全文获取类型
收费全文 | 578篇 |
免费 | 30篇 |
学科分类
工业技术 | 608篇 |
出版年
2022年 | 3篇 |
2021年 | 12篇 |
2020年 | 9篇 |
2019年 | 15篇 |
2018年 | 16篇 |
2017年 | 18篇 |
2016年 | 9篇 |
2015年 | 15篇 |
2014年 | 11篇 |
2013年 | 19篇 |
2012年 | 24篇 |
2011年 | 46篇 |
2010年 | 40篇 |
2009年 | 33篇 |
2008年 | 28篇 |
2007年 | 27篇 |
2006年 | 37篇 |
2005年 | 21篇 |
2004年 | 18篇 |
2003年 | 13篇 |
2002年 | 10篇 |
2001年 | 7篇 |
2000年 | 20篇 |
1999年 | 19篇 |
1998年 | 23篇 |
1997年 | 20篇 |
1996年 | 10篇 |
1995年 | 13篇 |
1994年 | 6篇 |
1993年 | 8篇 |
1992年 | 6篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1988年 | 2篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1985年 | 3篇 |
1984年 | 5篇 |
1983年 | 3篇 |
1982年 | 5篇 |
1981年 | 3篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1978年 | 2篇 |
1977年 | 3篇 |
1976年 | 4篇 |
1975年 | 2篇 |
1973年 | 2篇 |
1971年 | 1篇 |
排序方式: 共有608条查询结果,搜索用时 250 毫秒
21.
Yu-Chen Hu Kim-Kwang Raymond Choo Wu-Lin Chen 《Multimedia Tools and Applications》2017,76(14):15435-15463
To ensure the integrity of images compressed using block truncation coding (BTC), a tamper detection and image recovery scheme is proposed in this paper. In this scheme, the size of the authentication data can be adaptively selected according to the user’s requirement. The authentication data is embedded in the value differences of the quantization levels in each BTC-compressed image block. Multiple copies of the recovery data are embedded into the bit maps of the smooth blocks. Experimental results show that the proposed scheme performs well in terms of detection precision and the embedded image quality. Meanwhile, the tampered areas can be roughly recovered by using the proposed scheme. 相似文献
22.
Nishant Doshi Saru Kumari Dheerendra Mishra Xiong Li Kim-Kwang Raymond Choo Arun Kumar Sangaiah 《Multimedia Tools and Applications》2017,76(24):25893-25918
In this digital era, where Internet of Things (IoT) is increasing day by day, use of resource constrained devices is also increasing. Indeed, the features such as low cost, less maintenance, more adaptive to hostile environment, etc. make the wireless multimedia devices to be the best choice as the resource constrained devices. For the security, the end user device requires to establish the session key with the server before transferring the data. Mobile is one of the device having more and more usage as wireless multimedia device in recent years. In 2013, Li et al. proposed an efficient scheme for the wireless mobile communications and claimed it to be secure against various attacks. Recently, Shen et al. claimed that the scheme of Li et al. is still vulnerable to the privileged insider attack, the stolen verifier attack and finally proposed a scheme to withstand the mentioned and other attacks. However, in this paper we claim that the scheme of Shen et al. is still susceptible to the user anonymity, the session specific temporary information attack and the replay attack. In addition, Shen et al.’s scheme requires more time due to many operations. Further, we propose an efficient scheme that is secure against various known attacks and due to reduced time complexity our scheme is a preferred choice for the wireless mobile networks and hence for wireless multimedia systems. 相似文献
23.
The tensile behaviors of the ultrafine-grained (UFG) pure copper prepared by cold rolling have been investigated. The UFG-Cu exhibited high strengths and low ductility. The ductile dimple-like fracture surfaces and persistent-slip-bands (PSBs)-like local shear bands in the tension-deformed UFG-Cu were observed, both of which typically spanned tens of grain sizes. This observation indicated that the fracture mechanisms operated at a larger scale than the grain size and eventually involved collective grain activities. Moreover, localized shear bands provided the experimental evidence to the localized plastic deformation, which was the one of the dominant reasons, causing the low ductility in the UFG-Cu. 相似文献
24.
25.
26.
