全文获取类型
收费全文 | 784篇 |
免费 | 22篇 |
国内免费 | 8篇 |
专业分类
化学 | 60篇 |
力学 | 5篇 |
综合类 | 8篇 |
数学 | 31篇 |
物理学 | 153篇 |
无线电 | 557篇 |
出版年
2024年 | 2篇 |
2023年 | 11篇 |
2022年 | 29篇 |
2021年 | 32篇 |
2020年 | 28篇 |
2019年 | 7篇 |
2018年 | 7篇 |
2017年 | 26篇 |
2016年 | 36篇 |
2015年 | 45篇 |
2014年 | 79篇 |
2013年 | 64篇 |
2012年 | 50篇 |
2011年 | 44篇 |
2010年 | 38篇 |
2009年 | 47篇 |
2008年 | 37篇 |
2007年 | 20篇 |
2006年 | 38篇 |
2005年 | 34篇 |
2004年 | 31篇 |
2003年 | 21篇 |
2002年 | 31篇 |
2001年 | 5篇 |
2000年 | 11篇 |
1999年 | 11篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有814条查询结果,搜索用时 187 毫秒
721.
《电子学报:英文版》2016,(4):621-624
In binary Region increm enting visual cryptography schemes (RIVCSs), the secrets of multi-ple secrecy regions can be gradually revealed by hu-man visual system. A characteristic of the existing binary RIVCSs different from traditional binary Visual cryptog-raphy schemes (VCSs) is that, the contrasts for different revealed regions are different while traditional binary VCSs have same contrast. To keep the quality (contrast) of re-covered image compatible with the traditional VCS, we use integer linear programming to design a binary (k,n)-RIVCS with same contrast for all secrecy regions in this paper. Experimental results demonstrate that our method is feasible and effective. The trade-off is that our schem e involves a larger pixel expansion. 相似文献
722.
To understand the physiological mechanisms underlying the blood-oxygenation-level-dependent (BOLD) signal, the acquisition of data must be optimized to achieve the maximum possible spatial resolution and specificity. The term "specificity" implies the selective enhancement of signals originating in the parenchyma, and thus best reflecting actual neural activity. Such spatial specificity is a prerequisite for imaging aimed at the elucidation of interactions between cortical micromodules, such as columns and laminae. In addition to the optimal selection of functional magnetic resonance imaging pulse sequences, accurate superposition of activation patterns onto corresponding anatomical scans, preferably acquired during the same experimental session, is necessary. At high resolution, exact functional-to-structural registration is of critical importance, because even small differences in geometry, that arise when different sequences are used for functional and anatomical scans, can lead to misallocation of activation and erroneous interpretation of data. In the present study, we used spin-echo (SE) echo planar imaging (EPI) for functional scans, since the SE-BOLD signal is sensitive to the capillary response, together with SE-EPI anatomical reference scans. The combination of these acquisition methods revealed a clear spatial colocalization of the largest fractional changes with the Gennari line, suggesting peak activity in Layer IV. Notably, this very same layer coincided with the largest relaxivity changes as observed in steady-state cerebral blood volume measurements, using the intravascular agent monocrystalline iron oxide nanoparticles (MION). 相似文献
723.
Workflow technology is a generic mechanism to integrate diverse types of available resources (databases, servers, software applications and different services) which facilitate knowledge exchange within traditionally divergent fields such as molecular biology, clinical research, computational science, physics, chemistry and statistics. Researchers can easily incorporate and access diverse, distributed tools and data to develop their own research protocols for scientific analysis. Application of workflow technology has been reported in areas like drug discovery, genomics, large-scale gene expression analysis, proteomics, and system biology. In this article, we have discussed the existing workflow systems and the trends in applications of workflow based systems. 相似文献
724.
725.
