首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   59篇
  免费   0篇
化学工业   2篇
金属工艺   1篇
无线电   29篇
一般工业技术   1篇
冶金工业   19篇
自动化技术   7篇
  2016年   1篇
  2013年   2篇
  2012年   4篇
  2009年   2篇
  2008年   2篇
  2007年   3篇
  2006年   5篇
  2005年   2篇
  2004年   5篇
  2003年   5篇
  2002年   2篇
  2001年   1篇
  2000年   2篇
  1999年   2篇
  1998年   4篇
  1997年   3篇
  1996年   2篇
  1995年   1篇
  1994年   3篇
  1993年   3篇
  1990年   1篇
  1989年   1篇
  1980年   1篇
  1977年   1篇
  1958年   1篇
排序方式: 共有59条查询结果,搜索用时 15 毫秒
1.
We present an adaptive video transmission scheme for use in a code-division multiple-access network, which incorporates efficient bandwidth allocation among source coding, channel coding, and spreading under a fixed total bandwidth constraint. We derive the statistics of the received signal, as well as a theoretical bound on the packet drop rate at the receiver. Based on these results, a bandwidth allocation algorithm is proposed at the packet level, which incorporates the effects of both the changing channel conditions and the dynamics of the source content. Detailed simulations are done to evaluate the performance of the system, and the sensitivity of the system to estimation error is presented.  相似文献   
2.
Using vector quantization for image processing   总被引:1,自引:0,他引:1  
A review is presented of vector quantization, the mapping of pixel intensity vectors into binary vectors indexing a limited number of possible reproductions, which is a popular image compression algorithm. Compression has traditionally been done with little regard for image processing operations that may precede or follow the compression step. Recent work has used vector quantization both to simplify image processing tasks, such as enhancement classification, halftoning, and edge detection, and to reduce the computational complexity by performing the tasks simultaneously with the compression. The fundamental ideas of vector quantization are explained, and vector quantization algorithms that perform image processing are surveyed  相似文献   
3.
Many studies conducted in a laboratory or university setting are limited by funding, personnel, space, and time constraints. In the present study, we introduce a method of data collection using a mobile application that circumvents these typical experiment administration issues. Using the application, we examined cross-sectional age differences in cognitive function. We obtained data from more than 15,000 participants and replicated specific patterns of age-related differences in cognition. Using a subset of these participants, we also examined the processing speed account of age-related cognitive differences, and the association of exercise and leisure activity with cognitive function across the lifespan. We discuss the relative advantages and disadvantages of data collection with a mobile application, and provide recommendations for the use of this method in research.  相似文献   
4.
Mean squared error (MSE) and peak signal-to-noise-ratio (PSNR) are the most common methods for measuring the quality of compressed images, despite the fact that their inadequacies have long been recognized. Quality for compressed still images is sometimes evaluated using human observers who provide subjective ratings of the images. Both SNR and subjective quality judgments, however, may be inappropriate for evaluating progressive compression methods which are to be used for fast browsing applications. In this paper, we present a novel experimental and statistical framework for comparing progressive coders. The comparisons use response time studies in which human observers view a series of progressive transmissions, and respond to questions about the images as they become recognizable. We describe the framework and use it to compare several well-known algorithms (JPEG, set partitioning in hierarchical trees (SPIHT), and embedded zerotree wavelet (EZW)), and to show that a multiresolution decoding is recognized faster than a single large-scale decoding. Our experiments also show that, for the particular algorithms used, at the same PSNR, global blurriness slows down recognition more than do localized "splotch" artifacts.  相似文献   
5.
This paper presents a method for automatic tracking of the head, tail, and entire body movement of the nematode Caenorhabditis elegans (C. elegans) using computer vision and digital image analysis techniques. The characteristics of the worm's movement, posture and texture information were extracted from a 5-min image sequence. A Random Forests classifier was then used to identify the worm type, and the features that best describe the data. A total of 1597 individual worm video sequences, representing wild type and 15 different mutant types, were analyzed. The average correct classification ratio, measured by out-of-bag (OOB) error rate, was 90.9%. The features that have most discrimination ability were also studied. The algorithm developed will be an essential part of a completely automated C. elegans tracking and identification system.  相似文献   
6.
