全文获取类型
收费全文 | 1529篇 |
免费 | 280篇 |
国内免费 | 24篇 |
专业分类
化学 | 109篇 |
力学 | 14篇 |
综合类 | 13篇 |
数学 | 73篇 |
物理学 | 228篇 |
无线电 | 1396篇 |
出版年
2024年 | 5篇 |
2023年 | 9篇 |
2022年 | 22篇 |
2021年 | 23篇 |
2020年 | 35篇 |
2019年 | 38篇 |
2018年 | 36篇 |
2017年 | 55篇 |
2016年 | 67篇 |
2015年 | 88篇 |
2014年 | 134篇 |
2013年 | 86篇 |
2012年 | 139篇 |
2011年 | 134篇 |
2010年 | 116篇 |
2009年 | 95篇 |
2008年 | 104篇 |
2007年 | 109篇 |
2006年 | 93篇 |
2005年 | 83篇 |
2004年 | 77篇 |
2003年 | 69篇 |
2002年 | 53篇 |
2001年 | 36篇 |
2000年 | 34篇 |
1999年 | 15篇 |
1998年 | 19篇 |
1997年 | 21篇 |
1996年 | 3篇 |
1995年 | 7篇 |
1994年 | 6篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1988年 | 5篇 |
1987年 | 1篇 |
1985年 | 2篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有1833条查询结果,搜索用时 0 毫秒
1.
State-of-the-art speech watermarking techniques enable speech signals to be authenticated and protected against any malicious attack to ensure secure speech communication. In general, reliable speech watermarking methods must satisfy four requirements: inaudibility, robustness, blind-detectability, and confidentiality. We previously proposed a method of non-blind speech watermarking based on direct spread spectrum (DSS) using a linear prediction (LP) scheme to solve the first two issues (inaudibility and robustness) due to distortion by spread spectrum. This method not only effectively embeds watermarks with small distortion but also has the same robustness as the DSS method. There are, however, two remaining issues with blind-detectability and confidentiality. In this work, we attempt to resolve these issues by developing an approach called the LP-DSS scheme, which takes two forms of data embedding for blind detection and frame synchronization. We incorporate blind detection with frame synchronization into the scheme to satisfy blind-detectability and incorporate two forms of data embedding process, front-side and back-side embedding for blind detection and frame synchronization, to satisfy confidentiality. We evaluated these improved processes by carrying out four objective tests (PESQ, LSD, Bit-error-rate, and accuracy of frame synchronization) to determine whether inaudibility and blind-detectability could be satisfied. We also evaluated all combinations with the two forms of data embedding for blind detection with frame synchronization by carrying out BER tests to determine whether confidentiality could be satisfied. Finally, we comparatively evaluated the proposed method by carrying out ten robustness tests against various processing and attacks. Our findings showed that an inaudible, robust, blindly detectable, and confidential speech watermarking method based on the proposed LP-DSS scheme could be achieved. 相似文献
2.
Most existing two dimensional(2-D)angles of arrival(AOAs)estimation methods are based on the assumption that the signal sources are point sources.However,in mobile communications,local scattering in the vicinity of the mobile results in angular spreading as seen from a base station antenna array.In this paper,we consider the problem of estimating the 2-D AOAs of spatially distributed sources.First we perform blind estimation of the steering vectors by exploiting joint diagonalization,then the 2-D AOAs are obtained through two fast Fourier transforming of the estimated steering vectors.Simulations are carried out to illustrate the performance of the method. 相似文献
3.
4.
5.
The decentralized cryptocurrency which was based on block chain has been thought the most successful one in history.In the system,public keys were used as the users’ accounts which guaranteed the anonymity in real transactions.However,all the transaction information was recorded in the block chain,it was a potential threat for users’ privacy which might leak the payment information.Moreover,to avoid double-spending,it was agreed that the transaction on the target block was valid only if another k blocks were generated after the target one.The long waiting time reduced the efficiency of the payment system.A model of payment system based on a proxy-cryptocurrency was proposed,and a solution based on blind signature techniques was proposed.The scheme introduced a proxy in the payment phase,by which transaction confirmation time could be reduced and the transaction efficiency could be improved.Meanwhile,the system implements better anonymity,namely as the privacy protection function. 相似文献
6.
基于欠定盲分离的多目标微多普勒特征提取 总被引:1,自引:0,他引:1
连续波雷达多目标回波中多种微多普勒特征分离问题采用独立成分分析方法实现,该方法在使用中存在较大局限性,要求待分离的微多普勒特征之间必须是统计独立的,且仅局限于恰定和超定的方程组求解问题。然而,在多目标雷达观测场景下,雷达接收的混叠回波的个数通常少于目标的个数,各目标的微多普勒特征可能存在相关性。为此,提出了一种基于欠定盲分离的多目标回波微多普勒特征分离方法。该方法可以从少数原始混叠回波中分离出多个目标的微多普勒特征,对待分离的微多普勒特征限制性弱。通过数值仿真,证实了该方法的可行性。 相似文献
7.
8.
独立成分分析是为解决盲源分离问题发展起来的一种高效的信号处理方法,广泛应用于国民经济发展和国防军事科学的各个领域。系统介绍了独立成分分析的基本模型、假设条件、解的不确定性问题,总结了目标函数的建立依据,如非高斯性最大化、互信息极小化和极大似然估计等,并简要总结了近年出现的独立成分分析优化方法,最后对独立成分分析的难点问题和未来可能的发展方向进行了总结和展望。 相似文献
9.
数字共焦显微技术是一种新的共焦显微技术,其通过对三维样本显微图像的数字处理,获取高分辨率图像,无光漂白和毒化细胞现象,结构简单、价格便宜。简述了数字共焦显微技术及其进展,着重介绍了核心技术--去卷积算法及其特点:去模糊法速度很快,但易引入结构性假像,不宜用于测量和计算;线性复原法速度较快,复原效果较好,但会放大噪声和出现振铃;约束迭代法速度较慢,但复原能力强,分辨率高。各类算法在商业软件中都得到不同的应用。由于数字共焦显微技术的独有优势,随着去卷积算法的发展,数字共焦显微技术将获得更为广泛的应用。 相似文献
10.