首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   223篇
  免费   11篇
  国内免费   2篇
工业技术   236篇
  2023年   4篇
  2022年   11篇
  2021年   14篇
  2020年   11篇
  2019年   16篇
  2018年   12篇
  2017年   12篇
  2016年   8篇
  2015年   2篇
  2014年   8篇
  2013年   14篇
  2012年   8篇
  2011年   14篇
  2010年   13篇
  2009年   17篇
  2008年   8篇
  2007年   4篇
  2006年   7篇
  2005年   4篇
  2004年   3篇
  2003年   1篇
  2002年   1篇
  2001年   3篇
  2000年   5篇
  1999年   7篇
  1998年   3篇
  1997年   1篇
  1996年   3篇
  1995年   4篇
  1993年   2篇
  1991年   2篇
  1990年   3篇
  1989年   1篇
  1986年   1篇
  1985年   2篇
  1984年   2篇
  1981年   1篇
  1980年   1篇
  1978年   1篇
  1976年   1篇
  1975年   1篇
排序方式: 共有236条查询结果,搜索用时 281 毫秒
1.
Anup Bhat B  Harish SV  Geetha M 《ETRI Journal》2021,43(6):1024-1037
Mining high utility itemsets (HUIs) from transaction databases considers such factors as the unit profit and quantity of purchased items. Two-phase tree-based algorithms transform a database into compressed tree structures and generate candidate patterns through a recursive pattern-growth procedure. This procedure requires a lot of memory and time to construct conditional pattern trees. To address this issue, this study employs two compressed tree structures, namely, Utility Count Tree and String Utility Tree, to enumerate valid patterns and thus promote fast utility computation. Furthermore, the study presents an algorithm called single-phase utility computation (SPUC) that leverages these two tree structures to mine HUIs in a single phase by incorporating novel pruning strategies. Experiments conducted on both real and synthetic datasets demonstrate the superior performance of SPUC compared with IHUP, UP-Growth, and UP-Growth+ algorithms.  相似文献   
2.
Wireless Personal Communications - The majority of security systems for wireless sensor networks are based on symmetric encryption. The main open issue for these approaches concerns the...  相似文献   
3.
Recently, medical image compression becomes essential to effectively handle large amounts of medical data for storage and communication purposes. Vector quantization (VQ) is a popular image compression technique, and the commonly used VQ model is Linde–Buzo–Gray (LBG) that constructs a local optimal codebook to compress images. The codebook construction was considered as an optimization problem, and a bioinspired algorithm was employed to solve it. This article proposed a VQ codebook construction approach called the L2‐LBG method utilizing the Lion optimization algorithm (LOA) and Lempel Ziv Markov chain Algorithm (LZMA). Once LOA constructed the codebook, LZMA was applied to compress the index table and further increase the compression performance of the LOA. A set of experimentation has been carried out using the benchmark medical images, and a comparative analysis was conducted with Cuckoo Search‐based LBG (CS‐LBG), Firefly‐based LBG (FF‐LBG) and JPEG2000. The compression efficiency of the presented model was validated in terms of compression ratio (CR), compression factor (CF), bit rate, and peak signal to noise ratio (PSNR). The proposed L2‐LBG method obtained a higher CR of 0.3425375 and PSNR value of 52.62459 compared to CS‐LBG, FA‐LBG, and JPEG2000 methods. The experimental values revealed that the L2‐LBG process yielded effective compression performance with a better‐quality reconstructed image.  相似文献   
4.
Poly(1,3,4-oxadiazole-2,5-diylvinylene) and poly(1,4-phenylene-1,3,4-oxadiazole-2,5-diylvinylene) were prepared by polymerizing different quantities of terephthalic acid (T), maleic acid (M), and hydrazine sulfate (HS) in the presence of fuming sulfuric acid. Homopolymers of M and T and various copolymers of M:T were prepared. The polymers were characterized by viscosity, IR, UV, and elemental analysis. Their solubility in different solvents was investigated. The relative thermal stability of the polymers was evaluated by TGA and DTA.  相似文献   
5.

