首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1088篇
  免费   144篇
  国内免费   116篇
工业技术   1348篇
  2024年   3篇
  2023年   10篇
  2022年   26篇
  2021年   26篇
  2020年   22篇
  2019年   15篇
  2018年   16篇
  2017年   27篇
  2016年   30篇
  2015年   47篇
  2014年   74篇
  2013年   59篇
  2012年   93篇
  2011年   99篇
  2010年   78篇
  2009年   78篇
  2008年   93篇
  2007年   107篇
  2006年   95篇
  2005年   84篇
  2004年   56篇
  2003年   46篇
  2002年   32篇
  2001年   37篇
  2000年   32篇
  1999年   18篇
  1998年   15篇
  1997年   12篇
  1996年   2篇
  1995年   7篇
  1994年   3篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1988年   2篇
排序方式: 共有1348条查询结果,搜索用时 312 毫秒
1.
In the present era of machines and edge-cutting technologies, still document frauds persist. They are done intuitively by using almost identical inks, that it becomes challenging to detect them—this demands an approach that efficiently investigates the document and leaves it intact. Hyperspectral imaging is one such a type of approach that captures the images from hundreds to thousands of spectral bands and analyzes the images through their spectral and spatial features, which is not possible by conventional imaging. Deep learning is an edge-cutting technology known for solving critical problems in various domains. Utilizing supervised learning imposes constraints on its usage in real scenarios, as the inks used in forgery are not known prior. Therefore, it is beneficial to use unsupervised learning. An unsupervised feature extraction through a Convolutional Autoencoder (CAE) followed by Logistic Regression (LR) for classification is proposed (CAE-LR). Feature extraction is evolved around spectral bands, spatial patches, and spectral-spatial patches. We inspected the impact of spectral, spatial, and spectral-spatial features by mixing inks in equal and unequal proportion using CAE-LR on the UWA writing ink hyperspectral images dataset for blue and black inks. Hyperspectral images are captured at multiple correlated spectral bands, resulting in information redundancy handled by restoring certain principal components. The proposed approach is compared with eight state-of-art approaches used by the researchers. The results depicted that by using the combination of spectral and spatial patches, the classification accuracy enhanced by 4.85% for black inks and 0.13% for blue inks compared to state-of-art results. In the present scenario, the primary area concern is to identify and detect the almost similar inks used in document forgery, are efficiently managed by the proposed approach.  相似文献   
2.
无证书签名具有基于身份密码体制和传统公钥密码体制的优点,可解决复杂的公钥证书管理和密钥托管问题.Wu和Jing提出了一种强不可伪造的无证书签名方案,其安全性不依赖于理想的随机预言机.针对该方案的安全性,提出了两类伪造攻击.分析结果表明,该方案无法实现强不可伪造性,并在"malicious-but-passive"的密钥生成中心攻击下也是不安全的.为了提升该方案的安全性,设计了一个改进的无证书签名方案.在标准模型中证明了改进的方案对于适应性选择消息攻击是强不可伪造的,还能抵抗恶意的密钥生成中心攻击.此外,改进的方案具有较低的计算开销和较短的私钥长度,可应用于区块链、车联网、无线体域网等领域.  相似文献   
3.
The impact of fraud on the world economy is significant. As fraud has evolved it has become more organized and increasingly cyber-enabled and committed across borders of law enforcement jurisdictions. The technological demands facing fraud investigators are increasing. Yet, little attention has been given to how forensic photography can help tackle emerging crime types, like fraud. This study reviews literature surrounding forensic photography and provides an up to date and collective narrative. This article focuses on the advancements in photography and how imaging-science techniques can apply to a fraud investigation. Photographic practice plays a key role in many crime investigations but must embrace continual change to ensure that it remains relevant to modern policing. Fresh approaches are essential and practitioners must fully utilize new technologies and adapt to tackle the increasingly demanding scope of fraud types.  相似文献   
4.
