首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   466篇
  免费   16篇
  国内免费   4篇
电工技术   6篇
综合类   1篇
化学工业   68篇
金属工艺   11篇
机械仪表   8篇
建筑科学   8篇
能源动力   13篇
轻工业   63篇
水利工程   5篇
石油天然气   11篇
无线电   59篇
一般工业技术   98篇
冶金工业   62篇
原子能技术   4篇
自动化技术   69篇
  2023年   5篇
  2022年   12篇
  2021年   16篇
  2020年   12篇
  2019年   19篇
  2018年   17篇
  2017年   16篇
  2016年   18篇
  2015年   4篇
  2014年   15篇
  2013年   30篇
  2012年   18篇
  2011年   22篇
  2010年   24篇
  2009年   23篇
  2008年   25篇
  2007年   11篇
  2006年   14篇
  2005年   12篇
  2004年   7篇
  2003年   4篇
  2002年   4篇
  2001年   6篇
  2000年   10篇
  1999年   9篇
  1998年   12篇
  1997年   5篇
  1996年   10篇
  1995年   7篇
  1993年   3篇
  1992年   4篇
  1991年   5篇
  1990年   7篇
  1989年   5篇
  1988年   3篇
  1986年   4篇
  1985年   5篇
  1984年   7篇
  1983年   3篇
  1982年   4篇
  1981年   3篇
  1980年   5篇
  1979年   5篇
  1978年   5篇
  1976年   2篇
  1975年   7篇
  1974年   4篇
  1972年   3篇
  1971年   6篇
  1970年   2篇
排序方式: 共有486条查询结果,搜索用时 15 毫秒
1.
Anup Bhat B  Harish SV  Geetha M 《ETRI Journal》2021,43(6):1024-1037
Mining high utility itemsets (HUIs) from transaction databases considers such factors as the unit profit and quantity of purchased items. Two-phase tree-based algorithms transform a database into compressed tree structures and generate candidate patterns through a recursive pattern-growth procedure. This procedure requires a lot of memory and time to construct conditional pattern trees. To address this issue, this study employs two compressed tree structures, namely, Utility Count Tree and String Utility Tree, to enumerate valid patterns and thus promote fast utility computation. Furthermore, the study presents an algorithm called single-phase utility computation (SPUC) that leverages these two tree structures to mine HUIs in a single phase by incorporating novel pruning strategies. Experiments conducted on both real and synthetic datasets demonstrate the superior performance of SPUC compared with IHUP, UP-Growth, and UP-Growth+ algorithms.  相似文献   
2.
Wireless Personal Communications - The majority of security systems for wireless sensor networks are based on symmetric encryption. The main open issue for these approaches concerns the...  相似文献   
3.
Summary.  Quasi-static stress fields for a crack inclined to the direction of property gradation in functionally graded materials (FGMs) are obtained through an asymptotic analysis coupled with Westergaard's stress function approach. The elastic modulus of the FGM is assumed to vary exponentially along the gradation direction. The mode mixity due to the inclination of the property gradient is accommodated in the analysis through superposition of opening and shear modes. The first four terms in the expansion of the stress field are derived to explicitly bring out the influence of nonhomogeneity on the structure of the stress field. Using these stress field contours of constant maximum shear stress, constant maximum principal stress, constant first stress invariant and constant out of plane displacement are generated, and the effect of inclination of the property gradation direction on these contours is discussed. Received September 22, 2002 Published online: May 20, 2003 The financial support of National Science Foundation (NSF) under grant no. CMS 99000138 is gratefully acknowledged.  相似文献   
4.
The growing proliferation of malware is raising doubts about the Internet's future. Security measures primarily target inbound traffic, but service providers have no incentive to stop attacks and spam at the source. A proposed certification scheme motivates providers to control outgoing traffic, efficiently increasing overall security while preserving the Internet's open, decentralized structure  相似文献   
5.
Recently, medical image compression becomes essential to effectively handle large amounts of medical data for storage and communication purposes. Vector quantization (VQ) is a popular image compression technique, and the commonly used VQ model is Linde–Buzo–Gray (LBG) that constructs a local optimal codebook to compress images. The codebook construction was considered as an optimization problem, and a bioinspired algorithm was employed to solve it. This article proposed a VQ codebook construction approach called the L2‐LBG method utilizing the Lion optimization algorithm (LOA) and Lempel Ziv Markov chain Algorithm (LZMA). Once LOA constructed the codebook, LZMA was applied to compress the index table and further increase the compression performance of the LOA. A set of experimentation has been carried out using the benchmark medical images, and a comparative analysis was conducted with Cuckoo Search‐based LBG (CS‐LBG), Firefly‐based LBG (FF‐LBG) and JPEG2000. The compression efficiency of the presented model was validated in terms of compression ratio (CR), compression factor (CF), bit rate, and peak signal to noise ratio (PSNR). The proposed L2‐LBG method obtained a higher CR of 0.3425375 and PSNR value of 52.62459 compared to CS‐LBG, FA‐LBG, and JPEG2000 methods. The experimental values revealed that the L2‐LBG process yielded effective compression performance with a better‐quality reconstructed image.  相似文献   
6.
