首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   520篇
  免费   25篇
  国内免费   12篇
电工技术   22篇
综合类   10篇
化学工业   52篇
金属工艺   5篇
机械仪表   18篇
建筑科学   1篇
能源动力   14篇
轻工业   4篇
石油天然气   4篇
无线电   143篇
一般工业技术   30篇
冶金工业   3篇
原子能技术   1篇
自动化技术   250篇
  2024年   1篇
  2023年   23篇
  2022年   10篇
  2021年   25篇
  2020年   24篇
  2019年   17篇
  2018年   23篇
  2017年   69篇
  2016年   55篇
  2015年   29篇
  2014年   96篇
  2013年   15篇
  2012年   23篇
  2011年   19篇
  2010年   12篇
  2009年   24篇
  2008年   15篇
  2007年   21篇
  2006年   10篇
  2005年   7篇
  2004年   7篇
  2003年   2篇
  2002年   4篇
  2001年   3篇
  2000年   1篇
  1999年   4篇
  1998年   1篇
  1997年   2篇
  1994年   3篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
  1987年   4篇
  1986年   1篇
排序方式: 共有557条查询结果,搜索用时 15 毫秒
461.
Considering the joint channel estimation and data detection in time-varying orthogonal frequency division multiplexing (OFDM) and addressing transmission performance degradation induced by the severe inter-carrier interference (ICI) at very high speed, a new progressive iterative channel estimation scheme is proposed. To alleviate the error propagation of the inaccurate data due to ICI, the measurement subcarriers in the Kalman filter is designed to be extended from pilots subcarriers to all the subcarriers progressively through the iterations. Furthermore, in iteration process, the interference of the non-pilot data to the measurement subcarriers is considered to be part of noise in the modified Kalman filter, which improves the estimation accuracy. Simulation indicates that the proposed scheme improves the performance in fast time-varying situation.  相似文献   
462.
In this paper, we propose a new and novel modality fusion method designed for combining spatial and temporal fingerprint information to improve video copy detection performance. Most of the previously developed methods have been limited to use only pre-specified weights to combine spatial and temporal modality information. Hence, previous approaches may not adaptively adjust the significance of the temporal fingerprints that depends on the difference between the temporal variances of compared videos, leading to performance degradation in video copy detection. To overcome the aforementioned limitation, the proposed method has been devised to extract two types of fingerprint information: (1) spatial fingerprint that consists of the signs of DCT coefficients in local areas in a keyframe and (2) temporal fingerprint that computes the temporal variances in local areas in consecutive keyframes. In addition, the so-called temporal strength measurement technique is developed to quantitatively represent the amount of the temporal variances; it can be adaptively used to consider the significance of compared temporal fingerprints. The experimental results show that the proposed modality fusion method outperforms other state-of-the-arts fusion methods and popular spatio-temporal fingerprints in terms of video copy detection. Furthermore, the proposed method can save 39.0%, 25.1%, and 46.1% time complexities needed to perform video fingerprint matching without a significant loss of detection accuracy for our synthetic dataset, TRECVID 2009 CCD Task, and MUSCLE-VCD 2007, respectively. This result indicates that our proposed method can be readily incorporated into the real-life video copy detection systems.  相似文献   
463.
The current steganalysis frameworks involve a large number of techniques for feature extraction and classification. However, one of their common defects is treating all images as equal, thus ignoring the variability of statistical properties of different images, which motivates us to propose a novel steganalysis framework based on Gaussian mixture model (GMM) clustering in the study, targeting at heterogeneous images with different texture complexity. There are two main improvements compared to the current steganalysis frameworks. First, in the training stage, the GMM clustering algorithm is exploited to classify the training samples into limited categories automatically, and then design corresponding steganalyzers for each category; second, in the testing stage, the posterior probability of testing samples belonging to each category is calculated, and the samples are submitted to the steganalyzers corresponding to the maximum posterior probability for test. Extensive experimental results aiming at least significant bit matching (LSBM) steganography and two adaptive steganography algorithms show that the proposed framework outperforms the steganalysis system that is directly trained on a mixed dataset, and also indicate that our framework exhibits better detection performance compared to the representative framework for using image contents in most circumstances and similar detection performance in few cases.  相似文献   
464.
