全文获取类型
收费全文 | 826篇 |
免费 | 171篇 |
国内免费 | 93篇 |
专业分类
电工技术 | 13篇 |
综合类 | 51篇 |
化学工业 | 6篇 |
金属工艺 | 4篇 |
机械仪表 | 10篇 |
建筑科学 | 10篇 |
能源动力 | 1篇 |
武器工业 | 2篇 |
无线电 | 289篇 |
一般工业技术 | 43篇 |
自动化技术 | 661篇 |
出版年
2024年 | 7篇 |
2023年 | 19篇 |
2022年 | 24篇 |
2021年 | 26篇 |
2020年 | 22篇 |
2019年 | 13篇 |
2018年 | 20篇 |
2017年 | 26篇 |
2016年 | 42篇 |
2015年 | 41篇 |
2014年 | 57篇 |
2013年 | 59篇 |
2012年 | 72篇 |
2011年 | 75篇 |
2010年 | 50篇 |
2009年 | 67篇 |
2008年 | 80篇 |
2007年 | 71篇 |
2006年 | 71篇 |
2005年 | 61篇 |
2004年 | 48篇 |
2003年 | 37篇 |
2002年 | 20篇 |
2001年 | 14篇 |
2000年 | 13篇 |
1999年 | 10篇 |
1998年 | 9篇 |
1997年 | 13篇 |
1996年 | 7篇 |
1995年 | 3篇 |
1994年 | 6篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1989年 | 1篇 |
1988年 | 1篇 |
排序方式: 共有1090条查询结果,搜索用时 15 毫秒
1.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks. 相似文献
2.
多媒体音频设备驱动程序的结构和原理 总被引:4,自引:2,他引:2
李国辉 《小型微型计算机系统》1994,15(5):8-12
本文以波形音频输入输出为样本,剖析了Windows音频设备驱动程序的结构和原理。Windows设备驱动程序为应用提供了可扩展,设备无关,一致的接口。本文给出了数字波形数据I/O的处理过程,以及应用程序,驱动程序和音频硬件的层次关系。 相似文献
3.
提出了一种新颖的基于自适应小波基优化选择和心理声学模型相结合的数字音频信号的透明质量编码方法,保证固定失真水平上使每帧信号的变换系数的动态分配的比特数最少,并且利用动态码本的方法来消除音频信号的统计冗余,进一步压缩比特率,对于抽样率为44.1kHz每样值用16比特线性码表示的光盘单声道音乐信号可以压缩到64kBPS左右。 相似文献
4.
分析了一种数字解码卫星电视接收机,该机能接收利用MPEG-2进行数据压缩,采用SCPC或MCPC方式上星的卫星电视信号,具有选单显示,断电现场保护等功能。并对该机进行了原理分析,对主要集成电路的基本原理也作了简介,并给出了软件的部分主要流程及功能分析。 相似文献
5.
本文分析了理想的MPEG-2信源解码器中视频、音频同步实现的关键,给出了实际的解码器中实现视频、音频同步会遇到的问题和解决的方法。实践证明,这些方法是有效的,已用于我们的MPEG-2信源解码器中。 相似文献
6.
We propose a new multipurpose audio watermarking scheme in which two complementary watermarks are used.For audio copyright protection,the watermark data with copyright information or signature are first encrypted by Arnold transformation.Then the watermark data are inserted in the low frequency largest significant discrete cosine transform(DCT) coefficients to obtain robustness performance.For audio authentication,a chaotic signal is inserted in the high frequency insignificant DCT coefficients to detect tampered regions.Furthermore,the synchronization code is embedded in the audio statistical characteristics to resist desynchronization attacks.Experimental results show that our proposed method can not only obtain satisfactory detection and tampered location,but also achieve imperceptibility and robustness to common signal processing attacks,such as cropping,shifting,and time scale modification(TSM).Comparison results show that our method outperforms some existing methods. 相似文献
7.
为了提高隐写方案的安全性,提出一种基于最小嵌入失真原理和网格码的图像隐写算法。首先在离散小波域结合人眼视觉特性和整数提升小波变换设计了失真测度函数,主要考虑了亮度、频率和纹理掩蔽因子对载体失真的影响。然后结合网格码设计了隐写算法,将嵌入信息对载体的修改最小化并且集中在人眼不敏感区域。实验结果显示,方案具有良好的视觉不可见性,且能抵抗空域、小波域等隐写分析的攻击,安全容量达到0.4 bits/pixel。 相似文献
8.
Fei Yan Josef Kittler David Windridge William Christmas Krystian Mikolajczyk Stephen Cox Qiang Huang 《Image and vision computing》2014
Fully automatic annotation of tennis game using broadcast video is a task with a great potential but with enormous challenges. In this paper we describe our approach to this task, which integrates computer vision, machine listening, and machine learning. At the low level processing, we improve upon our previously proposed state-of-the-art tennis ball tracking algorithm and employ audio signal processing techniques to detect key events and construct features for classifying the events. At high level analysis, we model event classification as a sequence labelling problem, and investigate four machine learning techniques using simulated event sequences. Finally, we evaluate our proposed approach on three real world tennis games, and discuss the interplay between audio, vision and learning. To the best of our knowledge, our system is the only one that can annotate tennis game at such a detailed level. 相似文献
9.
《Expert systems with applications》2014,41(13):5858-5869
A new architecture of intelligent audio emotion recognition is proposed in this paper. It fully utilizes both prosodic and spectral features in its design. It has two main paths in parallel and can recognize 6 emotions. Path 1 is designed based on intensive analysis of different prosodic features. Significant prosodic features are identified to differentiate emotions. Path 2 is designed based on research analysis on spectral features. Extraction of Mel-Frequency Cepstral Coefficient (MFCC) feature is then followed by Bi-directional Principle Component Analysis (BDPCA), Linear Discriminant Analysis (LDA) and Radial Basis Function (RBF) neural classification. This path has 3 parallel BDPCA + LDA + RBF sub-paths structure and each handles two emotions. Fusion modules are also proposed for weights assignment and decision making. The performance of the proposed architecture is evaluated on eNTERFACE’05 and RML databases. Simulation results and comparison have revealed good performance of the proposed recognizer. 相似文献
10.
《Expert systems with applications》2014,41(14):6123-6130
Steganography is knowledge and art of hiding secret data into information which is largely used in information security systems. Various methods have been proposed in the literature which most of them are not capable of both preventing visual degradation and providing a large embedding capacity. In this paper, we propose a tunable visual image quality and data lossless method in spatial domain based on a genetic algorithm (GA). The main idea of the proposed technique is modeling the steganography problem as a search and optimization problem. Experimental results, in comparison with other currently popular steganography techniques, demonstrate that the proposed algorithm not only achieves high embedding capacity but also enhances the PSNR of the stego image. 相似文献