全文获取类型
收费全文 | 365篇 |
免费 | 23篇 |
学科分类
工业技术 | 388篇 |
出版年
2024年 | 2篇 |
2023年 | 12篇 |
2022年 | 17篇 |
2021年 | 20篇 |
2020年 | 17篇 |
2019年 | 29篇 |
2018年 | 19篇 |
2017年 | 19篇 |
2016年 | 15篇 |
2015年 | 10篇 |
2014年 | 14篇 |
2013年 | 43篇 |
2012年 | 11篇 |
2011年 | 15篇 |
2010年 | 11篇 |
2009年 | 15篇 |
2008年 | 8篇 |
2007年 | 9篇 |
2006年 | 7篇 |
2005年 | 8篇 |
2004年 | 6篇 |
2003年 | 4篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1996年 | 5篇 |
1995年 | 5篇 |
1994年 | 5篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1985年 | 4篇 |
1984年 | 3篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1978年 | 2篇 |
1976年 | 2篇 |
1975年 | 2篇 |
1970年 | 2篇 |
1969年 | 2篇 |
1968年 | 1篇 |
1967年 | 1篇 |
排序方式: 共有388条查询结果,搜索用时 31 毫秒
11.
A portable toolkit for supporting end-user personalization and control in context-aware applications 总被引:1,自引:0,他引:1
Fahim Kawsar Kaori Fujinami Tatsuo Nakajima Jong Hyuk Park Sang-Soo Yeo 《Multimedia Tools and Applications》2010,47(3):409-432
A context-aware application in the pervasive computing environment provides intuitive user centric services using implicit
context cues. Personalization and control are important issues for this class of application as they enable end-users to understand
and configure the behavior of an application. However most development efforts for building context-aware applications focus
on the sensor fusion and machine learning algorithms to generate and distribute context cues that drive the application with
little emphasis on user-centric issues. We argue that, to elevate user experiences with context-aware applications, it is
very important to address these personalization and control issues at the system interface level in parallel to context centric
design. Towards this direction, we present Persona, a toolkit that provides support for extending context-aware applications with end-user personalization and control features.
Specifically, Persona exposes a few application programming interfaces that abstract end-user customization and control mechanisms
and enables developers to integrate these user-centric aspects with rest of the application seamlessly. There are two primary
advantages of Persona. First, it can be used with various existing middlewares as a ready-to-use plug-in to build customizable
and controllable context-aware applications. Second, existing context-aware applications can easily be augmented to provide
end-user personalization and control support. In this paper, we discuss the design and implementation of Persona and demonstrate
its usefulness through the development and augmentation of a range of common context-aware applications. 相似文献
12.
13.
Guzel Muhammed Huseyin Unal Recep Emre Kose Faruk 《Journal of Mechanical Science and Technology》2021,35(12):5773-5779
Journal of Mechanical Science and Technology - Solar chimney power plants (SCPP) are structures that have the potential to generate a significant amount of electrical energy without harming the... 相似文献
14.
Anomaly localization in regular textures based on deep convolutional generative adversarial networks
Oz Muhammed Ali Nur Mercimek Muharrem Kaymakci Ozgur Turay 《Applied Intelligence》2022,52(2):1556-1565
Applied Intelligence - Pixel-level anomaly localization is a challenging problem due to the lack of abnormal training samples. The existing adversarial network methods attempt to segment anomalies... 相似文献
15.
Tulay Y. İnan Emel Yıldız Birsen Karaca Hacer Dogan Alican Vatansever Muhammed Nalbant Koray Eken 《Journal of materials science. Materials in medicine》2014,25(8):2027-2039
We produced UV curable lenses with properties blocking short wave UV light. In the UV-curable formulations, we used an oligomer (Ac-PEEK) with another urethan oligomer (Mw = 2000). Radically active, molecular weight controlled Ac-PEEK was obtained by reacting 2-hydroxyl ethyl methacrylate with molecular- weight- controlled and isocyanate terminated PEEK (Mn = 4500). We characterized all synthesized monomer, oligomer and optical materials with UV/Vis spectrophotometer with interferogram, elemental analyser, mass spectrophotometer, proton nuclear magnetic resonance, Fourier transform infrared spectroscopy, thermal gravimetric analyzer, differential scanning calorimeter, scanning electron microscopy and gas chromatography. Results suggested that newly synthesized oligomer with the structure of PEEK absorbs short wave UV-light. Ageing tests [ISO 11979-5, Ophthalmic implants—intraocular lenses (IOL)—Part 5: Biocompatibility] performed on the IOL materials were successful. High contact angle of the obtained lenses suggests that all lenses were hydrophobic and SEM results revealed that lenses are morphologically homogeneous. Based on all positive properties just mentioned, we safely conclude that the lenses produced in this study are very promising for IOL production. 相似文献
16.
