全文获取类型
收费全文 | 1071篇 |
免费 | 167篇 |
国内免费 | 33篇 |
专业分类
化学 | 71篇 |
晶体学 | 1篇 |
力学 | 19篇 |
综合类 | 25篇 |
数学 | 39篇 |
物理学 | 257篇 |
无线电 | 859篇 |
出版年
2024年 | 6篇 |
2023年 | 19篇 |
2022年 | 35篇 |
2021年 | 47篇 |
2020年 | 49篇 |
2019年 | 34篇 |
2018年 | 27篇 |
2017年 | 48篇 |
2016年 | 67篇 |
2015年 | 76篇 |
2014年 | 86篇 |
2013年 | 74篇 |
2012年 | 95篇 |
2011年 | 74篇 |
2010年 | 51篇 |
2009年 | 47篇 |
2008年 | 70篇 |
2007年 | 65篇 |
2006年 | 47篇 |
2005年 | 45篇 |
2004年 | 34篇 |
2003年 | 33篇 |
2002年 | 29篇 |
2001年 | 18篇 |
2000年 | 23篇 |
1999年 | 20篇 |
1998年 | 13篇 |
1997年 | 7篇 |
1996年 | 10篇 |
1995年 | 5篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1985年 | 3篇 |
1983年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有1271条查询结果,搜索用时 31 毫秒
81.
Cheating in Visual Cryptography 总被引:3,自引:0,他引:3
A secret sharing scheme allows a secret to be shared among a set of participants, P, such that only authorized subsets of P can recover the secret, but any unauthorized subset cannot recover the secret. In 1995, Naor and Shamir proposed a variant
of secret sharing, called visual cryptography, where the shares given to participants are xeroxed onto transparencies. If
X is an authorized subset of P, then the participants in X can visually recover the secret image by stacking their transparencies together without performing any computation. In this
paper, we address the issue of cheating by dishonest participants, called cheaters, in visual cryptography. The experimental
results demonstrate that cheating is possible when the cheaters form a coalition in order to deceive honest participants.
We also propose two simple cheating prevention visual cryptographic schemes. 相似文献
82.
Target tracking is one of the most important issues in computer vision and has been applied in many fields of science, engineering and industry. Because of the occlusion during tracking, typical approaches with single classifier learn much of occluding background information which results in the decrease of tracking performance, and eventually lead to the failure of the tracking algorithm. This paper presents a new correlative classifiers approach to address the above problem. Our idea is to derive a group of correlative classifiers based on sample set method. Then we propose strategy to establish the classifiers and to query the suitable classifiers for the next frame tracking. In order to deal with nonlinear problem, particle filter is adopted and integrated with sample set method. For choosing the target from candidate particles, we define a similarity measurement between particles and sample set. The proposed sample set method includes the following steps. First, we cropped positive samples set around the target and negative samples set far away from the target. Second, we extracted average Haar-like feature from these samples and calculate their statistical characteristic which represents the target model. Third, we define the similarity measurement based on the statistical characteristic of these two sets to judge the similarity between candidate particles and target model. Finally, we choose the largest similarity score particle as the target in the new frame. A number of experiments show the robustness and efficiency of the proposed approach when compared with other state-of-the-art trackers. 相似文献
83.
为了在导弹试验任务中给指挥员提供决策支持,设计了一种基于HLA和VEGA的海基靶场半实物视景仿真系统。将三轴飞行转台、目标模拟器、负载模拟器等实物接入仿真系统,采用高层体系结构规范构建仿真系统的联邦架构,设计了联邦对象模型,建立了关键联邦成员的数学模型,解决了反射内存网与HLA的时间推进冲突问题,有效提高了仿真系统数据传输的实时性。采用Multigen-Creator软件建立了各个仿真实体的3D模型,利用Vega软件实现模型的渲染、场景驱动、声音仿真等。通过系统测试,结果表明:该视景仿真系统能够实时驱动各个仿真实体运行,视景画面流畅,图像刷新速率达到30帧/秒以上,满足系统实时性要求。 相似文献
84.
Recently, Hou and others introduced a (2, n) block‐based progressive visual cryptographic scheme (BPVCS) in which image blocks can be gradually recovered step by step. In Hou and others’ (2, n)‐BPVCS, a secret image is subdivided into n non‐overlapping image blocks. When participants stack their shadow images, all the image blocks associated with these t participants will be recovered. However, Hou and others’ scheme is only a simple 2‐out‐of‐n case. In this paper, we discuss a general (k, n)‐BPVCS for any k and n. Our main contribution is to give two constructions (Construction 1 and Construction 2) of this general (k, n)‐BPVCS. Also, we theoretically prove that both constructions satisfy a threshold property and progressive recovery of the proposed (k, n)‐BPVCS. For , Construction 1 is reduced to Hou and others’ (2, n)‐BPVCS.] 相似文献
85.
研究了一种把小波变换和可视密码技术相结合的信息隐藏方案,实现对灰度图像的信息隐藏。该方案把经过Arnold变换处理后的秘密信息,按照k阶线性方程求解理论产生n幅分享图片,再把n幅分享图片应用离散小波变换信息隐藏理论,分存到n幅公开图片中。提取秘密图片时,必须要大于k幅公开图片才能获得秘密图片。实验结果表明,该方案具有很强的鲁棒性,而且秘密信息不容易丢失。 相似文献
86.
87.
88.
Steganography is a technique to hide the secret data into digital media without getting any unexpected notices. The traditional steganographic method, namely least significant bit (LSB) replacement, is a simple but insecure scheme. To overcome the traditional drawbacks, this paper proposes a steganographic scheme, which is called double-layer hiding method. The experimental results confirm that the proposed scheme achieves better hiding capacity with high ability of resisting security analysis. 相似文献
89.
本文在对绿色照明的深入理解基础上建立了绿色照明的数学模型,进一步完善了现有的绿色照明计算公式。并将计算方法应用于绿色照明的照度设计中,计算出几种光环境下绿色照明的照度范围。这是一种绿色照明设计中更能体现节能的要求、更加符合绿色照明思想的新方法。 相似文献
90.