全文获取类型
收费全文 | 14160篇 |
免费 | 1884篇 |
国内免费 | 431篇 |
专业分类
化学 | 2040篇 |
晶体学 | 20篇 |
力学 | 386篇 |
综合类 | 141篇 |
数学 | 2181篇 |
物理学 | 2727篇 |
无线电 | 8980篇 |
出版年
2024年 | 86篇 |
2023年 | 326篇 |
2022年 | 538篇 |
2021年 | 651篇 |
2020年 | 559篇 |
2019年 | 360篇 |
2018年 | 362篇 |
2017年 | 445篇 |
2016年 | 525篇 |
2015年 | 510篇 |
2014年 | 795篇 |
2013年 | 943篇 |
2012年 | 870篇 |
2011年 | 769篇 |
2010年 | 748篇 |
2009年 | 838篇 |
2008年 | 880篇 |
2007年 | 965篇 |
2006年 | 744篇 |
2005年 | 680篇 |
2004年 | 546篇 |
2003年 | 528篇 |
2002年 | 425篇 |
2001年 | 415篇 |
2000年 | 348篇 |
1999年 | 277篇 |
1998年 | 228篇 |
1997年 | 226篇 |
1996年 | 212篇 |
1995年 | 166篇 |
1994年 | 132篇 |
1993年 | 93篇 |
1992年 | 81篇 |
1991年 | 42篇 |
1990年 | 28篇 |
1989年 | 28篇 |
1988年 | 25篇 |
1987年 | 12篇 |
1986年 | 11篇 |
1985年 | 20篇 |
1984年 | 12篇 |
1983年 | 3篇 |
1982年 | 7篇 |
1981年 | 6篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1974年 | 1篇 |
1971年 | 1篇 |
1969年 | 1篇 |
1959年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
61.
基于神经网络的钞票真假识别研究 总被引:3,自引:1,他引:2
利用神经网络与光电检测的技术研制了钞票真假识别系统.介绍了系统的结构组成、工作原理、软件系统、神经网络的优化设计、实验及测试结果.经实践验证,其识别结果稳定可靠,可应用于金融智能防伪点钞机与ATM机中. 相似文献
62.
63.
The Existence and Global $p$-Exponential Stability of Periodic Solution for Stochastic BAM Neural Networks with Delays 下载免费PDF全文
In this paper, we consider a class of stochastic BAM neural networks with delays. By establishing new integral inequalities and using the properties of spectral radius of nonnegative matrix, some sufficient conditions for the existence and global $p$-exponential stability of periodic solution for stochastic BAM neural networks with delays are given. An example is provided to show the effectiveness of the theoretical results. 相似文献
64.
神经信息的编码与解码是神经科学中的核心研究内容,同时又极具挑战性.传统的编码理论都具有各自的局限性,很难从脑的全局运行方式上给出有效的理论.而由于能量是一个标量具有可叠加性,因此能量编码理论可以从神经元活动的能量特征出发来研究脑功能的全局神经编码问题,取得了一系列的研究成果.本研究以王-张神经元能量计算模型为基础,构建了一个多层次结构的神经网络,通过计算机数值模拟得到了神经网络的能量消耗和血液中葡萄糖供能的变化情况.计算结果显示,和网络的神经活动达到峰值的时间相比,血液中葡萄糖的供能达到峰值的时间延迟了约5.6s.从定量的角度再现了功能性核磁共振(fMRI)中的血液动力学现象:大脑某个脑区的神经元集群被激活以后经过5~7 s的延迟,脑血流的变化才会大幅增加.模拟结果表明先前发表的由王-张神经元模型所揭示的负能量机制在控制大脑的血液动力学现象中起着核心的作用,预测了刺激条件下大脑的能量代谢与血流之间变化的本质是由神经元在发放动作电位过程中正、负能量之间的非平衡、不匹配性质所决定的.本文的研究结果为今后进一步探究血液动力学现象的生理学机制提供了新的研究方向,在神经网络的建模与计算方面给出了一个新的视角和研究方法. 相似文献
65.
As a serious worldwide problem, suicide often causes huge and irreversible losses to families and society. Therefore, it is necessary to detect and help individuals with suicidal ideation in time. In recent years, the prosperous development of social media has provided new perspectives on suicide detection, but related research still faces some difficulties, such as data imbalance and expression implicitness. In this paper, we propose a Deep Hierarchical Ensemble model for Suicide Detection (DHE-SD) based on a hierarchical ensemble strategy, and construct a dataset based on Sina Weibo, which contains more than 550 thousand posts from 4521 users. To verify the effectiveness of the model, we also conduct experiments on a public Weibo dataset containing 7329 users’ posts. The proposed model achieves the best performance on both the constructed dataset and the public dataset. In addition, in order to make the model applicable to a wider population, we use the proposed sentence-level mask mechanism to delete user posts with strong suicidal ideation. Experiments show that the proposed model can still effectively identify social media users with suicidal ideation even when the performance of the baseline models decrease significantly. 相似文献
66.