In this paper, we integrate the concept of directional local extremas and their magnitude based patterns for content based image indexing and retrieval. The standard ditectional local extrama pattern (DLEP) extracts the directional edge information based on local extrema in 0°, 45°, 90°, and 135° directions in an image. However, they are not considering the magnitudes of local extremas. The proposed method integrates these two concepts for better retrieval performance. The sign DLEP (SDLEP) operator is a generalized DLEP operator and magnitude DLEP (MDLEP) operator is calculated using magnitudes of local extremas. The performance of the proposed method is compared with DLEP, local binary patterns (LBPs), block-based LBP (BLK_LBP), center-symmetric local binary pattern (CS-LBP), local edge patterns for segmentation (LEPSEG) and local edge patterns for image retrieval (LEPINV) methods by conducting two experiments on benchmark databases, viz. Corel-5K and Corel-10K databases. The results after being investigated show a significant improvement in terms of their evaluation measures as compared to other existing methods on respective databases.  相似文献   
465.
A chaos-based color image encryption scheme using bijection is designed. The whole image is diffused by exclusive or (XOR) operation for random rounds, each color component is separated into blocks with the same size. A bijective function f: B  S between block set B and S-box set S, is built. The corresponding 8 × 8 S-box is dynamically generated by the Chen system with variable conditions. The ciphered image can be obtained after substituting each block with the paired S-box. Numerical simulation and security analysis demonstrate that the scheme is practical in image encryption.  相似文献   
466.
An image is often corrupted by noise in its acquisition and transmission by various kinds of noises. Image denoising using thresholding methods find appropriate values (threshold) which separates noise values to actual image values without affecting the significant features of the image. Wavelet transform represents image energy in compact form and representation helps in determining threshold between noisy features and important image feature. In this paper we have worked with denoising of salt–pepper and Gaussian noise. The work is organized in four steps as follows: (1) image is denoised by filtering method, (2) image is denoised by wavelet based techniques using thresholding, (3) hard thresholding and filtering method applied simultaneously on noisy image, (4) results of PSNR (peak signal to noise ratio) and MSE (mean square error) are calculated by comparing all cases.  相似文献   
467.
In this paper we discuss layered multicast (LM) of progressive source codes using network coding. LM is absolutely optimal if different sinks in the network are satisfied up to their max-flow. Since absolutely optimal intra-layer network strategies might not exist for general networks, we present conditions under which an absolutely optimal, intra-layer multicast strategy exists for a given network and how that strategy may be efficiently constructed. We also discuss the problem of designing optimal intra-layer multicast strategies for general directed networks.  相似文献   
468.
469.
This paper considers a cognitive radio network where a secondary user (SU) coexists with a primary user (PU). The interference outage constraint is applied to protect the primary transmission. The power allocation problem to jointly maximize the ergodic capacity and minimize the outage probability of the SU, subject to the average transmit power constraint and the interference outage constraint, is studied. Suppose that the perfect knowledge of the instantaneous channel state information (CSI) of the interference link between the SU transmitter and the PU receiver is available at the SU, the optimal power allocation strategy is then proposed. Additionally, to manage more practical situations, we further assume only the interference link channel distribution is known and derive the corresponding optimal power allocation strategy. Extensive simulation results are given to verify the effectiveness of the proposed strategies. It is shown that the proposed strategies achieve high ergodic capacity and low outage probability simultaneously, whereas optimizing the ergodic capacity (or outage probability) only leads to much higher outage probability (or lower ergodic capacity). It is also shown that the SU performance is not degraded due to partial knowledge of the interference link CSI if tight transmit power constraint is applied.  相似文献   
470.
This article inspects partially segmented circular monopole with elliptical slot for super wideband applications. Two significant characteristics of proposed antenna design are: (i) partially segmented circular monopole, notch loaded elliptical ground plane along with tapered microstrip line provides super wide bandwidth; (ii) elliptical slot in between the partially segmented circular monopole reduces the lower operating frequency (1.07 GHz–0.96 GHz), which in turn enhance the bandwidth dimension ratio (BDR). For verifying the simulated outcomes, antenna prototype is practically constructed and measured. The proposed antenna design attains frequency range from 0.96 GHz to 10.9 GHz (VSWR < 2) with bandwidth ratio of 11.35:1 and percentage bandwidth of 167.22%. Bandwidth dimension ratio of proposed radiator is 6975.22. Frequency as well as time domain analysis of proposed radiator approves its applicability for super wideband wireless applications.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号