全文获取类型
收费全文 | 608篇 |
免费 | 105篇 |
国内免费 | 51篇 |
专业分类
电工技术 | 7篇 |
综合类 | 19篇 |
化学工业 | 7篇 |
金属工艺 | 7篇 |
机械仪表 | 4篇 |
矿业工程 | 1篇 |
能源动力 | 2篇 |
轻工业 | 1篇 |
石油天然气 | 1篇 |
无线电 | 196篇 |
一般工业技术 | 13篇 |
冶金工业 | 1篇 |
自动化技术 | 505篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2022年 | 16篇 |
2021年 | 17篇 |
2020年 | 14篇 |
2019年 | 17篇 |
2018年 | 15篇 |
2017年 | 71篇 |
2016年 | 56篇 |
2015年 | 33篇 |
2014年 | 126篇 |
2013年 | 55篇 |
2012年 | 80篇 |
2011年 | 66篇 |
2010年 | 37篇 |
2009年 | 39篇 |
2008年 | 17篇 |
2007年 | 47篇 |
2006年 | 16篇 |
2005年 | 9篇 |
2004年 | 3篇 |
2003年 | 1篇 |
2002年 | 4篇 |
2001年 | 6篇 |
2000年 | 4篇 |
1999年 | 5篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1992年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
排序方式: 共有764条查询结果,搜索用时 15 毫秒
751.
752.
753.
《Signal Processing: Image Communication》2014,29(9):971-986
In many multimedia applications, coded video is transmitted over error prone heterogeneous networks. Because of the predictive mechanism used in video coding, transmission error would propagate temporally and spatially and would result in significant quality losses. In order to address this problem, different error resilience methods have been proposed. One of the techniques, which is commonly used in video streaming, is unequal error protection (UEP) of scalable video coding (SVC). In this technique, different independent layers of an SVC stream are protected differently and based on their importance by using forward error correction (FEC) codes. Accurately analyzing the importance or utility of each video part is a critical component and would lead to a better protection and higher quality of the received video. Calculation of the utility is usually based on multiple decoding of sub-bitstreams and is highly computationally complex. In this work, we propose an accurate low complexity utility estimation technique that can be used in different applications. This technique estimates the utility of each network abstraction layer (NAL) by considering the error propagation to future frames. We utilize this method in an UEP framework with the scalable extension of H.264/AVC codec and it achieves almost the same performance as highly complex estimation techniques (an average loss of 0.05 dB). Furthermore, we propose a low delay version of this technique that can be used in delay constrained application. The estimation accuracy and performance of our proposed technique are studied extensively. 相似文献
754.
《Signal Processing: Image Communication》2014,29(8):864-874
Recent development of depth acquiring technique has accelerated the progress of 3D video in the market. Utilizing the acquired depth, arbitrary view frames can be generated based on depth image based rendering (DIBR) technique in free viewpoint video system. Different from texture video, depth sequence is mainly utilized for virtual view generation rather than viewing. Inspired by this, a depth frame interpolation scheme using texture information is proposed in this paper. The proposed scheme consists of a texture aided motion estimation (TAME) and texture aided motion compensation (TAMC) to fully explore the correlation between depth and the accompanying textures. The optimal motion vectors in TAME and the best interpolation weights in TAMC are respectively selected taking the geometric mapping relationship between depth and the accompanying texture frames into consideration. The proposed scheme is able to not only maintain the temporal consistency among interpolated depth sequence but also improve the quality of virtual frames generated by interpolated depth. Besides, it can be easily applied to arbitrary motion compensation based frame interpolation scheme. Experimental results demonstrate that the proposed depth frame interpolation scheme is able to improve the quality of virtual view texture frames in both subjective and objective criterions compared with existing schemes. 相似文献
755.
Jun Wu Mianxiong Dong Kaoru Ota Zhenyu Zhou Bin Duan 《Wireless Personal Communications》2014,75(3):1787-1808
Data access control within smart grids is a challenging issue because of the environmental noise and interferences. On one hand side, fine-grained data access control is essential because illegal access to the sensitive data may cause disastrous implications and/or be prohibited by the law. On the other hand, fault tolerance of the access control is very important, because of the potential impacts (implied by the errors) which could be significantly more serious than the ones regarding general data. In particular, control bits corruption could invalidate the security operation. To address the above challenges, this paper proposes a dedicated data access control scheme that is able to enforce fine-grained access control and resist against the corruptions implied by the noisy channels and the environmental interferences. The proposed scheme exploits a state-of-the-art cryptographic primitive called Fuzzy identity-based encryption with the lattice based access control and dedicated error-correction coding. We evaluate our proposed scheme by extensive simulations in terms of error correcting capability and energy consumption and results show the efficiency and feasibility of the proposed scheme. To our best knowledge, this paper is the first which addresses fault tolerant fine-grained data access control for smart grid. 相似文献
756.
757.
《AEUE-International Journal of Electronics and Communications》2014,68(7):637-643
In this paper, we integrate the concept of directional local extremas and their magnitude based patterns for content based image indexing and retrieval. The standard ditectional local extrama pattern (DLEP) extracts the directional edge information based on local extrema in 0°, 45°, 90°, and 135° directions in an image. However, they are not considering the magnitudes of local extremas. The proposed method integrates these two concepts for better retrieval performance. The sign DLEP (SDLEP) operator is a generalized DLEP operator and magnitude DLEP (MDLEP) operator is calculated using magnitudes of local extremas. The performance of the proposed method is compared with DLEP, local binary patterns (LBPs), block-based LBP (BLK_LBP), center-symmetric local binary pattern (CS-LBP), local edge patterns for segmentation (LEPSEG) and local edge patterns for image retrieval (LEPINV) methods by conducting two experiments on benchmark databases, viz. Corel-5K and Corel-10K databases. The results after being investigated show a significant improvement in terms of their evaluation measures as compared to other existing methods on respective databases. 相似文献
758.
759.
《AEUE-International Journal of Electronics and Communications》2014,68(7):611-615
In this paper we discuss layered multicast (LM) of progressive source codes using network coding. LM is absolutely optimal if different sinks in the network are satisfied up to their max-flow. Since absolutely optimal intra-layer network strategies might not exist for general networks, we present conditions under which an absolutely optimal, intra-layer multicast strategy exists for a given network and how that strategy may be efficiently constructed. We also discuss the problem of designing optimal intra-layer multicast strategies for general directed networks. 相似文献
760.