding technique that optimally shapes coding noise in embedded pulse-code modulation(PCM) and embedded adaptive differential PCM(ADPCM).We describe how this new technique was incorporated into the recent ITU-T G.711.1,G.711 App.III,and G.722 Annex B(G.722B) speech-coding standards.  相似文献   
74.
An efficient disparity estimation algorithm for multi-view video sequences, recorded by a two-dimensional camera array in which the cameras are spaced equidistantly, is presented. Because of the strong geometrical relationship among views, the disparity vectors of a certain view can for most blocks be derived from the disparity vectors of other views. A frame constructed using that idea is called a D frame in this work. Three new prediction schemes which contain D frames are proposed for encoding 5 × 3 multi-view video sequences. The schemes are applied to several multi-view image sequences taken from a camera-array and they are compared in terms of quality, bit-rate and complexity. The experimental results show that the proposed prediction schemes significantly decrease the complexity of the encoder at a very low cost of quality and/or bit-rate.  相似文献   
75.
The three-dimensional discrete cosine transform (3D-DCT) has been researched as an alternative to existing dominant video standards based on motion estimation and compensation. Since it does not need to search macro block for inter/intra prediction, 3D-DCT has great advantages for complexity. However, it has not been developed well because of poor video quality while video standards such as H.263(+) and HEVC have been blooming. In this paper, we propose a new 3D-DCT video coding as a new video solution for low power mobile technologies such as Internet of Things (IoT) and Drone. We focus on overcoming drawbacks reported in previous research. We build a complete 3D-DCT video coding system by adopting existing advanced techniques and devising new coding algorithms to improve overall performance of 3D-DCT. Experimental results show proposed 3D-DCT outperforms H.264 low power profiles while offering less complexity. From GBD-PSNR, proposed 3D-DCT provides better performance by average 4.6 dB.  相似文献   
76.
We present a computational framework based on the use of the Newton and level set methods to model fluid–structure interaction problems involving elastic membranes freely suspended in an incompressible Newtonian flow. The Mooney–Rivlin constitutive model is used to model the structure. We consider an extension to a more general case of the method described in Laadhari (2017) to model the elasticity of the membrane. We develop a predictor–corrector finite element method where an operator splitting scheme separates different physical phenomena. The method features an affordable computational burden with respect to the fully implicit methods. An exact Newton method is described to solve the problem, and the quadratic convergence is numerically achieved. Sample numerical examples are reported and illustrate the accuracy and robustness of the method.  相似文献   
77.
This paper presents the performance analysis of a two-way relay system with nodes-mobility (NM) and channel estimation errors (CEE) under time-varying Rayleigh fading. Herein, analog network coding protocol is employed at the relay node. All the participating nodes are half-duplex and equipped with single-antenna devices. Specifically, we utilize first-order Markovian model to characterize the impact of NM in the channel. Along with the NM, we also consider that the CEE may exist in practical scenarios, where nodes require to estimate the channel state information. By incorporating these factors, we first derive the instantaneous end-to-end (e2e) signal-to-noise ratios (SNRs) at two source nodes. Then, we obtain the exact closed-form expressions for distribution and density functions of the two e2e SNRs. After that, we derive the accurate expressions of various performance metrics, viz., sum-bit error rate, overall outage probability, and ergodic sum-rate. Further, to attain more insights into the considered system, we deduce the asymptotic behavior of these performance metrics. Finally, numerical and Monte-Carlo simulation results are provided to validate our theoretical analysis and to illustrate the impact of NM and CEE on the performance measures of the considered system.  相似文献   
78.
Embedded random matrix ensembles are generic models for describing statistical properties of finite isolated interacting quantum many-particle systems. For the simplest spinless fermion (or boson) systems, with say mm fermions (or bosons) in NN single particle states and interacting via kk-body interactions, we have EGUE(kk) [embedded GUE of kk-body interactions] with GUE embedding and the embedding algebra is U(N)U(N). A finite quantum system, induced by a transition operator, makes transitions from its states to the states of the same system or to those of another system. Examples are electromagnetic transitions (then the initial and final systems are same), nuclear beta and double beta decay (then the initial and final systems are different), particle addition to or removal from a given system and so on. Towards developing a complete statistical theory for transition strength densities (transition strengths multiplied by the density of states at the initial and final energies), we have derived formulas for the lower order bivariate moments of the strength densities generated by a variety of transition operators. Firstly, for a spinless fermion system, using EGUE(kk) representation for a Hamiltonian that is kk-body and an independent EGUE(tt) representation for a transition operator that is tt-body and employing the embedding U(N)U(N) algebra, finite-NN formulas for moments up to order four are derived, for the first time, for the transition strength densities. Secondly, formulas for the moments up to order four are also derived for systems with two types of spinless fermions and a transition operator similar to beta decay and neutrinoless beta decay operators. In addition, moments formulas are also derived for a transition operator that removes k0k0 number of particles from a system of mm spinless fermions. In the dilute limit, these formulas are shown to reduce to those for the EGOE version derived using the asymptotic limit theory of Mon and French (1975). Numerical results obtained using the exact formulas for two-body (k=2k=2) Hamiltonians (in some examples for k=3k=3 and 44) and the asymptotic formulas clearly establish that in general the smoothed (with respect to energy) form of the bivariate transition strength densities take bivariate Gaussian form for isolated finite quantum systems. Extensions of these results to bosonic systems and EGUE ensembles with further symmetries are discussed.  相似文献   
79.
80.
Tao WANG  Yong WANG  Yue ZHANG 《通信学报》2015,36(10):263-270
In order to exchange information among k users using the technology of physical-layer network coding in the multiple input multiple output Y two-way relay channels,the GSA-GSA scheme was proposed,using the technology of general signal alignment during the uplink and the downlink.The signals were exchanged between every source node align in a transformed subspace,rather than the direct subspace.This was realized by jointly designing the precoding matrices at all source nodes and the processing matrix at the relay.The constraints of the number of sending and receiving antennas and the sum rate of proposed scheme were analyzed.In simulation,it can figure out that the proposed scheme needs fewer antennas in the whole system and can improve the achievable system sum rate under the same SNR and degrees of freedom.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号