全文获取类型
收费全文 | 1916篇 |
免费 | 99篇 |
国内免费 | 15篇 |
学科分类
工业技术 | 2030篇 |
出版年
2024年 | 9篇 |
2023年 | 47篇 |
2022年 | 85篇 |
2021年 | 106篇 |
2020年 | 92篇 |
2019年 | 109篇 |
2018年 | 105篇 |
2017年 | 107篇 |
2016年 | 91篇 |
2015年 | 49篇 |
2014年 | 95篇 |
2013年 | 177篇 |
2012年 | 124篇 |
2011年 | 134篇 |
2010年 | 95篇 |
2009年 | 101篇 |
2008年 | 75篇 |
2007年 | 61篇 |
2006年 | 33篇 |
2005年 | 23篇 |
2004年 | 23篇 |
2003年 | 23篇 |
2002年 | 22篇 |
2001年 | 24篇 |
2000年 | 16篇 |
1999年 | 17篇 |
1998年 | 22篇 |
1997年 | 24篇 |
1996年 | 20篇 |
1995年 | 20篇 |
1994年 | 16篇 |
1993年 | 4篇 |
1992年 | 10篇 |
1991年 | 4篇 |
1990年 | 7篇 |
1989年 | 4篇 |
1988年 | 5篇 |
1987年 | 2篇 |
1986年 | 5篇 |
1985年 | 10篇 |
1984年 | 6篇 |
1983年 | 9篇 |
1982年 | 4篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1978年 | 4篇 |
1977年 | 4篇 |
1976年 | 4篇 |
1970年 | 1篇 |
排序方式: 共有2030条查询结果,搜索用时 330 毫秒
51.
Sajjad Ahmad Imran Raza M. Hasan Jamal Sirojiddin Djuraev Soojung Hur Imran Ashraf 《计算机、材料和连续体(英文)》2023,74(2):2363-2377
Vehicle-to-grid technology is an emerging field that allows unused power from Electric Vehicles (EVs) to be used by the smart grid through the central aggregator. Since the central aggregator is connected to the smart grid through a wireless network, it is prone to cyber-attacks that can be detected and mitigated using an intrusion detection system. However, existing intrusion detection systems cannot be used in the vehicle-to-grid network because of the special requirements and characteristics of the vehicle-to-grid network. In this paper, the effect of denial-of-service attacks of malicious electric vehicles on the central aggregator of the vehicle-to-grid network is investigated and an intrusion detection system for the vehicle-to-grid network is proposed. The proposed system, central aggregator–intrusion detection system (CA-IDS), works as a security gateway for EVs to analyze and monitor incoming traffic for possible DoS attacks. EVs are registered with a Central Aggregator (CAG) to exchange authenticated messages, and malicious EVs are added to a blacklist for violating a set of predefined policies to limit their interaction with the CAG. A denial of service (DoS) attack is simulated at CAG in a vehicle-to-grid (V2G) network manipulating various network parameters such as transmission overhead, receiving capacity of destination, average packet size, and channel availability. The proposed system is compared with existing intrusion detection systems using different parameters such as throughput, jitter, and accuracy. The analysis shows that the proposed system has a higher throughput, lower jitter, and higher accuracy as compared to the existing schemes. 相似文献
52.
Shahad Alyousif Mohammed Dauwed Rafal Nader Mohammed Hasan Ali Mustafa Musa Jabar Ahmed Alkhayyat 《计算机、材料和连续体(英文)》2023,75(1):531-546
The number of mobile devices accessing wireless networks is skyrocketing due to the rapid advancement of sensors and wireless communication technology. In the upcoming years, it is anticipated that mobile data traffic would rise even more. The development of a new cellular network paradigm is being driven by the Internet of Things, smart homes, and more sophisticated applications with greater data rates and latency requirements. Resources are being used up quickly due to the steady growth of smartphone devices and multimedia apps. Computation offloading to either several distant clouds or close mobile devices has consistently improved the performance of mobile devices. The computation latency can also be decreased by offloading computing duties to edge servers with a specific level of computing power. Device-to-device (D2D) collaboration can assist in processing small-scale activities that are time-sensitive in order to further reduce task delays. The task offloading performance is drastically reduced due to the variation of different performance capabilities of edge nodes. Therefore, this paper addressed this problem and proposed a new method for D2D communication. In this method, the time delay is reduced by enabling the edge nodes to exchange data samples. Simulation results show that the proposed algorithm has better performance than traditional algorithm. 相似文献
53.
