首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   42篇
  免费   4篇
  国内免费   1篇
化学工业   10篇
轻工业   2篇
无线电   11篇
一般工业技术   2篇
冶金工业   1篇
自动化技术   21篇
  2022年   3篇
  2021年   2篇
  2020年   3篇
  2019年   3篇
  2018年   1篇
  2017年   2篇
  2016年   5篇
  2015年   1篇
  2014年   3篇
  2012年   3篇
  2011年   1篇
  2010年   1篇
  2009年   3篇
  2005年   1篇
  2004年   2篇
  2002年   1篇
  1999年   1篇
  1996年   1篇
  1995年   1篇
  1994年   2篇
  1993年   1篇
  1992年   2篇
  1990年   1篇
  1982年   1篇
  1976年   1篇
  1973年   1篇
排序方式: 共有47条查询结果,搜索用时 15 毫秒
1.
This paper describes an efficient hardware architecture of 2D-Scan-based-Wavelet watermarking for image and video. The potential application for this architecture includes broadcast monitoring of video sequences for High Definition Television (HDTV) and DVD protection and access control. The proposed 2D design allows even distribution of the processing load onto a set of filters, with each set performing the calculation for one dimension according to the scan-based process. The video protection is achieved by the insertion of watermarks bank within the middle frequency of wavelet coefficients related to video frames by their selective quantization. The 2-D DWT is applied for both video stream and watermark in order to make the watermarking scheme robust and perceptually invisible. The proposed architecture has a very simple control part, since the data are operated in a row-column-slice fashion. This organization reduces the requirement of on-chip memory. In addition, the control unit selects which coefficient to pass to the low-pass and high-pass filters. The on-chip memory will be small as compared to the input size since it depends solely on the filter sizes. Due to the pipelining, all filters are utilized for 100% of the time except during the start-up and wind-down times. The major contribution of this research is towards the selection of appropriate real time watermarking scheme and performing a trade-off between the algorithmic aspects of our proposed watermarking scheme and the hardware implementation technique. The hardware architecture is designed, as a watermarking based IP core with the Avalon interface related to NIOS embedded processor, and tested in order to evaluate the performance of our proposed watermarking algorithm. This architecture has been implemented on the Altera Stratix-II Field Programmable Gate Array (FPGA) prototyping board. Experimental results are presented to demonstrate the capability of the proposed watermarking system for real time applications and its robustness against malicious attacks.  相似文献   
2.
Electrochemical oxidation of O-Toluidine (OT) was studied by galvanostatic electrolysis using lead dioxide (PbO2) and boron-doped diamond (BDD) as anodes. The influence of operating parameters, such as current density, initial concentration of OT and temperature was investigated. Measurements of chemical oxygen demand were used to follow the oxidation. The experimental data indicated that on PbO2 and BDD anodes, OT oxidation takes place by reaction with electrogenerated hydroxyl radicals and is favoured by low current density and high temperature. Furthermore, BDD anodes offer significant advantages over PbO2 in terms of current efficiency and oxidation rate.  相似文献   
3.
Calcium carbonate (CaCO3) reinforced polypropylene/ethylene propylene rubber (PP/EPR) copolymer composites for automotive use were developed by means of extrusion and injection molding process. Three kinds of CaCO3 (stearic acid treated and untreated) nanoparticles and microparticles were used as fillers. The influence of stearic acid, particle size, and filler content on the state distribution and morphology were investigated by SEM and rheological measurements. Two different morphologies were observed: EPR and CaCO3 dispersed in the PP matrix and a core shell structure, depending on the interactions between EPR and CaCO3. Toughening mechanisms and mechanical properties of the different systems were investigated. Significant improvement in tensile modulus is observed in all composites, depending on filler content. Elongation and notched impact strength were drastically decreased, especially for composites with nano CaCO3. Better impact properties were obtained with low content of treated particles, showing the importance of filler treatment. POLYM. ENG. SCI., 55:2859–2868, 2015. © 2015 Society of Plastics Engineers  相似文献   
4.