Poly(1,3,4-oxadiazole-2,5-diylvinylene) and poly(1,4-phenylene-1,3,4-oxadiazole-2,5-diylvinylene) were prepared by polymerizing different quantities of terephthalic acid (T), maleic acid (M), and hydrazine sulfate (HS) in the presence of fuming sulfuric acid. Homopolymers of M and T and various copolymers of M:T were prepared. The polymers were characterized by viscosity, IR, UV, and elemental analysis. Their solubility in different solvents was investigated. The relative thermal stability of the polymers was evaluated by TGA and DTA.  相似文献   
7.

Water and microbial contamination is a serious issues to aquatic system and human health. The metal selenide has a tremendous technique to degrade the dyes and bacteria.The present work reports the synthesis of ZnSe nanoparticles in a simple co-precipitation method. The synthesized samples were analyzed by structural, optical, morphological, catalytic and biological activity. The size and bandgap by annealing temperature tuning which are confirm by X-ray Diffraction and UV–Visible spectrometer. The quasi-spherical shapes were confirmed by Scanning Electron Microscope and Transmission Electron Microscope.The photo excited electrons have trapped the metals and promoting the degradation system. The release of ions to the surface was acknowledged by Photo Luminescence spectroscopy. The photocatalytic dye degradation of the Methyl Orange showed that the enhanced activity in high temperature. The photocatalytic dye degradation activity suggested that the temperature change the production of free radicals and ROS formation. The hydroxyl radicals were slewing the dye molecules and bacteria. The obtained results giving the information of ZnSe nanoparticles are one of the fascinating research areas in the current research world. Because of its large application in different field it acts as a promoting catalytic and biological application.

Graphical Abstract
  相似文献   
8.
Poly(1,3,4-oxadiazole-2,5-diyl-1,2-ethendiyl) and poly(1,4-phenylene-1,3,4-oxadiazole-2,5 diyl-1,2-ethenediyl) have been prepared by condensation polymerization using fuming sulfuric acid and different quantities of terephthalic acid (T), fumaric acid (F), and hydrazine sulfate (HS). Homopolymers of F and T and various copolymers of F:T have been prepared. The polymer structure was investigated by IR and visible-range spectra and elemental analysis. The existence of poly(1,3,4-oxadiazole-diylphenylene) and poly(hydrazoterephthaloyl) structures was revealed by these studies. These polymers were thermally stable, and most of them did not show a weight loss below 350°C. The relative thermal stabilities of the various polymers have been evaluated by “integral procedural decomposition temperature” and activation energy measurements.  相似文献   
9.
Monolayer and bilayer coatings of TiAlN, AlCrN, and AlCrN/TiAlN were deposited onto tungsten carbide inserts using the plasma enhanced physical vapor deposition process. The microstructures of the coatings were characterized using scanning electron microscopy (SEM) and atomic force microscopy (AFM). The SEM micrographs revealed that the AlrN and AlCrN/TiAlN coatings were uniform and highly dense and contained only a limited number of microvoids. The TiAIN coating was non-uniform and highly porous and contained more micro droplets. The hardness and scratch resistance of the specimens were measured using a nanoindentation tester and scratch tester, respectively. Different phases formed in the coatings were analyzed by X-ray diffraction (XRD). The AlCrN/TiAlN coating exhibited a higher hardness (32.75 GPa), a higher Young's modulus (561.97 GPa), and superior scratch resistance (LcN = 46 N) compared to conventional coatings such as TiAlN, A1CrN, and TiN.  相似文献   
10.
Information systems are one of the most rapidly changing and vulnerable systems, where security is a major issue. The number of security-breaking attempts originating inside organizations is increasing steadily. Attacks made in this way, usually done by "authorized" users of the system, cannot be immediately traced. Because the idea of filtering the traffic at the entrance door, by using firewalls and the like, is not completely successful, the use of intrusion detection systems should be considered to increase the defense capacity of an information system. An intrusion detection system (IDS) is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current IDS depends on the system operators in working out the tuning solution and in integrating it into the detection model. Furthermore, an extensive effort is required to tackle the newly evolving attacks and a deep study is necessary to categorize it into the respective classes. To reduce this dependence, an automatically evolving anomaly IDS using neuro-genetic algorithm is presented. The proposed system automatically tunes the detection model on the fly according to the feedback provided by the system operator when false predictions are encountered. The system has been evaluated using the Knowledge Discovery in Databases Conference (KDD 2009) intrusion detection dataset. Genetic paradigm is employed to choose the predominant features, which reveal the occurrence of intrusions. The neuro-genetic IDS (NGIDS) involves calculation of weightage value for each of the categorical attributes so that data of uniform representation can be processed by the neuro-genetic algorithm. In this system unauthorized invasion of a user are identified and newer types of attacks are sensed and classified respectively by the neuro-genetic algorithm. The experimental results obtained in this work show that the system achieves improvement in terms of misclassification cost when compared with conventional IDS. The results of the experiments show that this system can be deployed based on a real network or database environment for effective prediction of both normal attacks and new attacks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号