首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   201篇
  免费   52篇
  国内免费   33篇
电工技术   6篇
综合类   18篇
机械仪表   9篇
建筑科学   1篇
轻工业   2篇
无线电   52篇
一般工业技术   14篇
冶金工业   1篇
原子能技术   1篇
自动化技术   182篇
  2024年   1篇
  2023年   4篇
  2022年   9篇
  2021年   6篇
  2020年   3篇
  2019年   10篇
  2018年   2篇
  2017年   10篇
  2016年   5篇
  2015年   9篇
  2014年   12篇
  2013年   17篇
  2012年   15篇
  2011年   23篇
  2010年   15篇
  2009年   26篇
  2008年   29篇
  2007年   29篇
  2006年   22篇
  2005年   16篇
  2004年   9篇
  2003年   4篇
  2002年   5篇
  2001年   3篇
  2000年   1篇
  1955年   1篇
排序方式: 共有286条查询结果,搜索用时 0 毫秒
1.
Fractal dimension applied to plant identification   总被引:2,自引:0,他引:2  
This article discusses methods to identify plants by analysing leaf complexity based on estimating their fractal dimension. Leaves were analyzed according to the complexity of their internal and external shapes. A computational program was developed to process, analyze and extract the features of leaf images, thereby allowing for automatic plant identification. Results are presented from two experiments, the first to identify plant species from the Brazilian Atlantic forest and Brazilian Cerrado scrublands, using fifty leaf samples from ten different species, and the second to identify four different species from genus Passiflora, using twenty leaf samples for each class. A comparison is made of two methods to estimate fractal dimension (box-counting and multiscale Minkowski). The results are discussed to determine the best approach to analyze shape complexity based on the performance of the technique, when estimating fractal dimension and identifying plants.  相似文献   
2.
鉴于人体的手指指节折痕具有稳定性且因人而异的特点,该文提出一种基于投影和小波分析的手指指节折痕识别的新算法。对手指图像进行定位,经分割、归一化后得到了用于身份鉴别的手指子图。将手指子图向水平轴投影,得到含有折痕信息的一维信号,利用小波的多分辨率特点提取折痕信息进而形成代表折痕的特征矢量。在手指图像数据库中,利用最近邻分类器进行了算法验证,等错误率约为1.5%,实验结果表明了算法的有效性。  相似文献   
3.
Biometrics technologies have been around for quite some time and many have been deployed for different applications all around the world, ranging from small companies' time and attendance systems to access control systems for nuclear facilities. Biometrics offer a reliable solution for the establishment of the distinctiveness of identity based on who an individual is, rather than what he or she knows or carries. Biometric Systems automatically verify a person's identity based on his/her anatomical and behav...  相似文献   
4.
Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password. Unfortunately, this approach has many security problems because personal data can be stolen or recognized by hackers. This paper aims to present a cloud-based biometric authentication model (CBioAM) for improving and securing cloud services. The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system (CBioAS), where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the users’ information. The paper presents the performance evaluation of the proposed model in terms of three main characteristics including accuracy, sensitivity, and specificity. The research study introduces a novel algorithm called “Bio_Authen_as_a_Service” for implementing and evaluating the proposed model. The proposed system performs the biometric authentication process securely and preserves the privacy of user information. The experimental result was highly promising for securing cloud services using the proposed model. The experiments showed encouraging results with a performance average of 93.94%, an accuracy average of 96.15%, a sensitivity average of 87.69%, and a specificity average of 97.99%.  相似文献   
5.
Biometric cryptosystems and cancelable biometrics are both practical and promising schemes to enhance the security and privacy of biometric systems. Though a number of bio-crypto algorithms have been proposed, they have limited practical applicability because they lack of cancelability. Since biometrics are immutable, the users whose biometrics are stolen cannot use bio-crypto systems anymore. Cancelable biometric schemes are of cancelability; however, they are difficult to compromise the conflicts between the security and performance. By embedded a novel cancelable palmprint template, namely “two dimensional (2D) Palmprint Phasor”, the proposed palmprint cryptosystem overcomes the lack of cancelability in existing biometric cryptosystems. Besides, the authentication performance is enhanced when users have different tokens/keys. Furthermore, we develop a novel dual-key-binding cancelable palmprint cryptosystem to enhance the security and privacy of palmprint biometric. 2D Palmprint Phasor template is scrambled by the scrambling transformation based on the chaotic sequence that is generated by both the user's token/key and strong key extracted from palmprint. Dual-key-binding scrambling not only has more robustness to resist against chosen plain text attack, but also enhances the secure requirement of non-invertibility. 2D Palmprint Phasor algorithm and dual-key-binding scrambling both increase the difficulty of adversary's statistical analysis. The experimental results and security analysis confirm the efficiency of the proposed scheme.  相似文献   
6.
为了有效利用用户的生物特征进行入侵者身份识别,提出了一种基于用户击键特征进行异常检测的新方法.该方法根据人们在击键时所产生的按键压力和时间间隔的惟一性,利用正态分布的特性控制模式库生成方式,构造出能够描述每个用户独有特征的击键特征向量库,然后利用模式匹配算法对新登陆用户进行检测.相关实验验证了该方法具有较高的用户识别能力.  相似文献   
7.
8.
从手机解锁、小区门禁到餐厅吃饭、超市收银,再到高铁进站、机场安检以及医院看病,人脸、虹膜和指纹等生物特征已成为人们进入万物互联世界的数字身份证。生物特征识别赋予机器自动探测、捕获、处理、分析和识别数字化生理或行为信号的高级智能,是一个典型而又复杂的模式识别问题,一直处于人工智能技术发展前沿,在新一代人工智能规划、“互联网+”行动计划等国家战略中具有重要地位。由于生物特征识别涉及公众利益攸关的隐私、道德和法律等问题,近期也引起了广泛的社会关注。本文系统综述了生物特征识别学科发展现状、新兴方向、存在问题和可行思路,深入梳理了人脸、虹膜、指纹、掌纹、静脉、声纹、步态、行人重识别以及多模态融合识别的研究进展,以人脸为例重点介绍了生物特征识别领域近些年受到关注的新方向——对抗攻击和防御、深度伪造和反伪造,最后剖析总结了生物特征识别领域存在的3大挑战问题——“感知盲区”、“决策误区”和“安全红区”。本文认为必须变革和创新生物特征的传感、认知和安全机制,才有可能取得复杂场景生物识别学术研究和技术应用的根本性突破,破除现有生物识别技术的弊端,朝着“可感”、“可知”和“可信”的新一代生物特征识别总体目标发展。  相似文献   
9.
生物加密综述   总被引:2,自引:0,他引:2       下载免费PDF全文
冯全  苏菲  蔡安妮 《计算机工程》2008,34(10):141-143
生物加密(BE)将生物模板和密钥相结合生成生物密钥,可以取代传统口令对密钥进行保护。在没有通过验证的情况下,攻击者无法获取密钥或生物模板。BE包含了可撤销生物认证技术,增强了生物认证中的安全性和保护隐私。该文介绍这一领域的主要方案,并指出各类方案的优缺点。  相似文献   
10.
张淑苗  张书晔  冯全  杨梅 《计算机工程》2011,37(23):147-148,151
在模糊保险箱方案中,通常采用多个干扰点与用户特征点混合构成的集合表示保险箱,这种方法存在多种安全缺陷。为此,提出一种新的保险箱构造方案,该方案利用随机点与用户特征集合构造一个随机多项式,运用该多项式系数表示保险箱。分析结果表明,该方案可以抵抗已知的对模糊保险箱的多种攻击,具有更高的安全性,并能节约存储空间。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号