全文获取类型
收费全文 | 42篇 |
免费 | 4篇 |
国内免费 | 1篇 |
专业分类
化学工业 | 10篇 |
轻工业 | 2篇 |
无线电 | 11篇 |
一般工业技术 | 2篇 |
冶金工业 | 1篇 |
自动化技术 | 21篇 |
出版年
2022年 | 3篇 |
2021年 | 2篇 |
2020年 | 3篇 |
2019年 | 3篇 |
2018年 | 1篇 |
2017年 | 2篇 |
2016年 | 5篇 |
2015年 | 1篇 |
2014年 | 3篇 |
2012年 | 3篇 |
2011年 | 1篇 |
2010年 | 1篇 |
2009年 | 3篇 |
2005年 | 1篇 |
2004年 | 2篇 |
2002年 | 1篇 |
1999年 | 1篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1990年 | 1篇 |
1982年 | 1篇 |
1976年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有47条查询结果,搜索用时 15 毫秒
1.
This paper describes an efficient hardware architecture of 2D-Scan-based-Wavelet watermarking for image and video. The potential application for this architecture includes broadcast monitoring of video sequences for High Definition Television (HDTV) and DVD protection and access control. The proposed 2D design allows even distribution of the processing load onto a set of filters, with each set performing the calculation for one dimension according to the scan-based process. The video protection is achieved by the insertion of watermarks bank within the middle frequency of wavelet coefficients related to video frames by their selective quantization. The 2-D DWT is applied for both video stream and watermark in order to make the watermarking scheme robust and perceptually invisible. The proposed architecture has a very simple control part, since the data are operated in a row-column-slice fashion. This organization reduces the requirement of on-chip memory. In addition, the control unit selects which coefficient to pass to the low-pass and high-pass filters. The on-chip memory will be small as compared to the input size since it depends solely on the filter sizes. Due to the pipelining, all filters are utilized for 100% of the time except during the start-up and wind-down times. The major contribution of this research is towards the selection of appropriate real time watermarking scheme and performing a trade-off between the algorithmic aspects of our proposed watermarking scheme and the hardware implementation technique. The hardware architecture is designed, as a watermarking based IP core with the Avalon interface related to NIOS embedded processor, and tested in order to evaluate the performance of our proposed watermarking algorithm. This architecture has been implemented on the Altera Stratix-II Field Programmable Gate Array (FPGA) prototyping board. Experimental results are presented to demonstrate the capability of the proposed watermarking system for real time applications and its robustness against malicious attacks. 相似文献
2.
Emna Hmani Sourour Chaabane Elaoud Youssef Samet Ridha Abdelhdi 《Journal of hazardous materials》2009,170(2-3):928-933
Electrochemical oxidation of O-Toluidine (OT) was studied by galvanostatic electrolysis using lead dioxide (PbO2) and boron-doped diamond (BDD) as anodes. The influence of operating parameters, such as current density, initial concentration of OT and temperature was investigated. Measurements of chemical oxygen demand were used to follow the oxidation. The experimental data indicated that on PbO2 and BDD anodes, OT oxidation takes place by reaction with electrogenerated hydroxyl radicals and is favoured by low current density and high temperature. Furthermore, BDD anodes offer significant advantages over PbO2 in terms of current efficiency and oxidation rate. 相似文献
3.
Phase structure and mechanical properties of PP/EPR/CaCO3 nanocomposites: Effect of particle's size and treatment 下载免费PDF全文
Calcium carbonate (CaCO3) reinforced polypropylene/ethylene propylene rubber (PP/EPR) copolymer composites for automotive use were developed by means of extrusion and injection molding process. Three kinds of CaCO3 (stearic acid treated and untreated) nanoparticles and microparticles were used as fillers. The influence of stearic acid, particle size, and filler content on the state distribution and morphology were investigated by SEM and rheological measurements. Two different morphologies were observed: EPR and CaCO3 dispersed in the PP matrix and a core shell structure, depending on the interactions between EPR and CaCO3. Toughening mechanisms and mechanical properties of the different systems were investigated. Significant improvement in tensile modulus is observed in all composites, depending on filler content. Elongation and notched impact strength were drastically decreased, especially for composites with nano CaCO3. Better impact properties were obtained with low content of treated particles, showing the importance of filler treatment. POLYM. ENG. SCI., 55:2859–2868, 2015. © 2015 Society of Plastics Engineers 相似文献
4.
