全文获取类型
收费全文 | 784篇 |
免费 | 22篇 |
国内免费 | 8篇 |
专业分类
化学 | 60篇 |
力学 | 5篇 |
综合类 | 8篇 |
数学 | 31篇 |
物理学 | 153篇 |
无线电 | 557篇 |
出版年
2024年 | 2篇 |
2023年 | 11篇 |
2022年 | 29篇 |
2021年 | 32篇 |
2020年 | 28篇 |
2019年 | 7篇 |
2018年 | 7篇 |
2017年 | 26篇 |
2016年 | 36篇 |
2015年 | 45篇 |
2014年 | 79篇 |
2013年 | 64篇 |
2012年 | 50篇 |
2011年 | 44篇 |
2010年 | 38篇 |
2009年 | 47篇 |
2008年 | 37篇 |
2007年 | 20篇 |
2006年 | 38篇 |
2005年 | 34篇 |
2004年 | 31篇 |
2003年 | 21篇 |
2002年 | 31篇 |
2001年 | 5篇 |
2000年 | 11篇 |
1999年 | 11篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有814条查询结果,搜索用时 296 毫秒
51.
Shawn Mankad George Michailidis 《Journal of computational and graphical statistics》2013,22(4):943-965
Three-dimensional data arrays (collections of individual data matrices) are increasingly prevalent in modern data and pose unique challenges to pattern extraction and visualization. This article introduces a biclustering technique for exploration and pattern detection in such complex structured data. The proposed framework couples the popular plaid model together with tools from functional data analysis to guide the estimation of bicluster responses over the array. We present an efficient algorithm that first detects biclusters that exhibit strong deviations for some data matrices, and then estimates their responses over the entire data array. Altogether, the framework is useful to home in on and display underlying structure and its evolution over conditions/time. The methods are scalable to large datasets, and can accommodate a variety of dynamic patterns. The proposed techniques are illustrated on gene expression data and bilateral trade networks. Supplementary materials are available online. 相似文献
52.
用VB实现上位机与OMRON PLC串行通讯 总被引:1,自引:0,他引:1
随着工业自动化的发展,PLC与计算机在工业中的应用越来越广泛,为了充分发挥它们的各自优越性,PLC与个人计算机间的通讯越来越频繁。本文以OMRON小型PLC CPIH为例,介绍了如何用VB编程软件实现上位机和PLC的串行通讯。该方案具有硬件简单,使用灵活的特点。对中小型控制系统实现人机界面有一定的参考价值。 相似文献
53.
On the Contrast in Visual Cryptography Schemes 总被引:16,自引:0,他引:16
A visual cryptography scheme is a method to encode a secret image SI into shadow images called shares such that certain qualified subsets of shares enable the ``visual' recovery of the secret
image. The ``visual' recovery consists of xeroxing the shares onto transparencies, and then stacking them. The shares of
a qualified set will reveal the secret image without any cryptographic computation.
In this paper we analyze the contrast of the reconstructed image in k out of n visual cryptography schemes. (In such a scheme any k shares will reveal the image, but no set of k-1 shares gives any information about the image.) In the case of 2 out of n threshold schemes we give a complete characterization of schemes having optimal contrast and minimum pixel expansion in
terms of certain balanced incomplete block designs. In the case of k out of n threshold schemes with we obtain upper and lower bounds on the optimal contrast.
Received 27 September 1996 and revised 13 February 1998 相似文献
54.
55.
基于四阶偏微分方程的图像去噪方法实现 总被引:1,自引:1,他引:0
针对VB数值计算能力和图像处理能力不足,以及不利于系统开发的缺点,介绍基于VB和MatrixVB并利用四阶偏微分方程实现图像去噪的方法。利用VB作为主要编程语言,借助MatrixVB矩阵运算函数库建立了处理系统,实现了图像去噪功能。该方法将Matlab的强大计算功能与VB的Windows用户界面开发方面的优势结合起来,缩短了软件的开发周期。软件测试结果表明.计算方法正确,方法稳定可靠,算法设计优化,所开发的应用软件具有界面友好,计算速度快,系统资源消耗少,操作简便易行,能满足图像滤波的要求。 相似文献
56.
为了更简便地将基于图像的视觉伺服运用于移动机器人,避免采用近似线性输入输出反馈控制模型中近似与假设的情况,提出了3种使用极线几何与三角几何相结合的方法,此类方法不需要预先知道三维场景的结构知识。实验仿真结果证明了该方法的有效性。 相似文献
57.
A high contrast and capacity efficient visual cryptography scheme for the encryption of multiple secret images 总被引:1,自引:0,他引:1
The visual secret sharing for multiple secrets (VSSM) allows for the encryption of a greater number of secret images into a given image area. Previous researches on VSSM schemes incur a very serious pixel expansion that will damage capable of increasing the capacity of secret image encryption. Moreover, the most of VSSM schemes will decrease the contrast of recover images while the amount of secret image encryption increases. These drawbacks limit applicability of the existing VSSM schemes. In this paper, we propose a highly efficient encryption algorithm to cope with this problem. The proposed algorithm adopts a novel hybrid encryption approach that includes a VC-based encryption and a camouflaging process. The experimental results demonstrate that the proposed approach not only can increase the capacity efficient for VSSM schemes, but also maintains an excellent level of contrast in the recovered secret images. 相似文献
58.
结合FTIR和电子能谱EDS指纹图谱,鉴别了两种组成相近的中药复方右归丸和济生肾气丸.测定右归丸和济生肾气丸样品氯仿提取物的红外指纹图谱,依据W检验理论判别方法精细建立两种中药复方红外指纹图谱的特征吸收峰组,确定了各个特征吸收峰相对应的特征分子基团和药物成分组成.同时测量两种中药复方原药粉末样品的EDS指纹图谱.根据两... 相似文献
59.
《Computational Geometry》2014,47(6):675-682
This paper presents a method for designing solid shapes containing slopes where orientation appears opposite to the actual orientation when observed from a unique vantage viewpoint. The resulting solids generate a new type of visual illusion, which we call “impossible motion”, in which balls placed on the slopes appear to roll uphill thereby defying the law of gravity. This is possible because a single retinal image lacks depth information and human visual perception tries to interpret images as the most familiar shape even though there are infinitely many possible interpretations. We specify the set of all possible solids represented by a single picture as the solution set of a system of equations and inequalities, and then relax the constraints in such a way that the antigravity slopes can be reconstructed. We present this design procedure with examples. 相似文献
60.
从播控管理系统的需求分析入手,构建了系统各功能模块,建立数据库,对系统登录、用户权限管理、播控资源管理等模块做了分析与设计。系统对播控信息数据进行统一管理,完成了信息的收集、统计、汇总和分析等功能,实现了对电视播控事务科学、高效的管理。 相似文献