首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   76篇
  免费   8篇
  国内免费   5篇
工业技术   89篇
  2023年   1篇
  2022年   2篇
  2021年   1篇
  2020年   2篇
  2019年   1篇
  2018年   1篇
  2017年   5篇
  2016年   4篇
  2014年   3篇
  2013年   4篇
  2012年   4篇
  2011年   6篇
  2010年   1篇
  2009年   2篇
  2008年   7篇
  2007年   7篇
  2006年   9篇
  2005年   5篇
  2004年   5篇
  2003年   4篇
  2002年   9篇
  2001年   3篇
  1999年   1篇
  1998年   1篇
  1995年   1篇
排序方式: 共有89条查询结果,搜索用时 156 毫秒
1.
提出了一种安全的、不可见的、通用的易碎文档数字水印方法.嵌入到文档图像中的水印完全依赖于文档内容及字符间距等格式,可有效检验文档的完整性和可信性.根据文档中字符的Unicode编码值及各个字符在文档中对应的位置,构造一个矩阵D,计算D经过一系列变换后的特征值,可以生成水印序列.若文档被篡改,则根据该文档提取出的水印也将发生改变.同时,通过将文档图像分块,可预测可能发生篡改的位置.  相似文献   
2.
This study assessed social behavior in a mouse model of Fragile X syndrome (FXS), the Fmr1 tm1Cgr or Fmr1 "knockout" (KO) mouse. Both the KO and wild-type (WT) mice preferred to be near a novel conspecific than to be alone. However, during the initial interaction with a novel conspecific, (1) a greater proportion of the KO mice exhibited high levels of grooming; and (2) the average duration of nose contact with the stimulus mouse was significantly shorter for the KO mice, both indicative of increased arousal and/or anxiety. Both groups exhibited a robust novelty preference when the novel animal was a "preferred" mouse. However, when the novel mouse was a "nonpreferred" animal, both groups showed a diminished novelty preference but this effect was more pronounced for the WT mice. This blunted negative reaction of the KO mice to a nonpreferred animal may indicate that they were less proficient than controls in distinguishing between positive and negative social interactions. These findings provide support for the use of this animal model to study the autistic features of FXS and autism spectrum disorders. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
3.
Enabling the robotic fabrication of building elements directly on a construction site, in-situ fabrication is a radical and novel approach to the application of digital fabrication in architecture. Volker Helm of ETH Zurich describes how an on-site unit, developed with Fabio Gramazio and Matthias Kohler in the Architecture and Digital Fabrication department at the university, offers the first-ever generic robot with applications in a wide range of processes, providing the means of investigating the requirements and capacities involved in non-standardised fabrication.  相似文献   
4.
基于可分逆模糊化的脆弱水印   总被引:1,自引:0,他引:1  
提出了一种时域上的水隐藏与检测算法--基于可分逆模糊化的脆弱水印算法。其原理是将水印隐藏到图像的一行/列中,再通过高斯模糊化将水印信息进一步隐藏到其相邻的行/列中。在水印检测过程中,通过可分逆模糊化算法检测并估计出嵌入水印。实验结果表明,这种算法隐藏水印具有隐蔽性和脆弱性,同时能够对攻击方位进行准确定位,是一种很有前途的脆弱水印算法。  相似文献   
5.
This article reviews the current bibliographic knowledge on early neurobehavioral development and milestones in Fragile X syndrome (FraX), with emphasis on males affected by the condition. Three broad areas of early development were examined: (1) gross and fine motor, (2) speech and language, and (3) social. The result of the current review indicates very limited information on the developmental milestones in all three areas. The scarce literature on motor development shows that in FraX there is an early developmental delay. Research on speech and language demonstrates pervasive deficits in conversational skills and severe developmental delay, with increasing discrepancy between language level and chronological age in young males with FraX. Finally, deficits in social development in FraX include abnormal gaze, approach and avoidance conflict, and high incidence of autistic spectrum disorders.  相似文献   
6.
多媒体数字产品版权保护模型研究与设计   总被引:1,自引:0,他引:1  
非法的盗版行为侵害了创作者的合法权益,使得多媒体信息的版权保护问题变得十分重要。通过分析一般的版权保护管理系统,提出了一种有效保护多媒体信息版权的模型。该模型综合利用鲁棒水印和脆弱水印对多媒体信息进行4次水印嵌入;采用全文件加密的方式对多媒体信息加密;使用基于双缓冲机制及安全存储机制的专门的客户端软件对信息解密。最后通过性能分析可知,在没有降低系统的权威性、公平性、实用性的前提下,该模型提高了整个DRM系统的安全性。  相似文献   
7.
This paper analyzes the numerically instable problem in the current 3D fragile watermarking schemes. Some existing fragile watermarking schemes apply the floating-point arithmetic to embed the watermarks. However, these schemes fail to work properly due to the numerically instable problem, which is common in the floating-point arithmetic. This paper proposes a numerically stable fragile watermarking scheme. The scheme views the mantissa part of the floating-point number as an unsigned integer and operates on it by the bit XOR operator. Since there is no numerical problem in the bit operation, this scheme is numerically stable. The scheme can control the watermark strength through changing the embedding parameters. This paper further discusses selecting appropriate embedding parameters to achieve good performance in terms of the perceptual invisibility and the ability to detect unauthorized attacks on the 3D models. The experimental results show that the proposed public scheme could detect attacks such as adding noise, adding/deleting faces, inserting/removing vertices, etc. The comparisons with the existing fragile schemes show that this scheme is easier to implement and use.  相似文献   
8.
提出了一个用于珍贵作品完整性认证的脆弱数字水印算法。其特点是在认证时不需要原始水印,理论和实验结果证实所提算法具有很强的认证能力。  相似文献   
9.
易损数字水印若干问题的研究   总被引:17,自引:0,他引:17       下载免费PDF全文
易损数学水印算法可用于多媒体内容真实性的保护。为更有效地设计和使用易损水印,首先通过研究其算法应具有的特点及易损水印与鲁棒水印的差别;然后在可信赖的数码相机这个应用背景的基础上,提出了一个简单的易损水印应用框架;最后,讨论了变换域易损图象数学水印算法的误差问题和逆变换后象素值溢出的问题,同时给出了两种解决方法,并利用此方法对一种基于小波变换的易损水印算法做了改进。  相似文献   
10.
根据特征编码的思想,首次提出了一种基于文字下划线特征变化的脆弱型文本水印算法.该算法利用字符的内码特征信息生成水印,然后按照特定的顺序插入水印或检测水印.理论分析和实验表明,算法具有良好的不可感知性,能准确地检测各类水印攻击,在大部分情况下能对篡改进行精确定位.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号