全文获取类型
收费全文 | 3408篇 |
免费 | 273篇 |
国内免费 | 52篇 |
专业分类
化学 | 184篇 |
晶体学 | 1篇 |
力学 | 39篇 |
综合类 | 43篇 |
数学 | 178篇 |
物理学 | 419篇 |
无线电 | 2869篇 |
出版年
2024年 | 10篇 |
2023年 | 63篇 |
2022年 | 85篇 |
2021年 | 77篇 |
2020年 | 94篇 |
2019年 | 63篇 |
2018年 | 76篇 |
2017年 | 100篇 |
2016年 | 103篇 |
2015年 | 93篇 |
2014年 | 216篇 |
2013年 | 177篇 |
2012年 | 204篇 |
2011年 | 195篇 |
2010年 | 147篇 |
2009年 | 177篇 |
2008年 | 203篇 |
2007年 | 211篇 |
2006年 | 179篇 |
2005年 | 168篇 |
2004年 | 164篇 |
2003年 | 155篇 |
2002年 | 162篇 |
2001年 | 128篇 |
2000年 | 107篇 |
1999年 | 89篇 |
1998年 | 53篇 |
1997年 | 53篇 |
1996年 | 43篇 |
1995年 | 35篇 |
1994年 | 19篇 |
1993年 | 15篇 |
1992年 | 11篇 |
1991年 | 12篇 |
1990年 | 9篇 |
1989年 | 12篇 |
1988年 | 7篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 5篇 |
1982年 | 1篇 |
1980年 | 2篇 |
1979年 | 3篇 |
1975年 | 1篇 |
排序方式: 共有3733条查询结果,搜索用时 15 毫秒
71.
无人机目标检测与识别任务中,目标随着飞行高度的改变尺寸发生显著变化。常规目标检测模型中,获取的小目标细节信息有限,检测精度较低;而适用于小目标的实时检测模型往往容易丢失大目标的背景信息,降低大目标的检测精度。针对以上多尺度目标检测识别任务难点,提出一种基于改进特征金字塔网络(Feature Pyramid Network, FPN)结构的实时多尺度目标检测识别模型。该模型通过增加特征金字塔层级覆盖更广的目标尺度,获取更为丰富的目标信息;同时,利用跨连接增加不同尺度特征融合的多样性,降低特征传导距离,保留更加完整的尺度特征来提高模型检测识别多尺度目标的性能。通过实验发现,相比于原始网络结构和相同特征层级的四层特征金字塔结构,加入改进特征金字塔结构的多尺度目标检测模型识别性能得到了提升。 相似文献
72.
周敏 《太赫兹科学与电子信息学报》2022,20(8):810-816
针对被动式太赫兹安检系统因环境影响导致图像质量波动,从而影响识别算法,导致准确率大幅降低的问题,提出了基于Focal-EIOU损失函数的改进YOLOv4算法,并用被动式太赫兹人体安检图像对刀、枪违禁物品进行模型训练获得模型。建立不同环境、不同位置角度携带刀枪嫌疑物人员的太赫兹图像数据库,采用图像增广的方法构建丰富数据集;将YOLOv4的CIOU loss改进为Focal-EIOU loss,提高算法对太赫兹图像识别的鲁棒性,进而经过训练获得较优的模型。在本文的测试集中,使用改进后的算法训练的模型平均检测精确度(mAP)达到96.4%,检测速度在28 ms左右,交并比(IOU)平均值为0.95,在同等条件下高于常规算法,改善了检测识别的效果。实验结果表明,本文方法能够有效提高被动式太赫兹人体安检系统的嫌疑物识别准确率,有利于该项技术在人体安检领域的推广应用。 相似文献
73.
Jiaquan Zhang Hui Chen Xiaoming Yao Xiaoming Fu 《Digital Communications & Networks》2022,8(3):324-332
Identifying an unfamiliar caller's profession is important to protect citizens' personal safety and property. Owing to the limited data protection of various popular online services in some countries, such as taxi hailing and ordering takeouts, many users presently encounter an increasing number of phone calls from strangers. The situation may be aggravated when criminals pretend to be such service delivery staff, threatening the user individuals as well as the society. In addition, numerous people experience excessive digital marketing and fraudulent phone calls because of personal information leakage. However, previous works on malicious call detection only focused on binary classification, which does not work for the identification of multiple professions. We observed that web service requests issued from users' mobile phones might exhibit their application preferences, spatial and temporal patterns, and other profession-related information. This offers researchers and engineers a hint to identify unfamiliar callers. In fact, some previous works already leveraged raw data from mobile phones (which includes sensitive information) for personality studies. However, accessing users' mobile phone raw data may violate the more and more strict private data protection policies and regulations (e.g., General Data Protection Regulation). We observe that appropriate statistical methods can offer an effective means to eliminate private information and preserve personal characteristics, thus enabling the identification of the types of mobile phone callers without privacy concerns. In this paper, we develop CPFinder —- a system that exploits privacy-preserving mobile data to automatically identify callers who are divided into four categories of users: taxi drivers, delivery and takeouts staffs, telemarketers and fraudsters, and normal users (other professions). Our evaluation of an anonymized dataset of 1,282 users over a period of 3 months in Shanghai City shows that the CPFinder can achieve accuracies of more than 75.0% and 92.4% for multiclass and binary classifications, respectively. 相似文献
74.
