首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   145篇
  免费   48篇
  国内免费   32篇
电工技术   3篇
综合类   13篇
化学工业   1篇
机械仪表   10篇
建筑科学   2篇
轻工业   3篇
无线电   40篇
一般工业技术   16篇
冶金工业   1篇
自动化技术   136篇
  2024年   1篇
  2023年   6篇
  2022年   9篇
  2021年   14篇
  2020年   15篇
  2019年   5篇
  2018年   7篇
  2017年   15篇
  2016年   5篇
  2015年   12篇
  2014年   16篇
  2013年   10篇
  2012年   21篇
  2011年   13篇
  2010年   13篇
  2009年   8篇
  2008年   12篇
  2007年   18篇
  2006年   12篇
  2005年   6篇
  2004年   2篇
  2003年   2篇
  2002年   2篇
  1957年   1篇
排序方式: 共有225条查询结果,搜索用时 171 毫秒
91.
Some sexually motivated serial killers target victims on the basis of appearance. Therefore, multiple victims of a single serial killer are likely to have some facial features and geometries that are similar. The current research was undertaken to propose a technique, termed face similarity linkage, to evaluate whether victims of a serial killer have statistically more similar facial measurements than a randomly chosen person of the same gender. To test this, three of Ted Bundy's victims were randomly selected and anatomical landmarks were located and measured to produce proportionality indices of their faces. A random subject from an online database was used as a comparison. The results showed there were no statistically significant differences between the three of Bundy's victims, however there was significant difference between 11 of the 17 facial measurements of Bundy's victims when compared to a random person. This research serves as a proof of concept that, with more advanced means of data collection, may be a useful tool for law enforcement for linking serial homicides. The current method is relatively novel, and in need of expert systems interfaces to improve speed and application, which is outlined in the current study.  相似文献   
92.
93.
针对用户跨域访问数据资源的数据共享场景, 为了保证用户的身份合法性以及安全通信, 提出了一种基于区块链的生物特征和口令双因子跨域认证与密钥协商方案. 用户生物特征通过模糊提取技术转换为生物密钥和生物公开信息参与认证, 避免生物特征被泄露. 包含生物密钥和生物公开信息的用户身份信息存储在区块链账本中,保证身份信息一致以及...  相似文献   
94.
Everyone''s walking style is unique, and it has been shown that both humans and computers are very good at recognizing known gait patterns. It is therefore unsurprising that dynamic foot pressure patterns, which indirectly reflect the accelerations of all body parts, are also unique, and that previous studies have achieved moderate-to-high classification rates (CRs) using foot pressure variables. However, these studies are limited by small sample sizes (n < 30), moderate CRs (CR ≃ 90%), or both. Here we show, using relatively simple image processing and feature extraction, that dynamic foot pressures can be used to identify n = 104 subjects with a CR of 99.6 per cent. Our key innovation was improved and automated spatial alignment which, by itself, improved CR to over 98 per cent, a finding that pointedly emphasizes inter-subject pressure pattern uniqueness. We also found that automated dimensionality reduction invariably improved CRs. As dynamic pressure data are immediately usable, with little or no pre-processing required, and as they may be collected discreetly during uninterrupted gait using in-floor systems, foot pressure-based identification appears to have wide potential for both the security and health industries.  相似文献   
95.
徐勇 《通信技术》2010,43(10):117-119
以嵌入式处理器(ARM)作为核心处理芯片,以指纹作为载体,通过控制器局域网(CAN)总线来实现上位机与门禁节点控制器的通信,完成了门禁系统的基本功能。该系统弥补了以往门禁系统中依赖单片机作为主要控制芯片的存储空间不足及扩展能力有限的弊端,并将人体生物特征应用到门禁系统中,利用人体生物特征的唯一性大大提高了门禁系统的安全性,促进了门禁系统的向前发展。  相似文献   
96.
解梅 《中国电子科技》2006,4(3):219-224
1 Introduction We are living in the age, in which the demand on security is increasing greatly. Consequently, biometric recognition, which is a safe, reliable and convenient technology for personal recognition, appears. This technology makes use of physiological or behavioural characteristics to identify individuals[1]. A biometric system is a pattern recognition system including acquiring the biometric feature from individual, extracting the feature vector from the raw data and comparing this…  相似文献   
97.
基于指纹特征数字水印算法的身份认证技术研究   总被引:1,自引:0,他引:1       下载免费PDF全文
张毅刚  焦玉华  牛夏牧  俞龙江 《电子学报》2003,31(Z1):2131-2134
本文利用指纹特征信息生成数字水印信号,并隐藏在身份证件之中.以身份证件作为指纹信息的载体,取代了传统指纹识别系统中的指纹特征参考信息数据库,提高整个自动指纹识别系统(AFIS)的安全性.同时,嵌入指纹特征信息的身份证件与用户存在本质联系,防止证件被盗用,实现对证件的保护.实验证明,使用含水印的证件在保证指纹识别系统正常工作的前提下,提高了验证的安全性,并且水印算法具有一定的鲁棒性.  相似文献   
98.
本文详细阐述了手指静脉特征识别技术的原理与特点,并与其他生物识别技术进行比较,最后介绍了日立制作所手指静脉相关产品及未来的应用领域。  相似文献   
99.
We analyze the security of the Li et al . authentication scheme and show its vulnerability to off‐line password‐guessing and replay attacks. We design a new anonymous authentication scheme. The proposed scheme not only removes the drawback of the scheme of the Li et al . scheme but also protects user's anonymity. Moreover, we show validity of our proposed scheme using Burrows, Abadi, and Needham logic. Our scheme is comparable in terms of the communication and computational overhead with related schemes. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
100.
Due to the enormous usage of the internet for transmission of data over a network, security and authenticity become major risks. Major challenges encountered in biometric system are the misuse of enrolled biometric templates stored in database server. To describe these issues various algorithms are implemented to deliver better protection to biometric traits such as physical (Face, fingerprint, Ear etc.) and behavioural (Gesture, Voice, tying etc.) by means of matching and verification process. In this work, biometric security system with fuzzy extractor and convolutional neural networks using face attribute is proposed which provides different choices for supporting cryptographic processes to the confidential data. The proposed system not only offers security but also enhances the system execution by discrepancy conservation of binary templates. Here Face Attribute Convolutional Neural Network (FACNN) is used to generate binary codes from nodal points which act as a key to encrypt and decrypt the entire data for further processing. Implementing Artificial Intelligence (AI) into the proposed system, automatically upgrades and replaces the previously stored biometric template after certain time period to reduce the risk of ageing difference while processing. Binary codes generated from face templates are used not only for cryptographic approach is also used for biometric process of enrolment and verification. Three main face data sets are taken into the evaluation to attain system performance by improving the efficiency of matching performance to verify authenticity. This system enhances the system performance by 8% matching and verification and minimizes the False Acceptance Rate (FAR), False Rejection Rate (FRR) and Equal Error Rate (EER) by 6 times and increases the data privacy through the biometric cryptosystem by 98.2% while compared to other work.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号