全文获取类型
收费全文 | 520篇 |
免费 | 25篇 |
国内免费 | 12篇 |
专业分类
电工技术 | 22篇 |
综合类 | 10篇 |
化学工业 | 52篇 |
金属工艺 | 5篇 |
机械仪表 | 18篇 |
建筑科学 | 1篇 |
能源动力 | 14篇 |
轻工业 | 4篇 |
石油天然气 | 4篇 |
无线电 | 143篇 |
一般工业技术 | 30篇 |
冶金工业 | 3篇 |
原子能技术 | 1篇 |
自动化技术 | 250篇 |
出版年
2024年 | 1篇 |
2023年 | 23篇 |
2022年 | 10篇 |
2021年 | 25篇 |
2020年 | 24篇 |
2019年 | 17篇 |
2018年 | 23篇 |
2017年 | 69篇 |
2016年 | 55篇 |
2015年 | 29篇 |
2014年 | 96篇 |
2013年 | 15篇 |
2012年 | 23篇 |
2011年 | 19篇 |
2010年 | 12篇 |
2009年 | 24篇 |
2008年 | 15篇 |
2007年 | 21篇 |
2006年 | 10篇 |
2005年 | 7篇 |
2004年 | 7篇 |
2003年 | 2篇 |
2002年 | 4篇 |
2001年 | 3篇 |
2000年 | 1篇 |
1999年 | 4篇 |
1998年 | 1篇 |
1997年 | 2篇 |
1994年 | 3篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 4篇 |
1986年 | 1篇 |
排序方式: 共有557条查询结果,搜索用时 15 毫秒
461.
Considering the joint channel estimation and data detection in time-varying orthogonal frequency division multiplexing (OFDM) and addressing transmission performance degradation induced by the severe inter-carrier interference (ICI) at very high speed, a new progressive iterative channel estimation scheme is proposed. To alleviate the error propagation of the inaccurate data due to ICI, the measurement subcarriers in the Kalman filter is designed to be extended from pilots subcarriers to all the subcarriers progressively through the iterations. Furthermore, in iteration process, the interference of the non-pilot data to the measurement subcarriers is considered to be part of noise in the modified Kalman filter, which improves the estimation accuracy. Simulation indicates that the proposed scheme improves the performance in fast time-varying situation. 相似文献
462.
《Signal Processing: Image Communication》2014,29(7):788-806
In this paper, we propose a new and novel modality fusion method designed for combining spatial and temporal fingerprint information to improve video copy detection performance. Most of the previously developed methods have been limited to use only pre-specified weights to combine spatial and temporal modality information. Hence, previous approaches may not adaptively adjust the significance of the temporal fingerprints that depends on the difference between the temporal variances of compared videos, leading to performance degradation in video copy detection. To overcome the aforementioned limitation, the proposed method has been devised to extract two types of fingerprint information: (1) spatial fingerprint that consists of the signs of DCT coefficients in local areas in a keyframe and (2) temporal fingerprint that computes the temporal variances in local areas in consecutive keyframes. In addition, the so-called temporal strength measurement technique is developed to quantitatively represent the amount of the temporal variances; it can be adaptively used to consider the significance of compared temporal fingerprints. The experimental results show that the proposed modality fusion method outperforms other state-of-the-arts fusion methods and popular spatio-temporal fingerprints in terms of video copy detection. Furthermore, the proposed method can save 39.0%, 25.1%, and 46.1% time complexities needed to perform video fingerprint matching without a significant loss of detection accuracy for our synthetic dataset, TRECVID 2009 CCD Task, and MUSCLE-VCD 2007, respectively. This result indicates that our proposed method can be readily incorporated into the real-life video copy detection systems. 相似文献
463.
《Signal Processing: Image Communication》2014,29(3):385-399
The current steganalysis frameworks involve a large number of techniques for feature extraction and classification. However, one of their common defects is treating all images as equal, thus ignoring the variability of statistical properties of different images, which motivates us to propose a novel steganalysis framework based on Gaussian mixture model (GMM) clustering in the study, targeting at heterogeneous images with different texture complexity. There are two main improvements compared to the current steganalysis frameworks. First, in the training stage, the GMM clustering algorithm is exploited to classify the training samples into limited categories automatically, and then design corresponding steganalyzers for each category; second, in the testing stage, the posterior probability of testing samples belonging to each category is calculated, and the samples are submitted to the steganalyzers corresponding to the maximum posterior probability for test. Extensive experimental results aiming at least significant bit matching (LSBM) steganography and two adaptive steganography algorithms show that the proposed framework outperforms the steganalysis system that is directly trained on a mixed dataset, and also indicate that our framework exhibits better detection performance compared to the representative framework for using image contents in most circumstances and similar detection performance in few cases. 相似文献
464.