Alawi Alqushaibi Mohd Hilmi Hasan Said Jadid Abdulkadir Amgad Muneer Mohammed Gamal Qasem Al-Tashi Shakirah Mohd Taib Hitham Alhussian 《计算机、材料和连续体(英文)》2023,75(2):3223-3238
Diabetes mellitus is a long-term condition characterized by hyperglycemia. It could lead to plenty of difficulties. According to rising morbidity in recent years, the world’s diabetic patients will exceed 642 million by 2040, implying that one out of every ten persons will be diabetic. There is no doubt that this startling figure requires immediate attention from industry and academia to promote innovation and growth in diabetes risk prediction to save individuals’ lives. Due to its rapid development, deep learning (DL) was used to predict numerous diseases. However, DL methods still suffer from their limited prediction performance due to the hyperparameters selection and parameters optimization. Therefore, the selection of hyper-parameters is critical in improving classification performance. This study presents Convolutional Neural Network (CNN) that has achieved remarkable results in many medical domains where the Bayesian optimization algorithm (BOA) has been employed for hyperparameters selection and parameters optimization. Two issues have been investigated and solved during the experiment to enhance the results. The first is the dataset class imbalance, which is solved using Synthetic Minority Oversampling Technique (SMOTE) technique. The second issue is the model's poor performance, which has been solved using the Bayesian optimization algorithm. The findings indicate that the Bayesian based-CNN model superbases all the state-of-the-art models in the literature with an accuracy of 89.36%, F1-score of 0.88.6, and Matthews Correlation Coefficient (MCC) of 0.88.6. 相似文献
54.
Muhammad Aadil Siddiqui M. H. Md Khir Zaka Ullah Muath Al Hasan Abdul Saboor Saeed Ahmed Magsi 《计算机、材料和连续体(英文)》2023,75(2):2859-2871
One of the most pressing concerns for the consumer market is the detection of adulteration in meat products due to their preciousness. The rapid and accurate identification mechanism for lard adulteration in meat products is highly necessary, for developing a mechanism trusted by consumers and that can be used to make a definitive diagnosis. Fourier Transform Infrared Spectroscopy (FTIR) is used in this work to identify lard adulteration in cow, lamb, and chicken samples. A simplified extraction method was implied to obtain the lipids from pure and adulterated meat. Adulterated samples were obtained by mixing lard with chicken, lamb, and beef with different concentrations (10%–50% v/v). Principal component analysis (PCA) and partial least square (PLS) were used to develop a calibration model at 800–3500 cm−1. Three-dimension PCA was successfully used by dividing the spectrum in three regions to classify lard meat adulteration in chicken, lamb, and beef samples. The corresponding FTIR peaks for the lard have been observed at 1159.6, 1743.4, 2853.1, and 2922.5 cm−1, which differentiate chicken, lamb, and beef samples. The wavenumbers offer the highest determination coefficient R2 value of 0.846 and lowest root mean square error of calibration (RMSEC) and root mean square error prediction (RMSEP) with an accuracy of 84.6%. Even the tiniest fat adulteration up to 10% can be reliably discovered using this methodology. 相似文献
55.