Süleyman Karda Serkan elik Muhammed Ali Bingl Mehmet Sabir Kiraz Hüseyin Demirci Albert Levi 《Wireless Communications and Mobile Computing》2015,15(18):2150-2166
This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k‐strong and k‐forward adversaries where the adversary is allowed to corrupt a tag at most k times. Moreover, we introduce an extended privacy definition that also covers all privacy classes of Vaudenay's model. In order to achieve highest privacy level, we study low cost primitives such as physically unclonable functions (PUFs). The common assumption of PUFs is that their physical structure is destroyed once tampered. This is an ideal assumption because the tamper resistance depends on the ability of the attacker and the quality of the PUF circuits. In this paper, we have weakened this assumption by introducing a new definition k‐resistant PUFs. k‐PUFs are tamper resistant against at most k attacks; that is, their physical structure remains still functional and correct until at most kth physical attack. Furthermore, we prove that strong privacy can be achieved without public‐key cryptography using k PUF‐based authentication. We finally prove that our extended proposal achieves both reader authentication and k‐strong privacy. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
17.
Therese P. McAllister John L. Gross Fahim Sadek Steven Kirkpatrick Robert A. MacNeill Mehdi Zarghamee Omer O. Erbay Andrew T. Sarawit 《Fire Technology》2013,49(3):709-739
The National Institute of Standards and Technology (NIST) conducted an extensive investigation of the collapse of World Trade Center towers (WTC 1 and WTC 2) and the WTC 7 building. This paper describes the component, subsystem, and global analyses performed for the reconstruction of the structural response of WTC buildings 1, 2, and 7 to impact and fire damage. To illustrate the component and subsystem analyses, the approach taken for simulating the performance of concrete slabs and shear stud connectors in composite floors subject to fire conditions are presented, as well as steel floor framing connections for beams and girders. The development of the global models from the component and subsystem analyses is briefly described, including the sets of input data used to bound the probable conditions of impact and fire damage. The final analysis results that were used to develop the probable collapse hypotheses, and a comparison of the results against observed events, are presented for each building. A review of research activities focused on improving understanding of structural system response to multi-floor fires following the WTC disaster is also provided. 相似文献
18.
Farman Muhammad Nawaz Fahim Majeed Sadia Javeed Hafiz Muhammad Rashad Ahsan Muhammad Ahmad Khawaja Shafique Aurangzaib Muhammad Bukhari Muhammad Adnan Shehzad Muhammad Asif Hussain Muhammad Baqir 《SILICON》2022,14(13):7901-7917
Silicon - The present study evaluated the effect of silicon (Si) seed priming and sulfur (S) foliar spray on drought tolerance of two contrasting maize hybrids viz. drought tolerant Hi-Corn 11 and... 相似文献
19.
20.
Degner M.W. Van Maaren R. Azza Fahim Novotny D.W. Lorenz R.D. Syverson C.D. 《Industry Applications, IEEE Transactions on》1996,32(2):380-385
A major problem in the design and manufacturing of surface mounted permanent magnet machines is reliably holding the permanent magnets in place at high speeds. This paper evaluates a unique rotor lamination design for a high pole number, permanent magnet alternator. This buried magnet design, which is capable of reliably holding the permanent magnets in place at high speeds, offers both easier and cheaper assembly when compared with the methods currently used in surface mounted permanent magnet machines. Finite element analysis is used to compare the buried magnet design with equivalent surface mounted designs and shows that the performance of the alternator is not significantly affected by the iron over the magnets. Experimental results from a prototype alternator further corroborate the FEA and show that the design is capable of operating at high speeds with no other means of magnet retention. In addition, an improvement in the buried magnet design which can reduce the lamination complexity is suggested and examined 相似文献