全文获取类型
收费全文 | 199篇 |
免费 | 7篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 3篇 |
综合类 | 1篇 |
化学工业 | 39篇 |
金属工艺 | 3篇 |
机械仪表 | 1篇 |
建筑科学 | 8篇 |
能源动力 | 6篇 |
轻工业 | 35篇 |
水利工程 | 6篇 |
无线电 | 16篇 |
一般工业技术 | 16篇 |
冶金工业 | 15篇 |
原子能技术 | 5篇 |
自动化技术 | 54篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2022年 | 4篇 |
2021年 | 13篇 |
2020年 | 8篇 |
2019年 | 13篇 |
2018年 | 6篇 |
2017年 | 10篇 |
2016年 | 20篇 |
2015年 | 9篇 |
2014年 | 7篇 |
2013年 | 13篇 |
2012年 | 10篇 |
2011年 | 7篇 |
2010年 | 1篇 |
2009年 | 6篇 |
2008年 | 6篇 |
2007年 | 7篇 |
2006年 | 2篇 |
2005年 | 3篇 |
2004年 | 5篇 |
2003年 | 1篇 |
2002年 | 1篇 |
2001年 | 4篇 |
2000年 | 3篇 |
1999年 | 5篇 |
1998年 | 5篇 |
1997年 | 3篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1994年 | 4篇 |
1993年 | 5篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 3篇 |
1989年 | 3篇 |
1985年 | 3篇 |
1983年 | 1篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1977年 | 1篇 |
1976年 | 1篇 |
排序方式: 共有208条查询结果,搜索用时 15 毫秒
41.
In this paper, we analyze the security of a recent image encryption algorithm based on an improper fractional-order chaotic system suggested by Zhao et al. The fatal flaw in the cryptosystem is that the keystream generated depends on neither the plain-image nor the cipher-image. Another main issue with this algorithm is using the same key (the last key in the keystream) in all encryption equations. Based on these points, it is easy to recover the plain-image and the keystream by applying chosen plaintext attack in only one plain-image. Both mathematical analysis and experimental results confirm the feasibility of this attack. As a result, the cryptosystem under study is not suitable for cryptography. 相似文献
42.
Rizvi Sultan Ahmad Ahmad Afeef Latif Muhammad Shakir Abdul Sattar Khan Aftab Ahmad Naseem Waqas Gondal Muhammad Riaz 《Water Resources Management》2021,35(14):4909-4926
Water Resources Management - Poor irrigation management is a common issue of irrigated agriculture. Assessment of irrigation system performance is essential to improve the irrigation system, which... 相似文献
43.
Mina Sohrabi Mohammad M. Javidi Sattar Hashemi 《Journal of Intelligent Information Systems》2014,42(3):619-644
The security of computers and their networks is of crucial concern in the world today. One mechanism to safeguard information stored in database systems is an Intrusion Detection System (IDS). The purpose of intrusion detection in database systems is to detect malicious transactions that corrupt data. Recently researchers are working on using data mining techniques for detecting such malicious transactions in database systems. Their approach concentrates on mining data dependencies among data items. However, the transactions not compliant with these data dependencies are identified as malicious transactions. Algorithms that these approaches use for designing their data dependency miner have limitations. For instance, they need to experimentally determine appropriate settings for minimum support and related constraints, which does not necessarily lead to strong data dependencies. In this paper we propose a new data mining algorithm, called the Optimal Data Access Dependency Rule Mining (ODADRM), for designing a data dependency miner for our database IDS. ODADRM is an extension of k-optimal rule discovery algorithm, which has been improved to be suitable in database intrusion detection domain. ODADRM avoids many limitations of previous data dependency miner algorithms. As a result, our approach is able to track normal transactions and detect malicious ones more effectively than existing approaches. 相似文献
44.
Esmaeel Radkani Sattar Hashemi Alireza Keshavarz-Haddad Maryam Amir Haeri 《Applied Intelligence》2018,48(6):1536-1546
Metamorphic malware is a kind of malware which evades signature-based anti-viruses by changing its internal structure in each infection. This paper, firstly, introduces a new measure of distance between two computer programs called program dissimilarity measure based on entropy (PDME). Then, it suggests a measure for the degree of metamorphism, based on the suggested distance measure. The distance measure is defined based on the Entropy of the two malware programs. Moreover, the paper shows that the distance measure can be used for classifying metamorphic malware via K-Nearest Neighbors (KNN) method. The method is evaluated by four metamorphic malware families. The results demonstrate that the measure can indicate the degree of metamorphism efficiently, and the KNN classification method using PDME can classify the metamorphic malware with a high precision. 相似文献
45.
