首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   568篇
  免费   30篇
工业技术   598篇
  2022年   3篇
  2021年   11篇
  2020年   9篇
  2019年   15篇
  2018年   16篇
  2017年   18篇
  2016年   9篇
  2015年   15篇
  2014年   11篇
  2013年   19篇
  2012年   24篇
  2011年   46篇
  2010年   40篇
  2009年   33篇
  2008年   28篇
  2007年   27篇
  2006年   37篇
  2005年   21篇
  2004年   18篇
  2003年   12篇
  2002年   10篇
  2001年   7篇
  2000年   17篇
  1999年   16篇
  1998年   22篇
  1997年   20篇
  1996年   9篇
  1995年   13篇
  1994年   6篇
  1993年   8篇
  1992年   6篇
  1991年   1篇
  1990年   3篇
  1989年   2篇
  1988年   2篇
  1987年   3篇
  1986年   1篇
  1985年   3篇
  1984年   5篇
  1983年   3篇
  1982年   5篇
  1981年   3篇
  1980年   4篇
  1979年   2篇
  1978年   2篇
  1977年   3篇
  1976年   4篇
  1975年   2篇
  1973年   2篇
  1971年   1篇
排序方式: 共有598条查询结果,搜索用时 15 毫秒
91.
The electroencephalogram (EEG) is a representative signal containing information about the condition of the brain. The shape of the wave may contain useful information about the state of the brain. However, the human observer cannot directly monitor these subtle details. Besides, since bio-signals are highly subjective, the symptoms may appear at random in the time scale. Therefore, the EEG signal parameters, extracted and analyzed using computers, are highly useful in diagnostics. The aim of this work is to compare the different entropy estimators when applied to EEG data from normal and epileptic subjects. The results obtained indicate that entropy estimators can distinguish normal and epileptic EEG data with more than 95% confidence (using t-test). The classification ability of the entropy measures is tested using ANFIS classifier. The results are promising and a classification accuracy of about 90% is achieved.  相似文献   
92.
Android productivity apps have provided the facility of having a constantly accessible and productive workforce to the information and work capabilities needed by the users. With hundreds of productivity apps available in the Android app market, it is necessary to develop a taxonomy for the forensic investigators and the end users to allow them to know what personal data remnants are available from the productivity apps. In this paper, 30 popular Android productivity apps were examined. A logical extraction of the Android phone was collected by using a well-known mobile forensic tool- XRY to extract various information of forensic interest such as user email ID and list of tasks. Based on the findings, a two-dimensional taxonomy of the forensic artefacts of the productivity apps is proposed with the app categories in one dimension and the classes of artefacts in the other dimension. The artefacts identified in the study of the apps are summarised using the taxonomy. In addition, a comparison with the existing forensic taxonomies of different categories of Android apps is provided to facilitate timely collection and analysis of evidentiary materials from mobile devices.  相似文献   
93.
To ensure the integrity of images compressed using block truncation coding (BTC), a tamper detection and image recovery scheme is proposed in this paper. In this scheme, the size of the authentication data can be adaptively selected according to the user’s requirement. The authentication data is embedded in the value differences of the quantization levels in each BTC-compressed image block. Multiple copies of the recovery data are embedded into the bit maps of the smooth blocks. Experimental results show that the proposed scheme performs well in terms of detection precision and the embedded image quality. Meanwhile, the tampered areas can be roughly recovered by using the proposed scheme.  相似文献   
94.
In this digital era, where Internet of Things (IoT) is increasing day by day, use of resource constrained devices is also increasing. Indeed, the features such as low cost, less maintenance, more adaptive to hostile environment, etc. make the wireless multimedia devices to be the best choice as the resource constrained devices. For the security, the end user device requires to establish the session key with the server before transferring the data. Mobile is one of the device having more and more usage as wireless multimedia device in recent years. In 2013, Li et al. proposed an efficient scheme for the wireless mobile communications and claimed it to be secure against various attacks. Recently, Shen et al. claimed that the scheme of Li et al. is still vulnerable to the privileged insider attack, the stolen verifier attack and finally proposed a scheme to withstand the mentioned and other attacks. However, in this paper we claim that the scheme of Shen et al. is still susceptible to the user anonymity, the session specific temporary information attack and the replay attack. In addition, Shen et al.’s scheme requires more time due to many operations. Further, we propose an efficient scheme that is secure against various known attacks and due to reduced time complexity our scheme is a preferred choice for the wireless mobile networks and hence for wireless multimedia systems.  相似文献   
95.
