首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   51篇
  免费   1篇
化学工业   2篇
能源动力   1篇
轻工业   1篇
无线电   5篇
一般工业技术   1篇
自动化技术   42篇
  2020年   1篇
  2019年   3篇
  2018年   1篇
  2017年   3篇
  2016年   2篇
  2015年   1篇
  2014年   4篇
  2012年   4篇
  2011年   4篇
  2010年   2篇
  2009年   1篇
  2008年   4篇
  2007年   2篇
  2006年   5篇
  2005年   2篇
  2003年   2篇
  2002年   2篇
  2000年   1篇
  1997年   1篇
  1995年   4篇
  1994年   1篇
  1993年   1篇
  1985年   1篇
排序方式: 共有52条查询结果,搜索用时 15 毫秒
1.
2.
Abstract

A steady state laminar natural convection flow in a trapezoidal enclosure with discretely heated bottom wall, adiabatic top wall, and constant temperature cold inclined walls is performed. The finite volume based commercial code “ANSYS-FLUENT” is used to investigate the influence of discrete heating on natural convection flows in a trapezoidal cavity. The numerical solution of the problem covers various Rayleigh numbers ranging from 103 to 106, non-dimensional heating length ranging from 0.2 to 0.8 and Prandtl number is 0.7. The performance of the present numerical approach is represented in the form of streamfunction, temperature profile and Nusselt number. Heat transfer increases with increase of Rayleigh numbers at the corners of the cavity for same heating length from center of the bottom wall. However, the heat transfer rate is less and almost constant for the Rayleigh numbers considered. It is found that the average Nusselt number monotonically increases with increase of Rayleigh number and length of heat source. The variation of local and average Nusselt numbers is more significant for larger length of heating than smaller one. The heat transfer correlations useful for practical design problems have been predicted.  相似文献   
3.
State-of-the-art near-duplicate video clip (NDVC) detection for novelty re-ranking uses non-semantic low-level features (color/texture) to detect and eliminate “content-based NDVC” and increases content level novelty in the top results. However, humans may perceive a video as near duplicate from a semantic perspective as well. In this paper, we propose concept-based near-duplicate video clip (CBNDVC) detection technique for novelty re-ranking. We identify “semantic NDVC”, making use of the semantic features (events/concepts) and re-rank the top results to increase the content as well as semantic novelty. Videos are represented as a multivariate time series of confidence values of relevant concepts and thereafter discovery of CBNDVC clusters is achieved by conceptual clustering. Obtained results show higher precision and recall from the user’s perspective.  相似文献   
4.
5.
6.
Advances in multimedia data acquisition and storage technology have led to the growth of very large multimedia databases. Analyzing this huge amount of multimedia data to discover useful knowledge is a challenging problem. This challenge has opened the opportunity for research in Multimedia Data Mining (MDM). Multimedia data mining can be defined as the process of finding interesting patterns from media data such as audio, video, image and text that are not ordinarily accessible by basic queries and associated results. The motivation for doing MDM is to use the discovered patterns to improve decision making. MDM has therefore attracted significant research efforts in developing methods and tools to organize, manage, search and perform domain specific tasks for data from domains such as surveillance, meetings, broadcast news, sports, archives, movies, medical data, as well as personal and online media collections. This paper presents a survey on the problems and solutions in Multimedia Data Mining, approached from the following angles: feature extraction, transformation and representation techniques, data mining techniques, and current multimedia data mining systems in various application domains. We discuss main aspects of feature extraction, transformation and representation techniques. These aspects are: level of feature extraction, feature fusion, features synchronization, feature correlation discovery and accurate representation of multimedia data. Comparison of MDM techniques with state of the art video processing, audio processing and image processing techniques is also provided. Similarly, we compare MDM techniques with the state of the art data mining techniques involving clustering, classification, sequence pattern mining, association rule mining and visualization. We review current multimedia data mining systems in detail, grouping them according to problem formulations and approaches. The review includes supervised and unsupervised discovery of events and actions from one or more continuous sequences. We also do a detailed analysis to understand what has been achieved and what are the remaining gaps where future research efforts could be focussed. We then conclude this survey with a look at open research directions.  相似文献   
7.
This survey aims at providing multimedia researchers with a state-of-the-art overview of fusion strategies, which are used for combining multiple modalities in order to accomplish various multimedia analysis tasks. The existing literature on multimodal fusion research is presented through several classifications based on the fusion methodology and the level of fusion (feature, decision, and hybrid). The fusion methods are described from the perspective of the basic concept, advantages, weaknesses, and their usage in various analysis tasks as reported in the literature. Moreover, several distinctive issues that influence a multimodal fusion process such as, the use of correlation and independence, confidence level, contextual information, synchronization between different modalities, and the optimal modality selection are also highlighted. Finally, we present the open issues for further research in the area of multimodal fusion.  相似文献   
8.
A digital rights management scheme for broadcast video   总被引:2,自引:0,他引:2  
Many watermarking techniques have been proposed for digital video and digital broadcast video. In general, they address the seller's or broadcaster's concerns, such as copyright-violation deterrence, copyright-violation detection and copy protection. Some of them provide for data integrity (tamper proofing), which is a shared concern of both subscriber and broadcaster. In all these cases, the watermark generation and embedding is performed or controlled by the seller or broadcaster. Therefore, a broadcaster with malicious intentions could, with manipulation, falsely implicate an innocent subscriber in copyright violation. This could be a major concern for subscribers. In this paper, we propose an integrated solution to manage the broadcaster's copyright and subscriber's false-implication concern (subscriber's rights) for digital video broadcasts. The proposed novel approach makes use of interactive watermarking techniques and protocols to help protect digital rights of all parties involved in video broadcasting.  相似文献   
9.
Content based image retrieval is an active area of research. Many approaches have been proposed to retrieve images based on matching of some features derived from the image content. Color is an important feature of image content. The problem with many traditional matching-based retrieval methods is that the search time for retrieving similar images for a given query image increases linearly with the size of the image database. We present an efficient color indexing scheme for similarity-based retrieval which has a search time that increases logarithmically with the database size.In our approach, the color features are extracted automatically using a color clustering algorithm. Then the cluster centroids are used as representatives of the images in 3-dimensional color space and are indexed using a spatial indexing method that usesR-tree. The worst case search time complexity of this approach isOn q log(N* navg)), whereN is the number of images in the database, andn q andn avg are the number of colors in the query image and the average number of colors per image in the database respectively. We present the experimental results for the proposed approach on two databases consisting of 337 Trademark images and 200 Flag images.  相似文献   
10.
Visual Cryptography (VC) has been developed as a significant research arena in media security. Despite of its obvious strengths, recent investigations have debated this scheme from adverse aspects, its problem is lack of authentication of VC shares, VC authentication related to digital image processing and cryptography has not been fully integrated together in the past years. In this paper, we analyze both visual features and cryptographic features of VC shares and take use of them for VC authentication. Compared to those existing methods, our contribution is the first one to integrate visual features and cryptographic features of VC shares into Hash code for the purpose of VC authentication.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号