全文获取类型
收费全文 | 609篇 |
免费 | 18篇 |
专业分类
电工技术 | 5篇 |
综合类 | 1篇 |
化学工业 | 108篇 |
金属工艺 | 26篇 |
机械仪表 | 16篇 |
建筑科学 | 18篇 |
能源动力 | 23篇 |
轻工业 | 28篇 |
水利工程 | 2篇 |
无线电 | 101篇 |
一般工业技术 | 105篇 |
冶金工业 | 89篇 |
原子能技术 | 7篇 |
自动化技术 | 98篇 |
出版年
2024年 | 4篇 |
2022年 | 10篇 |
2021年 | 13篇 |
2020年 | 11篇 |
2019年 | 18篇 |
2018年 | 16篇 |
2017年 | 19篇 |
2016年 | 11篇 |
2015年 | 15篇 |
2014年 | 11篇 |
2013年 | 19篇 |
2012年 | 24篇 |
2011年 | 46篇 |
2010年 | 40篇 |
2009年 | 33篇 |
2008年 | 28篇 |
2007年 | 27篇 |
2006年 | 37篇 |
2005年 | 21篇 |
2004年 | 18篇 |
2003年 | 13篇 |
2002年 | 10篇 |
2001年 | 7篇 |
2000年 | 20篇 |
1999年 | 19篇 |
1998年 | 23篇 |
1997年 | 20篇 |
1996年 | 10篇 |
1995年 | 13篇 |
1994年 | 6篇 |
1993年 | 8篇 |
1992年 | 6篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1988年 | 2篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1985年 | 3篇 |
1984年 | 5篇 |
1983年 | 3篇 |
1982年 | 5篇 |
1981年 | 3篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1978年 | 2篇 |
1977年 | 3篇 |
1976年 | 4篇 |
1975年 | 2篇 |
1973年 | 2篇 |
1971年 | 1篇 |
排序方式: 共有627条查询结果,搜索用时 15 毫秒
21.
Abdullah Azfar Kim-Kwang Raymond Choo Lin Liu 《Multimedia Tools and Applications》2017,76(3):3313-3341
Android productivity apps have provided the facility of having a constantly accessible and productive workforce to the information and work capabilities needed by the users. With hundreds of productivity apps available in the Android app market, it is necessary to develop a taxonomy for the forensic investigators and the end users to allow them to know what personal data remnants are available from the productivity apps. In this paper, 30 popular Android productivity apps were examined. A logical extraction of the Android phone was collected by using a well-known mobile forensic tool- XRY to extract various information of forensic interest such as user email ID and list of tasks. Based on the findings, a two-dimensional taxonomy of the forensic artefacts of the productivity apps is proposed with the app categories in one dimension and the classes of artefacts in the other dimension. The artefacts identified in the study of the apps are summarised using the taxonomy. In addition, a comparison with the existing forensic taxonomies of different categories of Android apps is provided to facilitate timely collection and analysis of evidentiary materials from mobile devices. 相似文献
22.
Yu-Chen Hu Kim-Kwang Raymond Choo Wu-Lin Chen 《Multimedia Tools and Applications》2017,76(14):15435-15463
To ensure the integrity of images compressed using block truncation coding (BTC), a tamper detection and image recovery scheme is proposed in this paper. In this scheme, the size of the authentication data can be adaptively selected according to the user’s requirement. The authentication data is embedded in the value differences of the quantization levels in each BTC-compressed image block. Multiple copies of the recovery data are embedded into the bit maps of the smooth blocks. Experimental results show that the proposed scheme performs well in terms of detection precision and the embedded image quality. Meanwhile, the tampered areas can be roughly recovered by using the proposed scheme. 相似文献
23.
Zhang Zhimin Ning Huansheng Shi Feifei Farha Fadi Xu Yang Xu Jiabo Zhang Fan Choo Kim-Kwang Raymond 《Artificial Intelligence Review》2022,55(2):1029-1053
Artificial Intelligence Review - In recent times, there have been attempts to leverage artificial intelligence (AI) techniques in a broad range of cyber security applications. Therefore, this paper... 相似文献
24.
Jinho Choi Sanghun Jung Deok Gun Park Jaegul Choo Niklas Elmqvist 《Computer Graphics Forum》2019,38(3):249-260
The majority of visualizations on the web are still stored as raster images, making them inaccessible to visually impaired users. We propose a deep‐neural‐network‐based approach that automatically recognizes key elements in a visualization, including a visualization type, graphical elements, labels, legends, and most importantly, the original data conveyed in the visualization. We leverage such extracted information to provide visually impaired people with the reading of the extracted information. Based on interviews with visually impaired users, we built a Google Chrome extension designed to work with screen reader software to automatically decode charts on a webpage using our pipeline. We compared the performance of the back‐end algorithm with existing methods and evaluated the utility using qualitative feedback from visually impaired users. 相似文献
25.
