首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   338篇
  免费   14篇
  国内免费   6篇
电工技术   3篇
化学工业   87篇
金属工艺   10篇
机械仪表   12篇
建筑科学   14篇
能源动力   14篇
轻工业   35篇
水利工程   3篇
石油天然气   1篇
无线电   23篇
一般工业技术   105篇
冶金工业   26篇
原子能技术   1篇
自动化技术   24篇
  2024年   1篇
  2023年   10篇
  2022年   12篇
  2021年   9篇
  2020年   8篇
  2019年   19篇
  2018年   12篇
  2017年   26篇
  2016年   21篇
  2015年   10篇
  2014年   10篇
  2013年   28篇
  2012年   24篇
  2011年   21篇
  2010年   27篇
  2009年   19篇
  2008年   11篇
  2007年   7篇
  2006年   9篇
  2005年   8篇
  2004年   11篇
  2003年   6篇
  2002年   2篇
  2001年   2篇
  2000年   1篇
  1999年   2篇
  1998年   8篇
  1997年   5篇
  1995年   1篇
  1994年   2篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
  1985年   2篇
  1984年   2篇
  1983年   1篇
  1982年   1篇
  1981年   3篇
  1980年   4篇
  1978年   1篇
  1977年   2篇
  1976年   1篇
  1972年   1篇
  1965年   1篇
  1959年   1篇
排序方式: 共有358条查询结果,搜索用时 15 毫秒
1.
Mobile Networks and Applications - 5G/6G communication are first generation high speed wireless communication network which integrates the aerial data, terrestrial data and maritime data via...  相似文献   
2.
Wireless Personal Communications - This paper considers half-duplex cooperative spectrum sharing scheme where both primary and secondary systems mutually cooperate with each other to exploit...  相似文献   
3.
International Journal of Mechanics and Materials in Design - The resonant frequency of electromechanical energy harvester should be tuned to ambient frequency so as to maximize the harvester power....  相似文献   
4.
The present study was carried out to evaluate the effects of ozone on rice grains for the following three conditions: saturation time, decay rate, and half-life of ozone. Experiments were performed in different bed thicknesses (5 and 10 cm) and moisture content (11.4 and 14.2% wb) at atmospheric conditions. The lowest saturation time of ozone was 119 min, with the concentration of 516 ppm for rice grains ozonated at 5-cm bed thickness with 11.4% (wb) moisture content. The decay rate kinetics of ozone obtained were consistent with a first-order model. Regarding the half-life of ozone, the lowest value obtained was 6.78 min for rice grains ozonated at 10-cm bed thickness with 14.2% (wb) moisture content.  相似文献   
5.
6.
The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies. Early diagnosis of many diseases will improve the patient life. The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things (IoT), Wireless Sensor Networks (WSN), Embedded systems, Deep learning approaches and Optimization and aggregation methods. The data generated through these technologies will demand the bandwidth, data rate, latency of the network. In this proposed work, efficient discrete grey wolf optimization (DGWO) based data aggregation scheme using Elliptic curve Elgamal with Message Authentication code (ECEMAC) has been used to aggregate the parameters generated from the wearable sensor devices of the patient. The nodes that are far away from edge node will forward the data to its neighbor cluster head using DGWO. Aggregation scheme will reduce the number of transmissions over the network. The aggregated data are preprocessed at edge node to remove the noise for better diagnosis. Edge node will reduce the overhead of cloud server. The aggregated data are forward to cloud server for central storage and diagnosis. This proposed smart diagnosis will reduce the transmission cost through aggregation scheme which will reduce the energy of the system. Energy cost for proposed system for 300 nodes is 0.34μJ. Various energy cost of existing approaches such as secure privacy preserving data aggregation scheme (SPPDA), concealed data aggregation scheme for multiple application (CDAMA) and secure aggregation scheme (ASAS) are 1.3 μJ, 0.81 μJ and 0.51 μJ respectively. The optimization approaches and encryption method will ensure the data privacy.  相似文献   
7.