Energy Harvesting (EH) is a promising paradigm for 5G heterogeneous communication. EH-enabled Device-to-Device (D2D) communication can assist devices in overcoming the disadvantage of limited battery capacity and improving the Energy Efficiency (EE) by performing EH from ambient wireless signals. Although numerous research works have been conducted on EH-based D2D communication scenarios, the feature of EH-based D2D communication underlying Air-to-Ground (A2G) millimeter-Wave (mmWave) networks has not been fully studied. In this paper, we considered a scenario where multiple Unmanned Aerial Vehicles (UAVs) are deployed to provide energy for D2D Users (DUs) and data transmission for Cellular Users (CUs). We aimed to improve the network EE of EH-enabled D2D communications while reducing the time complexity of beam alignment for mmWave-enabled D2D Users (DUs). We considered a scenario where multiple EH-enabled DUs and CUs coexist, sharing the full mmWave frequency band and adopting high-directive beams for transmitting. To improve the network EE, we propose a joint beamwidth selection, power control, and EH time ratio optimization algorithm for DUs based on alternating optimization. We iteratively optimized one of the three variables, fixing the other two. During each iteration, we first used a game-theoretic approach to adjust the beamwidths of DUs to achieve the sub-optimal EE. Then, the problem with regard to power optimization was solved by the Dinkelbach method and Successive Convex Approximation (SCA). Finally, we performed the optimization of the EH time ratio using linear fractional programming to further increase the EE. By performing extensive simulation experiments, we validated the convergence and effectiveness of our algorithm. The results showed that our proposed algorithm outperformed the fixed beamwidth and fixed power strategy and could closely approach the performance of exhaustive search, particle swarm optimization, and the genetic algorithm, but with a much reduced time complexity. 相似文献
67.
A two-level hierarchical scheme for video-based person re-identification (re-id) is presented, with the aim of learning a pedestrian appearance model through more complete walking cycle extraction. Specifically, given a video with consecutive frames, the objective of the first level is to detect the key frame with lightweight Convolutional neural network (CNN) of PCANet to reflect the summary of the video content. At the second level, on the basis of the detected key frame, the pedestrian walking cycle is extracted from the long video sequence. Moreover, local features of Local maximal occurrence (LOMO) of the walking cycle are extracted to represent the pedestrian' s appearance information. In contrast to the existing walking-cycle-based person re-id approaches, the proposed scheme relaxes the limit on step number for a walking cycle, thus making it flexible and less affected by noisy frames. Experiments are conducted on two benchmark datasets: PRID 2011 and iLIDS-VID. The experimental results demonstrate that our proposed scheme outperforms the six state-of-art video-based re-id methods, and is more robust to the severe video noises and variations in pose, lighting, and camera viewpoint. 相似文献
68.
Nikola Simi Sinia Suzi Tijana Nosek Mia Vujovi Zoran Peri Milan Savi Vlado Deli 《Entropy (Basel, Switzerland)》2022,24(3)
Speaker recognition is an important classification task, which can be solved using several approaches. Although building a speaker recognition model on a closed set of speakers under neutral speaking conditions is a well-researched task and there are solutions that provide excellent performance, the classification accuracy of developed models significantly decreases when applying them to emotional speech or in the presence of interference. Furthermore, deep models may require a large number of parameters, so constrained solutions are desirable in order to implement them on edge devices in the Internet of Things systems for real-time detection. The aim of this paper is to propose a simple and constrained convolutional neural network for speaker recognition tasks and to examine its robustness for recognition in emotional speech conditions. We examine three quantization methods for developing a constrained network: floating-point eight format, ternary scalar quantization, and binary scalar quantization. The results are demonstrated on the recently recorded SEAC dataset. 相似文献
69.
Jameel Ahmed Bhutto Lianfang Tian Qiliang Du Zhengzheng Sun Lubin Yu Muhammad Faizan Tahir 《Entropy (Basel, Switzerland)》2022,24(3)
Medical image fusion (MIF) has received painstaking attention due to its diverse medical applications in response to accurately diagnosing clinical images. Numerous MIF methods have been proposed to date, but the fused image suffers from poor contrast, non-uniform illumination, noise presence, and improper fusion strategies, resulting in an inadequate sparse representation of significant features. This paper proposes the morphological preprocessing method to address the non-uniform illumination and noise by the bottom-hat–top-hat strategy. Then, grey-principal component analysis (grey-PCA) is used to transform RGB images into gray images that can preserve detailed features. After that, the local shift-invariant shearlet transform (LSIST) method decomposes the images into the low-pass (LP) and high-pass (HP) sub-bands, efficiently restoring all significant characteristics in various scales and directions. The HP sub-bands are fed to two branches of the Siamese convolutional neural network (CNN) by process of feature detection, initial segmentation, and consistency verification to effectively capture smooth edges, and textures. While the LP sub-bands are fused by employing local energy fusion using the averaging and selection mode to restore the energy information. The proposed method is validated by subjective and objective quality assessments. The subjective evaluation is conducted by a user case study in which twelve field specialists verified the superiority of the proposed method based on precise details, image contrast, noise in the fused image, and no loss of information. The supremacy of the proposed method is further justified by obtaining 0.6836 to 0.8794, 0.5234 to 0.6710, and 3.8501 to 8.7937 gain for , CRR, and AG and noise reduction from 0.3397 to 0.1209 over other methods for objective parameters. 相似文献
70.
Anton Skidin Alexey Redyuk Olga Shtyrina Michael Fedoruk Alex Shafarenko 《Optics Communications》2011,284(19):4695-4698
We quantify the error statistics and patterning effects in a 5 × 40 Gbit/s WDM RZ-OOK SMF/DCF fibre link using hybrid Raman/EDFA amplification. By extensive use of a numerical model, we determine how the error statistics change with the transmission distance. This knowledge is used as a basis for a constrained coding technique in order to improve the transmission error rate. We propose an adaptive constrained code for mitigation of the patterning effects and demonstrate that this approach can substantially reduce the bit error rate (BER) even for very large values of the channel BER (BER > 10− 1). The proposed technique can be used in combination with forward error correction schemes (FEC) to extend the range of channel BERs that an FEC scheme is effective over. 相似文献