首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2790篇
  免费   257篇
  国内免费   42篇
化学   19篇
晶体学   3篇
力学   12篇
综合类   25篇
数学   843篇
物理学   293篇
无线电   1894篇
  2024年   34篇
  2023年   103篇
  2022年   156篇
  2021年   159篇
  2020年   153篇
  2019年   117篇
  2018年   71篇
  2017年   79篇
  2016年   81篇
  2015年   72篇
  2014年   109篇
  2013年   133篇
  2012年   102篇
  2011年   106篇
  2010年   81篇
  2009年   141篇
  2008年   206篇
  2007年   163篇
  2006年   176篇
  2005年   123篇
  2004年   92篇
  2003年   120篇
  2002年   94篇
  2001年   73篇
  2000年   73篇
  1999年   78篇
  1998年   46篇
  1997年   44篇
  1996年   28篇
  1995年   10篇
  1994年   16篇
  1993年   8篇
  1992年   11篇
  1991年   9篇
  1990年   4篇
  1989年   7篇
  1988年   1篇
  1987年   1篇
  1985年   2篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1979年   1篇
  1977年   1篇
  1959年   2篇
排序方式: 共有3089条查询结果,搜索用时 15 毫秒
31.
It has been noted by several authors that the classical stuck-at logical fault model might not be an appropriate representation of certain real failures occurring in integrated circuits. Shorts are an important class of such faults. This article gives a detailed analysis of the effects of shorts in self-checking circuits and proposes techniques for dealing with them. More precisely, we show that, unlike other faults such as stuck-at, stuck-on, and stuck-open—which produce only single errors in the place they occur—shorts can produce double errors on the two shorted lines. In particular, feedback shorts can produce double errors on the two shorted lines. The double error is unidirectional for some feedback shorts and non-unidirectional for some others. Furthermore, in some technologies (e.g., CMOS), non-feedback shorts can also produce double non-unidirectional errors. We also show that unlike stuck-at, stuck-on, and stuck-open faults, redundant shorts can destroy the SFS property. Then we propose several techniques for coping with these problems and we illustrate the results by circuit implementation examples.The present study is given for NMOS and CMOS circuits but we show that it is valid for any other technology.  相似文献   
32.
本文用代数观点来研究循环阵列码,证明了一般的阵列码是一些极小循环阵列码的直和,并且对极小循环阵列码给出了明确的刻画.当有限域的特征不整除群的阶时,给出了直接写出相应的多项式环的本原幂等元的方法,从而可以直接写出所有的极小循环码.  相似文献   
33.
The main result is that to any even integer q in the interval 0 ≤ q ≤ 2n+1-2log(n+1), there are two perfect codes C1 and C2 of length n = 2m − 1, m ≥ 4, such that |C1C2| = q.  相似文献   
34.
We are interested in improving the Varshamov bound for finite values of length n and minimum distance d. We employ a counting lemma to this end which we find particularly useful in relation to Varshamov graphs. Since a Varshamov graph consists of components corresponding to low weight vectors in the cosets of a code it is a useful tool when trying to improve the estimates involved in the Varshamov bound. We consider how the graph can be iteratively constructed and using our observations are able to achieve a reduction in the over-counting which occurs. This tightens the lower bound for any choice of parameters n, k, d or q and is not dependent on information such as the weight distribution of a code. This work is taken from the author’s thesis [10]  相似文献   
35.
In this paper we investigate two-point algebraic-geometry codes (AG codes) coming from the Beelen-Montanucci (BM) maximal curve. We study properties of certain two-point Weierstrass semigroups of the curve and use them for determining a lower bound on the minimum distance of such codes. AG codes with better parameters with respect to comparable two-point codes from the Garcia-Güneri-Stichtenoth (GGS) curve are discovered.  相似文献   
36.
We prove two new upper bounds on the size of binary codes with a minimum distance of three, namelyA(10, 3)76 andA(11, 3)152.  相似文献   
37.
糖尿病视网膜病变(diabetic retinopathy, DR)是一种糖尿病性微血管病变,会在球结膜微血管上有所体现,球结膜血管图像的获取比眼底图像更加便捷,但微血管的特征变化微小且难以量化。为了能够对患者进行早期辅助诊断,本文依据球结膜微血管形态与DR的关联,首先对球结膜图像进行预处理,使用限制对比度自适应直方图均衡(contrast limited adaptive histogram equalization, CLAHE)算法进行图像增强,随机处理使数据增强,然后结合卷积神经网络(convolutional neural network, CNN)和Transformer各自的网络优势构建CTCNet,对处理后的球结膜血管图像进行DR分类,分类准确率达到了97.44%,敏感度97.69%,特异性97.11%,精确度97.69%,通过实验对比CNN和Transformer, CTCNet网络性能优于其他模型,能够有效识别DR。  相似文献   
38.
In order to solve the challenging tasks of person re-identification(Re-ID) in occluded scenarios, we propose a novel approach which divides local units by forming high-level semantic information of pedestrians and generates features of occluded parts. The approach uses CNN and pose estimation to extract the feature map and key points, and a graph convolutional network to learn the relation of key points. Specifically, we design a Generating Local Part (GLP) module to divide the feature map into different units. Based on different occluded conditions, the partition mode of GLP has high flexibility and variability. The features of the non-occluded parts are clustered into an intermediate node, and then the spatially correlated features of the occluded parts are generated according to the de-clustering operation. We conduct experiments on both the occluded and the holistic datasets to demonstrate its effectiveness.  相似文献   
39.
The technological innovations and wide use of Wireless Sensor Network (WSN) applications need to handle diverse data. These huge data possess network security issues as intrusions that cannot be neglected or ignored. An effective strategy to counteract security issues in WSN can be achieved through the Intrusion Detection System (IDS). IDS ensures network integrity, availability, and confidentiality by detecting different attacks. Regardless of efforts by various researchers, the domain is still open to obtain an IDS with improved detection accuracy with minimum false alarms to detect intrusions. Machine learning models are deployed as IDS, but their potential solutions need to be improved in terms of detection accuracy. The neural network performance depends on feature selection, and hence, it is essential to bring an efficient feature selection model for better performance. An optimized deep learning model has been presented to detect different types of attacks in WSN. Instead of the conventional parameter selection procedure for Convolutional Neural Network (CNN) architecture, a nature-inspired whale optimization algorithm is included to optimize the CNN parameters such as kernel size, feature map count, padding, and pooling type. These optimized features greatly improved the intrusion detection accuracy compared to Deep Neural network (DNN), Random Forest (RF), and Decision Tree (DT) models.  相似文献   
40.
铁路接触网绝缘子状态检测对铁路行车安全有着 重大的意义,为解决目前人工对绝缘 子图像检测结果的不确定性,提出一种深度学习结合灰度纹理特征的检测方法。首先使用 Faster R-CNN (faster region-based convolutional neural network)目标检测算法对图像中绝缘子精确识别,再通过灰度共生矩阵对绝缘子纹理 特征进行分析提取,之后结合支持向量机将绝缘子分为正常绝缘子和异常绝缘子,实验数 据结果证明使用能量、熵、相关度3种纹理特征进行绝缘子状态分类时对实验数据中的正 常状态绝缘子的分类精度可达100%,异常状态绝缘子的分类精度达97.5%,最后依据绝缘 子图像灰度分布的周期性特点,利用灰度积分投影将异常绝缘子分为破损绝缘子和夹杂异 物绝缘子。实验结果表明所提方法可以有效对绝缘子状态进行检测分类。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号