首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10103篇
  免费   1310篇
  国内免费   785篇
化学   3953篇
晶体学   17篇
力学   75篇
综合类   123篇
数学   299篇
物理学   1413篇
无线电   6318篇
  2024年   69篇
  2023年   186篇
  2022年   391篇
  2021年   458篇
  2020年   505篇
  2019年   325篇
  2018年   252篇
  2017年   354篇
  2016年   492篇
  2015年   525篇
  2014年   763篇
  2013年   702篇
  2012年   715篇
  2011年   715篇
  2010年   518篇
  2009年   575篇
  2008年   596篇
  2007年   609篇
  2006年   565篇
  2005年   514篇
  2004年   456篇
  2003年   351篇
  2002年   258篇
  2001年   215篇
  2000年   167篇
  1999年   165篇
  1998年   149篇
  1997年   121篇
  1996年   105篇
  1995年   88篇
  1994年   75篇
  1993年   53篇
  1992年   33篇
  1991年   22篇
  1990年   19篇
  1989年   21篇
  1988年   14篇
  1987年   7篇
  1986年   7篇
  1985年   10篇
  1984年   8篇
  1983年   4篇
  1982年   4篇
  1981年   3篇
  1980年   2篇
  1979年   6篇
  1975年   1篇
  1974年   1篇
  1969年   1篇
  1959年   2篇
排序方式: 共有10000条查询结果,搜索用时 14 毫秒
1.
Small object detection is challenging and far from satisfactory. Most general object detectors suffer from two critical issues with small objects: (1) Feature extractor based on classification network cannot express the characteristics of small objects reasonably due to insufficient appearance information of targets and a large amount of background interference around them. (2) The detector requires a much higher location accuracy for small objects than for general objects. This paper proposes an effective and efficient small object detector YOLSO to address the above problems. For feature representation, we analyze the drawbacks in previous backbones and present a Half-Space Shortcut(HSSC) module to build a background-aware backbone. Furthermore, a coarse-to-fine Feature Pyramid Enhancement(FPE) module is introduced for layer-wise aggregation at a granular level to enhance the semantic discriminability. For loss function, we propose an exponential L1 loss to promote the convergence of regression, and a focal IOU loss to focus on prime samples with high classification confidence and high IOU. Both of them significantly improves the location accuracy of small objects. The proposed YOLSO sets state-of-the-art results on two typical small object datasets, MOCOD and VeDAI, at a speed of over 200 FPS. In the meantime, it also outperforms the baseline YOLOv3 by a wide margin on the common COCO dataset.  相似文献   
2.
The recognition of boron compounds is well developed as boronic acids but untapped as organotrifluoroborate anions (R−BF3). We are exploring the development of these and other designer anions as anion-recognition motifs by considering them as substituted versions of the parent inorganic ion. To this end, we demonstrate strong and reliable binding of organic trifluoroborates, R−BF3, by cyanostar macrocycles that are size-complementary to the inorganic BF4 progenitors. We find that recognition is modulated by the substituent's sterics and that the affinities are retained using the common K+ salts of R−BF3 anions.  相似文献   
3.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
4.
Electromagnetic signal emitted by satellite communication (satcom) transmitters are used to identify specific individual uplink satcom terminals sharing the common transponder in real environment, which is known as specific emitter identification (SEI) that allows for early indications and warning (I&W) of the targets carrying satcom furnishment and furthermore the real time electromagnetic situation awareness in military operations. In this paper, the authors are the first to propose the identification of specific transmitters of satcom by using probabilistic neural networks (PNN) to reach the goal of target recognition. We have been devoted to the examination by exploring the feasibility of utilizing the Hilbert transform to signal preprocessing, applying the discrete wavelet transform to feature extraction, and employing the PNN to perform the classification of stationary signals. There are a total of 1000 sampling time series with binary phase shift keying (BPSK) modulation originated by five types of satcom transmitters in the test. The established PNNs classifier implements the data testing and finally yields satisfactory accuracy at 8 dB(±1 dB) carrier to noise ratio, which indicates the feasibility of our method, and even the keen insight of its application in military.  相似文献   
5.
