全文获取类型
收费全文 | 106篇 |
免费 | 6篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 34篇 |
机械仪表 | 1篇 |
建筑科学 | 4篇 |
能源动力 | 4篇 |
轻工业 | 12篇 |
水利工程 | 1篇 |
无线电 | 2篇 |
一般工业技术 | 20篇 |
冶金工业 | 8篇 |
自动化技术 | 25篇 |
出版年
2023年 | 7篇 |
2022年 | 3篇 |
2021年 | 5篇 |
2020年 | 11篇 |
2019年 | 3篇 |
2018年 | 2篇 |
2017年 | 5篇 |
2016年 | 5篇 |
2015年 | 4篇 |
2014年 | 7篇 |
2013年 | 5篇 |
2012年 | 5篇 |
2011年 | 7篇 |
2010年 | 7篇 |
2009年 | 3篇 |
2008年 | 6篇 |
2007年 | 3篇 |
2006年 | 2篇 |
2004年 | 4篇 |
2003年 | 1篇 |
2002年 | 1篇 |
2001年 | 1篇 |
2000年 | 2篇 |
1999年 | 4篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1991年 | 1篇 |
1987年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 2篇 |
排序方式: 共有112条查询结果,搜索用时 709 毫秒
1.
Yasmin AlNoamany Ahmed AlSum Michele C. Weigle Michael L. Nelson 《International Journal on Digital Libraries》2014,14(3-4):101-115
The Internet Archive’s (IA) Wayback Machine is the largest and oldest public Web archive and has become a significant repository of our recent history and cultural heritage. Despite its importance, there has been little research about how it is discovered and used. Based on Web access logs, we analyze what users are looking for, why they come to IA, where they come from, and how pages link to IA. We find that users request English pages the most, followed by the European languages. Most human users come to Web archives because they do not find the requested pages on the live Web. About 65 % of the requested archived pages no longer exist on the live Web. We find that more than 82 % of human sessions connect to the Wayback Machine via referrals from other Web sites, while only 15 % of robots have referrers. Most of the links (86 %) from Websites are to individual archived pages at specific points in time, and of those 83 % no longer exist on the live Web. Finally, we find that users who come from search engines browse more pages than users who come from external Web sites. 相似文献
2.
Rehana Yasmin Eike Ritter Guilin Wang 《International Journal of Information Security》2014,13(5):453-465
Designing efficient as well as secure cryptographic protocols for resource-constrained applications is a challenging task. In this paper, we formally analyze the security of an efficient one-pass authenticated key establishment protocol, the 1P-AKE protocol, which is primarily proposed for resource-constrained sensor nodes devices in wireless sensor networks (WSNs). In contrast to the existing identity-based one-pass key establishment protocols, the 1P-AKE protocol does not require any bilinear pairing computation in order to establish a key. This feature makes it really attractive for resource-constrained application environments, such as WSNs, where pairing computations are too expensive. We show that in the random oracle model, the 1P-AKE protocol is a secure authenticated one-pass key establishment protocol under the computational Diffie–Hellman assumption. The performance of the 1P-AKE protocol is also discussed and compared with the existing relevant protocols. 相似文献
3.
Yasmin AlNoamany Michele C. Weigle Michael L. Nelson 《International Journal on Digital Libraries》2016,17(3):203-221
Web archives have become a significant repository of our recent history and cultural heritage. Archival integrity and accuracy is a precondition for future cultural research. Currently, there are no quantitative or content-based tools that allow archivists to judge the quality of the Web archive captures. In this paper, we address the problems of detecting when a particular page in a Web archive collection has gone off-topic relative to its first archived copy. We do not delete off-topic pages (they remain part of the collection), but they are flagged as off-topic so they can be excluded for consideration for downstream services, such as collection summarization and thumbnail generation. We propose different methods (cosine similarity, Jaccard similarity, intersection of the 20 most frequent terms, Web-based kernel function, and the change in size using the number of words and content length) to detect when a page has gone off-topic. Those predicted off-topic pages will be presented to the collection’s curator for possible elimination from the collection or cessation of crawling. We created a gold standard data set from three Archive-It collections to evaluate the proposed methods at different thresholds. We found that combining cosine similarity at threshold 0.10 and change in size using word count at threshold ?0.85 performs the best with accuracy = 0.987, \(F_{1}\) score = 0.906, and AUC \(=\) 0.968. We evaluated the performance of the proposed method on several Archive-It collections. The average precision of detecting off-topic pages in the collections is 0.89. 相似文献
4.
5.
Ester Sporleder Yasmin Assan Shasha Rao David Warther Clive A. Prestidge Jean‐Olivier Durand Nicolas H. Voelcker 《Small (Weinheim an der Bergstrasse, Germany)》2017,13(29)
There is a pressing need to develop more effective therapeutics to fight cancer. An idyllic chemotherapeutic is expected to overcome drug resistance of tumors and minimize harmful side effects to healthy tissues. Antibody‐functionalized porous silicon nanoparticles loaded with a combination of chemotherapy drug and gold nanoclusters (AuNCs) are developed. These nanocarriers are observed to selectively deliver both payloads, the chemotherapy drug and AuNCs, to human B cells. The accumulation of AuNCs to target cells and subsequent exposure to an external electromagnetic field in the microwave region render them more susceptible to the codelivered drug. This approach represents a targeted two‐stage delivery nanocarrier that benefits from a dual therapeutic action that results in enhanced cytotoxicity. 相似文献
6.