Edward J. Wegman 《Journal of computational and graphical statistics》2013,22(4):281-295
Abstract Recently, Huber offered a taxonomy of data set sizes ranging from tiny (102 bytes) to huge (1010 bytes). This taxonomy is particularly appealing because it quantifies the meaning of tiny, small, medium, large, and huge. Indeed, some investigators consider 300 small and 10,000 large while others consider 10,000 small. In Huber's taxonomy, most statistical and visualization techniques are computationally feasible with tiny data sets. With larger data sets, however, computers run out of computational horsepower and graphics displays run out of resolution fairly quickly. In this article, I discuss aspects of data set size and computational feasibility for general classes of algorithms in the context of CPU performance, memory size, hard disk capacity, screen resolution and massively parallel architectures. I discuss some strategies such as recursive formulations that mitigate the impact of size. I also discuss the potential for scalable parallelization that will mitigate the effects of computational complexity. 相似文献
726.
Nicolas Riche Matei Mancas Matthieu Duvinage Makiese Mibulumukini Bernard Gosselin Thierry Dutoit 《Signal Processing: Image Communication》2013,28(6):642-658
For the last decades, computer-based visual attention models aiming at automatically predicting human gaze on images or videos have exponentially increased. Even if several families of methods have been proposed and a lot of words like centre-surround difference, contrast, rarity, novelty, redundancy, irregularity, surprise or compressibility have been used to define those models, they are all based on the same and unique idea of information innovation in a given context.In this paper, we propose a novel saliency prediction model, called RARE2012, which selects information worthy of attention based on multi-scale spatial rarity. RARE2012 is then evaluated using two complementary metrics, the Normalized Scanpath Saliency (NSS) and the Area Under the Receiver Operating Characteristic (AUROC) against 13 recently published saliency models. It is shown to be the best for NSS metric and second best for AUROC metric on three publicly available datasets (Toronto, Koostra and Jian Li).Finally, based on an additional comparative statistical analysis and the effect-size Hedge' g? measure, RARE2012 outperforms, at least slightly, the other models while considering both metrics on the three databases as a whole. 相似文献
727.
Hsuan-Ying Chen Jin-Jang Leou 《Journal of Visual Communication and Image Representation》2012,23(2):343-358
In this study, a saliency-directed color image interpolation approach using artificial neural network (ANN) and particle swarm optimization (PSO) is proposed. First, a high-quality saliency map of a color image to be interpolated is generated by a modified block-based visual attention model in an effective manner. Then, based on the saliency map, bilinear interpolation and ANN-PSO interpolation are employed for non-saliency (non-ROI) and saliency (ROI) blocks, respectively, to obtain the final color interpolation results. In the proposed ANN-PSO interpolation scheme, ANN is used to determine the orientation of each 5 × 5 image pattern (block), whereas PSO is employed to determine the weights in 5 × 5 interpolation filtering masks. The proposed approach is applicable to image interpolation with arbitrary magnification factors (MFs). Based on the experimental results obtained in this study, the color interpolation results by the proposed approach are better than those by five comparison approaches. 相似文献
728.
本文针对"Visual C++语言"课程教学现状,提出了以专业工程案例为中心的教学模式。教学过程中,笔者为相关教学内容精选了与之配套的教学案例,使得教学内容具有了明显的专业特色。实践证明,案例教学模式能够提升学生对专业知识的应用能力,明显改善教学效果。 相似文献
729.
Yao-Sheng LeeTzung-Her Chen 《Signal processing》2012,92(3):727-736
Visual secret sharing (VSS), either visual-cryptography-based (VC-based) VSS or random-grid-based (RG-based) VSS, is a well-known technology of secret communication for sensitive security applications. Horng et al. (2006) kindled the interest in the cheating problem existing in threshold VC-based VSS. The cheating problem happened when dishonest participants collude to cheat honest ones by enabling the latter to accept the wrong secret information generated by the former. As RG-based VSS (RGVSS) has gained significant attention in academia in the past years, it is concerned that RG-based VSS may also suffer cheating attacks. The authors of the present study demonstrate that the security risk does exist in RG-based VSS. To prove the feasibility of cheating, the experimental results and formal analysis illustrate that the proposed collusion attacks do work. 相似文献
730.