全文获取类型
收费全文 | 3019篇 |
免费 | 94篇 |
国内免费 | 149篇 |
专业分类
化学 | 1130篇 |
晶体学 | 3篇 |
力学 | 18篇 |
综合类 | 3篇 |
数学 | 51篇 |
物理学 | 426篇 |
无线电 | 1631篇 |
出版年
2024年 | 8篇 |
2023年 | 88篇 |
2022年 | 63篇 |
2021年 | 81篇 |
2020年 | 74篇 |
2019年 | 45篇 |
2018年 | 50篇 |
2017年 | 91篇 |
2016年 | 127篇 |
2015年 | 127篇 |
2014年 | 191篇 |
2013年 | 213篇 |
2012年 | 180篇 |
2011年 | 162篇 |
2010年 | 120篇 |
2009年 | 180篇 |
2008年 | 148篇 |
2007年 | 142篇 |
2006年 | 120篇 |
2005年 | 113篇 |
2004年 | 133篇 |
2003年 | 84篇 |
2002年 | 70篇 |
2001年 | 60篇 |
2000年 | 62篇 |
1999年 | 57篇 |
1998年 | 67篇 |
1997年 | 61篇 |
1996年 | 46篇 |
1995年 | 44篇 |
1994年 | 25篇 |
1993年 | 28篇 |
1992年 | 29篇 |
1991年 | 21篇 |
1990年 | 20篇 |
1989年 | 16篇 |
1988年 | 18篇 |
1987年 | 12篇 |
1986年 | 7篇 |
1985年 | 7篇 |
1984年 | 4篇 |
1983年 | 3篇 |
1982年 | 12篇 |
1981年 | 8篇 |
1980年 | 8篇 |
1979年 | 11篇 |
1978年 | 3篇 |
1977年 | 13篇 |
1976年 | 4篇 |
1974年 | 3篇 |
排序方式: 共有3262条查询结果,搜索用时 31 毫秒
1.
In this paper we combine video compression and modern image processing methods. We construct novel iterative filter methods for prediction signals based on Partial Differential Equation (PDE) based methods. The mathematical framework of the employed diffusion filter class is given and some desirable properties are stated. In particular, two types of diffusion filters are constructed: a uniform diffusion filter using a fixed filter mask and a signal adaptive diffusion filter that incorporates the structures of the underlying prediction signal. The latter has the advantage of not attenuating existing edges while the uniform filter is less complex. The filters are embedded into a software based on HEVC with additional QTBT (Quadtree plus Binary Tree) and MTT (Multi-Type-Tree) block structure. In this setting, several measures to reduce the coding complexity of the tool are introduced, discussed and tested thoroughly. The coding complexity is reduced by up to 70% while maintaining over 80% of the gain. Overall, the diffusion filter method achieves average bitrate savings of 2.27% for Random Access having an average encoder runtime complexity of 119% and 117% decoder runtime complexity. For individual test sequences, results of 7.36% for Random Access are accomplished. 相似文献
2.
3.
A double optimal projection method that involves projections for intra-cluster and inter-cluster dimensionality reduction are proposed for video fingerprinting. The video is initially set as a graph with frames as its vertices in a high-dimensional space. A similarity measure that can compute the weights of the edges is then proposed. Subsequently, the video frames are partitioned into different clusters based on the graph model. Double optimal projection is used to explore the optimal mapping points in a low-dimensional space to reduce the video dimensions. The statistics and geometrical fingerprints are generated to determine whether a query video is copied from one of the videos in the database. During matching, the video can be roughly matched by utilizing the statistics fingerprint. Further matching is thereafter performed in the corresponding group using geometrical fingerprints. Experimental results show the good performance of the proposed video fingerprinting method in robustness and discrimination. 相似文献
4.
5.
Steven R. Corman 《Computational & Mathematical Organization Theory》2006,12(1):35-49
The predominant idea for using network concepts to fight terrorists centers on disabling key parts of their communication
networks. Although this counternetwork strategy is clearly a sound approach, it is vulnerable to missing, incomplete, or erroneous
information about the network. This paper describes a different and complementary application of network concepts to terrorist
organizations. It is based on activity focus networks (AFNs), which represent the complex activity system of an organization.
An activity focus is a conceptual or physical entity around which joint activity is organized. Any organization has a number
of these, which are in some cases compatible and in some cases incompatible. The set of foci and their relations of compatibility
and incompatibility define the AFN. A hypothetical AFN for a terrorist organization is specified and tested in a simulation
called AQAS. It shows that certain activity foci, and in particular one combination, have high potential as pressure points
for the activity system. The AFN approach complements the counternetwork approach by reducing the downside risk of incomplete
information about the communication network, and enhancing the effectiveness of counternetwork approaches over time.
Steven R. Corman is Professor in the Hugh Downs School of Human Communication at Arizona State University and Chair of the Organizational
Communication Division of the International Communication Association. His research interests include communication networks
and activity systems, high-resolution text and discourse analysis, and modeling and simulation of human communication systems. 相似文献
6.
Motion Perception Using Analog VLSI 总被引:2,自引:0,他引:2
Andre J.S. Yakovleff Alireza Moini 《Analog Integrated Circuits and Signal Processing》1998,15(2):183-200
Motion perception is arguably a fundamental mechanism used by natural species to accomplish a number of tasks, such as navigating freely in an unknown environment. Traditional motion perception methods tend to be computationally intensive, requiring powerful computers and large memories. However, by copying biological mechanisms, such as elementary motion discrimination at the early stages of the visual processing paths, it should be possible to build small and efficient motion perception systems. This paper describes the manner in which a simple motion perception model based on the insect visual system has been implemented using mixed analog/digital VLSI. The device has been fabricated in a 2 micron double metal, double polysilicon process, and comprises 61 photo-detectors, and associated analog and digital circuitry. While not entirely successful in that component mismatches hamper the detection of dark-to-bright changes in contrast, the results clearly show the feasibility of using such a device in autonomous control systems. 相似文献
7.
8.
Safety considerations of TBM are part of the design process to ensure that the TBM do not adversely affect the safety of ITER. So accurate calculations of all radioactivity and potential harmfulness are very important for designing of device, selecting of blanket and shield material, analyzing of the safety and environment, disposing of nuclear waste and operation of the reactor. 相似文献
9.
This paper proposes a low complexity joint space-time multiuser detection algorithm for asynchronous DS/CDMA antenna array systems. The proposed multiuser detector is composed of an adaptive antenna array, used as a linear beamformer, and a sliding window decorrelator. A QPSK modulation scheme is used in order to increase bandwidth efficiency. Numerical results are given in terms of Bit Error Rate (BER) under the assumption of a frequency-selective Rayleigh slow fading channel. In particular, the proposed receiver is shown to be near-far resistant, even in worst fading cases, and to exploit completely array introduction while maintaining acceptable computational complexity. The proposed architecture avoids linear filter realization of the decorrelator, which is impractical in the case of a large number of users, and operates with relatively short data frames instead of the complete information sequence. Finally, this receiver is very flexible to changes in timing configuration. 相似文献
10.
We propose an efficient scheme for camera motion characterization in MPEG‐compressed video. The proposed scheme detects six types of basic camera motions through threshold‐based qualitative interpretation, in which fixed thresholds are applied to motion model parameters estimated from MPEG motion vectors (MVs). The efficiency and robustness of the scheme are validated by the experiment with real compressed video sequences. 相似文献