全文获取类型
收费全文 | 484篇 |
免费 | 43篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 16篇 |
综合类 | 4篇 |
化学工业 | 147篇 |
金属工艺 | 16篇 |
机械仪表 | 22篇 |
建筑科学 | 19篇 |
能源动力 | 20篇 |
轻工业 | 53篇 |
水利工程 | 5篇 |
石油天然气 | 9篇 |
无线电 | 48篇 |
一般工业技术 | 80篇 |
冶金工业 | 11篇 |
原子能技术 | 8篇 |
自动化技术 | 72篇 |
出版年
2023年 | 10篇 |
2022年 | 16篇 |
2021年 | 30篇 |
2020年 | 24篇 |
2019年 | 28篇 |
2018年 | 45篇 |
2017年 | 33篇 |
2016年 | 31篇 |
2015年 | 23篇 |
2014年 | 27篇 |
2013年 | 45篇 |
2012年 | 28篇 |
2011年 | 35篇 |
2010年 | 28篇 |
2009年 | 24篇 |
2008年 | 18篇 |
2007年 | 22篇 |
2006年 | 15篇 |
2005年 | 10篇 |
2004年 | 7篇 |
2003年 | 4篇 |
2002年 | 5篇 |
2001年 | 1篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1993年 | 3篇 |
1990年 | 1篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1981年 | 1篇 |
1980年 | 3篇 |
1979年 | 2篇 |
排序方式: 共有530条查询结果,搜索用时 234 毫秒
91.
In this paper, we have proposed a hybrid denoising algorithm based on combining of the shearlet transform method, as a pre-processing step, with the Yaroslavsky’s filter, as a kernel smoother, on a wide class of images with various properties such as thin features and textures. In the other word, proposed algorithm is a two-step algorithm, where in the first step the image is filtered by shearlet transform method and in the second step the weighted Yaroslavsky’s filter is applied on result of first step. The weight coefficients of the Yaroslavsky’s filter are achieved by pixel similarities in the denoised image from the first step. The theoretical results are confirmed via simulations for 2D images corrupted by additive white Gaussian noise. Experimental results illustrate that proposed hybrid method has good effect on suppressing the pseudo-Gibbs and shearlet-like artifacts can obtain better performance in terms of mean square error (MSE), peak signal to noise ratio (PSNR) and structural similarity (SSIM) index rather than existing state-of-the-art methods. 相似文献
92.
Mehrdad Aliasgari Marina Blanton Fattaneh Bayatbabolghani 《International Journal of Information Security》2017,16(6):577-601
Hidden Markov model (HMM) is a popular statistical tool with a large number of applications in pattern recognition. In some of these applications, such as speaker recognition, the computation involves personal data that can identify individuals and must be protected. We thus treat the problem of designing privacy-preserving techniques for HMM and companion Gaussian mixture model computation suitable for use in speaker recognition and other applications. We provide secure solutions for both two-party and multi-party computation models and both semi-honest and malicious settings. In the two-party setting, the server does not have access in the clear to either the user-based HMM or user input (i.e., current observations) and thus the computation is based on threshold homomorphic encryption, while the multi-party setting uses threshold linear secret sharing as the underlying data protection mechanism. All solutions use floating-point arithmetic, which allows us to achieve high accuracy and provable security guarantees, while maintaining reasonable performance. A substantial part of this work is dedicated to building secure protocols for floating-point operations in the two-party setting, which are of independent interest. 相似文献
93.
Swallow: Resource and Tag Recommender System Based on Heat Diffusion Algorithm in Social Annotation Systems 下载免费PDF全文
Vahideh Amel Mahboob Mehrdad Jalali Majid Vafaei Jahan Pegah Barekati 《Computational Intelligence》2017,33(1):99-118
Social annotation systems (SAS) allow users to annotate different online resources with keywords (tags). These systems help users in finding, organizing, and retrieving online resources to significantly provide collaborative semantic data to be potentially applied by recommender systems. Previous studies on SAS had been worked on tag recommendation. Recently, SAS‐based resource recommendation has received more attention by scholars. In the most of such systems, with respect to annotated tags, searched resources are recommended to user, and their recent behavior and click‐through is not taken into account. In the current study, to be able to design and implement a more precise recommender system, because of previous users' tagging data and users' current click‐through, it was attempted to work on the both resource (such as web pages, research papers, etc.) and tag recommendation problem. Moreover, by applying heat diffusion algorithm during the recommendation process, more diverse options would present to the user. After extracting data, such as users, tags, resources, and relations between them, the recommender system so called “Swallow” creates a graph‐based pattern from system log files. Eventually, following the active user path and observing heat conduction on the created pattern, user further goals are anticipated and recommended to him. Test results on SAS data set demonstrate that the proposed algorithm has improved the accuracy of former recommendation algorithms. 相似文献
94.