Iftikhar Ahmad Ambreen Shahnaz Muhammad Asfand-e-Yar Wajeeha Khalil Yasmin Bano 《计算机、材料和连续体(英文)》2023,74(1):279-293
The demand for cloud computing has increased manifold in the recent past. More specifically, on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing needs. The cloud service provider fulfills different user requirements using virtualization - where a single physical machine can host multiple Virtual Machines. Each virtual machine potentially represents a different user environment such as operating system, programming environment, and applications. However, these cloud services use a large amount of electrical energy and produce greenhouse gases. To reduce the electricity cost and greenhouse gases, energy efficient algorithms must be designed. One specific area where energy efficient algorithms are required is virtual machine consolidation. With virtual machine consolidation, the objective is to utilize the minimum possible number of hosts to accommodate the required virtual machines, keeping in mind the service level agreement requirements. This research work formulates the virtual machine migration as an online problem and develops optimal offline and online algorithms for the single host virtual machine migration problem under a service level agreement constraint for an over-utilized host. The online algorithm is analyzed using a competitive analysis approach. In addition, an experimental analysis of the proposed algorithm on real-world data is conducted to showcase the improved performance of the proposed algorithm against the benchmark algorithms. Our proposed online algorithm consumed 25% less energy and performed 43% fewer migrations than the benchmark algorithms. 相似文献
7.
Yasmin Srivastava Christopher Rhodes Manuel Marquez Todd Thorsen 《Microfluidics and nanofluidics》2008,5(4):455-458
Hollow poly (vinylpyrrolidone) (PVP) + TiO2 and polypyrrole (core)/PVP (sheath) nanofibers were successfully electrospun using hydrodynamic fluid focusing. Utilizing
a two-dimensional fluid focusing technique previously applied to aqueous solutions, intersecting microchannels cast in (poly)dimethylsiloxane
were utilized to dynamically center core fluids in immiscible sheath fluids prior to electrospinning at the channel outlet.
Advantages of using microfluidic channel networks for the electrospinning of composite nanofibers include spatiotemporal control
over input reagents, ease of fabrication and the ability to focus the core stream into sheath layer without the need of complex
co-annular nozzles. 相似文献
8.
On the SPH tensile instability in forming viscous liquid drops 总被引:1,自引:0,他引:1
Smoothed Particle Hydrodynamics (SPH) simulations of elastic solids and viscous fluids may suffer from unphysical clustering of particles due to the tensile instability. Recent work has shown that in simulations of elastic or brittle solids the instability can be removed by an artificial stress whose form is derived from a linear perturbation analysis of the full set of governing SPH equations. While a linear analysis cannot be used to derive the corresponding form of the artificial stress for a viscous fluid, here we show that the same construction which applies to elastic solids may also work for viscous fluids provided that the constant parameter ? entering in the definition of the artificial stress is properly chosen. As a suitable test case, we model the formation of a circular van der Waals liquid drop and show that the tensile instability is removed when an artificial viscous force and energy generation term are added to the standard SPH equations of motion and energy, respectively. The optimal value of the constant ? is constrained by the ability of the model simulation to reproduce both a sufficiently smoothed density profile and the van der Waals phase diagram. 相似文献
9.
This paper focuses on the relevance of alternate discrete outcome frameworks for modeling driver injury severity. The study empirically compares the ordered response and unordered response models in the context of driver injury severity in traffic crashes. The alternative modeling approaches considered for the comparison exercise include: for the ordered response framework-ordered logit (OL), generalized ordered logit (GOL), mixed generalized ordered logit (MGOL) and for the unordered response framework-multinomial logit (MNL), nested logit (NL), ordered generalized extreme value logit (OGEV) and mixed multinomial logit (MMNL) model. A host of comparison metrics are computed to evaluate the performance of these alternative models. The study provides a comprehensive comparison exercise of the performance of ordered and unordered response models for examining the impact of exogenous factors on driver injury severity. The research also explores the effect of potential underreporting on alternative frameworks by artificially creating an underreported data sample from the driver injury severity sample. The empirical analysis is based on the 2010 General Estimates System (GES) data base—a nationally representative sample of road crashes collected and compiled from about 60 jurisdictions across the United States. The performance of the alternative frameworks are examined in the context of model estimation and validation (at the aggregate and disaggregate level). Further, the performance of the model frameworks in the presence of underreporting is explored, with and without corrections to the estimates. The results from these extensive analyses point toward the emergence of the GOL framework (MGOL) as a strong competitor to the MMNL model in modeling driver injury severity. 相似文献
10.
Joel Lanir Alan J. Wecker Tsvi Kuflik Yasmin Felberbaum 《Personal and Ubiquitous Computing》2016,20(4):635-651
We conducted an exploratory study that examines the use of shared mobile displays such as mobile projectors and tablets to support group activities. We compare how a small group of visitors use either a shared display or personal individual devices in a museum visit context, in both a navigation task and a media viewing task. Group proximity, decision making, leadership patterns, and interaction between group members as well as attitudes are analyzed. We report on various usage patterns observed with group use of shared displays and discuss user preferences in comparison with the non-shared handheld alternative. Results show how mobile shared displays can support and enhance the group experience, by providing a shared mobile environment. Mobile shared displays increase group cohesiveness as was shown by increased proximity and amount of discussion by participants. Users perceive the use of shared displays as both useful and enjoyable, with the caveat that many users still want to retain individual control. We discuss this trade-off between groupness and individual control, as well as provide an analysis of the relative advantages of each shared display option. 相似文献