首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   164篇
  免费   4篇
电工技术   4篇
综合类   1篇
化学工业   32篇
金属工艺   5篇
机械仪表   3篇
建筑科学   6篇
能源动力   12篇
轻工业   14篇
水利工程   2篇
无线电   18篇
一般工业技术   23篇
冶金工业   6篇
原子能技术   5篇
自动化技术   37篇
  2023年   1篇
  2022年   8篇
  2021年   9篇
  2020年   9篇
  2019年   8篇
  2018年   14篇
  2017年   7篇
  2016年   16篇
  2015年   7篇
  2014年   10篇
  2013年   15篇
  2012年   8篇
  2011年   8篇
  2010年   12篇
  2009年   5篇
  2008年   9篇
  2007年   7篇
  2006年   2篇
  2005年   1篇
  2004年   1篇
  2000年   4篇
  1999年   1篇
  1998年   4篇
  1994年   1篇
  1992年   1篇
排序方式: 共有168条查询结果,搜索用时 31 毫秒
1.
Real-time processing and compression of DNA microarray images.   总被引:1,自引:0,他引:1  
In this paper, we present a pipeline architecture specifically designed to process and compress DNA microarray images. Many of the pixilated image generation methods produce one row of the image at a time. This property is fully exploited by the proposed pipeline that takes in one row of the produced image at each clock pulse and performs the necessary image processing steps on it. This will remove the present need for sluggish software routines that are considered a major bottleneck in the microarray technology. Moreover, two different structures are proposed for compressing DNA microarray images. The proposed architecture is proved to be highly modular, scalable, and suited for a standard cell VLSI implementation.  相似文献   
2.
Silicon - In this study, a new magnetic ZrFe2O4@SiO2-TCPP nanocatalyst with high efficiency was used for the oxidation of cyclohexane to cyclohexanone (Ke) and cyclohexanol (Al). The mesoporous...  相似文献   
3.

Maintaining a fluid and safe traffic is a major challenge for human societies because of its social and economic impacts. Various technologies have considerably paved the way for the elimination of traffic problems and have been able to effectively detect drivers’ violations. However, the high volume of the real-time data collected from surveillance cameras and traffic sensors along with the data obtained from individuals have made the use of traditional methods ineffective. Therefore, using Hadoop for processing large-scale structured and unstructured data as well as multimedia data can be of great help. In this paper, the TVD-MRDL system based on the MapReduce techniques and deep learning was employed to discover effective solutions. The Distributed Deep Learning System was implemented to analyze traffic big data and to detect driver violations in Hadoop. The results indicated that more accurate monitoring automatically creates the power of deterrence and behavior change in drivers and it prevents drivers from committing unusual behaviors in society. So, if the offending driver is identified quickly after committing the violation and is punished with the appropriate punishment and dealt with decisively and without negligence, we will surely see a decrease in violations at the community level. Also, the efficiency of the TVD-MRDL performance increased by more than 75% as the number of data nodes increased.

  相似文献   
4.
In this work, the effect of various effective dimensionless numbers and moisture contents on initiation of instability in combustion of moisty organic dust is calculated. To have reliable model, effect of thermal radiation is taken into account. One- dimensional flame structure is divided into three zones: preheat zone, reaction zone and post-flame zone. To investigate pulsating characteristics of flame, governing equations are rewritten in dimensionless space-time ((, r/, ~) coordinates. By solving these newly achieved governing equations and combining them, which is completely discussed in body of article, a new expression is obtained. By solving this equation, it is possible to predict initiation of instability in organic dust flame. According to the obtained results by increasing Lewis number, threshold of instability happens sooner. On the other hand, pulsating is postponed by increasing Damk6hler number, pyrolysis temperature or moisture content. Also, by considering thermal radiation effect, burning velocity predicted by our model is closer to experimental results.  相似文献   
5.