Kannathal N Choo ML Acharya UR Sadasivan PK 《Computer methods and programs in biomedicine》2005,80(3):187-194
The electroencephalogram (EEG) is a representative signal containing information about the condition of the brain. The shape of the wave may contain useful information about the state of the brain. However, the human observer cannot directly monitor these subtle details. Besides, since bio-signals are highly subjective, the symptoms may appear at random in the time scale. Therefore, the EEG signal parameters, extracted and analyzed using computers, are highly useful in diagnostics. The aim of this work is to compare the different entropy estimators when applied to EEG data from normal and epileptic subjects. The results obtained indicate that entropy estimators can distinguish normal and epileptic EEG data with more than 95% confidence (using t-test). The classification ability of the entropy measures is tested using ANFIS classifier. The results are promising and a classification accuracy of about 90% is achieved. 相似文献
26.
GridFTP is a secure and reliable high-performance parallel data transfer protocol used for transferring massive amounts of widely distributed data. Currently it allows users to configure the number of parallel streams and socket buffer size. However, its tuning procedure for optimal combination is a time consuming task. The socket handlers and buffers are important system resources and must therefore be carefully managed. In this paper, we propose a scheme to achieve high throughput even with a smaller buffer size, and also derive a regression equation to predict the optimal combination of resources for a connection. To improve the performance, the TCP based on our scheme obtains higher throughput and spends less memory for the same throughput than the original TCP scheme. In addition, the regression equation is verified by comparing measured and predicted values, and we apply the equation to an actual experiment on the KOrea advanced REsearch Network (KOREN). The result demonstrates that the equation provides excellent predictions with only an 8% error boundary. 相似文献
27.
Nishant Doshi Saru Kumari Dheerendra Mishra Xiong Li Kim-Kwang Raymond Choo Arun Kumar Sangaiah 《Multimedia Tools and Applications》2017,76(24):25893-25918
In this digital era, where Internet of Things (IoT) is increasing day by day, use of resource constrained devices is also increasing. Indeed, the features such as low cost, less maintenance, more adaptive to hostile environment, etc. make the wireless multimedia devices to be the best choice as the resource constrained devices. For the security, the end user device requires to establish the session key with the server before transferring the data. Mobile is one of the device having more and more usage as wireless multimedia device in recent years. In 2013, Li et al. proposed an efficient scheme for the wireless mobile communications and claimed it to be secure against various attacks. Recently, Shen et al. claimed that the scheme of Li et al. is still vulnerable to the privileged insider attack, the stolen verifier attack and finally proposed a scheme to withstand the mentioned and other attacks. However, in this paper we claim that the scheme of Shen et al. is still susceptible to the user anonymity, the session specific temporary information attack and the replay attack. In addition, Shen et al.’s scheme requires more time due to many operations. Further, we propose an efficient scheme that is secure against various known attacks and due to reduced time complexity our scheme is a preferred choice for the wireless mobile networks and hence for wireless multimedia systems. 相似文献
28.
Seong-Hun Choo Chang Kyu Kim Kwangjun Euh Sunghak Lee Jae-Young Jung Sangho Ahn 《Metallurgical and Materials Transactions A》2000,31(12):3041-3052
A correlation was made of the microstructure, wear resistance, and fracture toughness of hardfacing alloys reinforced with
complex carbides. The hardfacing alloys were deposited twice on a low-carbon steel substrate by a submerged arc welding (SAW)
method. In order to investigate the effect of complex carbides, different fractions of complex carbide powders included inside
hardfacing electrodes were employed. Microstructural analysis of the hardfaced layer showed that cuboidal carbides, in which
a TiC carbide core was encircled by a WC carbide, and rod-type carbides, in which W and Ti were mixed, were homogeneously
distributed in the bainitic matrix. In the surface layer hardfaced with FeWTiC powders, more complex carbides were formed,
because of the efficient melting and solidification during hardfacing, than in the case of hardfacing with WTiC powders. As
the volume fraction of complex carbides, particularly that of cuboidal carbides, increased, the hardness and wear resistance
increased. In-situ observation of the fracture process showed that microcracks were initiated at complex carbides and that shear bands were
formed between them, leading to ductile fracture. The hardness, wear resistance, and fracture toughness of the hardfacing
alloys reinforced with complex carbides were improved in comparison with high-chromium white-iron hardfacing alloys, because
of the homogeneous distribution of hard and fine complex carbides in the bainitic matrix. 相似文献
29.
We have developed a novel algorithm to adjust link-bandwidths of a given multicast tree, which sends a message with sizer from a source to a multiple destinations taking into consideration pipelined router. The algorithm that we have developed
tries to minimize the end-to-end delay time and resources such as bandwidths of a multicast tree, and performs admirably well
in any given multicast tree. Our evaluation shows that the proposed algorithm dramatically reduces the end-to-end delay time
and resources reserved to satisfy the time-constraints.
This work was supported in parts by BK21 and the Ministry of Information and Communication, Korea. Corresponding author: H.
Choo. 相似文献
30.