《AEUE-International Journal of Electronics and Communications》2014,68(7):637-643
In this paper, we integrate the concept of directional local extremas and their magnitude based patterns for content based image indexing and retrieval. The standard ditectional local extrama pattern (DLEP) extracts the directional edge information based on local extrema in 0°, 45°, 90°, and 135° directions in an image. However, they are not considering the magnitudes of local extremas. The proposed method integrates these two concepts for better retrieval performance. The sign DLEP (SDLEP) operator is a generalized DLEP operator and magnitude DLEP (MDLEP) operator is calculated using magnitudes of local extremas. The performance of the proposed method is compared with DLEP, local binary patterns (LBPs), block-based LBP (BLK_LBP), center-symmetric local binary pattern (CS-LBP), local edge patterns for segmentation (LEPSEG) and local edge patterns for image retrieval (LEPINV) methods by conducting two experiments on benchmark databases, viz. Corel-5K and Corel-10K databases. The results after being investigated show a significant improvement in terms of their evaluation measures as compared to other existing methods on respective databases. 相似文献
465.
《AEUE-International Journal of Electronics and Communications》2014,68(7):676-686
A chaos-based color image encryption scheme using bijection is designed. The whole image is diffused by exclusive or (XOR) operation for random rounds, each color component is separated into blocks with the same size. A bijective function f: B → S between block set B and S-box set S, is built. The corresponding 8 × 8 S-box is dynamically generated by the Chen system with variable conditions. The ciphered image can be obtained after substituting each block with the paired S-box. Numerical simulation and security analysis demonstrate that the scheme is practical in image encryption. 相似文献
466.
《AEUE-International Journal of Electronics and Communications》2014,68(8):699-705
An image is often corrupted by noise in its acquisition and transmission by various kinds of noises. Image denoising using thresholding methods find appropriate values (threshold) which separates noise values to actual image values without affecting the significant features of the image. Wavelet transform represents image energy in compact form and representation helps in determining threshold between noisy features and important image feature. In this paper we have worked with denoising of salt–pepper and Gaussian noise. The work is organized in four steps as follows: (1) image is denoised by filtering method, (2) image is denoised by wavelet based techniques using thresholding, (3) hard thresholding and filtering method applied simultaneously on noisy image, (4) results of PSNR (peak signal to noise ratio) and MSE (mean square error) are calculated by comparing all cases. 相似文献
467.
《AEUE-International Journal of Electronics and Communications》2014,68(7):611-615
In this paper we discuss layered multicast (LM) of progressive source codes using network coding. LM is absolutely optimal if different sinks in the network are satisfied up to their max-flow. Since absolutely optimal intra-layer network strategies might not exist for general networks, we present conditions under which an absolutely optimal, intra-layer multicast strategy exists for a given network and how that strategy may be efficiently constructed. We also discuss the problem of designing optimal intra-layer multicast strategies for general directed networks. 相似文献
468.
469.
《AEUE-International Journal of Electronics and Communications》2014,68(8):747-755
This paper considers a cognitive radio network where a secondary user (SU) coexists with a primary user (PU). The interference outage constraint is applied to protect the primary transmission. The power allocation problem to jointly maximize the ergodic capacity and minimize the outage probability of the SU, subject to the average transmit power constraint and the interference outage constraint, is studied. Suppose that the perfect knowledge of the instantaneous channel state information (CSI) of the interference link between the SU transmitter and the PU receiver is available at the SU, the optimal power allocation strategy is then proposed. Additionally, to manage more practical situations, we further assume only the interference link channel distribution is known and derive the corresponding optimal power allocation strategy. Extensive simulation results are given to verify the effectiveness of the proposed strategies. It is shown that the proposed strategies achieve high ergodic capacity and low outage probability simultaneously, whereas optimizing the ergodic capacity (or outage probability) only leads to much higher outage probability (or lower ergodic capacity). It is also shown that the SU performance is not degraded due to partial knowledge of the interference link CSI if tight transmit power constraint is applied. 相似文献
470.
This article inspects partially segmented circular monopole with elliptical slot for super wideband applications. Two significant characteristics of proposed antenna design are: (i) partially segmented circular monopole, notch loaded elliptical ground plane along with tapered microstrip line provides super wide bandwidth; (ii) elliptical slot in between the partially segmented circular monopole reduces the lower operating frequency (1.07 GHz–0.96 GHz), which in turn enhance the bandwidth dimension ratio (BDR). For verifying the simulated outcomes, antenna prototype is practically constructed and measured. The proposed antenna design attains frequency range from 0.96 GHz to 10.9 GHz (VSWR < 2) with bandwidth ratio of 11.35:1 and percentage bandwidth of 167.22%. Bandwidth dimension ratio of proposed radiator is 6975.22. Frequency as well as time domain analysis of proposed radiator approves its applicability for super wideband wireless applications. 相似文献