全文获取类型
收费全文 | 455篇 |
免费 | 27篇 |
国内免费 | 8篇 |
专业分类
电工技术 | 4篇 |
化学工业 | 75篇 |
金属工艺 | 18篇 |
机械仪表 | 19篇 |
建筑科学 | 14篇 |
矿业工程 | 2篇 |
能源动力 | 21篇 |
轻工业 | 38篇 |
水利工程 | 17篇 |
无线电 | 70篇 |
一般工业技术 | 102篇 |
冶金工业 | 51篇 |
原子能技术 | 3篇 |
自动化技术 | 56篇 |
出版年
2023年 | 13篇 |
2022年 | 23篇 |
2021年 | 42篇 |
2020年 | 25篇 |
2019年 | 22篇 |
2018年 | 28篇 |
2017年 | 31篇 |
2016年 | 28篇 |
2015年 | 8篇 |
2014年 | 22篇 |
2013年 | 26篇 |
2012年 | 25篇 |
2011年 | 28篇 |
2010年 | 9篇 |
2009年 | 22篇 |
2008年 | 14篇 |
2007年 | 11篇 |
2006年 | 11篇 |
2005年 | 9篇 |
2004年 | 7篇 |
2003年 | 3篇 |
2002年 | 9篇 |
2001年 | 5篇 |
2000年 | 4篇 |
1999年 | 4篇 |
1998年 | 12篇 |
1997年 | 8篇 |
1996年 | 5篇 |
1995年 | 5篇 |
1994年 | 2篇 |
1993年 | 4篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 3篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1984年 | 3篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1978年 | 1篇 |
1977年 | 3篇 |
1976年 | 3篇 |
排序方式: 共有490条查询结果,搜索用时 16 毫秒
41.
Muhammad Farrukh Yaqub Ammar Haider Iqbal Gondal Joarder Kamruzzaman 《Computers & Electrical Engineering》2014
High density of coexisting networks in the Industrial, Scientific and Medical (ISM) band leads to static and self interferences among different communication entities. The inevitability of these interferences demands for interference avoidance schemes to ensure reliability of network operations. This paper proposes a novel Diversified Adaptive Frequency Rolling (DAFR) technique for frequency hopping in Bluetooth piconets. DAFR employs intelligent hopping procedures in order to mitigate self interferences, weeds out the static interferer efficiently and ensures sufficient frequency diversity. We compare the performance of our proposed technique with the widely used existing frequency hopping techniques, namely, Adaptive Frequency Hopping (AFH) and Adaptive Frequency Rolling (AFR). Simulation studies validate the significant improvement in goodput and hopping diversity of our scheme compared to other schemes and demonstrate its potential benefit in real world deployment. 相似文献
42.
Mohibullah Khan Ata Ullah Isra Naz Sajjad Haider Nz Jhanji Mohammad Shorfuzzaman Mehedi Masud 《计算机系统科学与工程》2023,46(1):461-473
The deep learning model encompasses a powerful learning ability that integrates the feature extraction, and classification method to improve accuracy. Convolutional Neural Networks (CNN) perform well in machine learning and image processing tasks like segmentation, classification, detection, identification, etc. The CNN models are still sensitive to noise and attack. The smallest change in training images as in an adversarial attack can greatly decrease the accuracy of the CNN model. This paper presents an alpha fusion attack analysis and generates defense against adversarial attacks. The proposed work is divided into three phases: firstly, an MLSTM-based CNN classification model is developed for classifying COVID-CT images. Secondly, an alpha fusion attack is generated to fool the classification model. The alpha fusion attack is tested in the last phase on a modified LSTM-based CNN (CNN-MLSTM) model and other pre-trained models. The results of CNN models show that the accuracy of these models dropped greatly after the alpha-fusion attack. The highest F1 score before the attack was achieved is 97.45 And after the attack lowest F1 score recorded is 22%. Results elucidate the performance in terms of accuracy, precision, F1 score and Recall. 相似文献
43.
44.
45.
Program diagnosis systems were developed to help users solve programming problems. By providing guidence on errors and misconceptions, these systems can help the users in writing programs and understanding their dynamic behavior. Features of software visualization which aim at providing visual and concrete depictions to the abstractions and operations of programs have also shown to be making programs more understandable. The main theme of this paper is to asses the usefulness of incorporating features of software visualization into the design of program diagnosis systems intended for novices. We report an empirical evaluation to assess the effectiveness of supporting visualization features during problem solving. The system used in the evaluation integrates visualzation and immediacy features and supports a model-tracing based approach to program diagnosis. Unlike other similar systems, our prototype system supports a more flexible style of interaction by increasing the grain size of diagnosis to a complete programming statement. The evaluation reported here seems to suggest that when supported with visualization features, systems for program diagnosis tend to be more effective in helping the users during problem solving. 相似文献
46.
