全文获取类型
收费全文 | 1574523篇 |
国内免费 | 12661篇 |
完全免费 | 74832篇 |
专业分类
无线电 | 1662016篇 |
出版年
2023年 | 303篇 |
2022年 | 11291篇 |
2021年 | 12919篇 |
2020年 | 10786篇 |
2019年 | 12802篇 |
2018年 | 11557篇 |
2017年 | 27652篇 |
2016年 | 36151篇 |
2015年 | 36982篇 |
2014年 | 71879篇 |
2013年 | 63388篇 |
2012年 | 67750篇 |
2011年 | 64312篇 |
2010年 | 69751篇 |
2009年 | 90005篇 |
2008年 | 91925篇 |
2007年 | 84003篇 |
2006年 | 85790篇 |
2005年 | 83211篇 |
2004年 | 78957篇 |
2003年 | 70699篇 |
2002年 | 59693篇 |
2001年 | 56145篇 |
2000年 | 48390篇 |
1999年 | 38765篇 |
1998年 | 33281篇 |
1997年 | 31186篇 |
1996年 | 31883篇 |
1995年 | 28215篇 |
1994年 | 25579篇 |
1993年 | 18303篇 |
1992年 | 17964篇 |
1991年 | 17751篇 |
1990年 | 16675篇 |
1989年 | 16329篇 |
1988年 | 9735篇 |
1987年 | 10528篇 |
1986年 | 10665篇 |
1985年 | 10237篇 |
1984年 | 9648篇 |
1983年 | 8739篇 |
1982年 | 7929篇 |
1981年 | 7955篇 |
1980年 | 6831篇 |
1979年 | 5611篇 |
1978年 | 4860篇 |
1977年 | 4475篇 |
1976年 | 3953篇 |
1975年 | 3861篇 |
1974年 | 3659篇 |
1973年 | 3968篇 |
1972年 | 3685篇 |
1971年 | 3276篇 |
1970年 | 2806篇 |
1969年 | 2373篇 |
1968年 | 2500篇 |
1967年 | 2435篇 |
1966年 | 2149篇 |
1965年 | 2034篇 |
1964年 | 1506篇 |
1963年 | 948篇 |
1962年 | 316篇 |
1961年 | 328篇 |
1960年 | 291篇 |
1959年 | 384篇 |
1958年 | 407篇 |
1957年 | 259篇 |
1956年 | 326篇 |
1955年 | 226篇 |
1954年 | 204篇 |
1953年 | 130篇 |
1952年 | 121篇 |
1951年 | 99篇 |
1950年 | 66篇 |
1949年 | 74篇 |
1948年 | 58篇 |
1947年 | 55篇 |
1946年 | 34篇 |
排序方式: 共有1662016条查询结果,搜索用时 203 毫秒
1.
Secure spread spectrum watermarking for multimedia 总被引:668,自引:0,他引:668
Cox I.J. Kilian J. Leighton F.T. Shamoon T. 《IEEE transactions on image processing》1997,6(12):1673-1687
This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations (such as lossy compression, filtering, digital-analog and analog-digital conversion, requantization, etc.), and common geometric transformations (such as cropping, scaling, translation, and rotation) provided that the original image is available and that it can be successfully registered against the transformed watermarked image. In these cases, the watermark detector unambiguously identifies the owner. Further, the use of Gaussian noise, ensures strong resilience to multiple-document, or collusional, attacks. Experimental results are provided to support these claims, along with an exposition of pending open problems. 相似文献
2.
3.
Active contours without edges 总被引:356,自引:0,他引:356
We propose a new model for active contours to detect objects in a given image, based on techniques of curve evolution, Mumford-Shah (1989) functional for segmentation and level sets. Our model can detect objects whose boundaries are not necessarily defined by the gradient. We minimize an energy which can be seen as a particular case of the minimal partition problem. In the level set formulation, the problem becomes a "mean-curvature flow"-like evolving the active contour, which will stop on the desired boundary. However, the stopping term does not depend on the gradient of the image, as in the classical active contour models, but is instead related to a particular segmentation of the image. We give a numerical algorithm using finite differences. Finally, we present various experimental results and in particular some examples for which the classical snakes methods based on the gradient are not applicable. Also, the initial curve can be anywhere in the image, and interior contours are automatically detected. 相似文献
4.
