收费全文 | 318篇 |
免费 | 25篇 |
国内免费 | 2篇 |
工业技术 | 345篇 |
2024年 | 1篇 |
2023年 | 5篇 |
2022年 | 33篇 |
2021年 | 35篇 |
2020年 | 29篇 |
2019年 | 36篇 |
2018年 | 35篇 |
2017年 | 26篇 |
2016年 | 23篇 |
2015年 | 12篇 |
2014年 | 12篇 |
2013年 | 21篇 |
2012年 | 8篇 |
2011年 | 13篇 |
2010年 | 15篇 |
2009年 | 10篇 |
2008年 | 13篇 |
2007年 | 6篇 |
2006年 | 2篇 |
2005年 | 1篇 |
2002年 | 1篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1995年 | 1篇 |
1983年 | 1篇 |
1982年 | 2篇 |
As per the most recent literature, Orthogonal Frequency Division Multiplexing (OFDM), a multi access technique, is considered most suitable for the 3G, 4G and 5G techniques in high speed wireless communication. What made OFDM most popular is its ability to deliver high bandwidth efficiency and superior data rate. Besides it, high value of peak to average power ratio (PAPR) and Inter Carrier Interference (ICI) are the challenges to tackle down via appropriate mitigation scheme. As a research contribution in the present work, an improved self-cancellation (SC) technique is designed and simulated through Simulink to mitigate the effect of ICI. This novel proposed technique (Improved SC) is designed over discrete wavelet transform (DWT) based OFDM and compared with conventional SC scheme over different channel conditions i.e. AWGN and Rayleigh fading environments. It is found that proposed DWT-OFDM with Improved SC scheme outperforms conventional SC technique significantly, under both AWGN and Rayleigh channel conditions. Further, in order to justify the novelty in the research contribution, a Split-DWT based Simulink model for Improved SC scheme is investigated to analyse the BER performance. This Split-DWT based Simulink model presented here foretells the future research potential in wavelet hybridization of OFDM to side-line ICI effects more efficiently.
相似文献IT systems pervade our society more and more, and we become heavily dependent on them. At the same time, these systems are increasingly targeted in cyberattacks, making us vulnerable. Enterprise and cybersecurity responsibles face the problem of defining techniques that raise the level of security. They need to decide which mechanism provides the most efficient defense with limited resources. Basically, the risks need to be assessed to determine the best cost-to-benefit ratio. One way to achieve this is through threat modeling; however, threat modeling is not commonly used in the enterprise IT risk domain. Furthermore, the existing threat modeling methods have shortcomings. This paper introduces a metamodel-based approach named Yet Another Cybersecurity Risk Assessment Framework (Yacraf). Yacraf aims to enable comprehensive risk assessment for organizations with more decision support. The paper includes a risk calculation formalization and also an example showing how an organization can use and benefit from Yacraf.
相似文献Background removal of an identity (ID) picture consists in separating the foreground (face, body, hair and clothes) from the background of the image. It is a necessary groundwork for all modern identity documents that also has many benefits for improving ID security. State of the art image processing techniques encountered several segmentation issues and offer only partial solutions. It is due to the presence of erratic components like hairs, poor contrast, luminosity variation, shadow, color overlap between clothes and background. In this paper, a knowledge infused approach is proposed that hybridizes smart image processing tasks and prior knowledge. The research is based on a divide and conquer strategy aiming at simulating the sequential attention of human when performing a manual segmentation. Knowledge is infused by considering the spatial relation between anatomic elements of the ID image (face feature, forehead, body and hair) as well as their “signal properties”. The process consists in first determining a convex hull around the person’s body including all the foreground while keeping very close to the contour between the background and the foreground. Then, a body map generated from biometric analysis associated to an automatic grab cut process is applied to reach a finer segmentation. Finally, a heuristic-based post-processing step consisting in correcting potential hair and fine boundary issues leads to the final segmentation. Experimental results show that the newly proposed architecture achieves better performances than tested current state-of-the-art methodologies including active contours, generalist popular deep learning techniques, and also two other ones considered as the smartest for portrait segmentation. This new technology has been adopted by an international company as its industrial ID foreground solution.
相似文献