Water and microbial contamination is a serious issues to aquatic system and human health. The metal selenide has a tremendous technique to degrade the dyes and bacteria.The present work reports the synthesis of ZnSe nanoparticles in a simple co-precipitation method. The synthesized samples were analyzed by structural, optical, morphological, catalytic and biological activity. The size and bandgap by annealing temperature tuning which are confirm by X-ray Diffraction and UV–Visible spectrometer. The quasi-spherical shapes were confirmed by Scanning Electron Microscope and Transmission Electron Microscope.The photo excited electrons have trapped the metals and promoting the degradation system. The release of ions to the surface was acknowledged by Photo Luminescence spectroscopy. The photocatalytic dye degradation of the Methyl Orange showed that the enhanced activity in high temperature. The photocatalytic dye degradation activity suggested that the temperature change the production of free radicals and ROS formation. The hydroxyl radicals were slewing the dye molecules and bacteria. The obtained results giving the information of ZnSe nanoparticles are one of the fascinating research areas in the current research world. Because of its large application in different field it acts as a promoting catalytic and biological application.

Graphical Abstract
  相似文献   
6.
Poly(1,3,4-oxadiazole-2,5-diyl-1,2-ethendiyl) and poly(1,4-phenylene-1,3,4-oxadiazole-2,5 diyl-1,2-ethenediyl) have been prepared by condensation polymerization using fuming sulfuric acid and different quantities of terephthalic acid (T), fumaric acid (F), and hydrazine sulfate (HS). Homopolymers of F and T and various copolymers of F:T have been prepared. The polymer structure was investigated by IR and visible-range spectra and elemental analysis. The existence of poly(1,3,4-oxadiazole-diylphenylene) and poly(hydrazoterephthaloyl) structures was revealed by these studies. These polymers were thermally stable, and most of them did not show a weight loss below 350°C. The relative thermal stabilities of the various polymers have been evaluated by “integral procedural decomposition temperature” and activation energy measurements.  相似文献   
7.
Monolayer and bilayer coatings of TiAlN, AlCrN, and AlCrN/TiAlN were deposited onto tungsten carbide inserts using the plasma enhanced physical vapor deposition process. The microstructures of the coatings were characterized using scanning electron microscopy (SEM) and atomic force microscopy (AFM). The SEM micrographs revealed that the AlrN and AlCrN/TiAlN coatings were uniform and highly dense and contained only a limited number of microvoids. The TiAIN coating was non-uniform and highly porous and contained more micro droplets. The hardness and scratch resistance of the specimens were measured using a nanoindentation tester and scratch tester, respectively. Different phases formed in the coatings were analyzed by X-ray diffraction (XRD). The AlCrN/TiAlN coating exhibited a higher hardness (32.75 GPa), a higher Young's modulus (561.97 GPa), and superior scratch resistance (LcN = 46 N) compared to conventional coatings such as TiAlN, A1CrN, and TiN.  相似文献   
8.
Information systems are one of the most rapidly changing and vulnerable systems, where security is a major issue. The number of security-breaking attempts originating inside organizations is increasing steadily. Attacks made in this way, usually done by "authorized" users of the system, cannot be immediately traced. Because the idea of filtering the traffic at the entrance door, by using firewalls and the like, is not completely successful, the use of intrusion detection systems should be considered to increase the defense capacity of an information system. An intrusion detection system (IDS) is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current IDS depends on the system operators in working out the tuning solution and in integrating it into the detection model. Furthermore, an extensive effort is required to tackle the newly evolving attacks and a deep study is necessary to categorize it into the respective classes. To reduce this dependence, an automatically evolving anomaly IDS using neuro-genetic algorithm is presented. The proposed system automatically tunes the detection model on the fly according to the feedback provided by the system operator when false predictions are encountered. The system has been evaluated using the Knowledge Discovery in Databases Conference (KDD 2009) intrusion detection dataset. Genetic paradigm is employed to choose the predominant features, which reveal the occurrence of intrusions. The neuro-genetic IDS (NGIDS) involves calculation of weightage value for each of the categorical attributes so that data of uniform representation can be processed by the neuro-genetic algorithm. In this system unauthorized invasion of a user are identified and newer types of attacks are sensed and classified respectively by the neuro-genetic algorithm. The experimental results obtained in this work show that the system achieves improvement in terms of misclassification cost when compared with conventional IDS. The results of the experiments show that this system can be deployed based on a real network or database environment for effective prediction of both normal attacks and new attacks.  相似文献   
9.
Geetha  N.  Mahesh  K. 《Wireless Personal Communications》2022,126(2):1553-1575
Wireless Personal Communications - Users in practical cellular geographical areas are found to be non-uniformly distributed. Small cell (SC) deployments in heterogeneous user distribution in a...  相似文献   
10.
Wireless Personal Communications - OFDM (Orthogonal Frequency Division Multiplexing) is a common transmission method in various wireless communications. It makes use of numerous carriers that are...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号