首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   252篇
  免费   21篇
  国内免费   1篇
电工技术   1篇
综合类   2篇
化学工业   54篇
金属工艺   1篇
机械仪表   14篇
建筑科学   2篇
能源动力   9篇
轻工业   80篇
水利工程   2篇
无线电   41篇
一般工业技术   34篇
冶金工业   5篇
原子能技术   1篇
自动化技术   28篇
  2024年   2篇
  2023年   9篇
  2022年   16篇
  2021年   17篇
  2020年   13篇
  2019年   20篇
  2018年   15篇
  2017年   10篇
  2016年   8篇
  2015年   14篇
  2014年   13篇
  2013年   26篇
  2012年   14篇
  2011年   15篇
  2010年   7篇
  2009年   10篇
  2008年   6篇
  2007年   19篇
  2006年   10篇
  2005年   1篇
  2004年   6篇
  2003年   3篇
  2002年   3篇
  2001年   2篇
  2000年   5篇
  1999年   1篇
  1998年   2篇
  1996年   1篇
  1995年   1篇
  1993年   1篇
  1991年   2篇
  1990年   1篇
  1989年   1篇
排序方式: 共有274条查询结果,搜索用时 62 毫秒
251.
International Journal of Information Security - A Network Intrusion Detection System is a network security technology for detecting intruder attacks. However, it produces a great amount of...  相似文献   
252.

To ensure confidentiality and efficient network bandwidth, digital data must be compressed and encrypted. In most communication systems, these two factors are critical for information processing. Image compression and encryption may result in lower restoration quality and performance. Secure-JPEG is an effort to create a compression and encryption technique for digital data. This approach is based on the JPEG compression standard, which is the most extensively used lossy compression scheme. It enhances the usual JPEG compression algorithm to encrypt data during compression. The Secure-JPEG approach encrypts the data while it is compressed, and it may be easily modified to offer near lossless compression. Lossless compression, on the other hand, has a lower compression ratio and is only useful in certain situations. The paper addresses the issue of insufficient security as a result of the usage of a simple random number generator that is not cryptographically safe. The enhanced security characteristics are provided via the Generalized Bernoulli Shift Map, which has a chaotic system with proven security. Several cryptographic tests are used to validate the algorithm's security, and the chaotic system's behavior is also examined.

  相似文献   
253.
Wireless Personal Communications - With the emergence of COVID-19, smart healthcare, the Internet of Medical Things, and big data-driven medical applications have become even more important. The...  相似文献   
254.
The dry–jet–wet spinning process was employed to spin poly(lactic acid)(PLA) fiber by the phase inversion technique using chloroform and methanol as solvent and nonsolvent, respectively, for PLA. The as spun fiber was subjected to two‐stage hot drawing to study the effect of various process parameters, such as take‐up speed, drawing temperature, and heat‐setting temperature on the fiber structural properties. The take‐up speed had a pronounced influence on the maximum draw ratio of the fiber. The optimum drawing temperature was observed to be 90°C to get a fiber with the tenacity of 0.6 GPa for the draw ratio of 8. The heat‐setting temperature had a pronounced effect on fiber properties. © 2006 Wiley Periodicals, Inc. J Appl Polym Sci 101: 3774–3780, 2006  相似文献   
255.
256.
A framework for misuse detection in ad hoc Networks-part I   总被引:2,自引:0,他引:2  
We consider ad hoc networks with multiple, mobile intruders. We investigate the placement of the intrusion detection modules for misuse-based detection strategy. Our goal is to maximize the detection rate subject to limited availability of communication and computational resources. We mathematically formulate this problem, and show that computing the optimal solution is NP-hard. Thereafter, we propose two approximation algorithms that approximate the optimal solution within a constant factor, and prove that they attain the best possible approximation ratios. The approximation algorithms though require recomputation every time the topology changes. Thereafter, we modify these algorithms to adapt seamlessly to topological changes. We obtain analytical expressions to quantify the resource consumption versus detection rate tradeoffs for different algorithms. Using analysis and simulation, we evaluate these algorithms, and identify the appropriate algorithms for different detection rate and resource consumption tradeoffs.  相似文献   
257.
Dairy byproduct proteins are considered natural functional additives having the ability to interact with the starch and gluten network in a dough system and thus behave as dough improvers. Native whey proteins have negative effect in bread making so whey protein concentrates modified to increase viscosity in solution (mWPC) might overcome undesirable weakening of the gluten network which usually occurs in frozen dough products during prolonged times in frozen storage. The objective of this research project was to determine the effect of mWPC on empirical and fundamental dynamic rheological properties of wheat flour dough. The results for empirical rheological studies showed that addition of mWPC had significant effects on mixographic parameters and also increased values of mixing time and peak height percentage. The results for the fundamental mechanical properties of the frozen dough revealed an increase in the values of G′ with the increase in the frequency, along with an upward trend with increasing temperature, but the highest values were obtained after cooling. Addition of mWPC in the dough treatments induced softening in the dough system, as shown by the decrease in the values of the viscoelastic moduli. Rheological and textural changes in the bakery products made from frozen dough could be imparted by the incorporation of modified whey protein concentrates as dough improvers.  相似文献   
258.
Plant‐based drugs have reached remarkable acceptability as therapeutic remedy for various diseases due to the adverse effects of contemporary medicines. This increasing popularity of herbal drugs leads to a growing herbal market for the development of plant‐based drugs, nutraceuticals, pharmaceuticals and cosmeceuticals. Herbal drug adulteration is a complex problem which currently has undeniable consequences on health and nutrition. Ambiguities in nomenclature, misidentification and resemblance of colour and texture of the crude herbal drugs are the major causes of adulteration. Three different species commercially marketed under the same trade name Halion are Lepidium apetalum, Asparagus officinalis, and Lepidium didymum. The genuine source of Halion is Lepidium apetalum, which is authenticated by using basic and advanced taxonomic techniques. Morphology, anatomy and palynology of the misidentified sources were done using light and scanning electron microscopic techniques for authentication. This study may help to set microscopic techniques as a tool to achieve quality and standardization of the genuine source of the herbal drug. Phytochemical analysis and biological screening is needed for the further establishment of authenticity and quality of herbal drugs.  相似文献   
259.
Future telecommunications networks will consist of integrated packet-switched (IP and/or ATM), circuit-switched (PSTN), and wireless networks. Service providers will offer a wide portfolio of innovative applications over these integrated networks. Doing so rapidly and efficiently requires open network APIs, with a key API being that for call control, as well as for coordination and transactions. The JAIN community is defining an API for Java call control and Java coordination and transactions. The JCC API defines the interface for applications to initiate and manipulate calls, while JCAT defines the facilities for applications to be invoked and return results before or during calls. Note that in this context a call refers to a multimedia, multiparty, multiprotocol communications session. The JCC/JCAT Edit Group of JAIN is in the process of defining the first version of the JCC/JCAT API specification, which is expected to be released in early 2000. This article describes the background of and motivation for the design of the JCC/JCAT API. We describe the AIN and JTAPI call models on which the JCC/JCAT API is based. We then describe the scope of JCC/JCAT and its relationship to other JAIN Edit Groups defining facilities for enabling service creation. Finally, we describe the requirements and example service drivers for JCC/JCAT, as well as the initial proposed design and structure for JCC and JCAT  相似文献   
260.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号