首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   64篇
  免费   1篇
  国内免费   1篇
化学   3篇
数学   4篇
物理学   41篇
综合类   18篇
  2023年   1篇
  2022年   3篇
  2020年   1篇
  2019年   1篇
  2018年   1篇
  2017年   2篇
  2016年   5篇
  2014年   12篇
  2013年   1篇
  2012年   2篇
  2011年   4篇
  2010年   4篇
  2009年   6篇
  2008年   5篇
  2007年   3篇
  2006年   3篇
  2005年   3篇
  2004年   1篇
  2003年   1篇
  2002年   1篇
  2001年   1篇
  1999年   1篇
  1998年   2篇
  1997年   1篇
  1993年   1篇
排序方式: 共有66条查询结果,搜索用时 31 毫秒
1.
In this work, a robust method for moving object detection in thermal video frames has been proposed by including Kullback–Leibler divergence (KLD) based threshold and background subtraction (BGS) technique. A trimmed-mean based background model has been developed that is capable enough to reduce noise or dynamic component of the background. This work assumed that each pixel has normally distributed. The KLD has computed between background pixel and a current pixel with the help of Gaussian mixture model. The proposed threshold is useful enough to classify the state of each pixel. The post-processing step uses morphological tool for edge linking, and then the flood-fill algorithm has applied for hole-filling, and finally the silhouette of targeted object has generated. The proposed methods run faster and have validated over various real-time based problematic thermal video sequences. In the experimental results, the average value of F1-score, area under the curve, the percentage of correct classification, Matthew’s correlation coefficient show higher values whereas total error and percentage of the wrong classification show minimum values. Moreover, the proposed-1 method achieved higher accuracy and execution speed with minimum false alarm rate that has been compared with proposed-2 as well as considered peer methods in the real-time thermal video.  相似文献   
2.
The visual secret sharing for multiple secrets (VSSM) allows for the encryption of a greater number of secret images into a given image area. Previous researches on VSSM schemes incur a very serious pixel expansion that will damage capable of increasing the capacity of secret image encryption. Moreover, the most of VSSM schemes will decrease the contrast of recover images while the amount of secret image encryption increases. These drawbacks limit applicability of the existing VSSM schemes. In this paper, we propose a highly efficient encryption algorithm to cope with this problem. The proposed algorithm adopts a novel hybrid encryption approach that includes a VC-based encryption and a camouflaging process. The experimental results demonstrate that the proposed approach not only can increase the capacity efficient for VSSM schemes, but also maintains an excellent level of contrast in the recovered secret images.  相似文献   
3.
A fast method is presented for gaining 3D actinic flux density fields, Fact, in clouds employing the Independent Pixel Approximation (IPA) with a parameterized horizontal photon transport to imitate radiative smoothing effects. For 3D clouds the IPA is an efficient method to simulate radiative transfer, but it suffers from the neglect of horizontal photon fluxes leading to significant errors (up to locally 30% in the present study). Consequently, the resulting actinic flux density fields exhibit an unrealistically rough and rugged structure. In this study, the radiative smoothing is approximated by applying a physically based smoothing algorithm to the calculated IPA actinic flux field.  相似文献   
4.
Maskless lithography (ML) provides a fast and low-cost method for projecting the images of IC or micro features onto photoresist. However, it needs an efficient simulation method to evaluate the performance of lithography process. In this paper, a pixel-based partially coherent image method for digital micro-mirror device (DMD) based ML is proposed based on the linear invariant theory. In our method, the mask is sampled by DMD pixel (each pixel corresponding to each micro-mirror) and expressed by rect function. Using the shift theory of Fourier transform and the stacked pupil operator approach, we build a matrix Φ for system response function of rect function. If the DMD pixel state matrix is S, then the aerial image can be calculated with two matrix multiplication I(x,y) = .  相似文献   
5.
A disadvantage of using a galvanometer as the horizontal scanner in CSOM and OCT is its nonlinear distortion caused by the rotational inertial. This is inevitable even if a closed loop is equipped. Here, a second closed loop is introduced to provide pixel clocks to reduce the pincushion distortion of the images. A subdivided step motor is employed to be the vertical scanner as the result of price consideration. Nonetheless, the conventional linearity model of the peck torque with a winding current relationship is no longer in agreement with the experiment when the winding current is low, while a parabolic model is more likely to be reasonable. Relational treatment is proposed in the paper. Both methods have proved to be good enough to meet the requirement of a super resolution scanning imaging.  相似文献   
6.
This paper proposes two measures for the evaluation of permutation techniques used in image encryption. First, a general mathematical framework for describing the permutation phase used in image encryption is presented. Using this framework, six different permutation techniques, based on chaotic and non-chaotic generators, are described. The two new measures are, then, introduced to evaluate the effectiveness of permutation techniques. These measures are (1) Percentage of Adjacent Pixels Count (PAPC) and (2) Distance Between Adjacent Pixels (DBAP). The proposed measures are used to evaluate and compare the six permutation techniques in different scenarios. The permutation techniques are applied on several standard images and the resulting scrambled images are analyzed. Moreover, the new measures are used to compare the permutation algorithms on different matrix sizes irrespective of the actual parameters used in each algorithm. The analysis results show that the proposed measures are good indicators of the effectiveness of the permutation technique.  相似文献   
7.
采用一种基于模糊推理的方法来对块编码的灰度图像进行帧内误码恢复。在丢失块周围像素匹配的基础上采用模糊推理对匹配的结果进行模糊分类,并对匹配准确度低的块进行改进的像素逐点修正处理,从而达到误码恢复的目的。实验结果标明,该方法可以获得比较满意的结果。  相似文献   
8.
针对大多数基于直方图平移的可逆信息隐藏中载体图像分块方法过于粗糙的问题,根据相邻像素之间具有相似特性,提出对载体图像按像素梯度进行分割,将图像分为平滑区域和粗糙区域。同时为减少像素的无效平移,只对平滑区域分块并采用直方图的次峰值点进行双向移位实现信息可逆隐藏,同时将零值点嵌入图像;不需要单独传送峰值点和零值点信息,降低了通信负担。实验表明,该方法在图像质量和峰值信噪比上具有明显的提升,可应用于保密传输等领域。  相似文献   
9.
陈邓安 《科学技术与工程》2012,12(10):2472-2474
针对基于实物图片进行模拟射击的效能分析问题,提出了运用像素点法进行蒙特卡罗模拟的方法,研究了基于实物图片运用像素点法进行效能分析的步骤和运用Matlab软件编程实现的方法,并通过实例分析进行了仿真验证。  相似文献   
10.
We report the use of the time-of-flight secondary ion mass spectrometry (ToF-SIMS) technique to determine whether the patterned bank is suitable for inkjet printing, by evaluating the phobicity contrast between two regions, the glass substrate inside pixels and the surface of the resist bank. We first examined the effect of plasma treatment on the ink spreading behavior inside pixels. The phobicity contrast was optimized by removing residues inside the pixels and by providing high phobicity on the bank surface. We show that ToF-SIMS spectra and mass-resolved images are effective tools in examining the existence of organic contaminants inside pixels and predicting the actual inkjet printing behavior. The ToF-SIMS technique will find promising applications that are related to surface characteristics where conventional contact angle measurement is hard to apply due to geometrical and technical restrictions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号