首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   578篇
  免费   30篇
工业技术   608篇
  2022年   3篇
  2021年   12篇
  2020年   9篇
  2019年   15篇
  2018年   16篇
  2017年   18篇
  2016年   9篇
  2015年   15篇
  2014年   11篇
  2013年   19篇
  2012年   24篇
  2011年   46篇
  2010年   40篇
  2009年   33篇
  2008年   28篇
  2007年   27篇
  2006年   37篇
  2005年   21篇
  2004年   18篇
  2003年   13篇
  2002年   10篇
  2001年   7篇
  2000年   20篇
  1999年   19篇
  1998年   23篇
  1997年   20篇
  1996年   10篇
  1995年   13篇
  1994年   6篇
  1993年   8篇
  1992年   6篇
  1991年   1篇
  1990年   3篇
  1989年   2篇
  1988年   2篇
  1987年   3篇
  1986年   1篇
  1985年   3篇
  1984年   5篇
  1983年   3篇
  1982年   5篇
  1981年   3篇
  1980年   4篇
  1979年   2篇
  1978年   2篇
  1977年   3篇
  1976年   4篇
  1975年   2篇
  1973年   2篇
  1971年   1篇
排序方式: 共有608条查询结果,搜索用时 250 毫秒
21.
To ensure the integrity of images compressed using block truncation coding (BTC), a tamper detection and image recovery scheme is proposed in this paper. In this scheme, the size of the authentication data can be adaptively selected according to the user’s requirement. The authentication data is embedded in the value differences of the quantization levels in each BTC-compressed image block. Multiple copies of the recovery data are embedded into the bit maps of the smooth blocks. Experimental results show that the proposed scheme performs well in terms of detection precision and the embedded image quality. Meanwhile, the tampered areas can be roughly recovered by using the proposed scheme.  相似文献   
22.
In this digital era, where Internet of Things (IoT) is increasing day by day, use of resource constrained devices is also increasing. Indeed, the features such as low cost, less maintenance, more adaptive to hostile environment, etc. make the wireless multimedia devices to be the best choice as the resource constrained devices. For the security, the end user device requires to establish the session key with the server before transferring the data. Mobile is one of the device having more and more usage as wireless multimedia device in recent years. In 2013, Li et al. proposed an efficient scheme for the wireless mobile communications and claimed it to be secure against various attacks. Recently, Shen et al. claimed that the scheme of Li et al. is still vulnerable to the privileged insider attack, the stolen verifier attack and finally proposed a scheme to withstand the mentioned and other attacks. However, in this paper we claim that the scheme of Shen et al. is still susceptible to the user anonymity, the session specific temporary information attack and the replay attack. In addition, Shen et al.’s scheme requires more time due to many operations. Further, we propose an efficient scheme that is secure against various known attacks and due to reduced time complexity our scheme is a preferred choice for the wireless mobile networks and hence for wireless multimedia systems.  相似文献   
23.
The tensile behaviors of the ultrafine-grained (UFG) pure copper prepared by cold rolling have been investigated. The UFG-Cu exhibited high strengths and low ductility. The ductile dimple-like fracture surfaces and persistent-slip-bands (PSBs)-like local shear bands in the tension-deformed UFG-Cu were observed, both of which typically spanned tens of grain sizes. This observation indicated that the fracture mechanisms operated at a larger scale than the grain size and eventually involved collective grain activities. Moreover, localized shear bands provided the experimental evidence to the localized plastic deformation, which was the one of the dominant reasons, causing the low ductility in the UFG-Cu.  相似文献   
24.
25.
26.
Learners need to have good reasons to engage and accept e-learning. They need to understand that unless they do, the outcomes will be less favourable. The technology acceptance model (TAM) is the most widely recognized model addressing why users accept or reject technology. This study describes the development and evaluation of a virtual environment, the online 3D world Second Life (SL), for learning rapid sequence intubation (RSI). RSI is an increasingly frequently used method of acute airway management in healthcare settings. The intention of learners to use the system was explored based on the TAM, with the computer self-efficacy construct as an external variable. Two hundred and six nursing students participated in this study. The findings suggest that the system was perceived as useful, and that the students felt confident working with computers and intended to review RSI in SL as often as needed. However, they remained neutral regarding the ease of use of the system. Strategies were suggested for boosting the students’ self-confidence in using the system. Overall use of the TAM in this context was successful, indicating the robustness of the model. The limitations of the study were discussed and further areas of research on the TAM were proposed.  相似文献   
27.
During the last half century, significant efforts have been made to explore the underlying mechanisms of visual selective attention using a variety of approaches—psychology, neuroscience, and computational models. Among them, the computational approach emerged on the stage with the development of computer science and computer vision focusing researchers interests in this area. However, computer scientists often face the difficulty of how to construct a computational model of selective attention working on their own purpose. Here, we critically review studies of selective attention from a multidisciplinary perspective to take lessons from psychological and biological studies of attention. We consider how constraints from those studies can be imposed on computational models of selective attention.  相似文献   
28.
The mechanistic modeling of biodiesel production process in membrane reactor with the consideration of chemical reaction, phase equilibrium, and ultrafiltration is important for the membrane reactor design. In part II of this work, the chemical and phase equilibrium (CPE) model for crude palm oil transesterification reaction in the membrane reactor developed in part I is extended to an integration of CPE with modified Maxwell–Stefan model, which considers multicomponent mass transport phenomena of concentration polarization and intramembrane. A good fit of simulated permeate fluxes and apparent solute rejection to the experimental data shows that the model has a good prediction capability. Reversible fouling was found to be the major fouling and no pore plugging was observed. Simulation results verified that micelles were retained by the membrane at CPO:MEOH molar ratio of 1:24 and catalyst concentration of 0.5 wt %. However, phase inversion happened when catalyst concentration of 0.05 and 0.1 wt % were used. © 2015 American Institute of Chemical Engineers AIChE J, 61: 1981–1996, 2015  相似文献   
29.
In this study, nickel oxide was prepared through the calcination of extrusion dripped chitosan/nickel nitrate beads. The morphology and structural properties of the products were studied using various characterization techniques. Uniformly distributed nickel oxide was formed as observed from the studies of surface morphology where the processing parameters play a huge role on the resulting morphology. TEM results have shown that nickel oxide with crystallite sizes of 10–30 nm was obtained. The Fourier‐transform infrared spectra studies show an intense peak at 525 cm?1, which is attributed to the vibration of Ni–O bond. Furthermore, the XRD results show NiO diffraction peaks correspond to (111), (200), (220), (311), and (222) which indicates that a bunsenite structure with a face‐centered cubic phase was produced in this study. The usage of 500°C as the lower limit in this study is justified due to the complete removal of the templating material as seen in the thermalgravimetric analysis studies. Furthermore, it was obtained that the largest surface area of nickel oxide synthesized using this technique is 48.024 m2/g with pore sizes of 19.843 nm. The usage of chitosan as a green template for the synthesis of nanoparticles has shown promising results which allows a more economical and sustainable approach for the fabrication of nanomaterials.  相似文献   
30.
Bulletin of Engineering Geology and the Environment - The infinite slope stability model is the basis for predicting the slope stability; however, the fundamental theory requires various input...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号