首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   138篇
  免费   9篇
  国内免费   1篇
综合类   2篇
化学工业   13篇
机械仪表   3篇
建筑科学   1篇
能源动力   26篇
轻工业   39篇
水利工程   1篇
无线电   15篇
一般工业技术   17篇
自动化技术   31篇
  2024年   1篇
  2022年   5篇
  2021年   9篇
  2020年   16篇
  2019年   19篇
  2018年   10篇
  2017年   22篇
  2016年   8篇
  2015年   5篇
  2014年   3篇
  2013年   2篇
  2012年   14篇
  2011年   5篇
  2010年   7篇
  2009年   7篇
  2008年   5篇
  2007年   2篇
  2006年   3篇
  2005年   3篇
  1995年   1篇
  1988年   1篇
排序方式: 共有148条查询结果,搜索用时 20 毫秒
1.
Multimedia Tools and Applications - The advancement in communication and computation technologies has paved a way for connecting large number of heterogeneous devices to offer specified services....  相似文献   
2.
Social networking is one of the major source of massive data. Such data is not only difficult to store, manipulate and maintain but it’s open access makes it security prone. Therefore, robust and efficient authentication should be devised to make it invincible against the known security attacks. Moreover, social networking services are intrinsically multi-server environments, therefore compatible and suitable authentication should be designed accordingly. Sundry authentication protocols are being utilized at the moment and many of them are designed for single server architecture. This type of remote architecture resists each user to get itself register with each server if multiple servers are employed to offer online social services. Recently multi-server architecture for authentication has replaced the single server architecture, and it enable users to register once and procure services from multiple servers. A short time ago, Lu et al. presented two authentication schemes based on three factors. Furthermore, both Lu et al.’s schemes are designed for multi-server architecture. Lu et al. claimed the schemes to be invincible against the known attacks. However, this paper shows that one of the Lu et al.’s scheme is susceptible to user anonymity violation and impersonation attacks, whereas Lu et al.’s second scheme is susceptible to user impersonation attack. Therefore an enhanced scheme is introduced in this paper. The proposed scheme is more robust than subsisting schemes. The proposed scheme is thoroughly verified and validated with formal and informal security discussion, and through the popular automated tool ProVerif. The in-depth analysis affirms that proposed scheme is lightweight in terms of computations while attaining mutual authentication and is invincible against the known attacks, hence is more suitable for automated big data analysis for social multimedia networking environments.  相似文献   
3.

The edge computing model offers an ultimate platform to support scientific and real-time workflow-based applications over the edge of the network. However, scientific workflow scheduling and execution still facing challenges such as response time management and latency time. This leads to deal with the acquisition delay of servers, deployed at the edge of a network and reduces the overall completion time of workflow. Previous studies show that existing scheduling methods consider the static performance of the server and ignore the impact of resource acquisition delay when scheduling workflow tasks. Our proposed method presented a meta-heuristic algorithm to schedule the scientific workflow and minimize the overall completion time by properly managing the acquisition and transmission delays. We carry out extensive experiments and evaluations based on commercial clouds and various scientific workflow templates. The proposed method has approximately 7.7% better performance than the baseline algorithms, particularly in overall deadline constraint that gives a success rate.

  相似文献   
4.
Image processing algorithm is implemented to detect the grain boundary of the crystal using (SEM) Scanning Electron Microscopy. This paper presents a method for edge-detection in color image based on Sobel, Canny operator’s algorithm and discrete wavelet transform. The performance of these methods is effective and faster. Filtering is another approach to clear the noise of an image. Scanning Electron Microscopy (SEM) used to inspect semiconductor materials and devices for several decades, continues to increase in importance. Removal of noise is an important step in the image restoration process, but de-noising of the image has remained a challenging problem in recent research associated with image process. De-noising is used to remove the noise from corrupted images, while retaining the edges and other detailed features too are an essential part of de-noising.  相似文献   
5.
Vertical handover gain significant importance due to the enhancements in mobility models by the Fourth Generation (4G) technologies. However, these enhancements are limited to specific scenarios and hence do not provide support for generic mobility. Similarly, various schemes are proposed based on these mobility models but most of them are suffered from the high packet loss, frequent handovers, too early and late handovers, inappropriate network selection, etc. To address these challenges, a generic vertical handover management scheme for heterogeneous wireless networks is proposed in this article. The proposed scheme works in three phases. In the first phase, a handover triggering approach is designed to identify the appropriate place for initiating handover based on the estimated coverage area of a WLAN access point or cellular base station. In the second phase, fuzzy rule based system is designed to eliminate the inappropriate networks before deciding an optimal network for handover. In the third phase, a network selection scheme is developed based on the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) decision mechanism. Various parameters such as delay, jitter, Bit Error Rate (BER), packet loss, communication cost, response time, and network load are considered for selecting an optimal network. The proposed scheme is tested in a mobility scenario with different speeds of a mobile node ranging from very low to very high. The simulation results are compared with the existing decision models used for network selection and handover triggering approaches. The proposed scheme outperforms these schemes in terms of energy consumption, handover delay and time, packet loss, good put, etc.  相似文献   
6.
7.
Porous polymer scaffolds designed by the cryogel method are attractive materials for a range of tissue engineering applications. However, the use of toxic crosslinker for retaining the pore structure limits their clinical applications. In this research, acrylates (HEA/PEGDA, HEMA/PEGDA and PEGDA) were used in the low-temperature solid-state photopolymerization to produce porous scaffolds with good structural retention. The morphology, pore diameter, mineral deposition and water absorption of the scaffold were characterized by SEM and water absorption test respectively. Elemental analysis and cytotoxicity of the biomineralized scaffold were revealed by using XRD and MTT assay test. The PEGDA-derived scaffold showed good water absorption ability and a higher degree of porosity with larger pore size compared to others. XRD patterns and IR results confirmed the formation of hydroxyapatite crystals from an alternative socking process. The overall cell proliferation was excellent, where PEGDA-derived scaffold had the highest and the most uniform cell growth, while HEMA/PEGDA scaffold showed the least. These results suggest that the cell proliferation and adhesion are directly proportional to the pore size, the shape and the porosity of scaffolds.  相似文献   
8.

Heat and mass transfer effects in three-dimensional mixed convection flow of viscoelastic fluid over a stretching surface with convective boundary conditions are investigated. The fluid is electrically conducting in the presence of constant applied magnetic field. Conservation laws of energy and concentration are based upon the Soret and Dufour effects. First order chemical reaction effects are also taken into account. By using the similarity transformations, the governing boundary layer equations are reduced into the ordinary differential equations. The transformed boundary layer equations are computed for the series solutions. Dimensionless velocity, temperature, and concentration distributions are shown graphically for different values of involved parameters. Numerical values of local Nusselt and Sherwood numbers are computed and analyzed. It is found that the behaviors of viscoelastic, mixed convection, and concentration buoyancy parameters on the Nusselt and Sherwood numbers are similar. However, the Nusselt and Sherwood numbers have qualitative opposite effects for Biot number, thermophoretic parameter, and Soret-Dufour parameters.

  相似文献   
9.
10.
Silicon - The present study evaluated the effect of silicon (Si) seed priming and sulfur (S) foliar spray on drought tolerance of two contrasting maize hybrids viz. drought tolerant Hi-Corn 11 and...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号