This paper presents a new method for copy-move forgery detection of duplicated objects. A bounding rectangle is drawn around the detected object to form a sub-image. Morphological operator is used to remove the unnecessary small objects. Highly accurate polar complex exponential transform moments are used as features for the detected objects. Euclidian distance and correlation coefficient between the feature vectors are calculated and used for searching the similar objects. A set of 20 forged images with duplicated objects is carefully selected from previously published works. Additional 80 non-forged images are edited by the authors and forged by duplicating different kinds of objects. Numerical simulation is performed where the results show that the proposed method successfully detect different kinds of duplicated objects. The proposed method is much faster than the previously existing methods. Also, it exhibits high robustness to various attacks such as additive white Gaussian noise, JPEG compression, rotation, and scaling.  相似文献   
5.
6.
Copy Move is a technique widespreadly used in digital image tampering, meaning Copy Move Forgery Detection (CMFD) is still a significant research. In this paper, a novel CMFD method is proposed, including double matching process and region localizing process. In double matching process, the first matching is conducted on Delaunay triangles consisting of Local Intensity Order Pattern (LIOP) keypoints, to find the approximate location of suspicious regions. In order to find sufficient keypoint pairs, the existing set of matching triangles is expanded by adding their neighbors iteratively, covering the whole tampered regions, and the second matching with a looser threshold is conducted on the vertices. In the region localizing process, considering the case of multiple copies, Density-Based Spatial Clustering of Applications with Noise (DBSCAN) is used to classify the keypoint pairs described in a new model. Experimental results indicate that the proposed method, with good robustness, outperforms some state-of-the-art methods.  相似文献   
7.
运矿列车装车称重及控制系统设计   总被引:1,自引:0,他引:1  
介绍一种矿石列车料仓放料装车时,自动检测重量及装车控制系统的设计,该系统检测精度高,安装工期短,操作、使用、维护方便,取得很好的实际应用效果。  相似文献   
8.
通过HSPICE模拟和理论分析研究了FPGA互连中的阻性短路缺陷行为.结果表明,阻性短路产生了时序故障,小电阻缺陷甚至产生了布尔故障.对于大电阻缺陷,当被测通路进行v-to-v转换,且引起短路故障的另一条通路保持v值时,最好检测方式发生.另外,使用静态分析可以很容易检测到小电阻缺陷.在最好检测方式下,评估了电源电压和温度对测试结果的影响.结果表明低电压有助于改善测试,短路材料有正温度系数时,低温测试较好,反之高温测试较好.  相似文献   
9.
针对传统的小尺寸电雷管人工检测方式耗时耗力,容易带入人工误差等问题,提出一种电雷管中电极塞平行度检测方法.该方法通过设计平行检测装置结构,利用高精度位移传感器,通过其对位移数据的记录,检测电极塞的平行度,实现高精度、自动化检测产品平行度.实验结果表明:该装置能够实现自动化、高精度的平行度检测,检测的重复精度基本能够达到μ级,满足检测精度要求.  相似文献   
10.
目的 图像篡改区域检测是图像取证领域的一个挑战性任务,其目的是找出图像的篡改区域。传统方法仅针对某种特定的篡改方式进行设计,难以检测其他篡改方式的图像。基于卷积神经网络的方法能够自适应地提取特征,同时检测包含多种篡改方式的图像。但是其中多数方法都选择增强图像的噪声特征,这种机制无法较好处理篡改区域与原图像来源相同、噪声相似的情况。多数方法还忽略了篡改区域过小而产生的样本不平衡问题,导致检测效果不佳。方法 提出了一个基于区域损失的用于检测小篡改区域的U型网络,该网络构建了一个异常区域特征增强机制,放大与图像背景差异较大的异常区域的特征。此外,还利用区域损失增强对篡改区域框内像素的判别能力,可以解决因篡改区域过小而产生的样本不平衡问题。结果 消融实验说明了异常区域特征增强机制和区域损失机制的有效性;对JPEG压缩和高斯模糊的对抗性测试证明了模型的鲁棒性;在CASIA2.0(CASI-A image tampering detection evaluation database)、NIST2016(NIST nimble 2016 datasets)、COLUMBIA (Columbia uncompressed image splicing detection evaluation dataset)和COVERAGE (a novel database forcopy-move forgery detection)数据集上与最新方法进行比较时,本文方法取得了最优性能,其F1 score分别为0.979 5、0.982 2、0.995 3和0.987 0。结论 本文的异常区域特征增强机制和区域损失机制能有效提高模型性能,同时缓解篡改区域过小导致的样本不平衡问题,大量实验也表明了本文提出的小篡改区域检测方法的优越性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号