首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   59篇
  免费   9篇
各国政治   2篇
工人农民   2篇
世界政治   1篇
外交国际关系   1篇
法律   36篇
中国政治   8篇
政治理论   5篇
综合类   13篇
  2023年   2篇
  2022年   4篇
  2021年   4篇
  2020年   6篇
  2019年   3篇
  2018年   1篇
  2017年   2篇
  2016年   2篇
  2015年   7篇
  2014年   4篇
  2013年   3篇
  2012年   4篇
  2011年   2篇
  2010年   1篇
  2009年   4篇
  2008年   3篇
  2007年   4篇
  2006年   5篇
  2005年   4篇
  2004年   1篇
  2000年   1篇
  1999年   1篇
排序方式: 共有68条查询结果,搜索用时 0 毫秒
41.
With recent advancements in image processing and printing technology, home printers have improved in performance and grown more widespread. As such, they have been increasingly used in counterfeiting and forgery. Most counterfeit bills in Korea have been created using home scanners and printers. The identification of printer model is thus necessary to rapidly track down criminals and solve crimes. Household printers can be largely divided into inkjet and laser printers. These two types of printers print halftone textures instead of continuous images. This study proposed a technique of printer classification based on halftone textures that can be observed in printed documents. Since halftone textures are expressed as periodic lattices, the images were transformed via FFT, which is highly effective at expressing periodicity. ResNet, known for its superior gradient flow, was used for training. The experiment was conducted on 12 color laser jets and 2 inkjets. Scans of bills printed by each printer were used, and halftone texture analysis was performed on these images for printer model classification. Each image was cropped into several parts; one of the cropped parts was analyzed. The analysis showed that laser printers could be 100% distinguished from inkjet printers. An accuracy of 98.44% was achieved in make classification. When 50 cropped images were used instead of a single image, the technique achieved 100% accuracy in model classification. The proposed technique is non-destructive; it offers high accessibility and efficiency as it can be performed using a scanner alone, without requiring additional optical equipment.  相似文献   
42.
坚持用“慢”的哲学观点来指导人的实践活动,试着从社会“快”的发展中找到“快”与“慢”之间的结合点,保持人身体上和心理上的平衡,最终实现人的有序、平衡发展,对实现人的全面发展具有重要意义和价值。因此,探究“慢”的哲学视野下人全面发展的主要内涵,解除社会快速发展对人全面发展的不利因素,从而找出“慢”的哲学视野下关于人全面发展的途径,是实现社会与人和谐发展的必然要求。  相似文献   
43.
There is an increasing demand for herbal medicines in weight loss treatment. Some synthetic chemicals, such as sibutramine (SB), have been detected as adulterants in herbal formulations. In this study, two strategies using near infrared (NIR) spectroscopy have been developed to evaluate potential adulteration of herbal medicines with SB: a qualitative screening approach and a quantitative methodology based on multivariate calibration. Samples were composed by products commercialized as herbal medicines, as well as by laboratory adulterated samples. Spectra were obtained in the range of 14,000–4000 per cm. Using PLS‐DA, a correct classification of 100% was achieved for the external validation set. In the quantitative approach, the root mean squares error of prediction (RMSEP), for both PLS and MLR models, was 0.2%w/w. The results prove the potential of NIR spectroscopy and multivariate calibration in quantifying sibutramine in adulterated herbal medicines samples.  相似文献   
44.
王怀勇 《政法论丛》2021,(1):105-116
随着算法在金融领域应用的深入,算法固有的缺陷和特性也逐渐与金融本身的风险和逻辑发生耦合,形成了算法歧视、算法绑架、算法趋同等新型金融风险.然而,现有的金融科技算法规制框架存在主体、对象和工具层面的诸多问题,导致金融科技算法风险规制的低效和失灵,因而需要进行规制路径的优化和调适.从主体层面出发,应构建以金稳会为基础的规制...  相似文献   
45.
近年来,民警在执法过程中遭到犯罪嫌疑人暴力袭击的案件逐年增多,民警在遭到袭击的时候不知该如何保护自己,不知如何有效的利用一些战术基础动作发挥武器的优势。文中从当前民警自身的现状着手进行分析,并通过一些训练手段提高民警应激反应速度训练和强化快速出枪训练,最终提高民警在紧急状态的有效应对能力,以此来提高一线民警的执法战斗能力和自我保护能力。  相似文献   
46.
进入网络时代以后,人们逐步形成了一种以技术性和流动性为核心的在线生存样态.人们日益被数据化和被算法化.技术平台往往会利用自身在数据处理和深度学习算法上的技术优势,生成一种隐性的支配权和控制权,从而形成人工智能算法独特的运行逻辑.人工智能算法独特的运行逻辑正在深刻地改变着以往的生产方式和生活方式,并诱发了一系列的伦理危机...  相似文献   
47.
New mathematical techniques for analysis of raw dumps of NAND flash memory were developed. These techniques are aimed at detecting, by analysis of the raw NAND flash dump only, the use of LFSR-based scrambling and the use of a binary cyclic code for error-correction. If detected, parameter values for both LFSR and cyclic error-correcting code are determined simultaneously. These can subsequently be applied to expose the content of memory pages in the raw NAND flash dump and prepare these for further processing with media analysis tools. The techniques were tested on raw NAND flash memory dumps of four different devices and in all cases LFSR-based scrambling and binary cyclic error-correcting codes were in use.  相似文献   
48.
提出了一种数制转换的快速算法并在51系列单片机为核心的智能仪表设计中得到实现。通过与传统算法的比较,平均转换速度提高4倍以上,同时扩大了十进制数的输入范围、减少了程序存储空间。该算法在提高智能化仪表的运算速度方面,具有很高的推广应用价值。  相似文献   
49.
To increase throughput for DNA typing, we examined fast PCR cycling using AmpFlSTR Identifiler by three methods. In this study, we reduced PCR running times by 1/3 to 2/3 (approximately 1-2 h). This means DNA typing, including PCR reactions, can be completed within a timeframe ranging from 90 min to 2 h and 30 min.  相似文献   
50.
算法的大规模应用给人类生活带了前所未有的便捷,智能产品、智能搜索和导航、个性化的定制服务、精确的推荐等等。我们在享受如此高效便捷的同时,不免担心随之而来的诸如APP窃听、信息泄露、算法歧视等问题。传统法律制度下关于个人信息保护之规定已经不能满足社会变化所带来的新的需要。完善法律规定,建立“算法+专门机构”的双重监督模式,同时加强公民个人信息保护意识,才能更好地适应社会新变化。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号