首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   31篇
  免费   4篇
化学工业   6篇
机械仪表   3篇
建筑科学   1篇
能源动力   2篇
轻工业   6篇
无线电   1篇
一般工业技术   1篇
自动化技术   15篇
  2022年   4篇
  2021年   5篇
  2020年   5篇
  2019年   4篇
  2018年   1篇
  2017年   4篇
  2014年   1篇
  2013年   3篇
  2012年   2篇
  2011年   2篇
  2010年   2篇
  2008年   2篇
排序方式: 共有35条查询结果,搜索用时 15 毫秒
1.
Neural Computing and Applications - Feature selection is frequently used as a preprocessing step to data mining and is attracting growing attention due to the increasing amounts of data emerging...  相似文献   
2.
3.
Software and Systems Modeling - The field of business process modeling has been beset by inter-model consistency problems which are mainly due to the existence of multiple variants of the same...  相似文献   
4.
5.
In this paper, a recursive hierarchical parametric estimation (RHPE) algorithm is proposed for stochastic nonlinear systems which can be described by Wiener‐Hammerstein (W‐H) mathematical models. The formulation of parameters estimation problem is based on the prediction error approach and the gradient techniques. The convergence analysis of the developed RHPE algorithm is derived using stochastic gradient‐based theory. Wiener‐Hammerstein hydraulic process is treated to prove the efficiency of the proposed approach.  相似文献   
6.
7.
Despite the sound theoretical, methodological, and experimental background inherited from 2D video, the stereoscopic video watermarking imposed itself as an open research topic. Paving the way towards practical deployment of such copyright protection mechanisms, the present paper is structured as a comparative study on the main classes of 2D watermarking methods (spread spectrum, side information, hybrid) and on their related optimal stereoscopic insertion domains (view or disparity based). The performances are evaluated in terms of transparency, robustness, and computational cost. First, the watermarked content transparency is assessed by both subjective protocols (according to ITU-R BT 500-12 and BT 1438 recommendations) and objective quality measures (five metrics based on differences between pixels and on correlation). Secondly, the robustness is objectively expressed by means of the watermark detection bit error rate against several classes of attacks, such as linear and nonlinear filtering, compression, and geometric transformations. Thirdly, the computational cost is estimated for each processing step involved in the watermarking chain. All the quantitative results are obtained out of processing two corpora of stereoscopic visual content: (1) the 3DLive corpus, summing up about 2 h of 3D TV content captured by French professionals, and (2) the MPEG 3D video reference corpus, composed of 17 min provided by both academic communities and industrials. It was thus established that for a fixed size of the mark, a hybrid watermark insertion performed into a new disparity map representation is the only solution jointly featuring imperceptibility (according to the subjective tests), robustness against the three classes of attacks, and nonprohibitive computational cost.  相似文献   
8.
9.
10.
In this work, countersinking which is the manufacturing operation used to enlarge the side of an existing hole is studied. A finite element model is built in order to get the normalized dimensions of the countersink. The obtained countersink allows to the head of screws or rivets to sit flush with the surface with the surrounding material. A case study is detailed in order to show the effect of the pertinent parameters. The procedure is summarized by the construction of a single diagram in which the coupled effects of the different parameters are shown. A fully automatic procedure can be built in the light of this analysis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号