On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas 总被引:324,自引:12,他引:312
This paper is motivated by the need for fundamental understanding of ultimate limits of bandwidth efficient delivery of higher bit-rates in digital wireless communications and to also begin to look into how these limits might be approached. We examine exploitation of multi-element array (MEA) technology, that is processing the spatial dimension (not just the time dimension) to improve wireless capacities in certain applications. Specifically, we present some basic information theory results that promise great advantages of using MEAs in wireless LANs and building to building wireless communication links. We explore the important case when the channel characteristic is not available at the transmitter but the receiver knows (tracks) the characteristic which is subject to Rayleigh fading. Fixing the overall transmitted power, we express the capacity offered by MEA technology and we see how the capacity scales with increasing SNR for a large but practical number, n, of antenna elements at both transmitter and receiver.We investigate the case of independent Rayleigh faded paths between antenna elements and find that with high probability extraordinary capacity is available. Compared to the baseline n = 1 case, which by Shannon's classical formula scales as one more bit/cycle for every 3 dB of signal-to-noise ratio (SNR) increase, remarkably with MEAs, the scaling is almost like n more bits/cycle for each 3 dB increase in SNR. To illustrate how great this capacity is, even for small n, take the cases n = 2, 4 and 16 at an average received SNR of 21 dB. For over 99% of the channels the capacity is about 7, 19 and 88 bits/cycle respectively, while if n = 1 there is only about 1.2 bit/cycle at the 99% level. For say a symbol rate equal to the channel bandwith, since it is the bits/symbol/dimension that is relevant for signal constellations, these higher capacities are not unreasonable. The 19 bits/cycle for n = 4 amounts to 4.75 bits/symbol/dimension while 88 bits/cycle for n = 16 amounts to 5.5 bits/symbol/dimension. Standard approaches such as selection and optimum combining are seen to be deficient when compared to what will ultimately be possible. New codecs need to be invented to realize a hefty portion of the great capacity promised. 相似文献
5.
6.
DCT域的隐形水印应嵌入哪里,水印才足够稳健?尽管许多关于DCT域水印算法的文献赞成水印应放在对视觉效果重要的分量,但DC分量总是被无一例外地排除在外.本文提出了一个DCT域隐形水印的嵌入对策和一个应用该对策的自适应水印算法.基于对图像DCT系数振幅的定量分析,我们指出:DC分量比任何AC分量有更大的感觉容量,从稳健性的角度,DC分量最适合用来嵌入水印.应用这个对策,本文提出了一个把视觉系统纹理掩蔽特性结合到水印编码过程的自适应水印算法.实验结果有效地支持了这个结论,所产生的隐形水印体现了很好的稳健性. 相似文献
8.
Image coding using wavelet transform 总被引:217,自引:0,他引:217
Antonini M. Barlaud M. Mathieu P. Daubechies I. 《IEEE transactions on image processing》1992,1(2):205-220
A scheme for image compression that takes into account psychovisual features both in the space and frequency domains is proposed. This method involves two steps. First, a wavelet transform used in order to obtain a set of biorthogonal subclasses of images: the original image is decomposed at different scales using a pyramidal algorithm architecture. The decomposition is along the vertical and horizontal directions and maintains constant the number of pixels required to describe the image. Second, according to Shannon's rate distortion theory, the wavelet coefficients are vector quantized using a multiresolution codebook. To encode the wavelet coefficients, a noise shaping bit allocation procedure which assumes that details at high resolution are less visible to the human eye is proposed. In order to allow the receiver to recognize a picture as quickly as possible at minimum cost, a progressive transmission scheme is presented. It is shown that the wavelet transform is particularly well adapted to progressive transmission. 相似文献
9.
Snakes, shapes, and gradient vector flow 总被引:211,自引:0,他引:211
Snakes, or active contours, are used extensively in computer vision and image processing applications, particularly to locate object boundaries. Problems associated with initialization and poor convergence to boundary concavities, however, have limited their utility. This paper presents a new external force for active contours, largely solving both problems. This external force, which we call gradient vector flow (GVF), is computed as a diffusion of the gradient vectors of a gray-level or binary edge map derived from the image. It differs fundamentally from traditional snake external forces in that it cannot be written as the negative gradient of a potential function, and the corresponding snake is formulated directly from a force balance condition rather than a variational formulation. Using several two-dimensional (2-D) examples and one three-dimensional (3-D) example, we show that GVF has a large capture range and is able to move snakes into boundary concavities. 相似文献
10.