收费全文 | 295篇 |
免费 | 24篇 |
国内免费 | 4篇 |
电工技术 | 1篇 |
化学工业 | 72篇 |
金属工艺 | 4篇 |
机械仪表 | 14篇 |
建筑科学 | 6篇 |
能源动力 | 10篇 |
轻工业 | 55篇 |
水利工程 | 4篇 |
无线电 | 26篇 |
一般工业技术 | 77篇 |
冶金工业 | 14篇 |
原子能技术 | 4篇 |
自动化技术 | 36篇 |
2024年 | 1篇 |
2023年 | 6篇 |
2022年 | 35篇 |
2021年 | 33篇 |
2020年 | 26篇 |
2019年 | 26篇 |
2018年 | 26篇 |
2017年 | 18篇 |
2016年 | 16篇 |
2015年 | 11篇 |
2014年 | 17篇 |
2013年 | 26篇 |
2012年 | 7篇 |
2011年 | 9篇 |
2010年 | 8篇 |
2009年 | 4篇 |
2008年 | 8篇 |
2007年 | 6篇 |
2006年 | 2篇 |
2005年 | 4篇 |
2004年 | 2篇 |
2002年 | 2篇 |
2001年 | 1篇 |
1999年 | 3篇 |
1998年 | 2篇 |
1997年 | 4篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1993年 | 3篇 |
1990年 | 1篇 |
1988年 | 1篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1977年 | 2篇 |
1976年 | 2篇 |
1975年 | 2篇 |
As per the most recent literature, Orthogonal Frequency Division Multiplexing (OFDM), a multi access technique, is considered most suitable for the 3G, 4G and 5G techniques in high speed wireless communication. What made OFDM most popular is its ability to deliver high bandwidth efficiency and superior data rate. Besides it, high value of peak to average power ratio (PAPR) and Inter Carrier Interference (ICI) are the challenges to tackle down via appropriate mitigation scheme. As a research contribution in the present work, an improved self-cancellation (SC) technique is designed and simulated through Simulink to mitigate the effect of ICI. This novel proposed technique (Improved SC) is designed over discrete wavelet transform (DWT) based OFDM and compared with conventional SC scheme over different channel conditions i.e. AWGN and Rayleigh fading environments. It is found that proposed DWT-OFDM with Improved SC scheme outperforms conventional SC technique significantly, under both AWGN and Rayleigh channel conditions. Further, in order to justify the novelty in the research contribution, a Split-DWT based Simulink model for Improved SC scheme is investigated to analyse the BER performance. This Split-DWT based Simulink model presented here foretells the future research potential in wavelet hybridization of OFDM to side-line ICI effects more efficiently.
相似文献The Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by offering them the ability to connect to the Internet and communicate. Integrating the social component into IoT gave rise to the Social Internet of Things (SIoT), which has helped overcome various issues such as heterogeneity and navigability. In this kind of environment, participants compete to offer a variety of attractive services. Nevertheless, some of them resort to malicious behaviour to spread poor-quality services. They perform so-called Trust-Attacks and break the basic functionality of the system. Trust management mechanisms aim to counter these attacks and provide the user with an estimate of the trust degree they can place in other users, thus ensuring reliable and qualified exchanges and interactions. Several works in literature have interfered with this problem and have proposed different Trust-Models. The majority tried to adapt and reapply Trust-Models designed for common social networks or peer-to-peer ones. That is, despite the similarities between these types of networks, SIoT ones present specific peculiarities. In SIoT, users, devices and services are collaborating. Devices entities can present constrained computing and storage capabilities, and their number can reach some millions. The resulting network is complex, constrained and highly dynamic, and the attacks-implications can be more significant. In this paper, we propose DSL-STM a new dynamic and scalable multi-level Trust-Model, specifically designed for SIoT environments. We propose multidimensional metrics to describe and SIoT entities behaviours. The latter are aggregated via a Machine Learning-based method, allowing classifying users, detecting attack types and countering them. Finally, a hybrid propagation method is suggested to spread trust values in the network, while minimizing resource consumption and preserving scalability and dynamism. Experimentation made on various simulated scenarios allows us to prove the resilience and performance of DSL-STM.
相似文献Background removal of an identity (ID) picture consists in separating the foreground (face, body, hair and clothes) from the background of the image. It is a necessary groundwork for all modern identity documents that also has many benefits for improving ID security. State of the art image processing techniques encountered several segmentation issues and offer only partial solutions. It is due to the presence of erratic components like hairs, poor contrast, luminosity variation, shadow, color overlap between clothes and background. In this paper, a knowledge infused approach is proposed that hybridizes smart image processing tasks and prior knowledge. The research is based on a divide and conquer strategy aiming at simulating the sequential attention of human when performing a manual segmentation. Knowledge is infused by considering the spatial relation between anatomic elements of the ID image (face feature, forehead, body and hair) as well as their “signal properties”. The process consists in first determining a convex hull around the person’s body including all the foreground while keeping very close to the contour between the background and the foreground. Then, a body map generated from biometric analysis associated to an automatic grab cut process is applied to reach a finer segmentation. Finally, a heuristic-based post-processing step consisting in correcting potential hair and fine boundary issues leads to the final segmentation. Experimental results show that the newly proposed architecture achieves better performances than tested current state-of-the-art methodologies including active contours, generalist popular deep learning techniques, and also two other ones considered as the smartest for portrait segmentation. This new technology has been adopted by an international company as its industrial ID foreground solution.
相似文献![点击此处可从《国际能源研究杂志》网站下载免费的PDF全文](/ch/ext_images/free.gif)