全文获取类型
收费全文 | 132篇 |
免费 | 11篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 1篇 |
综合类 | 8篇 |
化学工业 | 6篇 |
金属工艺 | 4篇 |
机械仪表 | 5篇 |
建筑科学 | 6篇 |
矿业工程 | 5篇 |
能源动力 | 1篇 |
轻工业 | 13篇 |
水利工程 | 1篇 |
石油天然气 | 6篇 |
无线电 | 53篇 |
一般工业技术 | 1篇 |
冶金工业 | 8篇 |
原子能技术 | 2篇 |
自动化技术 | 28篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 5篇 |
2021年 | 3篇 |
2020年 | 2篇 |
2019年 | 3篇 |
2018年 | 1篇 |
2017年 | 1篇 |
2016年 | 1篇 |
2015年 | 1篇 |
2014年 | 5篇 |
2013年 | 5篇 |
2012年 | 5篇 |
2011年 | 10篇 |
2010年 | 9篇 |
2009年 | 9篇 |
2008年 | 6篇 |
2007年 | 10篇 |
2006年 | 6篇 |
2005年 | 5篇 |
2004年 | 3篇 |
2003年 | 8篇 |
2002年 | 7篇 |
2001年 | 11篇 |
2000年 | 6篇 |
1999年 | 5篇 |
1998年 | 1篇 |
1997年 | 3篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1993年 | 1篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1988年 | 3篇 |
排序方式: 共有148条查询结果,搜索用时 15 毫秒
1.
青岛广播电台交通台24小时连续播出,调频须在两地轮换发射每天需要倒机。为了安全优质播出,设计推出了时间精度高、带有反馈功能的闭环倒机控制系统,使两地自动倒机过程安全可靠。 相似文献
2.
Xianfu Lei Pingzhi Fan 《Communications Letters, IEEE》2008,12(10):720-721
We point out that a simpler expression could be derived for the outage probability considered by Chalise and Vandendorpe (2008). As a result, the computation of confluent hypergeometric function of two variables is not needed and the required computational effort is significantly reduced. 相似文献
3.
Shi-Jinn Horng Didi Rosiyadi Pingzhi Fan Xian Wang Muhammad Khurram Khan 《Multimedia Tools and Applications》2014,72(3):3085-3103
This paper proposes an adaptive watermarking scheme for e-government document images. The adaptive scheme combines the discrete cosine transform (DCT) and the singular value decomposition (SVD) using luminance masking. As a core of masking model in the human visual system (HVS), luminance masking is implemented to improve noise sensitivity. Genetic algorithm (GA), subsequently, is employed for the optimization of the scaling factor of the masking. Involving a number of steps, the scheme proposed through this study begins by calculating the mask of the host image using luminance masking. It is then continued by transforming the mask on each area into all frequencies domain. The watermark image, following this, is embedded by modifying the singular values of DCT-transformed host image with singular values of mask coefficient of host image and the control parameter of DCT-transformed watermark image using Genetic Algorithm (GA). The use of both the singular values and the control parameter respectively, in this case, is not only to improve the sensitivity of the watermark performance but also to avoid the false positive problem. The watermark image, afterwards, is extracted from the distorted images. The experiment results show the improved adaptive performance of the proposed scheme is in resistant to several types of attacks in comparison with the previous schemes; the adaptive performance refers to the adaptive parameter of the luminance masking functioned to improve the performance or robustness of an image from any attacks. 相似文献
4.
白鹤滩水电站区域构造地应力高,玄武岩坚硬性脆、隐微裂隙发育,地下厂房开挖过程顶拱浅层应力型开裂和深层破裂特征明显,传统的声波、钻孔电视测试和变形监测等方法难以精确获取岩体微破裂裂隙分布特征及高应力破裂发展特征信息。采用高精度超声波成像综合测试系统新方法,对厂房顶拱应力破裂破坏显著区域进行了多次重复测试。测试成果揭示:① 厂房顶拱上方岩体赋存的裂隙面倾角以陡倾角为主,优势倾角范围为45.98°~52.06°;裂隙面的倾向为NWW向,优势倾向范围为276.36°~292.01°,裂隙面倾角和倾向随深度变化不明显。② 顶拱浅层围岩破裂裂纹集中区一般在3.50~4.25 m的深度范围内,围岩深部诱发破裂裂纹区主要分布在9.68~10.11,16.12~16.32,21.45~21.77 m范围。③ 局部岩体受顶拱应力场不断调整演化作用,出现岩体破裂随时间加剧的现象。该成果高精度地辨识了玄武岩不同深度微破裂裂隙面分布特征、深度范围和应力破裂发展特点,对研究高应力硬脆玄武岩力学特性和响应机理提供了坚实基础资料,为工程开挖施工和动态支护设计发挥了重要支撑作用。 相似文献
5.
