全文获取类型
收费全文 | 2790篇 |
免费 | 257篇 |
国内免费 | 42篇 |
专业分类
化学 | 19篇 |
晶体学 | 3篇 |
力学 | 12篇 |
综合类 | 25篇 |
数学 | 843篇 |
物理学 | 293篇 |
无线电 | 1894篇 |
出版年
2024年 | 34篇 |
2023年 | 103篇 |
2022年 | 156篇 |
2021年 | 159篇 |
2020年 | 153篇 |
2019年 | 117篇 |
2018年 | 71篇 |
2017年 | 79篇 |
2016年 | 81篇 |
2015年 | 72篇 |
2014年 | 109篇 |
2013年 | 133篇 |
2012年 | 102篇 |
2011年 | 106篇 |
2010年 | 81篇 |
2009年 | 141篇 |
2008年 | 206篇 |
2007年 | 163篇 |
2006年 | 176篇 |
2005年 | 123篇 |
2004年 | 92篇 |
2003年 | 120篇 |
2002年 | 94篇 |
2001年 | 73篇 |
2000年 | 73篇 |
1999年 | 78篇 |
1998年 | 46篇 |
1997年 | 44篇 |
1996年 | 28篇 |
1995年 | 10篇 |
1994年 | 16篇 |
1993年 | 8篇 |
1992年 | 11篇 |
1991年 | 9篇 |
1990年 | 4篇 |
1989年 | 7篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
1959年 | 2篇 |
排序方式: 共有3089条查询结果,搜索用时 15 毫秒
31.
M. Nicolaidis 《Journal of Electronic Testing》1991,1(4):257-273
It has been noted by several authors that the classical stuck-at logical fault model might not be an appropriate representation of certain real failures occurring in integrated circuits. Shorts are an important class of such faults. This article gives a detailed analysis of the effects of shorts in self-checking circuits and proposes techniques for dealing with them. More precisely, we show that, unlike other faults such as stuck-at, stuck-on, and stuck-open—which produce only single errors in the place they occur—shorts can produce double errors on the two shorted lines. In particular, feedback shorts can produce double errors on the two shorted lines. The double error is unidirectional for some feedback shorts and non-unidirectional for some others. Furthermore, in some technologies (e.g., CMOS), non-feedback shorts can also produce double non-unidirectional errors. We also show that unlike stuck-at, stuck-on, and stuck-open faults, redundant shorts can destroy the SFS property. Then we propose several techniques for coping with these problems and we illustrate the results by circuit implementation examples.The present study is given for NMOS and CMOS circuits but we show that it is valid for any other technology. 相似文献
32.
33.
Sergey V. Avgustinovich Olof Heden Faina I. Solov’eva 《Designs, Codes and Cryptography》2006,39(3):317-322
The main result is that to any even integer q in the interval 0 ≤ q ≤ 2n+1-2log(n+1), there are two perfect codes C1 and C2 of length n = 2m − 1, m ≥ 4, such that |C1 ∩ C2| = q. 相似文献
34.
We are interested in improving the Varshamov bound for finite values of length n and minimum distance d. We employ a counting lemma to this end which we find particularly useful in relation to Varshamov graphs. Since a Varshamov
graph consists of components corresponding to low weight vectors in the cosets of a code it is a useful tool when trying to
improve the estimates involved in the Varshamov bound. We consider how the graph can be iteratively constructed and using
our observations are able to achieve a reduction in the over-counting which occurs. This tightens the lower bound for any
choice of parameters n, k, d or q and is not dependent on information such as the weight distribution of a code.
This work is taken from the author’s thesis [10] 相似文献
35.
In this paper we investigate two-point algebraic-geometry codes (AG codes) coming from the Beelen-Montanucci (BM) maximal curve. We study properties of certain two-point Weierstrass semigroups of the curve and use them for determining a lower bound on the minimum distance of such codes. AG codes with better parameters with respect to comparable two-point codes from the Garcia-Güneri-Stichtenoth (GGS) curve are discovered. 相似文献
36.