Universal lossless compression via multilevel pattern matching   总被引:2,自引:0,他引:2  
A universal lossless data compression code called the multilevel pattern matching code (MPM code) is introduced. In processing a finite-alphabet data string of length n, the MPM code operates at O(log log n) levels sequentially. At each level, the MPM code detects matching patterns in the input data string (substrings of the data appearing in two or more nonoverlapping positions). The matching patterns detected at each level are of a fixed length which decreases by a constant factor from level to level, until this fixed length becomes one at the final level. The MPM code represents information about the matching patterns at each level as a string of tokens, with each token string encoded by an arithmetic encoder. From the concatenated encoded token strings, the decoder can reconstruct the data string via several rounds of parallel substitutions. A O(1/log n) maximal redundancy/sample upper bound is established for the MPM code with respect to any class of finite state sources of uniformly bounded complexity. We also show that the MPM code is of linear complexity in terms of time and space requirements. The results of some MPM code compression experiments are reported  相似文献   
7.
In this paper, we study the weight enumerator and the numerical performance of a class of binary linear block codes formed from a family of rate-compatible punctured convolutional (RCPC) codes. Also, we present useful numerical results for a well-known family of RCPC codes.  相似文献   
8.
A 10-center cooperative clinical study with a new formulation of epirubicin hydrochloride injectable solution (Epirubicin-RTU) was conducted in patients with breast cancer. One course of treatment consisted of one intravenous administration of Epirubicin-RTU at the dose of 60 mg/m2 followed by a 3-week drug-free interval and concomitant daily administration of oral cyclophosphamide at 100 mg/day during the period between Days 1 through 14. At least, two courses of treatment were given. Among 20 registered cases, all 20 cases were eligible and 16 cases completed the whole course of the study. In 16 completers, PR was observed in 5 cases, indicating the efficacy rate of 31.3% (5/16).. No local irritation was observed at the injection sites. Adverse reactions frequently observed were leukopenia, neutropenia, anorexia, alopecia, and nausea/vomiting, which were all reversible and tolerable. From the above results, Adverse reactions both locally and systemically were tolerable. Intravenous administration of Epirubicin-RTU was considered to be useful for the treatment of breast cancer.  相似文献   
9.
In this paper, we explore end-to-end loss differentiation algorithms (LDAs) for use with congestion-sensitive video transport protocols for networks with either backbone or last-hop wireless links. As our basic video transport protocol, we use UDP in conjunction with a congestion control mechanism extended with an LDA. For congestion control, we use the TCP-Friendly Rate Control (TFRC) algorithm. We extend TFRC to use an LDA when a connection uses at least one wireless link in the path between the sender and receiver. We then evaluate various LDAs under different wireless network topologies, competing traffic, and fairness scenarios to determine their effectiveness. In addition to evaluating LDAs derived from previous work, we also propose and evaluate a new LDA, ZigZag, and a hybrid LDA, ZBS, that selects among base LDAs depending upon observed network conditions. We evaluate these LDAs via simulation, and find that no single base algorithm performs well across all topologies and competition. However, the hybrid algorithm performs well across topologies and competition, and in some cases exceeds the performance of the best base LDA for a given scenario. All of the LDAs are reasonably fair when competing with TCP, and their fairness among flows using the same LDA depends on the network topology. In general, ZigZag and the hybrid algorithm are the fairest among all LDAs.  相似文献   
10.
The interleukin (IL)-2 receptor gamma chain has recently been shown to be a component of the IL-7 and IL-4 receptors. Using a transient transfection assay and the trans-activation of reporter gene constructs which are under the control of cytokine-responsive promoter elements, we have studied signal transduction through the IL-7 receptor (IL-7R). The reporter gene expression was not stimulated by receptors that contained the cytoplasmic domain of the IL-7R, either as intact IL-7R or as part of a chimeric receptor. However, co-expression of the IL-7R with the IL-2 receptor gamma chain was able to stimulate gene activation. For maximal stimulation the intact cytoplasmic domains of each chain was required.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号