全文获取类型
收费全文 | 1432篇 |
免费 | 74篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 22篇 |
综合类 | 3篇 |
化学工业 | 332篇 |
金属工艺 | 33篇 |
机械仪表 | 48篇 |
建筑科学 | 23篇 |
能源动力 | 106篇 |
轻工业 | 138篇 |
水利工程 | 8篇 |
石油天然气 | 9篇 |
无线电 | 185篇 |
一般工业技术 | 274篇 |
冶金工业 | 71篇 |
原子能技术 | 3篇 |
自动化技术 | 256篇 |
出版年
2024年 | 6篇 |
2023年 | 32篇 |
2022年 | 71篇 |
2021年 | 112篇 |
2020年 | 86篇 |
2019年 | 75篇 |
2018年 | 109篇 |
2017年 | 83篇 |
2016年 | 72篇 |
2015年 | 51篇 |
2014年 | 70篇 |
2013年 | 122篇 |
2012年 | 69篇 |
2011年 | 80篇 |
2010年 | 63篇 |
2009年 | 50篇 |
2008年 | 45篇 |
2007年 | 42篇 |
2006年 | 35篇 |
2005年 | 27篇 |
2004年 | 11篇 |
2003年 | 17篇 |
2002年 | 7篇 |
2001年 | 13篇 |
2000年 | 10篇 |
1999年 | 6篇 |
1998年 | 25篇 |
1997年 | 14篇 |
1996年 | 9篇 |
1995年 | 14篇 |
1994年 | 10篇 |
1993年 | 5篇 |
1992年 | 3篇 |
1991年 | 4篇 |
1990年 | 5篇 |
1989年 | 7篇 |
1988年 | 3篇 |
1987年 | 6篇 |
1986年 | 3篇 |
1985年 | 6篇 |
1984年 | 6篇 |
1983年 | 3篇 |
1982年 | 2篇 |
1981年 | 7篇 |
1980年 | 2篇 |
1979年 | 5篇 |
1978年 | 2篇 |
1975年 | 2篇 |
1974年 | 2篇 |
1972年 | 1篇 |
排序方式: 共有1511条查询结果,搜索用时 15 毫秒
11.
Deepthi N. Ratnayake Hassan B. Kazemian Syed A. Yusuf 《Neural computing & applications》2014,25(1):1-14
Any sniffer can see the information sent through unprotected ‘probe request messages’ and ‘probe response messages’ in wireless local area networks (WLAN). A station (STA) can send probe requests to trigger probe responses by simply spoofing a genuine media access control (MAC) address to deceive access point (AP) controlled access list. Adversaries exploit these weaknesses to flood APs with probe requests, which can generate a denial of service (DoS) to genuine STAs. The research examines traffic of a WLAN using supervised feed-forward neural network classifier to identify genuine frames from rogue frames. The novel feature of this approach is to capture the genuine user and attacker training data separately and label them prior to training without network administrator’s intervention. The model’s performance is validated using self-consistency and fivefold cross-validation tests. The simulation is comprehensive and takes into account the real-world environment. The results show that this approach detects probe request attacks extremely well. This solution also detects an attack during an early stage of the communication, so that it can prevent any other attacks when an adversary contemplates to start breaking into the network. 相似文献
12.
A polyaniline–TiO2 composite (PTC) was prepared by oxidative polymerization of aniline in phosphoric acid with ammonium persulphate, in the presence of TiO2. The composite was characterized by spectroscopic methods. An acrylic paint containing the PTC was prepared and the coating formed on magnesium alloy was evaluated by electrochemical impedance spectroscopy after exposure to salt spray test for a period of 250 h. The coating containing the PTC was found to protect the magnesium alloy more efficiently than the coating containing polyaniline. 相似文献
13.
Neural Processing Letters - The motivation behind this paper is to explore the issue of synchronization of fractional order neutral type fuzzy cellular neural networks with state feedback control.... 相似文献
14.
Omar?N.?Al-BoeridiEmail author S.?M.?Syed Ahmad S.?P.?Koh 《Neural computing & applications》2015,26(6):1505-1513
An off-line handwriting recognition (OFHR) system is a computerized system that is capable of intelligently converting human handwritten data extracted from scanned paper documents into an equivalent text format. This paper studies a proposed OFHR for Malaysian bank cheques written in the Malay language. The proposed system comprised of three components, namely a character recognition system (CRS), a hybrid decision system and lexical word classification system. Two types of feature extraction techniques have been used in the system, namely statistical and geometrical. Experiments show that the statistical feature is reliable, accessible and offers results that are more accurate. The CRS in this system was implemented using two individual classifiers, namely an adaptive multilayer feed-forward back-propagation neural network and support vector machine. The results of this study are very promising and could generalize to the entire Malay lexical dictionary in future work toward scaled-up applications. 相似文献
15.