International Journal of Control, Automation and Systems - In this paper, we propose the use of fault-tolerant techniques for an autonomous lane keeping system (LKS) under sensor failure of the...  相似文献   
96.
97.
We have developed a novel algorithm to adjust link-bandwidths of a given multicast tree, which sends a message with sizer from a source to a multiple destinations taking into consideration pipelined router. The algorithm that we have developed tries to minimize the end-to-end delay time and resources such as bandwidths of a multicast tree, and performs admirably well in any given multicast tree. Our evaluation shows that the proposed algorithm dramatically reduces the end-to-end delay time and resources reserved to satisfy the time-constraints. This work was supported in parts by BK21 and the Ministry of Information and Communication, Korea. Corresponding author: H. Choo.  相似文献   
98.
99.
We evaluated the effects of tannic acid and purified perrsimmon tannin on survival and reproduction of bean bugs, Riptortus clavatus.Feeding behavior of R. clavatus was also examined on sweet (cv. Fuyu) and astringent (cv. Chongdosi) persimmon fruits. Soluble tannin in sweet persimmon fruits decreased from 3% in early June to 0.5% in late September, but it increased from 2 to 8% during the same period in astringent persimmon fruits. More bugs visited sweet than astringent persimmon. Numbers of piercing/sucking spots were higher on sweet than on astringent persimmon. When fed 1 and 3% solutions of persimmon tannin, adult bugs ingested only 64.1 and 9.5% of the amount of water ingested by those offered the control (distilled water). Amounts of persimmon tannin ingested by the adult bugs were 6.5 and 2.8 times higher at 1 and 3% tannin solutions compared to a 0.1% solution. Persimmon tannin exerted negative effects on survival and reproduction of R. clavatus at higher concentrations (1 and 3% solutions). Feeding of R. clavatus adults decreased with increasing tannin concentrations. When results from both sexes were pooled, 50% mortality was achieved at 11 and 4 days after treatment with the 1 and 3% tannin solutions, respectively. Reproduction decreased with 1% tannin, and no eggs were produced with 3% tannin solution. Tannic acid was similar in its effects on R. clavatus. All nymphs died 14, 12, and 7 days after feeding on 0.1, 1, and 3% tannic acid, respectively. Adults were less sensitive than nymphs, and their survival was not affected by 0.1% tannic acid. However. 1 and 3% tannic acid solutions were fatal. Survivorship decreased to 50% at 11 and 6 days after supplying tannin solutions of 1 and 3% concentrations. Higher concentrations (1 and 3%) resulted in reduced reproduction, as was seen with persimmon tannin. Our data may explain why R. clavatus does not invade sweet persimmon orchards until late July, when concentrations of soluble tannin are low enough to allow them to feed.  相似文献   
100.
Methanol selective oxidation to formaldehyde over a modified Fe-Mo catalyst with two different stoichiometric (Mo/Fe atomic ratio = 1.5 and 3.0) was studied experimentally in a fixed bed reactor over a wide range of reaction conditions. The physicochemical characterization of the prepared catalysts provides evidence that Fe2(MoO4)3 is in fact the active phase of the catalyst. The experimental results of conversion of methanol and selectivity towards formaldehyde for various residence times were studied. The results showed that as the residence time increases the yield of formaldehyde decreases. Selectivity of formaldehyde decreases with increase in residence time. This result is attributable to subsequent oxidation of formaldehyde to carbon monoxide due to longer residence time.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号