首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14160篇
  免费   1884篇
  国内免费   431篇
化学   2040篇
晶体学   20篇
力学   386篇
综合类   141篇
数学   2181篇
物理学   2727篇
无线电   8980篇
  2024年   86篇
  2023年   326篇
  2022年   538篇
  2021年   651篇
  2020年   559篇
  2019年   360篇
  2018年   362篇
  2017年   445篇
  2016年   525篇
  2015年   510篇
  2014年   795篇
  2013年   943篇
  2012年   870篇
  2011年   769篇
  2010年   748篇
  2009年   838篇
  2008年   880篇
  2007年   965篇
  2006年   744篇
  2005年   680篇
  2004年   546篇
  2003年   528篇
  2002年   425篇
  2001年   415篇
  2000年   348篇
  1999年   277篇
  1998年   228篇
  1997年   226篇
  1996年   212篇
  1995年   166篇
  1994年   132篇
  1993年   93篇
  1992年   81篇
  1991年   42篇
  1990年   28篇
  1989年   28篇
  1988年   25篇
  1987年   12篇
  1986年   11篇
  1985年   20篇
  1984年   12篇
  1983年   3篇
  1982年   7篇
  1981年   6篇
  1979年   1篇
  1978年   1篇
  1974年   1篇
  1971年   1篇
  1969年   1篇
  1959年   4篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
61.
基于神经网络的钞票真假识别研究   总被引:3,自引:1,他引:2  
利用神经网络与光电检测的技术研制了钞票真假识别系统.介绍了系统的结构组成、工作原理、软件系统、神经网络的优化设计、实验及测试结果.经实践验证,其识别结果稳定可靠,可应用于金融智能防伪点钞机与ATM机中.  相似文献   
62.
63.
In this paper, we consider a class of stochastic BAM neural networks with delays. By establishing new integral inequalities and using the properties of spectral radius of nonnegative matrix, some sufficient conditions for the existence and global $p$-exponential stability of periodic solution for stochastic BAM neural networks with delays are given. An example is provided to show the effectiveness of the theoretical results.  相似文献   
64.
彭俊  王如彬  王毅泓 《力学学报》2019,51(4):1202-1209
神经信息的编码与解码是神经科学中的核心研究内容,同时又极具挑战性.传统的编码理论都具有各自的局限性,很难从脑的全局运行方式上给出有效的理论.而由于能量是一个标量具有可叠加性,因此能量编码理论可以从神经元活动的能量特征出发来研究脑功能的全局神经编码问题,取得了一系列的研究成果.本研究以王-张神经元能量计算模型为基础,构建了一个多层次结构的神经网络,通过计算机数值模拟得到了神经网络的能量消耗和血液中葡萄糖供能的变化情况.计算结果显示,和网络的神经活动达到峰值的时间相比,血液中葡萄糖的供能达到峰值的时间延迟了约5.6s.从定量的角度再现了功能性核磁共振(fMRI)中的血液动力学现象:大脑某个脑区的神经元集群被激活以后经过5~7 s的延迟,脑血流的变化才会大幅增加.模拟结果表明先前发表的由王-张神经元模型所揭示的负能量机制在控制大脑的血液动力学现象中起着核心的作用,预测了刺激条件下大脑的能量代谢与血流之间变化的本质是由神经元在发放动作电位过程中正、负能量之间的非平衡、不匹配性质所决定的.本文的研究结果为今后进一步探究血液动力学现象的生理学机制提供了新的研究方向,在神经网络的建模与计算方面给出了一个新的视角和研究方法.   相似文献   
65.
As a serious worldwide problem, suicide often causes huge and irreversible losses to families and society. Therefore, it is necessary to detect and help individuals with suicidal ideation in time. In recent years, the prosperous development of social media has provided new perspectives on suicide detection, but related research still faces some difficulties, such as data imbalance and expression implicitness. In this paper, we propose a Deep Hierarchical Ensemble model for Suicide Detection (DHE-SD) based on a hierarchical ensemble strategy, and construct a dataset based on Sina Weibo, which contains more than 550 thousand posts from 4521 users. To verify the effectiveness of the model, we also conduct experiments on a public Weibo dataset containing 7329 users’ posts. The proposed model achieves the best performance on both the constructed dataset and the public dataset. In addition, in order to make the model applicable to a wider population, we use the proposed sentence-level mask mechanism to delete user posts with strong suicidal ideation. Experiments show that the proposed model can still effectively identify social media users with suicidal ideation even when the performance of the baseline models decrease significantly.  相似文献   
66.
