首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   278篇
  免费   20篇
  国内免费   1篇
电工技术   4篇
化学工业   61篇
金属工艺   3篇
机械仪表   14篇
建筑科学   5篇
能源动力   15篇
轻工业   12篇
水利工程   1篇
石油天然气   3篇
无线电   45篇
一般工业技术   66篇
冶金工业   12篇
原子能技术   4篇
自动化技术   54篇
  2024年   2篇
  2023年   6篇
  2022年   26篇
  2021年   22篇
  2020年   16篇
  2019年   22篇
  2018年   28篇
  2017年   20篇
  2016年   13篇
  2015年   10篇
  2014年   4篇
  2013年   18篇
  2012年   8篇
  2011年   16篇
  2010年   18篇
  2009年   13篇
  2008年   14篇
  2007年   11篇
  2006年   7篇
  2005年   3篇
  2004年   2篇
  2002年   2篇
  2001年   1篇
  2000年   2篇
  1999年   1篇
  1998年   6篇
  1996年   1篇
  1995年   1篇
  1994年   2篇
  1993年   1篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
排序方式: 共有299条查询结果,搜索用时 15 毫秒
1.
2.
3.
4.
The interaction of a soliton of the Nonlinear Schrodinger Equation (NSE) with a weak sinusoidal wave packet is treated analytically. The second-order soliton solution containing the original soliton and a perturbing soliton is expanded to first order in the amplitude of the perturbating soliton. From this expansion, one obtains the associate function of Gordon (1992) and a continuous change of position and phase of the perturbed soliton. One finds that the soliton experiences a second-order change of velocity under the influence of the perturbation. This result is then used to derive the displacement due to a wave packet of general shape, which is also confirmed by computer simulation  相似文献   
5.
Cellulose nanocrystals (CNCs) incorporated with silver nanoparticles (AgNPs) photonic films have drawn considerable attention due to their plasmonic chiroptical activity. However, the exploitation of some fundamental properties for practical use such as the affinity analysis of metal nanoparticles attached to the surface of photonic films according to the solvent compatibility and antibacterial activity under physical conditions has yet not been studied. Hence, a facile process of in situ deposition of AgNPs into the chiral structure of CNC films is proposed. CNC photonic films, cross-linked by glutaraldehyde are prepared. This interaction generated the solvents-stable photonic film with a considerable amount of unreacted aldehyde functional groups that facilitates the reduction of Ag salt to AgNPs. The formed AgNPs in the photonic films show excellent stability over immersion in various polar and non-polar solvents. The post-solvent treated photonic films display excellent contact-based antibacterial behavior against gram-negative Escherichia coli.  相似文献   
6.

IT systems pervade our society more and more, and we become heavily dependent on them. At the same time, these systems are increasingly targeted in cyberattacks, making us vulnerable. Enterprise and cybersecurity responsibles face the problem of defining techniques that raise the level of security. They need to decide which mechanism provides the most efficient defense with limited resources. Basically, the risks need to be assessed to determine the best cost-to-benefit ratio. One way to achieve this is through threat modeling; however, threat modeling is not commonly used in the enterprise IT risk domain. Furthermore, the existing threat modeling methods have shortcomings. This paper introduces a metamodel-based approach named Yet Another Cybersecurity Risk Assessment Framework (Yacraf). Yacraf aims to enable comprehensive risk assessment for organizations with more decision support. The paper includes a risk calculation formalization and also an example showing how an organization can use and benefit from Yacraf.

  相似文献   
7.
The Journal of Supercomputing - Smart services are a concept that provides services to the citizens in an efficient manner. The online shopping and recommender system can play an important role for...  相似文献   
8.
The extent of the peril associated with cancer can be perceived from the lack of treatment, ineffective early diagnosis techniques, and most importantly its fatality rate. Globally, cancer is the second leading cause of death and among over a hundred types of cancer; lung cancer is the second most common type of cancer as well as the leading cause of cancer-related deaths. Anyhow, an accurate lung cancer diagnosis in a timely manner can elevate the likelihood of survival by a noticeable margin and medical imaging is a prevalent manner of cancer diagnosis since it is easily accessible to people around the globe. Nonetheless, this is not eminently efficacious considering human inspection of medical images can yield a high false positive rate. Ineffective and inefficient diagnosis is a crucial reason for such a high mortality rate for this malady. However, the conspicuous advancements in deep learning and artificial intelligence have stimulated the development of exceedingly precise diagnosis systems. The development and performance of these systems rely prominently on the data that is used to train these systems. A standard problem witnessed in publicly available medical image datasets is the severe imbalance of data between different classes. This grave imbalance of data can make a deep learning model biased towards the dominant class and unable to generalize. This study aims to present an end-to-end convolutional neural network that can accurately differentiate lung nodules from non-nodules and reduce the false positive rate to a bare minimum. To tackle the problem of data imbalance, we oversampled the data by transforming available images in the minority class. The average false positive rate in the proposed method is a mere 1.5 percent. However, the average false negative rate is 31.76 percent. The proposed neural network has 68.66 percent sensitivity and 98.42 percent specificity.  相似文献   
9.
10.
This paper addresses the issue of data governance in a cloud-based storage system. To achieve fine-grained access control over the outsourced data, we propose Self-Healing Attribute-based Privacy Aware Data Sharing in Cloud (SAPDS). The proposed system delegates the key distribution and management process to a cloud server without seeping out any confidential information. It facilitates data owner to restrain access of the user with whom data has been shared. User revocation is achieved by merely changing one attribute associated with the decryption policy, instead of modifying the entire access control policy. It enables authorized users to update their decryption keys followed by each user revocation, making it self-healing, without ever interacting with the data owner. Computation analysis of the proposed system shows that data owner can revoke n′ users with the complexity of O(n′). Besides this, legitimate users can update their decryption keys with the complexity of O(1).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号