A multi-level conceptual data reduction approach based on the Lukasiewicz implication 总被引:1,自引:0,他引:1
Starting from fuzzy binary data represented as tables in the fuzzy relational database, in this paper, we use fuzzy formal concept analysis to reduce the tables size to only keep the minimal rows in each table, without losing knowledge (i.e., association rules extracted from reduced databases are identical at given precision level). More specifically, we develop a fuzzy extension of a previously proposed algorithm for crisp data reduction without loss of knowledge. The fuzzy Galois connection based on the Lukasiewicz implication is mainly used in the definition of the closure operator according to a precision level, which makes data reduction sensitive to the variation of this precision level. 相似文献
5.
Kinetics and thermal characterization of thermoset cure 总被引:1,自引:0,他引:1
The differential scanning calorimeter (Perkin-Elmer DSC-1) is used to characterize the cure of a general-purpose polyester during isothermal and scanning experiments. The technique is based on a new proposed model for the kinetics of isothermal cure. The model yields results which are in good agreement with experimental isothermal rate of reaction and integral heat of reaction data. It also gives some information about the residual reactivity of the sample after an isothermal cure experiment. With the aid of the proposed kinetic model, it is possible to obtain integral heats of reaction and rates of heat generation at different temperatures during a scanning experiment. The difference between the rate of heat input to the sample and the heat of reaction at any instant during scanning may be used to calculate the specific heat of the sample at the same instant. Specific heat data show two maxima during each scanning experiment. These maxima may be associated with transitions occurring during cure in the melt and rubbery states. 相似文献
6.
Murata Y. Esmailzadeh R. Takakusaki K. Sourour E. Nakagawa M. 《Selected Areas in Communications, IEEE Journal on》1994,12(5):970-975
A fast frequency hopping (FFH) method which uses path-diversity combining is proposed. Diversity techniques are realized when a signal is received from diverse independent paths, each of which carries identical information but suffers from independent fading variations. The improvement of communication performance of FFH systems is possible as the delayed paths are used and path-diversity combination is realized. The advantages of this method, operating in Rayleigh fading channels are confirmed by theoretical analyses. The improvement is in order of 2~3 dB at bit error rate (BER) of 10-3. This method can be also effective against interferences from other users in a code division multiple access (CDMA) environment. The performance of this system in a CDMA environment is evaluated by theoretical analyses and is shown to be superior to non-combining method. At BER of 10-3 the required Eb/N0 of the proposed system is 5 dB lower. If Eb/No is fixed, a greater number of users can be accommodated using the proposed system 相似文献
7.
In TDMA system each channel may have more than one time slot to serve more than one user. Techniques for the assignment of time slots to users while minimizing co-channel interference are important. The paper presents six time slot assignment techniques. A discrete event stochastic simulation study was performed on 120° and 60° sectored systems. The simulation employs the “blocked calls cleared” traffic model and a log-linear path loss propagation model. Only the down link is considered. The results compare the performance of the six techniques and investigates the effect of the number of time slots per frame and the maximum acceptable interference level 相似文献
8.
Dhieb Thameur Boubaker Houcine Njah Sourour Ben Ayed Mounir Alimi Adel M. 《Multimedia Tools and Applications》2022,81(6):7817-7845
Multimedia Tools and Applications - The active modality of handwriting is broadly related to signature verification in the context of biometric user authentication systems. Signature verification... 相似文献
9.
Mohamad Yassin Mohamed A. AboulHassan Samer Lahoud Marc Ibrahim Dany Mezher Bernard Cousin Essam A. Sourour 《Wireless Networks》2017,23(2):403-418
LTE networks’ main challenge is to efficiently use the available spectrum, and to provide satisfying quality of service for mobile users. However, using the same bandwidth among adjacent cells leads to occurrence of Inter-cell Interference especially at the cell-edge. Basic interference mitigation approaches consider bandwidth partitioning techniques between adjacent cells, such as frequency reuse of factor m schemes, to minimize cell-edge interference. Although SINR values are improved, such techniques lead to significant reduction in the maximum achievable data rate. Several improvements have been proposed to enhance the performance of frequency reuse schemes, where restrictions are made on resource blocks usage, power allocation, or both. Nevertheless, bandwidth partitioning methods still affect the maximum achievable throughput. In this proposal, we intend to perform a comprehensive survey on Inter-Cell Interference Coordination (ICIC) techniques, and we study their performance while putting into consideration various design parameters. This study is implemented throughout intensive system level simulations under several parameters such as different network loads, radio conditions, and user distributions. Simulation results show the advantages and the limitations of each technique compared to frequency reuse-1 model. Thus, we are able to identify the most suitable ICIC technique for each network scenario. 相似文献
10.