Energy Harvesting (EH) is a promising paradigm for 5G heterogeneous communication. EH-enabled Device-to-Device (D2D) communication can assist devices in overcoming the disadvantage of limited battery capacity and improving the Energy Efficiency (EE) by performing EH from ambient wireless signals. Although numerous research works have been conducted on EH-based D2D communication scenarios, the feature of EH-based D2D communication underlying Air-to-Ground (A2G) millimeter-Wave (mmWave) networks has not been fully studied. In this paper, we considered a scenario where multiple Unmanned Aerial Vehicles (UAVs) are deployed to provide energy for D2D Users (DUs) and data transmission for Cellular Users (CUs). We aimed to improve the network EE of EH-enabled D2D communications while reducing the time complexity of beam alignment for mmWave-enabled D2D Users (DUs). We considered a scenario where multiple EH-enabled DUs and CUs coexist, sharing the full mmWave frequency band and adopting high-directive beams for transmitting. To improve the network EE, we propose a joint beamwidth selection, power control, and EH time ratio optimization algorithm for DUs based on alternating optimization. We iteratively optimized one of the three variables, fixing the other two. During each iteration, we first used a game-theoretic approach to adjust the beamwidths of DUs to achieve the sub-optimal EE. Then, the problem with regard to power optimization was solved by the Dinkelbach method and Successive Convex Approximation (SCA). Finally, we performed the optimization of the EH time ratio using linear fractional programming to further increase the EE. By performing extensive simulation experiments, we validated the convergence and effectiveness of our algorithm. The results showed that our proposed algorithm outperformed the fixed beamwidth and fixed power strategy and could closely approach the performance of exhaustive search, particle swarm optimization, and the genetic algorithm, but with a much reduced time complexity.  相似文献   
67.
A two-level hierarchical scheme for video-based person re-identification (re-id) is presented, with the aim of learning a pedestrian appearance model through more complete walking cycle extraction. Specifically, given a video with consecutive frames, the objective of the first level is to detect the key frame with lightweight Convolutional neural network (CNN) of PCANet to reflect the summary of the video content. At the second level, on the basis of the detected key frame, the pedestrian walking cycle is extracted from the long video sequence. Moreover, local features of Local maximal occurrence (LOMO) of the walking cycle are extracted to represent the pedestrian' s appearance information. In contrast to the existing walking-cycle-based person re-id approaches, the proposed scheme relaxes the limit on step number for a walking cycle, thus making it flexible and less affected by noisy frames. Experiments are conducted on two benchmark datasets: PRID 2011 and iLIDS-VID. The experimental results demonstrate that our proposed scheme outperforms the six state-of-art video-based re-id methods, and is more robust to the severe video noises and variations in pose, lighting, and camera viewpoint.  相似文献   
68.
Speaker recognition is an important classification task, which can be solved using several approaches. Although building a speaker recognition model on a closed set of speakers under neutral speaking conditions is a well-researched task and there are solutions that provide excellent performance, the classification accuracy of developed models significantly decreases when applying them to emotional speech or in the presence of interference. Furthermore, deep models may require a large number of parameters, so constrained solutions are desirable in order to implement them on edge devices in the Internet of Things systems for real-time detection. The aim of this paper is to propose a simple and constrained convolutional neural network for speaker recognition tasks and to examine its robustness for recognition in emotional speech conditions. We examine three quantization methods for developing a constrained network: floating-point eight format, ternary scalar quantization, and binary scalar quantization. The results are demonstrated on the recently recorded SEAC dataset.  相似文献   
69.
Medical image fusion (MIF) has received painstaking attention due to its diverse medical applications in response to accurately diagnosing clinical images. Numerous MIF methods have been proposed to date, but the fused image suffers from poor contrast, non-uniform illumination, noise presence, and improper fusion strategies, resulting in an inadequate sparse representation of significant features. This paper proposes the morphological preprocessing method to address the non-uniform illumination and noise by the bottom-hat–top-hat strategy. Then, grey-principal component analysis (grey-PCA) is used to transform RGB images into gray images that can preserve detailed features. After that, the local shift-invariant shearlet transform (LSIST) method decomposes the images into the low-pass (LP) and high-pass (HP) sub-bands, efficiently restoring all significant characteristics in various scales and directions. The HP sub-bands are fed to two branches of the Siamese convolutional neural network (CNN) by process of feature detection, initial segmentation, and consistency verification to effectively capture smooth edges, and textures. While the LP sub-bands are fused by employing local energy fusion using the averaging and selection mode to restore the energy information. The proposed method is validated by subjective and objective quality assessments. The subjective evaluation is conducted by a user case study in which twelve field specialists verified the superiority of the proposed method based on precise details, image contrast, noise in the fused image, and no loss of information. The supremacy of the proposed method is further justified by obtaining 0.6836 to 0.8794, 0.5234 to 0.6710, and 3.8501 to 8.7937 gain for QFAB, CRR, and AG and noise reduction from 0.3397 to 0.1209 over other methods for objective parameters.  相似文献   
70.
We quantify the error statistics and patterning effects in a 5 × 40 Gbit/s WDM RZ-OOK SMF/DCF fibre link using hybrid Raman/EDFA amplification. By extensive use of a numerical model, we determine how the error statistics change with the transmission distance. This knowledge is used as a basis for a constrained coding technique in order to improve the transmission error rate. We propose an adaptive constrained code for mitigation of the patterning effects and demonstrate that this approach can substantially reduce the bit error rate (BER) even for very large values of the channel BER (BER > 10− 1). The proposed technique can be used in combination with forward error correction schemes (FEC) to extend the range of channel BERs that an FEC scheme is effective over.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号