全文获取类型
收费全文 | 966篇 |
免费 | 25篇 |
国内免费 | 9篇 |
专业分类
化学 | 79篇 |
力学 | 6篇 |
综合类 | 6篇 |
数学 | 72篇 |
物理学 | 176篇 |
无线电 | 661篇 |
出版年
2024年 | 4篇 |
2023年 | 13篇 |
2022年 | 33篇 |
2021年 | 35篇 |
2020年 | 35篇 |
2019年 | 16篇 |
2018年 | 13篇 |
2017年 | 30篇 |
2016年 | 56篇 |
2015年 | 60篇 |
2014年 | 88篇 |
2013年 | 72篇 |
2012年 | 58篇 |
2011年 | 49篇 |
2010年 | 44篇 |
2009年 | 81篇 |
2008年 | 71篇 |
2007年 | 21篇 |
2006年 | 40篇 |
2005年 | 35篇 |
2004年 | 35篇 |
2003年 | 25篇 |
2002年 | 28篇 |
2001年 | 6篇 |
2000年 | 11篇 |
1999年 | 11篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有1000条查询结果,搜索用时 0 毫秒
81.
在WindowsXP操作平台下使用PCI高速采集卡,结合面向对象的可视化开发C环境VB6.0设计完成了集双通道信号采集、波形显示、波形发生、滤波、波形存储等功能为一体的虚拟示波器.系统在开发方式上采用VB6.0常用控件结合采集卡底层驱动函数与功能控件来实现对采集卡的控制功能,并运用DMA采集方式以保证传输速率.采用中值滤波法对采样信号进行数字滤波.目前,此设计已应用到兰州陆军总院骨质疏松治疗仪中的虚拟示波部分.经过反复试验,运行效果良好. 相似文献
82.
83.
用并口实现D/A转换器的快速测试 总被引:2,自引:0,他引:2
本文简要介绍了D/A转换原理及D/A转换器快速测试的虚拟仪器实现方案,并给出了部分关键源程序. 相似文献
84.
A salience computation approach based on perceptual distinctness is proposed in this paper that predicts human eye fixation locations in images. The approach uses a novel representation of pattern in a patch around a pixel such that discrimination between patterns is in compliance with distinctness between them in-terms of a few well-known perceptual cues. Image patches of different sizes (resolutions) are considered. The representations of the value at and pattern around a pixel in different features such as lightness, color and orientation are discriminated from all those in the rest of the image to compute salience at that pixel. The effectiveness of the proposed salience computation approach in generating salience maps closer to human eye fixation density maps is demonstrated by comparing it both qualitatively and quantitatively to other existing state-of-the-art salience computation approaches. Several synthetic images and psychological patterns, and real-life images from five well-known datasets are considered for this purpose. 相似文献
85.
In current society, artificial intelligence processing technology offers convenient video monitoring, but also raises the risk of privacy leakage. Theoretically, the data used in intelligent video processing methods may directly convey visual information containing private content. For the above problem, this paper uses a multi-layer visual privacy-protected (VPP) coding method to blur private content in the video at the visual level, while avoiding the loss of important visual features contained in the video as much as possible. And this provides a guarantee of the quality of the subsequent keyframe extraction step. Then a visual evaluation algorithm is proposed for assessing the quality of VPP-encoded video privacy protection. And the experiment shows that the results are consistent with those of subjective evaluation. In addition, for VPP-encoded video, we propose an unsupervised two-layer clustering keyframe extraction method with corresponding performance evaluation index. Finally, an association model is established to balance the privacy protection quality and the keyframe extraction performance. 相似文献
86.
87.
88.
《Journal of Visual Communication and Image Representation》2014,25(7):1543-1557
Visual secret sharing, or the so-called visual cryptography, is a well-known scheme that encrypts a secret image into several meaningless share images, usually printed on transparencies, and decrypts as stacking some or all share images by the human visual system. More and more researches about visual secret sharing and its applications have been recently proposed. Unfortunately, the cheating attack in which malicious participants cheat the honest one(s) by forging a fake share image has existed. Since 2006, some cheating prevention schemes have been proposed but suffered from one or more disadvantages as follows: (1) maintaining extra share images used to verify the integrity of a share image prior to stacking, (2) introducing extra pixel expansion, (3) raising heavy computation cost, and (4) giving ambiguous cheating detection. In this paper, a multi-factor cheating–preventing scheme, aiming at exploiting the hybrid codebook to hide the additional verification images into the share images, has been proposed without suffering the above-mentioned deficiencies. Two-factor cheating–detection exploits the design of verification to both share images and stacked results to deter attackers’ cheating. The experimental results demonstrate the proposed scheme is feasible. 相似文献
89.
90.
用于控制声纳姿态的水下云台在实际应用中需要实现可视化。将设计云台的Pro/E模型保存为STL标准三维图形文件格式,利用3D Explore软件将该STL文件转换为标准数组。通过Visual C++结合Open GL编程技术,实现了水下云台的可视化,对准确控制云台提供了帮助。 相似文献