Sujan Kumar Roy Md. Khademul Islam Molla Keikichi Hirose Md. Kamrul Hasan 《International Journal of Speech Technology》2011,14(4):339-349
A novel and robust pitch estimation method is presented in this paper. The basic idea is to reshape the speech signal using
a combination of the dominant harmonic modification (DHM) and data adaptive time domain filtering techniques. The noisy speech
signal is filtered within the ranges of fundamental frequencies to obtain the pre-filtered signal (PFS). The dominant harmonic
(DH) of the PFS is determined and enhanced its amplitude. Normalized autocorrelation function (NACF) is applied to that modified
signal. Then empirical mode decomposition (EMD) based data adaptive time domain filtering is applied to the NACF signal. Partial
reconstruction is performed in EMD domain. The pitch period is determined from the partially reconstructed signal. The experimental
results show that the proposed method performs better than the other recently developed methods for noisy and clean speech
signals in terms of gross and fine pitch errors. 相似文献
56.
This paper presents a new algorithm for de-noising global positioning system (GPS) and inertial navigation system (INS) data and estimates the INS error using wavelet multi-resolution analysis algorithm (WMRA)-based genetic algorithm (GA) with a well-designed structure appropriate for practical and real time implementations because of its very short training time and elevated accuracy. Different techniques have been implemented to de-noise and estimate the INS and GPS errors. Wavelet de-noising is one of th... 相似文献
57.
Lower bounds on lengths of checking sequences 总被引:1,自引:0,他引:1
Guy-Vincent Jourdan Hasan Ural Hüsnü Yenigün Ji Chao Zhang 《Formal Aspects of Computing》2010,22(6):667-679
Lower bounds on the lengths of checking sequences constructed for testing from Finite State Machine-based specifications are
established. These bounds consider the case where a distinguishing sequence is used in forming state recognition and transition
verification subsequences and identify the effects of overlapping among such subsequences. Empirical results show that the
existing methods for construction of checking sequences provide checking sequences with lengths that are within acceptable
distance to these lower bounds. 相似文献
58.
In wireless communication reception, the reliability of orthogonal frequency division multiplexing (OFDM) is limited because of the time-varying nature of the channel. This causes inter-carrier interference (ICI) and increases inaccuracies in channel tracking. This can effectively be avoided at the cost of power loss and bandwidth expansion by inserting a cyclic prefix guard interval before each block of parallel data symbols. However, this guard interval decreases the spectral efficiency of the OFDM system as the corresponding amount. Recently, it was found that based on Haar-orthonormal wavelets, discrete wavelet-based OFDM (DWT-OFDM) is capable of reducing the inter symbol interference (ISI) and ICI, which are caused by the loss in orthogonality between the carriers. DWT-OFDM can also support much higher spectrum efficiency than discrete Fourier-based OFDM (DFT-OFDM). In this paper the DFT-OFDM is replaced by Multiwavelets OFDM (DMWT-OFDM) in order to further reduce the level of interference and increase spectral efficiency. It is found that proposed Multiwavelet design achieves much lower bit error rates, increases signal to noise power ratio (SNR), and can be used as an alternative to the conventional OFDM. The proposed OFDM system was modeled tested, and its performance was found under different channel conditions. 相似文献
59.
In this paper we introduce a goal programming formulation for the multi-group classification problem. Although a great number of mathematical programming models for two-group classification problems have been proposed in the literature, there are few mathematical programming models for multi-group classification problems. Newly proposed multi-group mathematical programming model is compared with other conventional multi-group methods by using different real data sets taken from the literature and simulation data. A comparative analysis on the real data sets and simulation data shows that our goal programming formulation may suggest efficient alternative to traditional statistical methods and mathematical programming formulations for the multi-group classification problem. 相似文献
60.
Cellular automata are used to model dynamical phenomena by focusing on their local behavior which depends on the neighboring cells in order to express their global behavior. The geometrical structure of the models suggests the algebraic structure of cellular automata. After modeling the dynamical phenomena, it is sometimes an important problem to be able to move backwards in order to understand it better. This is only possible if cellular automata is reversible. In this paper, 2D finite cellular automata defined by local rules based on hexagonal cell structure are studied. Rule matrix of the hexagonal finite cellular automaton is obtained. The rank of rule matrices representing the 2D hexagonal finite cellular automata via an algorithm is computed. It is a well known fact that determining the reversibility of a 2D cellular automata is a very difficult problem in general. Here, the reversibility problem of this family of 2D hexagonal cellular automata is also resolved completely. 相似文献