首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   111篇
  免费   0篇
  国内免费   1篇
化学工业   12篇
轻工业   5篇
无线电   49篇
冶金工业   5篇
自动化技术   41篇
  2017年   2篇
  2016年   1篇
  2015年   2篇
  2013年   3篇
  2012年   5篇
  2011年   1篇
  2010年   3篇
  2009年   4篇
  2008年   5篇
  2007年   9篇
  2006年   4篇
  2005年   3篇
  2004年   2篇
  2003年   3篇
  2002年   2篇
  2001年   6篇
  2000年   10篇
  1999年   7篇
  1998年   6篇
  1997年   2篇
  1996年   7篇
  1994年   3篇
  1993年   1篇
  1992年   1篇
  1986年   1篇
  1985年   1篇
  1983年   1篇
  1980年   1篇
  1979年   1篇
  1978年   4篇
  1977年   2篇
  1976年   1篇
  1975年   2篇
  1974年   1篇
  1970年   2篇
  1967年   2篇
  1966年   1篇
排序方式: 共有112条查询结果,搜索用时 15 毫秒
51.
52.
A novel method for enhancing the performance of elastic graph matching in frontal face authentication is proposed. The starting point is to weigh the local similarity values at the nodes of an elastic graph according to their discriminatory power. Powerful and well-established optimization techniques are used to derive the weights of the linear combination. More specifically, we propose a novel approach that reformulates Fisher's discriminant ratio to a quadratic optimization problem subject to a set of inequality constraints by combining statistical pattern recognition and support vector machines (SVM). Both linear and nonlinear SVM are then constructed to yield the optimal separating hyperplanes and the optimal polynomial decision surfaces, respectively. The method has been applied to frontal face authentication on the M2VTS database. Experimental results indicate that the performance of morphological elastic graph matching is highly improved by using the proposed weighting technique  相似文献   
53.
Lipoprotein lipase activity has been found in the milks from severals species where it is assumed to result from leakage from the mammary gland into milk. The function of the enzyme in the gland is apparently to assist in the transfer of blood lipoprotein triacylglycerol fatty acids into milk triacylglycerols. Bovine skim milk is one of the richest sources of lipoprotein lipase and this enzyme has been purified extensively (7000 fold) by affinity chromatography. The lipase has a molecular weight of about 62000, is inhibited by protamine sulfate, 1.0 M sodium chloride, apolipoprotein C-I (apolipoprotein-serine), and apolipoprotein C-III (apolipoprotein-alanine). The enzyme is activated by apolipoprotein C-II (apolipoprotein-glutamic acid), serum, and by heparin to which it also binds. The lipase is highly specific for the primary esters of acylglycerols and exhibits a slight stereospecificity for the sn-1 ester in preference to the sn-3-ester. Bovine milk also has separate activity toward 1-monoacylglycerols. Human milk contains a serum stimulated lipoprotein lipase with many of the characteristics of the enzyme in bovine milk, as well as an enzyme stimulated by bile salts which resembles the sterol ester hydrolase of rat pancreatic juice. The assay, function, purification, characteristics, and substrate specificities of these enzyme are discussed.  相似文献   
54.
A nonlinear multichannel digital filter is presented in this correspondence. The output is a weighted sum of all samples in the filter window, with a single parameter controlling the filter nonlinearity. Although input data ordering is not required, performance can surpass the performance of other ordering-based multichannel filters  相似文献   
55.
Image authentication techniques for surveillance applications   总被引:4,自引:0,他引:4  
In automatic video surveillance (VS) systems, the issue of authenticating the video content is of primary importance. Given the ease with which digital images and videos can be manipulated, practically they do not have any value as legal proof, if the possibility of authenticating their content is not provided. In this paper, the problem of authenticating video surveillance image sequences is considered. After an introduction motivating the need for a watermarking-based authentication of VS sequences, a brief survey of the main watermarking-based authentication techniques is presented and the requirements that an authentication algorithm should satisfy for VS applications, are discussed. A novel algorithm which is suitable for VS visual data authentication is also presented and the results obtained by applying it to test data are discussed  相似文献   
56.
Region-based image watermarking   总被引:12,自引:0,他引:12  
We introduce a novel method for embedding and detecting a chaotic watermark in the digital spatial image domain, based on segmenting the image and locating regions that are robust to several image manipulations. The robustness of the method is confirmed by experimental results that display the immunity of the embedded watermark to several kinds of attacks, such as compression, filtering, scaling, cropping, and rotation.  相似文献   
57.
An integrated methodology for the detection and removal of cracks on digitized paintings is presented in this paper. The cracks are detected by thresholding the output of the morphological top-hat transform. Afterward, the thin dark brush strokes which have been misidentified as cracks are removed using either a median radial basis function neural network on hue and saturation data or a semi-automatic procedure based on region growing. Finally, crack filling using order statistics filters or controlled anisotropic diffusion is performed. The methodology has been shown to perform very well on digitized paintings suffering from cracks.  相似文献   
58.
This paper proposes a fast algorithm for implementing the basic operation of Minkowski addition for the special case of binary three-dimensional (3-D) images, using 3-D structuring elements of arbitrary size and shape. The application of the proposed algorithm for all the other morphological transformations is straightforward, as they can all be expressed in terms of Minkowski addition. The efficiency of the algorithm is analyzed and some experimental results of its application are presented. As shown, the efficiency of the algorithm increases with the size of the structuring element.  相似文献   
59.
We introduce a novel method for embedding and detecting a chaotic watermark in the digital spatial domain of color facial images, based on localizing salient facial features. These features define a certain area on which the watermark is embedded and detected. An assessment of the watermarking robustness is done experimentally, by testing resistance to several attacks, such as compression, filtering, noise addition, scaling, cropping and rotation  相似文献   
60.
Two approaches for ultrasonic image processing are examined. First, signal-adaptive maximum likelihood (SAML) filters are proposed for ultrasonic speckle removal. It is shown that in the case of displayed ultrasound (US) image data the maximum likelihood (ML) estimator of the original (noiseless) signal closely resembles the L(2) mean which has been proven earlier to be the ML estimator of the original signal in US B-mode data. Thus, the design of signal-adaptive L(2) mean filters is treated for US B-mode data and displayed US image data as well. Secondly, the segmentation of ultrasonic images using self-organizing neural networks (NN) is investigated. A modification of the learning vector quantizer (L(2 ) LVQ) is proposed in such a way that the weight vectors of the output neurons correspond to the L(2) mean instead of the sample arithmetic mean of the input observations. The convergence in the mean and in the mean square of the proposed L(2) LVQ NN are studied. L(2) LVQ is combined with signal-adaptive filtering in order to allow preservation of image edges and details as well as maximum speckle reduction in homogeneous regions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号