DNA detection is usually conducted under nondenaturing conditions to favor the formation of Watson–Crick base-paring interactions. However, although such a setting is excellent for distinguishing a single-nucleotide polymorphism (SNP) within short DNA sequences (15–25 nucleotides), it does not offer a good solution to SNP detection within much longer sequences. Here we report on a new detection method capable of detecting SNP in a DNA sequence containing 35–90 nucleotides. This is achieved through incorporating into the recognition DNA sequence a previously discovered DNA molecule that forms a stable G-quadruplex in the presence of 7 molar urea, a known condition for denaturing DNA structures. The systems are configured to produce both colorimetric and fluorescent signals upon target binding.  相似文献   
6.
Motor Imagery Electroencephalography (MI-EEG) has shown good prospects in neurorehabilitation, and the entropy-based nonlinear dynamic methods have been successfully applied to feature extraction of MI-EEG. Especially based on Multiscale Fuzzy Entropy (MFE), the fuzzy entropies of the τ coarse-grained sequences in τ scale are calculated and averaged to develop the Composite MFE (CMFE) with more feature information. However, the coarse-grained process fails to match the nonstationary characteristic of MI-EEG by a mean filtering algorithm. In this paper, CMFE is improved by assigning the different weight factors to the different sample points in the coarse-grained process, i.e., using the weighted mean filters instead of the original mean filters, which is conductive to signal filtering and feature extraction, and the resulting personalized Weighted CMFE (WCMFE) is more suitable to represent the nonstationary MI-EEG for different subjects. All the WCMFEs of multi-channel MI-EEG are fused in serial to construct the feature vector, which is evaluated by a back-propagation neural network. Based on a public dataset, extensive experiments are conducted, yielding a relatively higher classification accuracy by WCMFE, and the statistical significance is examined by two-sample t-test. The results suggest that WCMFE is superior to the other entropy-based and traditional feature extraction methods.  相似文献   
7.
指纹考勤管理软件的研究与实现   总被引:2,自引:0,他引:2  
齐金平  孟建军  蒋兆远 《信息技术》2003,27(10):70-72,76
针对企、事业单位原有的考勤系统,如打卡钟、磁卡、IC卡等考勤方式存在代打卡、卡丢失等不足和缺陷的实际,结合指纹识别技术,建立一套考勤、薪资、人事管理于一体的软件系统。给出了系统的体系结构和功能实现,能使企业考勤管理更加简便快捷、客观公正。并提出了进一步的发展方向和展望。  相似文献   
8.
人工神经网络理论及其应用   总被引:7,自引:0,他引:7  
简要介绍了人工神经网络的发展过程和基本理论,从神经网络具有自学习功能、联想存储功能和高速寻找优化解的能力三个方面论述了其特点和优越性,详细阐述了在模式识别、信号处理、自动控制、人工智能、自适应的人机接口、优化计算、通信以及其它方面的应用,探讨和分析了其发展前景。  相似文献   
9.
医学超声图像处理系统   总被引:1,自引:1,他引:0  
超声图像诊断是与X线CT、同位素扫描、核磁共振等一样重要的医学图像诊断手段。根据肝脏超声图像进行脂肪肝的诊断,是病变确诊的主要方法。但是,与CT和核磁共振等医学图像相比,超声图像的图像质量较差,目前的诊断以定性为主,受主观因素影响较大。以图像分割为基础,以VC语言为工具,建立了超声图像处理系统,对超声图像进行了二值化处理,并对处理结果进行了量化,为诊断提供了依据。  相似文献   
10.
灰色信息及其运算研究   总被引:1,自引:1,他引:0       下载免费PDF全文
金新政 《电子学报》2002,30(12):1797-1799
本文提出了全真信息、信息的亲善性等概念,讨论了信息的有关性质及运算的关系,得到了信息的运算与普通集合运算之间存在着差异的结论,说明了引起该差异的原因.同时,以认知模式为基础,定义了信息函数,并得到了有关的命题及运算.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号