The electrical resistivity and thermoelectric power of Li0.5Fe2.5–x
R
x
O4 (R = Al, La, Sm and Gd; x = 0.0 and 0.1) are studied. The distribution of the substituted ions over the different lattice sites is determined from IR spectra. The electrical resistivity is found to have a direct relation with the ionic radius of the substituted R ions. Meanwhile, the absolute value of thermoelectric power decreased with increasing ionic radius. 相似文献
46.
47.
Distance learning is an important notion and has played a critical role in success of various machine learning algorithms. Any learning algorithm that requires dissimilarity/similarity measures has to assume some forms of distance functions, either explicitly or implicitly. Hence, in recent years a considerable amount of research has been devoted to distance learning. Despite great achievements in this field, a number of important issues need to be further explored for real world datasets mainly containing categorical attributes. Based on these considerations, the current research presents a Context‐Based Distance Learning approach (CBDL) to advance the state of the art existing researches on distance metric learning for categorical datasets. CBDL is designed and developed based on the idea that distance between two values of a given categorical attribute can be estimated by using information inherently exists within subset of attributes called context. CBDL composes of two main components: context extraction component and distance learning component. Context extraction component is responsible for extracting the relevant subset of feature set for a given attribute, while distance learning component tries to learn distance between each pair of values based on the extracted context. To have a comprehensive analysis, we conduct wide range of experiments in both supervised and unsupervised environments in the presence of noise. Our experimental results reveal that CBDL is the method of choice distance learning approach by offering a comparable or better performance compared to the state of the art existing distance learning schemes according to studied evaluation measures. © 2011 Wiley Periodicals, Inc. 相似文献
48.
Recently, passive Radio Frequency Identification (RFID) systems have received an increased amount of attention as researchers have worked to implement a stable and reliable system. Unfortunately, despite vast improvements in the quality of RFID technology, a significant amount of erroneous data is still captured in the system. Currently, the problems associated with RFID have been addressed by cleaning algorithms to enhance the data quality. In this paper, we present X-CleLo, a means to intelligently clean and transform the dirty data into high-level events using Clausal Defeasible Logic. The extensive experimental study we have conducted has shown that the X-CleLo method has several advantages over currently utilised cleaning techniques and achieves a higher cleaning and event discovery rate. 相似文献
49.
Hafiz Muhammad Anwaar Asghar Syed Nadir Hussain Hamed Sattar Edward Pelham Lindfield Roberts Nigel Willis Brown 《Korean Journal of Chemical Engineering》2014,31(5):834-840
The electrically conducting and partially porous graphite based adsorbent (called NyexTM 2000) was tested for its adsorption capacity and electrochemical regeneration ability for the removal of phenol from aqueous solution. Nyex? 2000 was tested in comparison with Nyex? 1000, which is currently being used for a number of industrial waste water treatment applications. Nyex? 1000 exhibited small adsorption capacity of 0.1 mg g?1 for phenol because of having small specific surface area of 1 m2 g?1. In contrast, Nyex? 2000 with specific surface area of 17 m2 g?1 delivered an adsorption capacity of 0.8 mg g?1, which was eight-fold higher than that of Nyex? 1000. Nyex? 2000 was successfully electrochemically regenerated by passing a current of 0.5 A, charge passed of 31 C g?1 for a treatment time of 45 minutes. These electrochemical parameters were comparable to Nyex? 1000 for which a current of 0.5 A, charge passed of 5 C g?1 for a treatment time of 20 minutes were applied for complete oxidation of adsorbed phenol. The comparatively high charge density was found to be required for Nyex? 2000, which is justified with its higher adsorption capacity. The FTIR results validated the mineralization of adsorbed phenol into CO2 and H2O except the formation of few by-products, which were in traces when compared with the concentration of phenol removed from aqueous solution. The electrical energy as required for electrochemical oxidation of phenol adsorbed onto Nyex? 1000 & 2000 was found to be 214 and 196 J mg?1, respectively. The comparatively low energy requirement for electrochemical oxidation using Nyex? 2000 is consistent with its higher bed electrical conductivity, which is twice that of Nyex? 1000. 相似文献
50.
A.A. Sattar H.M. El-Sayed W.R. Agami 《Journal of Materials Engineering and Performance》2007,16(5):573-577
The effect of Ca-substitution on the physical and magnetic properties of Li0.3-0.5x
Zn0.4Ca
x
Fe2.3-0.5x
O4 ferrites (x = 0.0, 0.01, 0.02, 0.03, and 0.05), prepared by the standard ceramic method, has been studied. It is found that the saturation
magnetization increases up to x = 0.01 and then it decreases. On the other hand, the initial permeability decreased while the Curie temperature remained
almost constant with increasing x. The coercivity and remanence ratio increased with increasing x.
A. A. Sattar is on leave from Physics Department, Faculty of Science, Ain Shams University, Cairo, Egypt 相似文献