Ashkan Mohsenzadeh Ledari Seyed Hamid Reza Pasandideh Mehrdad Nouri Koupaei 《Journal of Intelligent Manufacturing》2018,29(1):237-244
Newsvendor model is one of the most important issues in inventory models. In this paper, we investigate a newsvendor model without lead time, which have difference between distributer and wholesale/retailer. At the end of day, the residual products of newsvendor sold to a secondary market at a unit salvage value. Also, the amount of orders that cannot be met, should be paid the penalty for each unit. In addition, in each one of channels, the percent of these orders cannot be met by the distributer. Then, the newsvendor provides the difference between the amount that ordered to distributor and the amount that met in the occurrence of interruptions risk as a special order from the manufacturer, more expensive than the price of distributor. The limitations of the study are the procurement budget that used for special order. Finally, the model is applied in a real case as a numerical example to determine order amount that maximize profit and is solved by Maple 15. The Kuhn–Tucker method was used to illustrate the optimal points that have necessary condition. Also, the hessian matrix was used to illustrate the optimal points that have sufficient condition for optimization. Consequently, the considered points are global optimum. The main factor in the disruption risk that effect on the ordering amount and profit, are including the probability of appearing of disruption \((p_i)\) and a percent of ordering amount which are met in the case of appearing of disruption \((y_i)\). Therefore, the analysis of sensitivity has been done on two parameters of \(p_i\) and \(y_i\) by using contour curves. According to result of solved problem, the change of disruption appearance reduced. Finally, the proposed method besides being simple is so exact which is sensible in the solved problems. 相似文献
95.
Saeed Mehrjoo Abdolhossein Sarrafzadeh Mehrdad Mehrjoo 《Computational Intelligence》2015,31(3):513-531
This article proposes a novel algorithm to improve the lifetime of a wireless sensor network. This algorithm employs swarm intelligence algorithms in conjunction with compressive sensing theory to build up the routing trees and to decrease the communication rate. The main contribution of this article is to extend swarm intelligence algorithms to build a routing tree in such a way that it can be utilized to maximize efficiency, thereby rectifying the delay problem of compressive sensing theory and improving the network lifetime. In addition, our approach offers accurate data recovery from small amounts of compressed data. Simulation results show that our approach can effectively extend the network lifetime of a large‐scale wireless sensor network. 相似文献
96.
We study the unsteady pulsatile flow of blood in an artery, where the effects of body acceleration are included. The blood is modeled as a modified second-grade fluid where the viscosity and the normal stress coefficients depend on the shear rate. It is assumed that the blood near the wall behaves as a Newtonian fluid, and in the core as a non-Newtonian fluid. This phenomenon is also known as the Fahraeus–Lindqvist effect. The equations are made dimensionless and solved numerically. 相似文献
97.
In traditional CAD (computer-aided design) systems, the manipulation of points and lines is often difficult because designers manipulate virtual objects through their vision system. Nowadays, designers can explore and manipulate virtual objects in haptic-enabled CAD systems using haptic devices. Haptic devices can present force feedbacks to pull or push the users’ hands into desirable targets. Of course the intent is for the user to experience the same sensations in the virtual realm as they would in the real world. Thus, sub-threshold forces, which cannot be perceived by users, should be incorporated in the control of users’ movements. As a result, our attention is directed to study the effect of sub-threshold forces on the accuracy of movement in a haptic-enabled virtual reality (VR) system. In this study, our goal is to manipulate users’ hands using controlled forces such that users cannot notice the forces. With this in mind, we have constructed a haptic-enabled virtual environment (VE) to carry out a multi-modal Fitts’ type task. In the task, subjects could see the position of the haptic probe in the VE where forces were applied on their hands. Basically, the accuracy of subjects was measured using a performance index when the intensity and direction of forces changed. A psychophysical method was utilized to ensure that the forces were below the force threshold of the human force perception. Results indicate that the accuracy is affected by the intensity and direction of sub-threshold forces even when users are allowed to control their actions through visual feedbacks. 相似文献
98.
Mehrdad Lakestani 《Computer Physics Communications》2010,181(5):957-966
Two numerical techniques are presented for solving the solution of Riccati differential equation. These methods use the cubic B-spline scaling functions and Chebyshev cardinal functions. The methods consist of expanding the required approximate solution as the elements of cubic B-spline scaling function or Chebyshev cardinal functions. Using the operational matrix of derivative, we reduce the problem to a set of algebraic equations. Some numerical examples are included to demonstrate the validity and applicability of the new techniques. The methods are easy to implement and produce very accurate results. 相似文献
99.
Polynomial interpolations, one of the most common interpolations used in finite element methods (FEMs), are a workhorse of many FEM codes. These interpolations are readily available for all kinds of elements, and using them for modeling the variation of elastic moduli in graded elements is thus both convenient and natural. Yet, like all polynomial interpolations, they can be prone to oscillations that can result in regions of negative elastic modulus in the element, even with only positive nodal values of elastic moduli. The result of these negative modulus regions, even if the region is small, can be unexpected singularities in the solution. This defeats the purpose of using polynomial interpolations for capturing material grading in the element. We demonstrate the issue using three-node quadratic Lagrange interpolations of material grading in otherwise isoparametric p-type elements and show how to avoid this problem. 相似文献
100.
Mehrdad Khatami Hossein Heli Peyman Mohammadzadeh Jahani Hakim Azizi Marcos Augusto Lima Nobre 《IET nanobiotechnology / IET》2017,11(6):709
Nanoparticles of copper/cuprous oxide (Cu/Cu2 O) were successfully synthesised by a green chemistry route. The synthesis process was carried out using an extract of Stachys lavandulifolia as both reducing and capping agents with a facile procedure. The nanoparticles were characterised by different techniques including X‐ray diffraction, indicating that the synthesised sample comprised both copper and cuprous oxide entity. The nanoparticles had a mean size of 80 nm and represented an impressive bactericidal effect on Pseudomonas aeruginosa.Inspec keywords: copper, copper compounds, nanoparticles, nanofabrication, nanomedicine, antibacterial activity, X‐ray diffractionOther keywords: nanoparticles synthesis, Stachys lavandulifolia, antibacterial activity, green chemistry route, reducing agents, capping agents, X‐ray diffraction, bactericidal effect, Pseudomonas aeruginosa, Cu‐Cu2 O 相似文献