Ling-Yuan Hsu Shi-Jinn Horng Pingzhi Fan Muhammad Khurram Khan Yuh-Rau Wang Ray-Shine Run Jui-Lin Lai Rong-Jian Chen 《Expert systems with applications》2011,38(5):5525-5531
In this paper, we proposed a modified turbulent particle swarm optimization (named MTPSO) model for solving planar graph coloring problem based on particle swarm optimization. The proposed model is consisting of the walking one strategy, assessment strategy and turbulent strategy. The proposed MTPSO model can solve the planar graph coloring problem using four-colors more efficiently and accurately. Compared to the results shown in Cui et al. (2008), not only the experimental results of the proposed model can get smaller average iterations but can get higher correction coloring rate when the number of nodes is greater than 30. 相似文献
6.
Shih-Ying LinShi-Jinn Horng Tzong-Wann KaoChin-Shyurng Fahn Pingzhi FanYuan-Hsin Chen Muhammad Khurram KhanAnu Bourgeois Takao Terano 《Image and vision computing》2011,29(4):272-285
Traditionally, the block-based medial axis transform (BB-MAT) and the chessboard distance transform (CDT) were usually viewed as two completely different image computation problems, especially for three dimensional (3D) space. In fact, there exist some equivalent properties between them. The relationship between both of them is first derived and proved in this paper. One of the significant properties is that CDT for 3D binary image V is equal to BB-MAT for image V' where it denotes the inverse image of V. In a parallel algorithm, a cost is defined as the product of the time complexity and the number of processors used. The main contribution of this work is to reduce the costs of 3D BB-MAT and 3D CDT problems proposed by Wang [65]. Based on the reverse-dominance technique which is redefined from dominance concept, we achieve the computation of the 3D CDT problem by implementing the 3D BB-MAT algorithm first. For a 3D binary image of size N3, our parallel algorithm can be run in O(logN) time using N3 processors on the concurrent read exclusive write (CREW) parallel random access machine (PRAM) model to solve both 3D BB-MAT and 3D CDT problems, respectively. The presented results for the cost are reduced in comparison with those of Wang's. To the best of our knowledge, this work is the lowest costs for the 3D BB-MAT and 3D CDT algorithms known. In parallel algorithms, the running time can be divided into computation time and communication time. The experimental results of the running, communication and computation times for the different problem sizes are implemented in an HP Superdome with SMP/CC-NUMA (symmetric multiprocessor/cache coherent non-uniform memory access) architecture. We conclude that the parallel computer (i.e., SMP/CC-NUMA architecture or cluster system) is more suitable for solving problems with a large amount of input size. 相似文献
7.
提出了实现安全数据库的一种方法———数据库安全通信服务,它通过使用(1)不同种类和不同算法强度的密钥算法;(2)密钥的适时更新;(3)加密后的数据包与本地机器环境和客户端的当前用户相关;(4)数据包的还原校验与本地机器环境和客户端的当前用户相关;(5)基于X.509证书的身份识别和访问控制策略,等方法和技术极大地提高了数据库及其通信系统的安全性,具有较高的实用价值。 相似文献
8.
9.
提出了以氧化钙为钙剂与丙酸直接合成食品防腐剂丙酸钙的新方法,并从动力学角度出发成功地研究了该方法的最佳合成工艺条件,重点确定了丙酸过量系数和各反应物的最适浓度。同时,为了拓宽其应用范围,对两酸钙用做钙质强化剂的生物利用度和药物动力学也作了初步研究。 相似文献
10.
Muhammad Qadeer Sharif Pingzhi Fan 《中国电子科技》2007,5(2):97-101
This paper presents an efficient dynamic spectrum allocation (DSA) scheme in a flexible spectrum licensing environment where multiple networks coexist and interfere with each other. In particular, an extension of virtual boundary concept in DSA is proposed, which is spectrally efficient than the previous virtual boundary concept applied to donor systems only. Here, the same technique is applied to both donor and rental systems so as to further reduce the occurrences where the insertion of guard bands is obligatory and as a result provides better spectral efficiency. The proposed extension improves the spectrum utilization without any compromise on interference and fairness issues. 相似文献