全文获取类型
收费全文 | 399篇 |
免费 | 23篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 7篇 |
化学工业 | 104篇 |
金属工艺 | 3篇 |
机械仪表 | 7篇 |
建筑科学 | 8篇 |
矿业工程 | 3篇 |
能源动力 | 29篇 |
轻工业 | 21篇 |
水利工程 | 2篇 |
石油天然气 | 4篇 |
无线电 | 63篇 |
一般工业技术 | 67篇 |
冶金工业 | 16篇 |
原子能技术 | 22篇 |
自动化技术 | 68篇 |
出版年
2024年 | 4篇 |
2023年 | 3篇 |
2022年 | 17篇 |
2021年 | 27篇 |
2020年 | 20篇 |
2019年 | 26篇 |
2018年 | 17篇 |
2017年 | 26篇 |
2016年 | 14篇 |
2015年 | 15篇 |
2014年 | 16篇 |
2013年 | 44篇 |
2012年 | 20篇 |
2011年 | 25篇 |
2010年 | 28篇 |
2009年 | 21篇 |
2008年 | 9篇 |
2007年 | 11篇 |
2006年 | 6篇 |
2005年 | 5篇 |
2004年 | 5篇 |
2003年 | 3篇 |
2002年 | 8篇 |
2001年 | 3篇 |
2000年 | 2篇 |
1999年 | 3篇 |
1998年 | 2篇 |
1997年 | 3篇 |
1996年 | 6篇 |
1994年 | 3篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1987年 | 2篇 |
1985年 | 2篇 |
1984年 | 3篇 |
1983年 | 1篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1980年 | 2篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1975年 | 2篇 |
1972年 | 1篇 |
1958年 | 1篇 |
排序方式: 共有424条查询结果,搜索用时 31 毫秒
361.
Minimizing the breach detection gap (BDG) for cyber-attacks is a big concern for all organizations and governments. Cyber-attacks are discovered daily, many of which have gone undetected for days to years before the victim organizations detect and deploy the cyber defense. Cyber defense solutions are advancing to combat risks and attacks from traditional to next-generation advanced defense protection solutions. However, many individuals, organizations and businesses continue to be hit by new waves of global cyber-attacks. In this paper, we present a blockchain-enabled federated cloud computing framework that uses the Dempster–Shafer theory to reduce BDG by continuously monitoring and analyzing the network traffics against cyber-attacks. We evaluate the proposed approach using numerical results, and the proposed approach outperforms the traditional approaches. 相似文献
362.
Rawat Seema Kumar Deepak Kumar Praveen Khattri Chhaya 《Neural computing & applications》2021,33(21):14823-14835
Neural Computing and Applications - The increasing popularity of massively online open courses (MOOCs) has been attracting a lot of learners. Despite the popularity, it has been observed that there... 相似文献
363.
Chouhan Siddharth Singh Kaul Ajay Singh Uday Pratap 《Multimedia Tools and Applications》2018,77(21):28483-28537
Multimedia Tools and Applications - Image segmentation is the method of partitioning an image into a group of pixels that are homogenous in some manner. The homogeneity dependents on some... 相似文献
364.
365.
Hemant Kumar Rawat Hemant Soni Helen Treichel 《Critical reviews in food science and nutrition》2017,57(18):3818-3829
Among microbial enzymes, inulinases or fructo-furanosylhydrolases have received considerable attention in the past decade, and as a result, a variety of applications based on enzymatic hydrolysis of inulin have been documented. Inulinases are employed for generation of fructose and inulo-oligosaccharides (IOS) in a single-step reaction with specificity. The high fructose syrup can be biotransformed into value-added products such as ethanol, single cell protein, while IOS are indicated in nutraceutical industry as prebiotic. Myriad microorganisms produce inulinases, and a number of exo- and endo-inulinases have been characterized and expressed in heterologous hosts. Initially, predominated by Aspergilli, Penicillia, and some yeasts (Kluyveromyces spp.), the list of prominent inulinase producers has gradually expanded and now includes extremophilic prokaryotes and marine-derived microorganisms producing robust inulinases. The present paper summarizes important developments about microbial inulinases and their applications made in the last decade. 相似文献
366.
367.
368.
Vehicular networks has been recently proposed to connect vehicles and form ad-hoc networks. Many safety and information-entertainment related applications have thus been proposed. These applications, however, potentially have unique privacy challenges. For example, the vehicle’s network identity is strictly linked to the owner’s identity due to the insurance liability. In this paper, we propose cross-layer privacy protection protocols including initialization, joining and exiting protocols. In addition, we also analytically discuss the optimization of the quantity of pseudonyms to save costs. The analytical and numerical results showed the effectiveness of the proposed methods. 相似文献
369.
In this paper, we introduce a smoothed piecewise linear network (SPLN) and develop second order training algorithms for it. An embedded feature selection algorithm is developed which minimizes training error with respect to distance measure weights. Then a method is presented which adjusts center vector locations in the SPLN. We also present a gradient method for optimizing the SPLN output weights. Results with several data sets show that the distance measure optimization, center vector optimization, and output weight optimization, individually and together, reduce testing errors in the final network. 相似文献
370.
M. Santhi Siddharth Sarangan K. Murali G. Lakshminarayanan 《International Journal of Electronics》2013,100(8):1101-1113
This article presents the performance analysis of novel pseudo 4-phase dual-rail protocol with self-reset and multiple-reset logic for high speed asynchronous applications. The self-reset logic eliminates the need for separate empty phase and hence reduces the number of transitions at the input and the output. The multiple-reset logic reduces the reset phase and hence increases the throughput. The performance of the pseudo 4-phase dual-rail protocol is compared with the existing 4-phase dual-rail protocol by implementing 8-bit and 16-bit asynchronously pipelined carry look ahead adders (CLA) in 0.35?µm technology. The time period decreases up to 32.58% and 35.93% respectively, the reset phase reduces up to 66.39% and 76.18%, respectively, and the operating frequency increases up to 48.4% and 56.2%, respectively, for 8- and 16-bit CLA adders with the pseudo 4-phase dual-rail protocol compared to the conventional 4-phase dual-rail protocol at the cost of increase in area of 8.8% and 3.3%, respectively. The delay-power product in ns-mW of the 8- and 16-bit CLAs is reduced at the maximum of 11.29% and 23.74%, respectively, with the pseudo 4-phase dual-rail protocol compared to the conventional 4-phase dual-rail protocol. The pseudo 4-phase dual-rail protocol is suitable for interfacing with synchronous environments. 相似文献