Samer Yahya M. Moghavvemi Haider A.F. Mohamed 《Simulation Modelling Practice and Theory》2011,19(1):406-422
A new method for inverse kinematics for hyper-redundant manipulators is proposed in this paper to plan the path of the end-effector. The basic idea is that for a given smooth path consisting of points close enough to each other; computing the inverse kinematics for these points is carried out geometrically using the proposed method. In this method, the angles between the adjacent links are set to be the same, which makes lining up of two or more joint axes impossible; therefore, avoiding singularities. The manipulability index has been used to show how far the manipulator from the singularity configuration is. The determination of the workspace of the manipulator using the proposed method has been presented in this paper. The simulation results have been carried out on a planar and a three dimensional manipulators. The effectiveness of the proposed method is clearly demonstrated by comparing its result with results calculated by the well-known method of measuring manipulability which is used for singularity avoidance for the last two decades. 相似文献
47.
48.
Afsheen Ahmed Rabia Latif Seemab Latif Haider Abbas Farrukh Aslam Khan 《Multimedia Tools and Applications》2018,77(17):21947-21965
The emergence of Internet of Things (IoT) has introduced smart objects as the fundamental building blocks for developing a smart cyber-physical universal environment. The IoTs have innumerable daily life applications. The healthcare industry particularly has been benefited due to the provision of ubiquitous health monitoring, emergency response services, electronic medical billing, etc. Since IoT devices possess limited storage and processing power, therefore these intelligent objects are unable to efficiently provide the e-health facilities, or process and store enormous amount of collected data. IoTs are merged with Cloud Computing technology in Multi-Cloud form that basically helps cover the limitations of IoTs by offering a secure and on-demand shared pool of resources i.e., networks, servers, storage, applications, etc., to deliver effective and well-organized e-health amenities. Although the framework based on the integration of IoT and Multi-Cloud is contributing towards better patient care, yet on the contrary, it is challenging the privacy and reliability of the patients’ information. The purpose of this systematic literature review is to identify the top security threat and to evaluate the existing security techniques used to combat this attack and their applicability in IoT and Multi-Cloud based e-Healthcare environment. 相似文献
49.
Muhammad Aminur RAHAMAN Mahmood JASIM Md. Haider ALI Md. HASANUZZAMAN 《Frontiers of Computer Science》2020,14(3):143302-64
Because of using traditional hand-sign segmentation and classification algorithm,many diversities of Bangla language including joint-letters,dependent vowels etc.and representing 51 Bangla written characters by using only 36 hand-signs,continuous hand-sign-spelled Bangla sign language(BdSL)recognition is challenging.This paper presents a Bangla language modeling algorithm for automatic recognition of hand-sign-spelled Bangla sign language which consists of two phases.First phase is designed for hand-sign classification and the second phase is designed for Bangla language modeling algorithm(BLMA)for automatic recognition of hand-sign-spelled Bangla sign language.In first phase,we have proposed two step classifiers for hand-sign classification using normalized outer boundary vector(NOBV)and window-grid vector(WGV)by calculating maximum inter correlation coefficient(ICC)between test feature vector and pre-trained feature vectors.At first,the system classifies hand-signs using NOBV.If classification score does not satisfy specific threshold then another classifier based on WGV is used.The system is trained using 5,200 images and tested using another(5,200×6)images of 52 hand-signs from 10 signers in 6 different challenging environments achieving mean accuracy of 95.83%for classification with the computational cost of 39.972 milliseconds per frame.In the Second Phase,we have proposed Bangla language modeling algorithm(BLMA)which discovers allhidden charactersbased onrecognized charactersfrom 52 hand-signs of BdSL to make any Bangla words,composite numerals and sentences in BdSL with no training,only based on the result of first phase.To the best of our knowledge,the proposed system is the first system in BdSL designed on automatic recognition of hand-sign-spelled BdSL for large lexicon.The system is tested for BLMA using hand-sign-spelled 500 words,100 composite numerals and 80 sentences in BdSL achieving mean accuracy of 93.50%,95.50%and 90.50%respectively. 相似文献
50.
O'Neill K. Haider S.A. Geimer S.D. Paulsen K.D. 《Geoscience and Remote Sensing, IEEE Transactions on》2001,39(7):1556-1565
Throughout the world, the problem of buried unexploded ordnance (UXO) poses an enormous, persistent, and expensive problem. While UXO generally consists of sizable bodies of ferrous metal and can therefore be detected, with current technology it is extremely difficult to distinguish them reliably from typically widespread pieces of clutter. Thus the problem is one of subsurface discrimination. The authors previous modeling work on scattering of ground penetrating radar (GPR) from metallic objects surrounded by an infinite soil-like medium has suggested the utility of a number of key discriminants in broadband fully polarimetric sensing. In particular, resonance structure, induced field rotation and ellipticity, and bistatic observation of scattered signals were shown to offer key information about target shape and size. The authors investigate the effects on signature features of the proximity of a ground surface to the target, for the common case of shallow burial (<1 m). Overall, their analyses suggest that the key discriminants seen in scattering in an infinite medium survive the complex interactions with the ground surface. In some instances, these revealing signatures appear to be strengthened by the presence of a nearby surface. Multiposition backscatter also allows fundamental inferences about target elongation and symmetry when those cannot be obtained from single position viewing 相似文献