全文获取类型
收费全文 | 201篇 |
免费 | 52篇 |
国内免费 | 33篇 |
专业分类
电工技术 | 6篇 |
综合类 | 18篇 |
机械仪表 | 9篇 |
建筑科学 | 1篇 |
轻工业 | 2篇 |
无线电 | 52篇 |
一般工业技术 | 14篇 |
冶金工业 | 1篇 |
原子能技术 | 1篇 |
自动化技术 | 182篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 9篇 |
2021年 | 6篇 |
2020年 | 3篇 |
2019年 | 10篇 |
2018年 | 2篇 |
2017年 | 10篇 |
2016年 | 5篇 |
2015年 | 9篇 |
2014年 | 12篇 |
2013年 | 17篇 |
2012年 | 15篇 |
2011年 | 23篇 |
2010年 | 15篇 |
2009年 | 26篇 |
2008年 | 29篇 |
2007年 | 29篇 |
2006年 | 22篇 |
2005年 | 16篇 |
2004年 | 9篇 |
2003年 | 4篇 |
2002年 | 5篇 |
2001年 | 3篇 |
2000年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有286条查询结果,搜索用时 15 毫秒
1.
根据人体步态变化特点,提出一种基于特征融合和神经网络的步态识别算法。首先采用时域差分法对运动人体轮廓进行分割,然后分别提取空间特征和频率特征,将两步态特征融合在一起,从而实现步态的分类和识别。在CASIA步态数据库上进行仿真实验,仿真结果表明,该方法不仅克服了单一特征提取方法存在的缺陷,同时提高了步态识别正确率。 相似文献
2.
Fractal dimension applied to plant identification 总被引:2,自引:0,他引:2
Odemir Martinez Bruno Rodrigo de Oliveira Plotze Mário de Castro 《Information Sciences》2008,178(12):2722-2733
This article discusses methods to identify plants by analysing leaf complexity based on estimating their fractal dimension. Leaves were analyzed according to the complexity of their internal and external shapes. A computational program was developed to process, analyze and extract the features of leaf images, thereby allowing for automatic plant identification. Results are presented from two experiments, the first to identify plant species from the Brazilian Atlantic forest and Brazilian Cerrado scrublands, using fifty leaf samples from ten different species, and the second to identify four different species from genus Passiflora, using twenty leaf samples for each class. A comparison is made of two methods to estimate fractal dimension (box-counting and multiscale Minkowski). The results are discussed to determine the best approach to analyze shape complexity based on the performance of the technique, when estimating fractal dimension and identifying plants. 相似文献
3.
4.
Biometrics technologies have been around for quite some time and many have been deployed for different applications all around the world, ranging from small companies' time and attendance systems to access control systems for nuclear facilities. Biometrics offer a reliable solution for the establishment of the distinctiveness of identity based on who an individual is, rather than what he or she knows or carries. Biometric Systems automatically verify a person's identity based on his/her anatomical and behav... 相似文献
5.
Hosam El- El-Sofany 《计算机系统科学与工程》2022,43(2):573-589
Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password. Unfortunately, this approach has many security problems because personal data can be stolen or recognized by hackers. This paper aims to present a cloud-based biometric authentication model (CBioAM) for improving and securing cloud services. The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system (CBioAS), where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the users’ information. The paper presents the performance evaluation of the proposed model in terms of three main characteristics including accuracy, sensitivity, and specificity. The research study introduces a novel algorithm called “Bio_Authen_as_a_Service” for implementing and evaluating the proposed model. The proposed system performs the biometric authentication process securely and preserves the privacy of user information. The experimental result was highly promising for securing cloud services using the proposed model. The experiments showed encouraging results with a performance average of 93.94%, an accuracy average of 96.15%, a sensitivity average of 87.69%, and a specificity average of 97.99%. 相似文献
6.
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Biometric cryptosystems and cancelable biometrics are both practical and promising schemes to enhance the security and privacy of biometric systems. Though a number of bio-crypto algorithms have been proposed, they have limited practical applicability because they lack of cancelability. Since biometrics are immutable, the users whose biometrics are stolen cannot use bio-crypto systems anymore. Cancelable biometric schemes are of cancelability; however, they are difficult to compromise the conflicts between the security and performance. By embedded a novel cancelable palmprint template, namely “two dimensional (2D) Palmprint Phasor”, the proposed palmprint cryptosystem overcomes the lack of cancelability in existing biometric cryptosystems. Besides, the authentication performance is enhanced when users have different tokens/keys. Furthermore, we develop a novel dual-key-binding cancelable palmprint cryptosystem to enhance the security and privacy of palmprint biometric. 2D Palmprint Phasor template is scrambled by the scrambling transformation based on the chaotic sequence that is generated by both the user's token/key and strong key extracted from palmprint. Dual-key-binding scrambling not only has more robustness to resist against chosen plain text attack, but also enhances the secure requirement of non-invertibility. 2D Palmprint Phasor algorithm and dual-key-binding scrambling both increase the difficulty of adversary's statistical analysis. The experimental results and security analysis confirm the efficiency of the proposed scheme. 相似文献
7.
为了有效利用用户的生物特征进行入侵者身份识别,提出了一种基于用户击键特征进行异常检测的新方法.该方法根据人们在击键时所产生的按键压力和时间间隔的惟一性,利用正态分布的特性控制模式库生成方式,构造出能够描述每个用户独有特征的击键特征向量库,然后利用模式匹配算法对新登陆用户进行检测.相关实验验证了该方法具有较高的用户识别能力. 相似文献
8.
9.
人脸识别中,人脸特征作为生物特征的一种,具有唯一性、不可撤销性,一旦遭到攻击、篡改或泄露,用户隐私安全将面临巨大威胁。针对这一问题,提出一种基于深度学习和加密算法的人脸识别隐私安全方案。该方案中,利用FaceNet深度学习算法来高效提取人脸特征,协调生物特征模糊性与密码系统的精确性,采用CKKS全同态加密算法进行人脸识别密文域的运算,通过国密SM4算法增强人脸特征密文抵抗恶意攻击的能力,利用其对称密码的性质兼顾了安全性和运算效率,而SM9非对称密码算法则用于SM4算法对称密钥的管理。实验结果及分析表明,该方案在不影响人脸识别准确率、效率的前提下提高了数据传输、存储和比对的安全性。 相似文献
10.
在目前的生物特征识别方法中,虹膜识别被认为是最可靠的技术。提出一种基于经验模态分解和支持向量机的虹膜识别方法——EMD提取虹膜特征,SVM实现模式匹配。实验结果表明,该方法能够有效地应用到身份鉴别系统中。 相似文献