Yingchun Wang Jingyi Wang Weizhan Zhang Yufeng Zhan Song Guo Qinghua Zheng Xuanyu Wang 《Digital Communications & Networks》2022,8(1):1-17
With the rapid development of mobile devices and deep learning, mobile smart applications using deep learning technology have sprung up. It satisfies multiple needs of users, network operators and service providers, and rapidly becomes a main research focus. In recent years, deep learning has achieved tremendous success in image processing, natural language processing, language analysis and other research fields. Despite the task performance has been greatly improved, the resources required to run these models have increased significantly. This poses a major challenge for deploying such applications on resource-restricted mobile devices. Mobile intelligence needs faster mobile processors, more storage space, smaller but more accurate models, and even the assistance of other network nodes. To help the readers establish a global concept of the entire research direction concisely, we classify the latest works in this field into two categories, which are local optimization on mobile devices and distributed optimization based on the computational position of machine learning tasks. We also list a few typical scenarios to make readers realize the importance and indispensability of mobile deep learning applications. Finally, we conjecture what the future may hold for deploying deep learning applications on mobile devices research, which may help to stimulate new ideas. 相似文献
75.
针对传统的图流行排序显著性目标检测算法存在先验信息单一,显著目标检测不完整的问题,提出一种新的基于背景先验与中心先验的显著性目标检测算法。首先将图像边界节点作为背景种子进行流行排序获得粗略的前景区域,将其再次流行排序得到初步显著图;然后利用Harris角点检测、聚类实现中心先验显著性检测,捕获中心显著信息;最后在初步显著图上融合图像中心显著性,得到最终显著图。本文对综合指标、精确率-召回率曲线、F-measure值以及平均绝对误差(mean absolute error,MAE)值进行实验评估,在公开数据集MSRA-10K和ECSSD上进行的实验结果表明:对比10种主流算法,本文算法在不同的评估指标上都具有较好的表现,且能准确地突出显著目标,提升背景抑制效果。 相似文献
76.
LiDAR-based 3D object detection is important for autonomous driving scene perception, but point clouds produced by LiDAR are irregular and unstructured in nature, and cannot be adopted by the conventional Convolutional Neural Networks (CNN). Recently, Graph Convolutional Networks (GCN) has been proved as an ideal way to handle non-Euclidean structure data, as well as for point cloud processing. However, GCN involves massive computation for searching adjacent nodes, and the heavy computational cost limits its applications in processing large-scale LiDAR point cloud in autonomous driving. In this work, we adopt a frustum-based point cloud-image fusion scheme to reduce the amount of LiDAR point clouds, thus making the GCN-based large-scale LiDAR point clouds feature learning feasible. On this basis, we propose an efficient graph attentional network to accomplish the goal of 3D object detection in autonomous driving, which can learn features from raw LiDAR point cloud directly without any conversions. We evaluate the model on the public KITTI benchmark dataset, the 3D detection mAP is 63.72% on KITTI Cars, Pedestrian and Cyclists, and the inference speed achieves 7.9 fps on a single GPU, which is faster than other methods of the same type. 相似文献
77.
Real-time moving object detection is challenging for moving cameras due to the moving background. Many studies use homography matrix to compensate for global motion by warping the background model to the current frame. Then, the pixel difference between the current frame and the background model is used for background subtraction. Moving pixels are extracted by applying adaptive threshold and some post-processing techniques. On the other hand, deep learning-based dense optical flow can be efficient enough to extract the moving pixels, but it increases computational cost. This study proposes a method to enhance a classical background modeling method with deep learning-based dense optical flow. The main contribution of this paper is to propose a fusing algorithm for dense optical flow and background modeling approach. The background modeling methods are error-prone, especially with continuous camera movement, while the optical flow method alone may not always be efficient. Our hybrid method fuses both techniques to improve the detection accuracy. We propose a software architecture to run background modeling and dense optical flow methods in parallel processes. The proposed implementation approach significantly increases the method’s working speed, while the proposed fusion and combining strategy improve detection results. The experimental results show that the proposed method can run at high speed and has satisfying performance against the methods in the literature. 相似文献
78.
Feding Ge Jing Zhu Limin Chen 《International Journal of Infrared and Millimeter Waves》1996,17(2):449-455
The effective parameters of chiral composite are studied using a simple model, that is, randomly oriented non-interacting wire helices embedded in a nonchiral host medium. It is found that both the effective permittivity and permeability are independent on the handedness of the chiral objects while the effective chirality admittance is dependent. It is also found that when the ratio of the radius of the chiral helix to its pitch is about 0.23, maximum chirality admittance is achieved. The effective parameters of equichiral sample are also discussed. 相似文献
79.
Summary A new method for the determination of the mobile phase volume (V
m) in liquid chromatography is presented based on the model regarding the retention of ionic solutes in the presence of eluent
electrolytes. TheV
m value can be determined by measuring the retention volumes of two ions that have the same charge in two eluent electrolyte
systems. Compared with the methods using isotopically labelled eluent components or inorganic salts asV
m markers, the method presented is proved to give more reasonableV
m values for both normal and reversed-phase liquid chromatography. As well as in binary mixed solvent systems, theV
m values in single solvent systems can be determined by this method. 相似文献
80.
S. Nygren 《Journal of separation science》1979,2(6):319-323
The technique of programming the carrier gas flow rate in gas chromatography, especially in connection with the use of capillary columns shorter than 10 m can significantly accelerate GC analyses. Equations for calculation of the parameters of the exponential flow function and retention data are described. The effects of flow programming in a short capillary column are shown in a few chromatograms. Different programming rates are tested and compared with temperature programming. 相似文献