Learners need to have good reasons to engage and accept e-learning. They need to understand that unless they do, the outcomes will be less favourable. The technology acceptance model (TAM) is the most widely recognized model addressing why users accept or reject technology. This study describes the development and evaluation of a virtual environment, the online 3D world Second Life (SL), for learning rapid sequence intubation (RSI). RSI is an increasingly frequently used method of acute airway management in healthcare settings. The intention of learners to use the system was explored based on the TAM, with the computer self-efficacy construct as an external variable. Two hundred and six nursing students participated in this study. The findings suggest that the system was perceived as useful, and that the students felt confident working with computers and intended to review RSI in SL as often as needed. However, they remained neutral regarding the ease of use of the system. Strategies were suggested for boosting the students’ self-confidence in using the system. Overall use of the TAM in this context was successful, indicating the robustness of the model. The limitations of the study were discussed and further areas of research on the TAM were proposed. 相似文献
27.
During the last half century, significant efforts have been made to explore the underlying mechanisms of visual selective attention using a variety of approaches—psychology, neuroscience, and computational models. Among them, the computational approach emerged on the stage with the development of computer science and computer vision focusing researchers interests in this area. However, computer scientists often face the difficulty of how to construct a computational model of selective attention working on their own purpose. Here, we critically review studies of selective attention from a multidisciplinary perspective to take lessons from psychological and biological studies of attention. We consider how constraints from those studies can be imposed on computational models of selective attention. 相似文献
28.
Modeling of a membrane reactor system for crude palm oil transesterification. Part II: Transport phenomena 下载免费PDF全文
Pin Pin Oh Mei Fong Chong Harrison Lik Nang Lau Yuen May Choo Junghui Chen 《American Institute of Chemical Engineers》2015,61(6):1981-1996
The mechanistic modeling of biodiesel production process in membrane reactor with the consideration of chemical reaction, phase equilibrium, and ultrafiltration is important for the membrane reactor design. In part II of this work, the chemical and phase equilibrium (CPE) model for crude palm oil transesterification reaction in the membrane reactor developed in part I is extended to an integration of CPE with modified Maxwell–Stefan model, which considers multicomponent mass transport phenomena of concentration polarization and intramembrane. A good fit of simulated permeate fluxes and apparent solute rejection to the experimental data shows that the model has a good prediction capability. Reversible fouling was found to be the major fouling and no pore plugging was observed. Simulation results verified that micelles were retained by the membrane at CPO:MEOH molar ratio of 1:24 and catalyst concentration of 0.5 wt %. However, phase inversion happened when catalyst concentration of 0.05 and 0.1 wt % were used. © 2015 American Institute of Chemical Engineers AIChE J, 61: 1981–1996, 2015 相似文献
29.
Synthesis and Characterization of NiO Nano‐Spheres by Templating on Chitosan as a Green Precursor 下载免费PDF全文
Cheng Keong Choo Tze Lim Goh Ladan Shahcheraghi Gek Cheng Ngoh Ahmad Zuhairi Abdullah Bahman Amini Horri Babak Salamatinia 《Journal of the American Ceramic Society》2016,99(12):3874-3882
In this study, nickel oxide was prepared through the calcination of extrusion dripped chitosan/nickel nitrate beads. The morphology and structural properties of the products were studied using various characterization techniques. Uniformly distributed nickel oxide was formed as observed from the studies of surface morphology where the processing parameters play a huge role on the resulting morphology. TEM results have shown that nickel oxide with crystallite sizes of 10–30 nm was obtained. The Fourier‐transform infrared spectra studies show an intense peak at 525 cm?1, which is attributed to the vibration of Ni–O bond. Furthermore, the XRD results show NiO diffraction peaks correspond to (111), (200), (220), (311), and (222) which indicates that a bunsenite structure with a face‐centered cubic phase was produced in this study. The usage of 500°C as the lower limit in this study is justified due to the complete removal of the templating material as seen in the thermalgravimetric analysis studies. Furthermore, it was obtained that the largest surface area of nickel oxide synthesized using this technique is 48.024 m2/g with pore sizes of 19.843 nm. The usage of chitosan as a green template for the synthesis of nanoparticles has shown promising results which allows a more economical and sustainable approach for the fabrication of nanomaterials. 相似文献
30.
Choo Hyunwook Min Dae-Hong Sung Joo Hyun Yoon Hyung-Koo 《Bulletin of Engineering Geology and the Environment》2019,78(8):5671-5685
Bulletin of Engineering Geology and the Environment - The infinite slope stability model is the basis for predicting the slope stability; however, the fundamental theory requires various input... 相似文献