In the network security system, intrusion detection plays a significant role. The network security system detects the malicious actions in the network and also conforms the availability, integrity and confidentiality of data information resources. Intrusion identification system can easily detect the false positive alerts. If large number of false positive alerts are created then it makes intrusion detection system as difficult to differentiate the false positive alerts from genuine attacks. Many research works have been done. The issues in the existing algorithms are more memory space and need more time to execute the transactions of records. This paper proposes a novel framework of network security Intrusion Detection System (IDS) using Modified Frequent Pattern (MFP-Tree) via K-means algorithm. The accuracy rate of Modified Frequent Pattern Tree (MFPT)-K means method in finding the various attacks are Normal 94.89%, for DoS based attack 98.34%, for User to Root (U2R) attacks got 96.73%, Remote to Local (R2L) got 95.89% and Probe attack got 92.67% and is optimal when it is compared with other existing algorithms of K-Means and APRIORI.  相似文献   
8.
Studies during the past decade have led to the recognition of a fundamental, widely expressed mechanism of structural damage in energy-deprived cells, which is suppressed by physiologic levels of glycine and is independent of Ca2+ availability or alterations of cytosolic free Ca2+. To gain insight into this process, Madin-Darby canine kidney (MDCK) cells were depleted of adenosine triphosphate (ATP) by a mitochondrial uncoupler in glucose-free medium, and intracellular free Ca2+ was clamped at 100 nM to avoid calcium cytotoxicity. Although the ATP-depleted cells swelled and blebbed and their plasma membranes appeared to be under tension, they nevertheless became permeable to macromolecules. The plasma membranes of these cells retained structural continuity, as determined by morphologic observations, and confocal microscopy of a plasma membrane protein label (Biotin: Ultra Avidin-Texas Red) and a lipid label (NBD-sphingomyelin). Using fluoresceinated dextrans of graded molecular size, membrane permselectivity was examined noninvasively by confocal microscopy. Measured as inside/outside ratios of fluorescence intensity, the permeability indices showed progressively greater restriction to diffusion of increasingly larger dextran molecules across plasma membranes, with sharp break-points between 70,000 and 145,000 daltons (d). The results indicated that the membranes behaved as if they were perforated by water-filled channels or "pores," with size-exclusion limits of molecular dimensions. The membrane defects evolved from small pores permeable only to propidium iodide (668 d) and the smallest dextran (4,000 d), before enlarging with time to become permeable to larger dextrans. Inclusion of glycine during ATP depletion did not affect cell swelling or blebbing but completely prevented the development of permeability defects. Treatment of cells before ATP depletion with a membrane-impermeant homobifunctional "nearest neighbor" cross-linking agent, 3,3' dithiobis(sulfosuccinimidylpropionate), suppressed the development of permeability defects, even in the absence of glycine. These observations suggest that the cellular abnormality that is suppressed by glycine involves rearrangement of plasma membrane proteins to form water-filled pores large enough to leak macromolecules.  相似文献   
9.
Cognitive Radio Network (CRN) is an intelligent wireless communication system that adapts itself to variations in the incoming radio frequency stimuli by modifying the operating parameters. Using the spectrum sensing techniques, the idle channels are detected, and allocated to the Secondary Users (SUs). The existing cooperative spectrum sensing techniques such as centralized sensing technique, Distributed sensing technique, and External sensing technique exploit efficient prediction models for allocating the frequency spectrum to SUs. For an optimal assignment of the channel using channel parameters, the channel estimation techniques such as pilot-assisted channel estimation, blind and semi blind estimation technique, and decision directed channel estimation technique are analyzed. The flexible nature of the CRN introduces various security attacks such as Primary User Emulation Attack, Objective Function Attack, Jamming Attack, Spectrum Sensing Data Falsification (SSDF), Control Channel Saturation DoS Attack (CCSD), Selfish Channel Negotiation (SCN), Sinkhole Attacks, HELLO Flood Attacks and Lion Attack. From the surveyed results, it is observed that the existing spectrum sensing, and prediction-based techniques consume more energy, and minimal data transmission rate for detecting the idle channel. Further, the end-to-end delay, energy consumption, end-to-end delay, and bandwidth are not minimized by the existing techniques.  相似文献   
10.
Nano-Micro Letters - Magnesia (MgO) nanoparticles were produced from magnesite ore (MgCO3) using ball mill. The crystalline size, morphology and specific SSA were characterized by X-ray diffraction...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号