全文获取类型
收费全文 | 59篇 |
免费 | 2篇 |
专业分类
电工技术 | 1篇 |
化学工业 | 8篇 |
建筑科学 | 2篇 |
轻工业 | 4篇 |
无线电 | 26篇 |
一般工业技术 | 4篇 |
冶金工业 | 4篇 |
自动化技术 | 12篇 |
出版年
2022年 | 2篇 |
2021年 | 4篇 |
2019年 | 3篇 |
2018年 | 1篇 |
2017年 | 2篇 |
2016年 | 1篇 |
2015年 | 2篇 |
2014年 | 2篇 |
2013年 | 3篇 |
2012年 | 5篇 |
2011年 | 1篇 |
2010年 | 2篇 |
2009年 | 2篇 |
2008年 | 1篇 |
2007年 | 1篇 |
2006年 | 2篇 |
2005年 | 2篇 |
2004年 | 2篇 |
2003年 | 1篇 |
2002年 | 1篇 |
2001年 | 4篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1988年 | 1篇 |
排序方式: 共有61条查询结果,搜索用时 0 毫秒
31.
Abdur R. Shahid Niki Pissinou S.S. Iyengar Kia Makki 《International Journal of Communication Systems》2021,34(1)
The ubiquitous use of location‐based services (LBS) through smart devices produces massive amounts of location data. An attacker, with an access to such data, can reveal sensitive information about users. In this paper, we study location inference attacks based on the probability distribution of historical location data, travel time information between locations using knowledge of a map, and short and long‐term observation of privacy‐preserving queries. We show that existing privacy‐preserving approaches are vulnerable to such attacks. In this context, we propose a novel location privacy‐preserving approach, called KLAP, based on the three fundamental obfuscation requirements: minimum k ‐locations, l ‐diversity, and privacy a rea p reservation. KLAP adopts a personalized privacy preference for sporadic, frequent, and continuous LBS use cases. Specifically, it generates a secure concealing region (CR) to obfuscate the user's location and directs that CR to the service provider. The main contribution of this work is twofold. First, a CR pruning technique is devised to establish a balance between privacy and delay in LBS usage. Second, a new attack model called a long‐term obfuscated location tracking attack, and its countermeasure is proposed and evaluated both theoretically and empirically. We assess KLAP with two real‐world datasets. Experimental results show that it can achieve better privacy, reduced delay, and lower communication costs than existing state‐of‐the‐art methods. 相似文献
32.
Ramzi Bel‐Hassen Sami Boufi Marie‐Christine Brochier Salon Makki Abdelmouleh Mohamed Naceur Belgacem 《应用聚合物科学杂志》2008,108(3):1958-1968
The hydrolysis of four alkoxysilane agents, γ‐methacryloxypropyl trimethoxysilane (MPS), γ‐mercaptopropyl trimetoxysilane (MRPS), octyl trimethoxysilane OS), and N‐phenyl‐γ‐aminopropyl trimethoxysilane (PAPS), was carried out in an ethanol/water (80/20) solution under both acid and basic conditions. 1H, 13C, and 29Si NMR spectroscopy were used to provide quantitative analyses of the structural components during hydrolysis and condensation reaction. The analysis revealed that the acid‐catalyzed hydrolysis of silane allows the formation of high amount of silanol groups, reduced the selfcondensation reaction among silanol groups and stabilized the proportion of intermediary hydrolyzed species for several days. However, under basic condition, condensation reactions proceed as soon as the hydrolysis reaction started leading to the rapid consumption of silanol groups through selfcondensation and to the growth of three‐dimensional high molecular structures. The interaction of MPS and MRPS with cellulose fibers and the evolution of their surface properties were then investigated using adsorption isotherms and contact angle measurement. © 2008 Wiley Periodicals, Inc. J Appl Polym Sci, 2008 相似文献
33.
34.
Sufyan Fadhil Hassan F. Makki René Ruby-Figueroa Tiziana Marino Alessandra Criscuoli 《Chemical Engineering Communications》2019,206(2):237-246
Central composite design (CCD) was applied in this work to analyze the performance of poly(vinylidene fluoride-co-hexafluoropropylene) (PVDF-HFP) flat sheet membrane in the seawater desalination using direct contact membrane distillation (DCMD) process. It is the most popular in response surface method (RSM). Development on Quadratic Regression model for membrane performance as a function of the operating conditions was studied. The ranges for each operating condition were selected as follows: feed temperature (Tf): 48–58?°C, feed flow rate (Qf): 80–180?mL/min, permeate temperature (Tp):17–22?°C and permeate flow rate (Qp): 80–180?mL/min. The model R-squared of 0.9759 (adjusted to degree-of-freedom), Lack-of-fit test (p?=?0.4764), predicted residual error sum of squared (PRESS) statistic of 10.3 suggest that the model is adequate to correlate the impact of operating conditions on permeates. ANOVA analysis showed that factors as feed flow rate, feed temperature, and permeate temperature have a valuable impact (p?≤?0.05) on the response variable. Additionally, the interaction among feed temperature-feed flow rate, feed flow rate-permeate flow rate, and the quadratic impact of feed temperature, permeate temperature, and permeate flow rate have shown an important impact (p?≤?0.05) on the permeate flux. Optimization of operating conditions to make the permeate flux and salt rejection high as possible was determined according to desirability function approach. A desirability of 0.969 was achieved at a feed temperature of 58?°C, feed flow rate of 180?mL/min, permeate temperature of 18.8?°C, and permeate flow rate of 145.3?mL/min in which a permeate flux of 12.56?kg/m2h and a salt rejection of 99.97% was obtained. 相似文献
35.
