首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   609篇
  免费   18篇
电工技术   5篇
综合类   1篇
化学工业   108篇
金属工艺   26篇
机械仪表   16篇
建筑科学   18篇
能源动力   23篇
轻工业   28篇
水利工程   2篇
无线电   101篇
一般工业技术   105篇
冶金工业   89篇
原子能技术   7篇
自动化技术   98篇
  2024年   4篇
  2022年   10篇
  2021年   13篇
  2020年   11篇
  2019年   18篇
  2018年   16篇
  2017年   19篇
  2016年   11篇
  2015年   15篇
  2014年   11篇
  2013年   19篇
  2012年   24篇
  2011年   46篇
  2010年   40篇
  2009年   33篇
  2008年   28篇
  2007年   27篇
  2006年   37篇
  2005年   21篇
  2004年   18篇
  2003年   13篇
  2002年   10篇
  2001年   7篇
  2000年   20篇
  1999年   19篇
  1998年   23篇
  1997年   20篇
  1996年   10篇
  1995年   13篇
  1994年   6篇
  1993年   8篇
  1992年   6篇
  1990年   3篇
  1989年   2篇
  1988年   2篇
  1987年   3篇
  1986年   1篇
  1985年   3篇
  1984年   5篇
  1983年   3篇
  1982年   5篇
  1981年   3篇
  1980年   4篇
  1979年   2篇
  1978年   2篇
  1977年   3篇
  1976年   4篇
  1975年   2篇
  1973年   2篇
  1971年   1篇
排序方式: 共有627条查询结果,搜索用时 15 毫秒
21.
Android productivity apps have provided the facility of having a constantly accessible and productive workforce to the information and work capabilities needed by the users. With hundreds of productivity apps available in the Android app market, it is necessary to develop a taxonomy for the forensic investigators and the end users to allow them to know what personal data remnants are available from the productivity apps. In this paper, 30 popular Android productivity apps were examined. A logical extraction of the Android phone was collected by using a well-known mobile forensic tool- XRY to extract various information of forensic interest such as user email ID and list of tasks. Based on the findings, a two-dimensional taxonomy of the forensic artefacts of the productivity apps is proposed with the app categories in one dimension and the classes of artefacts in the other dimension. The artefacts identified in the study of the apps are summarised using the taxonomy. In addition, a comparison with the existing forensic taxonomies of different categories of Android apps is provided to facilitate timely collection and analysis of evidentiary materials from mobile devices.  相似文献   
22.
To ensure the integrity of images compressed using block truncation coding (BTC), a tamper detection and image recovery scheme is proposed in this paper. In this scheme, the size of the authentication data can be adaptively selected according to the user’s requirement. The authentication data is embedded in the value differences of the quantization levels in each BTC-compressed image block. Multiple copies of the recovery data are embedded into the bit maps of the smooth blocks. Experimental results show that the proposed scheme performs well in terms of detection precision and the embedded image quality. Meanwhile, the tampered areas can be roughly recovered by using the proposed scheme.  相似文献   
23.
Zhang  Zhimin  Ning  Huansheng  Shi  Feifei  Farha  Fadi  Xu  Yang  Xu  Jiabo  Zhang  Fan  Choo  Kim-Kwang Raymond 《Artificial Intelligence Review》2022,55(2):1029-1053
Artificial Intelligence Review - In recent times, there have been attempts to leverage artificial intelligence (AI) techniques in a broad range of cyber security applications. Therefore, this paper...  相似文献   
24.
The majority of visualizations on the web are still stored as raster images, making them inaccessible to visually impaired users. We propose a deep‐neural‐network‐based approach that automatically recognizes key elements in a visualization, including a visualization type, graphical elements, labels, legends, and most importantly, the original data conveyed in the visualization. We leverage such extracted information to provide visually impaired people with the reading of the extracted information. Based on interviews with visually impaired users, we built a Google Chrome extension designed to work with screen reader software to automatically decode charts on a webpage using our pipeline. We compared the performance of the back‐end algorithm with existing methods and evaluated the utility using qualitative feedback from visually impaired users.  相似文献   
25.