Starting from fuzzy binary data represented as tables in the fuzzy relational database, in this paper, we use fuzzy formal concept analysis to reduce the tables size to only keep the minimal rows in each table, without losing knowledge (i.e., association rules extracted from reduced databases are identical at given precision level). More specifically, we develop a fuzzy extension of a previously proposed algorithm for crisp data reduction without loss of knowledge. The fuzzy Galois connection based on the Lukasiewicz implication is mainly used in the definition of the closure operator according to a precision level, which makes data reduction sensitive to the variation of this precision level.  相似文献   
5.
Kinetics and thermal characterization of thermoset cure   总被引:1,自引:0,他引:1  
The differential scanning calorimeter (Perkin-Elmer DSC-1) is used to characterize the cure of a general-purpose polyester during isothermal and scanning experiments. The technique is based on a new proposed model for the kinetics of isothermal cure. The model yields results which are in good agreement with experimental isothermal rate of reaction and integral heat of reaction data. It also gives some information about the residual reactivity of the sample after an isothermal cure experiment. With the aid of the proposed kinetic model, it is possible to obtain integral heats of reaction and rates of heat generation at different temperatures during a scanning experiment. The difference between the rate of heat input to the sample and the heat of reaction at any instant during scanning may be used to calculate the specific heat of the sample at the same instant. Specific heat data show two maxima during each scanning experiment. These maxima may be associated with transitions occurring during cure in the melt and rubbery states.  相似文献   
6.
A fast frequency hopping (FFH) method which uses path-diversity combining is proposed. Diversity techniques are realized when a signal is received from diverse independent paths, each of which carries identical information but suffers from independent fading variations. The improvement of communication performance of FFH systems is possible as the delayed paths are used and path-diversity combination is realized. The advantages of this method, operating in Rayleigh fading channels are confirmed by theoretical analyses. The improvement is in order of 2~3 dB at bit error rate (BER) of 10-3. This method can be also effective against interferences from other users in a code division multiple access (CDMA) environment. The performance of this system in a CDMA environment is evaluated by theoretical analyses and is shown to be superior to non-combining method. At BER of 10-3 the required Eb/N0 of the proposed system is 5 dB lower. If Eb/No is fixed, a greater number of users can be accommodated using the proposed system  相似文献   
7.
In TDMA system each channel may have more than one time slot to serve more than one user. Techniques for the assignment of time slots to users while minimizing co-channel interference are important. The paper presents six time slot assignment techniques. A discrete event stochastic simulation study was performed on 120° and 60° sectored systems. The simulation employs the “blocked calls cleared” traffic model and a log-linear path loss propagation model. Only the down link is considered. The results compare the performance of the six techniques and investigates the effect of the number of time slots per frame and the maximum acceptable interference level  相似文献   
8.
Multimedia Tools and Applications - The active modality of handwriting is broadly related to signature verification in the context of biometric user authentication systems. Signature verification...  相似文献   
9.
LTE networks’ main challenge is to efficiently use the available spectrum, and to provide satisfying quality of service for mobile users. However, using the same bandwidth among adjacent cells leads to occurrence of Inter-cell Interference especially at the cell-edge. Basic interference mitigation approaches consider bandwidth partitioning techniques between adjacent cells, such as frequency reuse of factor m schemes, to minimize cell-edge interference. Although SINR values are improved, such techniques lead to significant reduction in the maximum achievable data rate. Several improvements have been proposed to enhance the performance of frequency reuse schemes, where restrictions are made on resource blocks usage, power allocation, or both. Nevertheless, bandwidth partitioning methods still affect the maximum achievable throughput. In this proposal, we intend to perform a comprehensive survey on Inter-Cell Interference Coordination (ICIC) techniques, and we study their performance while putting into consideration various design parameters. This study is implemented throughout intensive system level simulations under several parameters such as different network loads, radio conditions, and user distributions. Simulation results show the advantages and the limitations of each technique compared to frequency reuse-1 model. Thus, we are able to identify the most suitable ICIC technique for each network scenario.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号