全文获取类型
收费全文 | 568篇 |
免费 | 30篇 |
学科分类
工业技术 | 598篇 |
出版年
2022年 | 3篇 |
2021年 | 11篇 |
2020年 | 9篇 |
2019年 | 15篇 |
2018年 | 16篇 |
2017年 | 18篇 |
2016年 | 9篇 |
2015年 | 15篇 |
2014年 | 11篇 |
2013年 | 19篇 |
2012年 | 24篇 |
2011年 | 46篇 |
2010年 | 40篇 |
2009年 | 33篇 |
2008年 | 28篇 |
2007年 | 27篇 |
2006年 | 37篇 |
2005年 | 21篇 |
2004年 | 18篇 |
2003年 | 12篇 |
2002年 | 10篇 |
2001年 | 7篇 |
2000年 | 17篇 |
1999年 | 16篇 |
1998年 | 22篇 |
1997年 | 20篇 |
1996年 | 9篇 |
1995年 | 13篇 |
1994年 | 6篇 |
1993年 | 8篇 |
1992年 | 6篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1988年 | 2篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1985年 | 3篇 |
1984年 | 5篇 |
1983年 | 3篇 |
1982年 | 5篇 |
1981年 | 3篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1978年 | 2篇 |
1977年 | 3篇 |
1976年 | 4篇 |
1975年 | 2篇 |
1973年 | 2篇 |
1971年 | 1篇 |
排序方式: 共有598条查询结果,搜索用时 15 毫秒
91.
Kannathal N Choo ML Acharya UR Sadasivan PK 《Computer methods and programs in biomedicine》2005,80(3):187-194
The electroencephalogram (EEG) is a representative signal containing information about the condition of the brain. The shape of the wave may contain useful information about the state of the brain. However, the human observer cannot directly monitor these subtle details. Besides, since bio-signals are highly subjective, the symptoms may appear at random in the time scale. Therefore, the EEG signal parameters, extracted and analyzed using computers, are highly useful in diagnostics. The aim of this work is to compare the different entropy estimators when applied to EEG data from normal and epileptic subjects. The results obtained indicate that entropy estimators can distinguish normal and epileptic EEG data with more than 95% confidence (using t-test). The classification ability of the entropy measures is tested using ANFIS classifier. The results are promising and a classification accuracy of about 90% is achieved. 相似文献
92.
Abdullah Azfar Kim-Kwang Raymond Choo Lin Liu 《Multimedia Tools and Applications》2017,76(3):3313-3341
Android productivity apps have provided the facility of having a constantly accessible and productive workforce to the information and work capabilities needed by the users. With hundreds of productivity apps available in the Android app market, it is necessary to develop a taxonomy for the forensic investigators and the end users to allow them to know what personal data remnants are available from the productivity apps. In this paper, 30 popular Android productivity apps were examined. A logical extraction of the Android phone was collected by using a well-known mobile forensic tool- XRY to extract various information of forensic interest such as user email ID and list of tasks. Based on the findings, a two-dimensional taxonomy of the forensic artefacts of the productivity apps is proposed with the app categories in one dimension and the classes of artefacts in the other dimension. The artefacts identified in the study of the apps are summarised using the taxonomy. In addition, a comparison with the existing forensic taxonomies of different categories of Android apps is provided to facilitate timely collection and analysis of evidentiary materials from mobile devices. 相似文献
93.
Yu-Chen Hu Kim-Kwang Raymond Choo Wu-Lin Chen 《Multimedia Tools and Applications》2017,76(14):15435-15463
To ensure the integrity of images compressed using block truncation coding (BTC), a tamper detection and image recovery scheme is proposed in this paper. In this scheme, the size of the authentication data can be adaptively selected according to the user’s requirement. The authentication data is embedded in the value differences of the quantization levels in each BTC-compressed image block. Multiple copies of the recovery data are embedded into the bit maps of the smooth blocks. Experimental results show that the proposed scheme performs well in terms of detection precision and the embedded image quality. Meanwhile, the tampered areas can be roughly recovered by using the proposed scheme. 相似文献
94.
