首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   919篇
  免费   26篇
  国内免费   9篇
化学   79篇
力学   6篇
综合类   6篇
数学   72篇
物理学   176篇
无线电   615篇
  2024年   2篇
  2023年   11篇
  2022年   29篇
  2021年   33篇
  2020年   33篇
  2019年   10篇
  2018年   9篇
  2017年   29篇
  2016年   45篇
  2015年   53篇
  2014年   85篇
  2013年   71篇
  2012年   57篇
  2011年   49篇
  2010年   44篇
  2009年   81篇
  2008年   71篇
  2007年   21篇
  2006年   40篇
  2005年   35篇
  2004年   35篇
  2003年   25篇
  2002年   28篇
  2001年   6篇
  2000年   11篇
  1999年   11篇
  1998年   6篇
  1997年   3篇
  1996年   3篇
  1995年   4篇
  1994年   3篇
  1993年   2篇
  1992年   2篇
  1991年   1篇
  1990年   2篇
  1989年   1篇
  1982年   1篇
  1981年   1篇
  1979年   1篇
排序方式: 共有954条查询结果,搜索用时 15 毫秒
1.
The ability to detect gun and gun held in hand or other body parts is a typical human skill. The same problem presents an imperative task for computer vision system. Automatic observer independent detection of hand held gun or gun held in the other body part, whether it is visible or concealed, provides enhance security in vulnerable places and initiates appropriate action there. Compare to the automatic object detection systems, automatic detection of gun has very few successful attempts. In the present scope of this paper, we present an extensive survey on automatic detection of gun and define a taxonomy for this particular detection system. We also describe the inherent difficulties related with this problem. In this survey of published papers, we examine different approaches used in state-of-the-art attempts and compare performances of these approaches. Finally, this paper concludes pointing to the possible research gaps in related fields.  相似文献   
2.
3.
陆斌  何志强 《信息技术》2003,27(7):95-97
交互控制是计算机程序的重要功能 ,也是实现人—机对话的基本途径。VisualBasic编程语言以其易学习掌握、开发灵活的特点而成为目前流行的程序开发工具 ,本文以VisualBasic语言为例介绍了交互控制程序编程方法 ,并对具体的每一种方法编写了相应的示例。  相似文献   
4.
电路过渡过程所列方程是微分方程,本文中采用的是方框图模型分析法,即将微分方程的复杂示解分解成最基本的加(减)、乘(除)、积分(微分)、增益等运算,采用VB设计用户界面产进行计算,并给出了一算例。  相似文献   
5.
As borders between different entities, lines are an important element of natural images. Indeed, the neurons of the mammalian visual cortex are tuned to respond best to lines of a given orientation. This preferred orientation varies continuously across most of the cortex, but also has vortex-like singularities known as pinwheels. In attempting to describe such patterns of orientation preference, we are led to consider underlying rotation symmetries: Oriented segments in natural images tend to be collinear; neurons are more likely to be connected if their preferred orientations are aligned to their topographic separation. These are indications of a reduced symmetry requiring joint rotations of both orientation preference and the underlying topography. This is verified by direct statistical tests in both natural images and in cortical maps. Using the statistics of natural scenes we construct filters that are best suited to extracting information from such images, and find qualitative similarities to mammalian vision. PACS84.35+i 89.70.+c 87.57.Nk  相似文献   
6.
In this paper we consider the (t, n)-threshold visual secret sharing scheme (VSSS) in which black pixels in a secret black-white images is reproduced perfectly as black pixels when we stack arbitrary t shares. This paper provides a new characterization of the (t, n)-threshold visual secret sharing scheme with such a property (hereafter, we call such a VSSS the (t, n)-PBVSSS for short). We use an algebraic method to characterize basis matrices of the (t, n)-PBVSSS in a certain class of matrices. We show that the set of all homogeneous polynomials each element of which yields basis matrices of the (t, n)-PBVSSS becomes a set of lattice points in an (nt+1)-dimensional linear space. In addition, we prove that the optimal basis matrices in the sense of maximizing the relative difference among all the basis matrices in the class coincides with the basis matrices given by Blundo, Bonis and De Santis [3] for all nt ≥ 2.  相似文献   
7.
对基于Visual Basic 6.0开发的自动控制原理考试系统的系统结构做了阐述,并简要介绍了该系统的设计思想、主要功能及实现方法。  相似文献   
8.
In current society, artificial intelligence processing technology offers convenient video monitoring, but also raises the risk of privacy leakage. Theoretically, the data used in intelligent video processing methods may directly convey visual information containing private content. For the above problem, this paper uses a multi-layer visual privacy-protected (VPP) coding method to blur private content in the video at the visual level, while avoiding the loss of important visual features contained in the video as much as possible. And this provides a guarantee of the quality of the subsequent keyframe extraction step. Then a visual evaluation algorithm is proposed for assessing the quality of VPP-encoded video privacy protection. And the experiment shows that the results are consistent with those of subjective evaluation. In addition, for VPP-encoded video, we propose an unsupervised two-layer clustering keyframe extraction method with corresponding performance evaluation index. Finally, an association model is established to balance the privacy protection quality and the keyframe extraction performance.  相似文献   
9.
10.
The tracker based on the Siamese network regards tracking tasks as solving a similarity problem between the target template and search area. Using shallow networks and offline training, these trackers perform well in simple scenarios. However, due to the lack of semantic information, they have difficulty meeting the accuracy requirements of the task when faced with complex backgrounds and other challenging scenarios. In response to this problem, we propose a new model, which uses the improved ResNet-22 network to extract deep features with more semantic information. Multilayer feature fusion is used to obtain a high-quality score map to reduce the influence of interference factors in the complex background on the tracker. In addition, we propose a more powerful Corner Distance IoU (intersection over union) loss function so that the algorithm can better regression to the bounding box. In the experiments, the tracker was extensively evaluated on the object tracking benchmark data sets, OTB2013 and OTB2015, and the visual object tracking data sets, VOT2016 and VOT2017, and achieved competitive performance, proving the effectiveness of this method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号