全文获取类型
收费全文 | 638篇 |
免费 | 78篇 |
国内免费 | 46篇 |
专业分类
电工技术 | 33篇 |
综合类 | 31篇 |
化学工业 | 18篇 |
金属工艺 | 1篇 |
机械仪表 | 15篇 |
建筑科学 | 22篇 |
矿业工程 | 13篇 |
轻工业 | 85篇 |
水利工程 | 7篇 |
石油天然气 | 12篇 |
武器工业 | 1篇 |
无线电 | 191篇 |
一般工业技术 | 11篇 |
冶金工业 | 2篇 |
自动化技术 | 320篇 |
出版年
2024年 | 4篇 |
2023年 | 10篇 |
2022年 | 27篇 |
2021年 | 22篇 |
2020年 | 34篇 |
2019年 | 26篇 |
2018年 | 22篇 |
2017年 | 62篇 |
2016年 | 57篇 |
2015年 | 47篇 |
2014年 | 79篇 |
2013年 | 64篇 |
2012年 | 52篇 |
2011年 | 49篇 |
2010年 | 47篇 |
2009年 | 34篇 |
2008年 | 25篇 |
2007年 | 38篇 |
2006年 | 16篇 |
2005年 | 18篇 |
2004年 | 11篇 |
2003年 | 7篇 |
2002年 | 3篇 |
2001年 | 1篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1994年 | 1篇 |
1990年 | 1篇 |
1988年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有762条查询结果,搜索用时 343 毫秒
1.
2.
A double optimal projection method that involves projections for intra-cluster and inter-cluster dimensionality reduction are proposed for video fingerprinting. The video is initially set as a graph with frames as its vertices in a high-dimensional space. A similarity measure that can compute the weights of the edges is then proposed. Subsequently, the video frames are partitioned into different clusters based on the graph model. Double optimal projection is used to explore the optimal mapping points in a low-dimensional space to reduce the video dimensions. The statistics and geometrical fingerprints are generated to determine whether a query video is copied from one of the videos in the database. During matching, the video can be roughly matched by utilizing the statistics fingerprint. Further matching is thereafter performed in the corresponding group using geometrical fingerprints. Experimental results show the good performance of the proposed video fingerprinting method in robustness and discrimination. 相似文献
3.
Qiang Xia Tao Feng Xiaowei Lou Ying Wang Yangying Sun Daodong Pan Jinxuan Cao 《International Journal of Food Science & Technology》2020,55(2):669-680
As a decisive attribute, flavour could be influenced by HP treatments through multiple physical and chemical pathways within the high pressure (HP)-assisted meat curing process. This investigation aimed to identify the major pathway influencing volatile flavour patterns of two representative vinasse-cured duck (VCD) products with HP treatments (150–300 MPa/15 min), including wet and dry types, by employing headspace fingerprinting as an untargeted approach. Results suggested that HP treatments greatly lowered moisture contents and increased Warner-Bratzler shear force and thiobarbituric acid reactive substances of the cured samples. According to multivariate models, the volatile flavour patterns of the HP-processed VCD could be clearly separated from the unprocessed samples, but the VCD pressurised at different intensities represented similar volatile fingerprinting, which was validated by e-nose analysis. The discriminant analysis (OPLS-DA) model outlined vinasse-derived ethanol, acetic acid, 3-methyl-1-butanol, 2-methyl-1-butanol, phenethyl alcohol and 2-methyl-3-octanone as the major discriminant aromas across the unpressurised and pressurised samples. 相似文献
4.
针对目前的语音调度系统存在实时性差、需要布设大量电缆等问题,设计了一种基于WiFi的无线语音接收终端。该语音接收终端工作时,无线收发模块GS1011接收来自无线网络的数据帧,STM32微控制器以中断方式将接收到的数据放入环形缓存区中,当环形缓存区数据大于播放阈值,STM32微控制器从环形缓存区中读取语音数据并通过音频编解码模块VS1053解码播放。同时,该语音接收终端采用RTP协议结合环形缓存及动态调整语音回放速率的措施来消除网络抖动现象。测试结果表明,该语音接收终端响应时间不到1s,语音信号稳定,消除了网络抖动带来的影响。 相似文献
5.
张婧 《计算机工程与科学》2012,34(10):22-27
随着移动互联网络技术的发展和智能手机的广泛应用,人们对基于WiFi的移动互联业务的需求越来越广泛,许多行业及公共场所都在建设无线WiFi网络,而网络安全管理要求无线WiFi网络必须采用实名认证,其基本手段有用户名认证和手机号认证。本文论述了不依赖于特定协议和与WiFi设备厂商无关的认证方式及实现实名认证的方法和过程。 相似文献
6.
7.
8.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent. 相似文献
9.
Farid Ablayev Alexander Vasiliev 《International Journal of Software and Informatics》2013,7(4):485-500
In the paper, we develop a method for constructing quantum algorithms for computing Boolean functions by quantum ordered read-once branching programs (quantum OBDDs). Our method is based on ˉngerprinting technique and representation of Boolean functions by their characteristic polynomials. We use circuit notation for branching programs for desired algorithms presentation. For several known functions our approach provides optimal QOBDDs. Namely we consider such functions as MODm, EQn, Palindromen, and PERMn (testing whether given Boolean matrix is the Permutation Matrix). We also propose a generalization of our method and apply it to the Boolean variant of the Hidden
Subgroup Problem. 相似文献
10.
本文首先叙述了智能家居的基本概念以及分析了智能家居中的通信技术,分析了WiFi技术在智能家居中的应用优势。接着讨论了串口WiFi的功能,以WiFi插座为例,描述了串口WiFi在智能家居中的具体应用。最后叙述了基于WiFi技术的智能家居系统。 相似文献