The electroencephalogram (EEG) is a representative signal containing information about the condition of the brain. The shape of the wave may contain useful information about the state of the brain. However, the human observer cannot directly monitor these subtle details. Besides, since bio-signals are highly subjective, the symptoms may appear at random in the time scale. Therefore, the EEG signal parameters, extracted and analyzed using computers, are highly useful in diagnostics. The aim of this work is to compare the different entropy estimators when applied to EEG data from normal and epileptic subjects. The results obtained indicate that entropy estimators can distinguish normal and epileptic EEG data with more than 95% confidence (using t-test). The classification ability of the entropy measures is tested using ANFIS classifier. The results are promising and a classification accuracy of about 90% is achieved.  相似文献   
26.
GridFTP is a secure and reliable high-performance parallel data transfer protocol used for transferring massive amounts of widely distributed data. Currently it allows users to configure the number of parallel streams and socket buffer size. However, its tuning procedure for optimal combination is a time consuming task. The socket handlers and buffers are important system resources and must therefore be carefully managed. In this paper, we propose a scheme to achieve high throughput even with a smaller buffer size, and also derive a regression equation to predict the optimal combination of resources for a connection. To improve the performance, the TCP based on our scheme obtains higher throughput and spends less memory for the same throughput than the original TCP scheme. In addition, the regression equation is verified by comparing measured and predicted values, and we apply the equation to an actual experiment on the KOrea advanced REsearch Network (KOREN). The result demonstrates that the equation provides excellent predictions with only an 8% error boundary.  相似文献   
27.
In this digital era, where Internet of Things (IoT) is increasing day by day, use of resource constrained devices is also increasing. Indeed, the features such as low cost, less maintenance, more adaptive to hostile environment, etc. make the wireless multimedia devices to be the best choice as the resource constrained devices. For the security, the end user device requires to establish the session key with the server before transferring the data. Mobile is one of the device having more and more usage as wireless multimedia device in recent years. In 2013, Li et al. proposed an efficient scheme for the wireless mobile communications and claimed it to be secure against various attacks. Recently, Shen et al. claimed that the scheme of Li et al. is still vulnerable to the privileged insider attack, the stolen verifier attack and finally proposed a scheme to withstand the mentioned and other attacks. However, in this paper we claim that the scheme of Shen et al. is still susceptible to the user anonymity, the session specific temporary information attack and the replay attack. In addition, Shen et al.’s scheme requires more time due to many operations. Further, we propose an efficient scheme that is secure against various known attacks and due to reduced time complexity our scheme is a preferred choice for the wireless mobile networks and hence for wireless multimedia systems.  相似文献   
28.
A correlation was made of the microstructure, wear resistance, and fracture toughness of hardfacing alloys reinforced with complex carbides. The hardfacing alloys were deposited twice on a low-carbon steel substrate by a submerged arc welding (SAW) method. In order to investigate the effect of complex carbides, different fractions of complex carbide powders included inside hardfacing electrodes were employed. Microstructural analysis of the hardfaced layer showed that cuboidal carbides, in which a TiC carbide core was encircled by a WC carbide, and rod-type carbides, in which W and Ti were mixed, were homogeneously distributed in the bainitic matrix. In the surface layer hardfaced with FeWTiC powders, more complex carbides were formed, because of the efficient melting and solidification during hardfacing, than in the case of hardfacing with WTiC powders. As the volume fraction of complex carbides, particularly that of cuboidal carbides, increased, the hardness and wear resistance increased. In-situ observation of the fracture process showed that microcracks were initiated at complex carbides and that shear bands were formed between them, leading to ductile fracture. The hardness, wear resistance, and fracture toughness of the hardfacing alloys reinforced with complex carbides were improved in comparison with high-chromium white-iron hardfacing alloys, because of the homogeneous distribution of hard and fine complex carbides in the bainitic matrix.  相似文献   
29.
We have developed a novel algorithm to adjust link-bandwidths of a given multicast tree, which sends a message with sizer from a source to a multiple destinations taking into consideration pipelined router. The algorithm that we have developed tries to minimize the end-to-end delay time and resources such as bandwidths of a multicast tree, and performs admirably well in any given multicast tree. Our evaluation shows that the proposed algorithm dramatically reduces the end-to-end delay time and resources reserved to satisfy the time-constraints. This work was supported in parts by BK21 and the Ministry of Information and Communication, Korea. Corresponding author: H. Choo.  相似文献   
30.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号