An adaptive LSB matching steganography based on octonary complexity measure   总被引:1,自引:0,他引:1  
Adaptive steganography methods tend to increase the security against attacks. Most of adaptive methods use LSB flipping (LSB-F) for embedding part of their algorithms. LSB-F is very much vulnerable against simple steganalysis methods but it allows the adaptive algorithms to be extractable at the receiver side. Use of LSB matching (LSB-M) could increase the security but extraction of data at the receiver is difficult or, in occasions, impossible. There are numerous attacks against LSB-M. In this paper we are proposing an adaptive algorithm which, unlike most adaptive methods, uses LSB-M as its embedding method. The proposed method uses a complexity measure based on a local neighborhood analysis for determination of secure locations of an image. Comparable adaptive methods that use LSB-M suffer from possible changes in the complexity of pixels when embedding is performed. The proposed algorithm is such that when a pixel is categorized as complex at the transmitter and is embedded the receiver will identify it as complex too, and data is correctly retrieved. Better performance of the algorithm is shown by obtaining higher PSNR values for the embedded images with respect to comparable adaptive algorithms. The security of the algorithm against numerous attacks is shown to be higher than LSB-M. Also, it is compared with a recent adaptive method and is proved to be advantageous for most embedding rates.  相似文献   
6.
Wireless Personal Communications - In recent years, Smart Cities and Smart Homes have been studied as an important field of research. The design and construction of smart homes have flourished so...  相似文献   
7.
Fractal coding algorithm has many applications including image compression. In this paper a classification scheme is presented which allows the hardware implementation of the fractal coder. High speed and low power consumption are the goal of the suggested design. The introduced method is based on binary classification of domain and range blocks. The proposed technique increases the processing speed and reduces the power consumption while the qualities of the reconstructed images are comparable with those of the available software techniques. In order to show the functionality of the proposed algorithm, the architecture was implemented on a FPGA chip. The application of the proposed hardware is shown in image compression. The resulted compression ratios, PSNR error, gate count, compression speed and power consumption are compared with the existing designs. Other applications of the proposed design are feasible in certain fields such as mass–volume database coding and also in video coder’s block matching schemes.  相似文献   
8.
Visual surveillance of a designated air space can be achieved by a randomly distributed camera sensor network spread over a large area. The location and field of view of each battery operated sensor, after a calibration phase, will be known to a central processing node. To increase the lifetime of the network, the density of distributed sensors could be such that a subset of sensors can cover the required air space. As a sensor dies another sensor should be selected to compensate for the dead one and reestablish the complete coverage. This process should be continued until complete coverage is not achievable by the existing sensors. Thereafter, a graceful degradation of the coverage is desirable.The goal is to elongate the lifetime of the network while maintaining a maximum possible coverage of the designated air space. Since the selection of a subset of sensors for complete coverage of the target area is an NP-complete problem, we present a number of heuristics for this case. The proposed methods are categorized in two groups. In one category, the sensors are prioritized based on their visual and communicative properties and the selection is performed according to the prioritizing function. In the other group, we propose traditional evolutionary and swarm intelligence algorithms. The performance of the proposed methods is evaluated through extensive simulations.  相似文献   
9.
A parametric analytical study is carried out to scrutinize the mechanism of fluid flow, heat transfer and entropy generation in a low-speed rarefied gaseous flow confined between a shaft and its concentric housing, i.e., the cylindrical Couette flow. In the first law analysis, closed form solutions for the radial temperature profiles are obtained by incorporating the calculated velocity distribution into the energy equation. The derivations for three thermal cases, which are founded on imposing different thermal conditions, namely, the Uniform Heat Flux (UHF) and the Constant Wall Temperature (CWT) boundary conditions, are presented. In the second law analysis, the contributions of thermal diffusion and fluid friction irreversibility to the total entropy generation in the micro domain are illustrated, and the relevant expressions for the Bejan number and the entropy generation number as well as the average entropy generation rate are derived. Finally, the variations of major variables with influential parameters such as the Knudsen number, the Brinkman number and rotation mode are investigated to elucidate the associated effects of rarefaction phenomenon, viscous dissipation and geometric condition on the characteristics of the flow.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号