Ayesha Kulsoom Di Xiao Aqeel-ur-Rehman Syed Ali Abbas 《Multimedia Tools and Applications》2016,75(1):1-23
A novel image encryption algorithm in streaming mode is proposed which exhaustively employs an entire set of DNA complementary rules alongwith one dimensional chaotic maps. The proposed algorithm is highly efficient due to encrypting the subset of digital image which contains 92.125 % of information. DNA addition operation is carried out on this MSB part. The core idea of the proposed scheme is to scramble the whole image by means of piecewise linear chaotic map (PWLCM) followed by decomposition of image into most significant bits (MSB) and least significant bits (LSB). The logistic sequence is XORed with the decoded MSB and LSB parts separately and finally these two parts are combined to get the ciphered image. The parameters for PWLCM, logistic map and selection of different DNA rules for encoding and decoding of both parts of an image are derived from 128-bit MD5 hash of the plain image. Simulated experimental results in terms of quantitative and qualitative ways prove the encryption quality. Efficiency and robustness against different noises make the proposed cipher a good candidate for real time applications. 相似文献
16.
讨论了以基于前缀封闭集合的Heyting代数的直觉解释的线性μ-演算(IμTL)作为描述“假设-保证”的逻辑基础的问题,提出了一个基于IμTL的“假设-保证”规则.该规则比往常应用线性时序逻辑(LTL)作为规范语言的那些规则具有更好的表达能力,扩展了对形如“always ?”等安全性质的“假设-保证”的范围,具备更一般的“假设-保证”推理能力及对循环推理的支持. 相似文献
17.
Allon Rai Sangita Ale Syed S. Rizvi Aasia Riasat 《通讯和计算机》2009,6(10):37-43,53
With the tremendous applications of the wireless sensor network, self-localization has become one of the challenging subject matter that has gained attention of many researchers in the field of wireless sensor network. Localization is the process of assigning or computing the location of the sensor nodes in a sensor network. As the sensor nodes are deployed randomly, we do not have any knowledge about their location in advance. As a result, this becomes very important that they localize themselves as manual deployment of sensor node is not feasible. Also, in WSN the main problem is the power as the sensor nodes have very limited power source. This paper provides a novel solution for localizing the sensor nodes using controlled power of the beacon nodes such that we will have longer life of the beacon nodes which plays a vital role in the process of localization as it is the only special nodes that has the information about its location when they are deployed such that the remaining ordinary nodes can localize themselves in accordance with these beacon node. We develop a novel model that first finds the distance of the sensor nodes then it finds the location of the unknown sensor nodes in power efficient manner. Our simulation results show the effectiveness of the proposed methodology in terms of controlled and reduced power. 相似文献
18.
Syed Ali Fathima S. J. Lalitha T. Ahmad Faiyaz Karthick S. 《Wireless Personal Communications》2022,124(2):1815-1839
Wireless Personal Communications - Wireless Underground Networks comprise the ability to constantly monitor several physical parameters such as ground temperature, water level and soil condition,... 相似文献
19.
Anwar Syed Muhammad Irmakci Ismail Torigian Drew A. Jambawalikar Sachin Papadakis Georgios Z. Akgun Can Ellermann Jutta Akcakaya Mehmet Bagci Ulas 《Journal of Signal Processing Systems》2022,94(5):497-510
Journal of Signal Processing Systems - Segmentation of thigh tissues (muscle, fat, inter-muscular adipose tissue (IMAT), bone, and bone marrow) from magnetic resonance imaging (MRI) scans is useful... 相似文献
20.
Syed Waqar Haider Wouter C. Brink Neeraj Buch 《International Journal of Pavement Engineering》2017,18(7):645-657
The performance prediction models in the Pavement-ME design software are nationally calibrated using in-service pavement material properties, pavement structure, climate and truck loadings, and performance data obtained from the Long-Term Pavement Performance programme. The nationally calibrated models may not perform well if the inputs and performance data used to calibrate those do not represent the local design and construction practices. Therefore, before implementing the new M-E design procedure, each state highway agency (SHA) should evaluate how well the nationally calibrated performance models predict the measured field performance. The local calibrations of the Pavement-ME performance models are recommended to improve the performance prediction capabilities to reflect the unique conditions and design practices. During the local calibration process, the traditional calibration techniques (split sampling) may not necessarily provide adequate results when limited number of pavement sections are available. Consequently, there is a need to employ statistical and resampling methodologies that are more efficient and robust for model calibrations given the data related challenges encountered by SHAs. The main objectives of the paper are to demonstrate the local calibration of rigid pavement performance models and compare the calibration results based on different resampling techniques. The bootstrap is a non-parametric and robust resampling technique for estimating standard errors and confidence intervals of a statistic. The main advantage of bootstrapping is that model parameters estimation is possible without making distribution assumptions. This paper presents the use of bootstrapping and jackknifing to locally calibrate the transverse cracking and IRI performance models for newly constructed and rehabilitated rigid pavements. The results of the calibration show that the standard error of estimate and bias are lower compared to the traditional sampling methods. In addition, the validation statistics are similar to that of the locally calibrated model, especially for the IRI model, which indicates robustness of the local model coefficients. 相似文献