Finite element analysis is applied to find solutions to problems involving Poisson's equation and wave equations. Typical examples are used for illustration. Problems of node numbering, bandwidth reduction, and mesh generation are discussed 相似文献
36.
Jedidi Ilyes Cretin Marc Cerneaux Sophie AL Saidi Mohammed Saif Al- Isaee Sulaiman Cot Didier Abdelmouleh Makki 《Journal of Porous Materials》2022,29(1):291-306
Journal of Porous Materials - This paper discusses the preparation of an asymmetric microfiltration carbon membrane made of mineral coal powder and phenolic resin. Tubular supports were obtained... 相似文献
37.
An important problem in both wireless and wired communication networks is to be able to efficiently multicst information to a group of network sites. Multicasting reduces the transmission overhead of both wireless and wired networks and the time it takes for all the nodes in the subset to receive the information. Since transmission bandwidth is a scarce commodity especially in wireless networks, efficient and near minimum-cost multicast algorithms are particularly useful in the wireless context. In this paper, we discuss methods of establishing efficient and near minimum-cost multicast routing in communication networks. In particular, we discuss an efficient implementation of a widely used multicast routing method which can construct a multicast tree with a cost no greater than twice the cost of an optimal tree. We also present two efficient multicast tree constructions for a general version of the multicast routing problem in which a network consists of different classes of nodes, where each class can have one or more nodes of the same characteristic which is different from the characteristics of nodes from other classes. Because of their efficient running times, these multicast routing methods are particularly useful in the mobile communication environments where topology changes will imply recomputation of the multicast trees. Furthermore, the proposed efficient and near minimum-cost multicast routing methods are particularly suited to the wireless communication environments, where transmission bandwidth is more scarce than wired communication environments.Partially supported by NSF/LaSER under grant number EHR-9108765, by LEQSF grant number 94-RD-A-39, by NASA under grant number NAG 5-2842. 相似文献
38.
Elroby SA Makki MS Sobahi TR Hilal RH 《International journal of molecular sciences》2012,13(4):4321-4339
Levodopa (LD) is used to increase dopamine level for treating Parkinson's disease. The major metabolism of LD to produce dopamine is decarboxylation. In order to understand the metabolism of LD; the electronic structure of levodopa was investigated at the Density Functional DFT/B3LYP level of theory using the 6-311+G** basis set, in the gas phase and in solution. LD is not planar, with the amino acid side chain acting as a free rotator around several single bonds. The potential energy surface is broad and flat. Full geometry optimization enabled locating and identifying the global minimum on this Potential energy surface (PES). All possible protonation/deprotonation forms of LD were examined and analyzed. Protonation/deprotonation is local in nature, i.e., is not transmitted through the molecular framework. The isogyric protonation/deprotonation reactions seem to involve two subsequent steps: First, deprotonation, then rearrangement to form H-bonded structures, which is the origin of the extra stability of the deprotonated forms. Natural bond orbital (NBO) analysis of LD and its deprotonated forms reveals detailed information of bonding characteristics and interactions across the molecular framework. The effect of deprotonation on the donor-acceptor interaction across the molecular framework and within the two subsystems has also been examined. Attempts to mimic the complex formation of LD with water have been performed. 相似文献
39.
Sensor network security: a survey 总被引:5,自引:0,他引:5
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense, collect, and disseminate information in many types of applications. As sensor networks become wide-spread, security issues become a central concern, especially in mission-critical tasks. In this paper, we identify the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analysis first. Then we give a holistic overview of security issues. These issues are divided into seven categories: cryptography, key management, attack detections and preventions, secure routing, secure location security, secure data fusion, and other security issues. Along the way we analyze the advantages and disadvantages of current secure schemes in each category. In addition, we also summarize the techniques and methods used in these categories, and point out the open research issues and directions in each area. 相似文献
40.
Mamoona Naveed Asghar Martin Fleury Sohail Makki 《Multimedia Tools and Applications》2017,76(11):13139-13152
The pay-TV industry seeks to extend its reach to portable display devices. At the same time, it seeks to ensure a horizontal market by making interoperable the Conditional Access Systems (CASs) employed to protect content. To achieve interoperability for such devices, this paper proposes a form of selective encryption for video that allows simultaneous distribution of a small percentage of video data on a per-CAS basis, allowing sharing of the unencrypted video between the CASs. The bitrate overhead for each additional CAS enabled is found to be on average 7.41 %, whereas the computational overhead amounts to no more than 40 ms for the benchmark sequences tested. Adaptation of CAS to transparent encryption of scalable video is also demonstrated in this paper. 相似文献