全文获取类型
收费全文 | 919篇 |
免费 | 26篇 |
国内免费 | 9篇 |
专业分类
化学 | 79篇 |
力学 | 6篇 |
综合类 | 6篇 |
数学 | 72篇 |
物理学 | 176篇 |
无线电 | 615篇 |
出版年
2024年 | 2篇 |
2023年 | 11篇 |
2022年 | 29篇 |
2021年 | 33篇 |
2020年 | 33篇 |
2019年 | 10篇 |
2018年 | 9篇 |
2017年 | 29篇 |
2016年 | 45篇 |
2015年 | 53篇 |
2014年 | 85篇 |
2013年 | 71篇 |
2012年 | 57篇 |
2011年 | 49篇 |
2010年 | 44篇 |
2009年 | 81篇 |
2008年 | 71篇 |
2007年 | 21篇 |
2006年 | 40篇 |
2005年 | 35篇 |
2004年 | 35篇 |
2003年 | 25篇 |
2002年 | 28篇 |
2001年 | 6篇 |
2000年 | 11篇 |
1999年 | 11篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有954条查询结果,搜索用时 15 毫秒
1.
The ability to detect gun and gun held in hand or other body parts is a typical human skill. The same problem presents an imperative task for computer vision system. Automatic observer independent detection of hand held gun or gun held in the other body part, whether it is visible or concealed, provides enhance security in vulnerable places and initiates appropriate action there. Compare to the automatic object detection systems, automatic detection of gun has very few successful attempts. In the present scope of this paper, we present an extensive survey on automatic detection of gun and define a taxonomy for this particular detection system. We also describe the inherent difficulties related with this problem. In this survey of published papers, we examine different approaches used in state-of-the-art attempts and compare performances of these approaches. Finally, this paper concludes pointing to the possible research gaps in related fields. 相似文献
2.
3.
交互控制是计算机程序的重要功能 ,也是实现人—机对话的基本途径。VisualBasic编程语言以其易学习掌握、开发灵活的特点而成为目前流行的程序开发工具 ,本文以VisualBasic语言为例介绍了交互控制程序编程方法 ,并对具体的每一种方法编写了相应的示例。 相似文献
4.
电路过渡过程所列方程是微分方程,本文中采用的是方框图模型分析法,即将微分方程的复杂示解分解成最基本的加(减)、乘(除)、积分(微分)、增益等运算,采用VB设计用户界面产进行计算,并给出了一算例。 相似文献
5.
As borders between different entities, lines are an important element of natural images. Indeed, the neurons of the mammalian
visual cortex are tuned to respond best to lines of a given orientation. This preferred orientation varies continuously across
most of the cortex, but also has vortex-like singularities known as pinwheels. In attempting to describe such patterns of
orientation preference, we are led to consider underlying rotation symmetries: Oriented segments in natural images tend to
be collinear; neurons are more likely to be connected if their preferred orientations are aligned to their topographic separation.
These are indications of a reduced symmetry requiring joint rotations of both orientation preference and the underlying topography.
This is verified by direct statistical tests in both natural images and in cortical maps. Using the statistics of natural
scenes we construct filters that are best suited to extracting information from such images, and find qualitative similarities
to mammalian vision.
PACS84.35+i 89.70.+c 87.57.Nk 相似文献
6.
In this paper we consider the (t, n)-threshold visual secret sharing scheme (VSSS) in which black pixels in a secret black-white images is reproduced perfectly
as black pixels when we stack arbitrary t shares. This paper provides a new characterization of the (t, n)-threshold visual secret sharing scheme with such a property (hereafter, we call such a VSSS the (t, n)-PBVSSS for short). We use an algebraic method to characterize basis matrices of the (t, n)-PBVSSS in a certain class of matrices. We show that the set of all homogeneous polynomials each element of which yields
basis matrices of the (t, n)-PBVSSS becomes a set of lattice points in an (n−t+1)-dimensional linear space. In addition, we prove that the optimal basis matrices in the sense of maximizing the relative
difference among all the basis matrices in the class coincides with the basis matrices given by Blundo, Bonis and De Santis
[3] for all n≥ t ≥ 2. 相似文献
7.
8.
In current society, artificial intelligence processing technology offers convenient video monitoring, but also raises the risk of privacy leakage. Theoretically, the data used in intelligent video processing methods may directly convey visual information containing private content. For the above problem, this paper uses a multi-layer visual privacy-protected (VPP) coding method to blur private content in the video at the visual level, while avoiding the loss of important visual features contained in the video as much as possible. And this provides a guarantee of the quality of the subsequent keyframe extraction step. Then a visual evaluation algorithm is proposed for assessing the quality of VPP-encoded video privacy protection. And the experiment shows that the results are consistent with those of subjective evaluation. In addition, for VPP-encoded video, we propose an unsupervised two-layer clustering keyframe extraction method with corresponding performance evaluation index. Finally, an association model is established to balance the privacy protection quality and the keyframe extraction performance. 相似文献
9.
10.
The tracker based on the Siamese network regards tracking tasks as solving a similarity problem between the target template and search area. Using shallow networks and offline training, these trackers perform well in simple scenarios. However, due to the lack of semantic information, they have difficulty meeting the accuracy requirements of the task when faced with complex backgrounds and other challenging scenarios. In response to this problem, we propose a new model, which uses the improved ResNet-22 network to extract deep features with more semantic information. Multilayer feature fusion is used to obtain a high-quality score map to reduce the influence of interference factors in the complex background on the tracker. In addition, we propose a more powerful Corner Distance IoU (intersection over union) loss function so that the algorithm can better regression to the bounding box. In the experiments, the tracker was extensively evaluated on the object tracking benchmark data sets, OTB2013 and OTB2015, and the visual object tracking data sets, VOT2016 and VOT2017, and achieved competitive performance, proving the effectiveness of this method. 相似文献