Nishant Doshi Saru Kumari Dheerendra Mishra Xiong Li Kim-Kwang Raymond Choo Arun Kumar Sangaiah 《Multimedia Tools and Applications》2017,76(24):25893-25918
In this digital era, where Internet of Things (IoT) is increasing day by day, use of resource constrained devices is also increasing. Indeed, the features such as low cost, less maintenance, more adaptive to hostile environment, etc. make the wireless multimedia devices to be the best choice as the resource constrained devices. For the security, the end user device requires to establish the session key with the server before transferring the data. Mobile is one of the device having more and more usage as wireless multimedia device in recent years. In 2013, Li et al. proposed an efficient scheme for the wireless mobile communications and claimed it to be secure against various attacks. Recently, Shen et al. claimed that the scheme of Li et al. is still vulnerable to the privileged insider attack, the stolen verifier attack and finally proposed a scheme to withstand the mentioned and other attacks. However, in this paper we claim that the scheme of Shen et al. is still susceptible to the user anonymity, the session specific temporary information attack and the replay attack. In addition, Shen et al.’s scheme requires more time due to many operations. Further, we propose an efficient scheme that is secure against various known attacks and due to reduced time complexity our scheme is a preferred choice for the wireless mobile networks and hence for wireless multimedia systems. 相似文献
95.
Kang Chang Mook Lee Seung-Hi Kee Seok-Cheol Chung Chung Choo 《International Journal of Control, Automation and Systems》2018,16(3):1293-1302
International Journal of Control, Automation and Systems - In this paper, we propose the use of fault-tolerant techniques for an autonomous lane keeping system (LKS) under sensor failure of the... 相似文献
96.
97.
We have developed a novel algorithm to adjust link-bandwidths of a given multicast tree, which sends a message with sizer from a source to a multiple destinations taking into consideration pipelined router. The algorithm that we have developed
tries to minimize the end-to-end delay time and resources such as bandwidths of a multicast tree, and performs admirably well
in any given multicast tree. Our evaluation shows that the proposed algorithm dramatically reduces the end-to-end delay time
and resources reserved to satisfy the time-constraints.
This work was supported in parts by BK21 and the Ministry of Information and Communication, Korea. Corresponding author: H.
Choo. 相似文献
98.
99.
We evaluated the effects of tannic acid and purified perrsimmon tannin on survival and reproduction of bean bugs, Riptortus clavatus.Feeding behavior of R. clavatus was also examined on sweet (cv. Fuyu) and astringent (cv. Chongdosi) persimmon fruits. Soluble tannin in sweet persimmon fruits decreased from 3% in early June to 0.5% in late September, but it increased from 2 to 8% during the same period in astringent persimmon fruits. More bugs visited sweet than astringent persimmon. Numbers of piercing/sucking spots were higher on sweet than on astringent persimmon. When fed 1 and 3% solutions of persimmon tannin, adult bugs ingested only 64.1 and 9.5% of the amount of water ingested by those offered the control (distilled water). Amounts of persimmon tannin ingested by the adult bugs were 6.5 and 2.8 times higher at 1 and 3% tannin solutions compared to a 0.1% solution. Persimmon tannin exerted negative effects on survival and reproduction of R. clavatus at higher concentrations (1 and 3% solutions). Feeding of R. clavatus adults decreased with increasing tannin concentrations. When results from both sexes were pooled, 50% mortality was achieved at 11 and 4 days after treatment with the 1 and 3% tannin solutions, respectively. Reproduction decreased with 1% tannin, and no eggs were produced with 3% tannin solution. Tannic acid was similar in its effects on R. clavatus. All nymphs died 14, 12, and 7 days after feeding on 0.1, 1, and 3% tannic acid, respectively. Adults were less sensitive than nymphs, and their survival was not affected by 0.1% tannic acid. However. 1 and 3% tannic acid solutions were fatal. Survivorship decreased to 50% at 11 and 6 days after supplying tannin solutions of 1 and 3% concentrations. Higher concentrations (1 and 3%) resulted in reduced reproduction, as was seen with persimmon tannin. Our data may explain why R. clavatus does not invade sweet persimmon orchards until late July, when concentrations of soluble tannin are low enough to allow them to feed. 相似文献
100.
Tae Hwan Kim B. Ramachandra Jung Sik Choi M. B. Saidutta Ko Yeon Choo Sun-Dal Song Young-Woo Rhee 《Catalysis Letters》2004,98(2-3):161-165
Methanol selective oxidation to formaldehyde over a modified Fe-Mo catalyst with two different stoichiometric (Mo/Fe atomic ratio = 1.5 and 3.0) was studied experimentally in a fixed bed reactor over a wide range of reaction conditions. The physicochemical characterization of the prepared catalysts provides evidence that Fe2(MoO4)3 is in fact the active phase of the catalyst. The experimental results of conversion of methanol and selectivity towards formaldehyde for various residence times were studied. The results showed that as the residence time increases the yield of formaldehyde decreases. Selectivity of formaldehyde decreases with increase in residence time. This result is attributable to subsequent oxidation of formaldehyde to carbon monoxide due to longer residence time. 相似文献