We prove two new upper bounds on the size of binary codes with a minimum distance of three, namelyA(10, 3)76 andA(11, 3)152. 相似文献
37.
糖尿病视网膜病变(diabetic retinopathy, DR)是一种糖尿病性微血管病变,会在球结膜微血管上有所体现,球结膜血管图像的获取比眼底图像更加便捷,但微血管的特征变化微小且难以量化。为了能够对患者进行早期辅助诊断,本文依据球结膜微血管形态与DR的关联,首先对球结膜图像进行预处理,使用限制对比度自适应直方图均衡(contrast limited adaptive histogram equalization, CLAHE)算法进行图像增强,随机处理使数据增强,然后结合卷积神经网络(convolutional neural network, CNN)和Transformer各自的网络优势构建CTCNet,对处理后的球结膜血管图像进行DR分类,分类准确率达到了97.44%,敏感度97.69%,特异性97.11%,精确度97.69%,通过实验对比CNN和Transformer, CTCNet网络性能优于其他模型,能够有效识别DR。 相似文献
38.
In order to solve the challenging tasks of person re-identification(Re-ID) in occluded scenarios, we propose a novel approach which divides local units by forming high-level semantic information of pedestrians and generates features of occluded parts. The approach uses CNN and pose estimation to extract the feature map and key points, and a graph convolutional network to learn the relation of key points. Specifically, we design a Generating Local Part (GLP) module to divide the feature map into different units. Based on different occluded conditions, the partition mode of GLP has high flexibility and variability. The features of the non-occluded parts are clustered into an intermediate node, and then the spatially correlated features of the occluded parts are generated according to the de-clustering operation. We conduct experiments on both the occluded and the holistic datasets to demonstrate its effectiveness. 相似文献
39.
The technological innovations and wide use of Wireless Sensor Network (WSN) applications need to handle diverse data. These huge data possess network security issues as intrusions that cannot be neglected or ignored. An effective strategy to counteract security issues in WSN can be achieved through the Intrusion Detection System (IDS). IDS ensures network integrity, availability, and confidentiality by detecting different attacks. Regardless of efforts by various researchers, the domain is still open to obtain an IDS with improved detection accuracy with minimum false alarms to detect intrusions. Machine learning models are deployed as IDS, but their potential solutions need to be improved in terms of detection accuracy. The neural network performance depends on feature selection, and hence, it is essential to bring an efficient feature selection model for better performance. An optimized deep learning model has been presented to detect different types of attacks in WSN. Instead of the conventional parameter selection procedure for Convolutional Neural Network (CNN) architecture, a nature-inspired whale optimization algorithm is included to optimize the CNN parameters such as kernel size, feature map count, padding, and pooling type. These optimized features greatly improved the intrusion detection accuracy compared to Deep Neural network (DNN), Random Forest (RF), and Decision Tree (DT) models. 相似文献
40.
铁路接触网绝缘子状态检测对铁路行车安全有着 重大的意义,为解决目前人工对绝缘 子图像检测结果的不确定性,提出一种深度学习结合灰度纹理特征的检测方法。首先使用 Faster R-CNN (faster region-based convolutional neural network)目标检测算法对图像中绝缘子精确识别,再通过灰度共生矩阵对绝缘子纹理 特征进行分析提取,之后结合支持向量机将绝缘子分为正常绝缘子和异常绝缘子,实验数 据结果证明使用能量、熵、相关度3种纹理特征进行绝缘子状态分类时对实验数据中的正 常状态绝缘子的分类精度可达100%,异常状态绝缘子的分类精度达97.5%,最后依据绝缘 子图像灰度分布的周期性特点,利用灰度积分投影将异常绝缘子分为破损绝缘子和夹杂异 物绝缘子。实验结果表明所提方法可以有效对绝缘子状态进行检测分类。 相似文献