首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4727篇
  免费   520篇
  国内免费   37篇
化学   45篇
晶体学   1篇
力学   12篇
综合类   55篇
数学   379篇
物理学   337篇
无线电   4455篇
  2024年   8篇
  2023年   52篇
  2022年   110篇
  2021年   190篇
  2020年   216篇
  2019年   115篇
  2018年   94篇
  2017年   179篇
  2016年   188篇
  2015年   225篇
  2014年   393篇
  2013年   294篇
  2012年   387篇
  2011年   334篇
  2010年   263篇
  2009年   269篇
  2008年   335篇
  2007年   281篇
  2006年   280篇
  2005年   218篇
  2004年   203篇
  2003年   200篇
  2002年   130篇
  2001年   71篇
  2000年   66篇
  1999年   36篇
  1998年   39篇
  1997年   33篇
  1996年   24篇
  1995年   11篇
  1994年   7篇
  1993年   6篇
  1992年   4篇
  1991年   6篇
  1990年   2篇
  1989年   3篇
  1988年   1篇
  1987年   2篇
  1985年   1篇
  1984年   4篇
  1983年   2篇
  1982年   2篇
排序方式: 共有5284条查询结果,搜索用时 62 毫秒
81.
当前,由于软件发行商通常不为应用程序和可执行文件(程序文件,共享库,脚本等)提供用以验证其可靠性的关键信息,所以计算机管理员想要自动辨别这些文件是否被第三方修改过变得十分困难.通过与民航飞行的安全性要求进行类比,分析了软件身份标签如何从身份鉴别、应用关联、防止篡改和未知威胁这四方面改善软件的安全性.  相似文献   
82.
In this paper, the feature representation of an image by CNN is used to hide the secret image into the cover image. The style of the cover image hides the content of the secret image and produce a stego image using Neural Style Transfer (NST) algorithm, which resembles the cover image and also contains the semantic content of secret image. The main technical contributions are to hide the content of the secret image in the in-between hidden layered style features of the cover image, which is the first of its kind in the present state-of-art-technique. Also, to recover the secret image from the stego image, destylization is done with the help of conditional generative adversarial networks (GANs) using Residual in Residual Dense Blocks (RRDBs). Further, stego images from different layer combinations of content and style features are obtained and evaluated. Evaluation is based on the visual similarity and quality loss between the cover-stego pair and the secret-reconstructed secret pair of images. From the experiments, it has been observed that the proposed algorithm has 43.95 dB Peak Signal-to-Noise Ratio (PSNR)), .995 Structural Similarity Index (SSIM), and .993 Visual Information Fidelity (VIF) for the ImageNet dataset. The proposed algorithm is found to be more robust against StegExpose than the traditional methods.  相似文献   
83.
Let G be a three‐dimensional unimodular Lie group, and let T be a left‐invariant symmetric (0,2)‐tensor field on G. We provide the necessary and sufficient conditions on T for the existence of a pair consisting of a left‐invariant Riemannian metric g and a positive constant c such that , where is the Ricci curvature of g. We also discuss the uniqueness of such pairs and show that, in most cases, there exists at most one positive constant c such that is solvable for some left‐invariant Riemannian metric g.  相似文献   
84.
We classify totally geodesic and parallel hypersurfaces of four-dimensional non-reductive homogeneous pseudo-Riemannian manifolds.  相似文献   
85.
This paper presents a novel image segmentation algorithm driven by human visual system (HVS) properties. Segmentation quality metrics, based on perceptual properties of HVS with respect to segmentation, are integrated into an energy function. The energy function encodes the HVS properties from both region-based and boundary-based perspectives, where the just-noticeable difference (JND) model is employed when calculating the difference between the image contents. Extensive experiments are carried out to compare the performances of three variations of the presented algorithm and several representative segmentation and clustering algorithms available in the literature. The results show superior performance of our approach.  相似文献   
86.
87.
随着计算机应用的普及,在办公过程中,我们经常会使用计算机编辑处理电子文档.本文就如何更好更科学地管理这些文档进行简单的说明.  相似文献   
88.
Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of weB-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors.  相似文献   
89.
This paper analyzes the level and cyclicality of regulatory bank capital for asset portfolio securitizations in relation to the cyclicality of capital requirements for the underlying loan portfolio as under Basel II/III. We find that the cyclicality of capital requirements is higher for (i) asset portfolio securitizations relative to primary loan portfolios, (ii) Ratings Based Approach (RBA) relative to the Supervisory Formula Approach, (iii) given the RBA for a point-in-time rating methodology relative to a rate-and-forget rating methodology, and (iv) under the passive reinvestment rule relative to alternative rules. Capital requirements of the individual tranches reveal that the volatility of aggregated capital charges for the securitized portfolio is triggered by the most senior tranches. This is due to the fact that senior tranches are more sensitive to the macroeconomy. An empirical analysis provides evidence that current credit ratings are time-constant and that economic losses for securitizations have exceeded the required capital in the recent financial crisis.  相似文献   
90.
随着无线技术的发展和移动智能终端的普及,医疗行业对无线网络的需求也越来越多,建设医院无线局域网,能提高工作效率和服务质量。文章提出了以无线控制器和AP为架构形式的无线局域网的解决方案,能克服传统无线网络漫游、无法统一管理等的问题,同时给出了安全防护的措施,从而为医院建立一个稳定安全的无线网络环境。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号