首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   563篇
  免费   30篇
工业技术   593篇
  2022年   3篇
  2021年   9篇
  2020年   9篇
  2019年   15篇
  2018年   16篇
  2017年   18篇
  2016年   9篇
  2015年   15篇
  2014年   11篇
  2013年   19篇
  2012年   24篇
  2011年   46篇
  2010年   40篇
  2009年   33篇
  2008年   28篇
  2007年   25篇
  2006年   37篇
  2005年   21篇
  2004年   18篇
  2003年   12篇
  2002年   10篇
  2001年   7篇
  2000年   17篇
  1999年   16篇
  1998年   22篇
  1997年   20篇
  1996年   9篇
  1995年   13篇
  1994年   6篇
  1993年   8篇
  1992年   6篇
  1991年   1篇
  1990年   3篇
  1989年   2篇
  1988年   2篇
  1987年   3篇
  1986年   1篇
  1985年   3篇
  1984年   5篇
  1983年   3篇
  1982年   5篇
  1981年   3篇
  1980年   4篇
  1979年   2篇
  1978年   2篇
  1977年   3篇
  1976年   4篇
  1975年   2篇
  1973年   2篇
  1971年   1篇
排序方式: 共有593条查询结果,搜索用时 15 毫秒
1.
Park  Tae-Hwan  Lee  Hye-Jin  Kwon  Ryeo-Won  Lee  In-Ho  Lee  Seung-Jea  Park  Jong-In  Choo  Eon-Ah  Lee  Jeong-Beom 《Food science and biotechnology》2022,31(9):1207-1212
Food Science and Biotechnology - Caffeine and orexin can affect awakening, neuroendocrine, and sympathetic nerve function. Our previous study has reported that caffeine intake can increase human...  相似文献   
2.
The capability to efficiently revoke compromised/misbehaving users is important in identity‐based encryption (IBE) applications, as it is not a matter of if but of when that one or more users are compromised. Existing solutions generally require a trusted third party to update the private keys of nonrevoked users periodically, which impact on scalability and result in high computation and communication overheads at the key generation center. Li et al proposed a revocable IBE scheme, which outsources most of the computation and communication overheads to a Key Update Cloud Service Provider (KU‐CSP). However, their scheme is lack of scalability since the KU‐CSP must maintain a secret value for each user. Tseng et al proposed another revocable IBE scheme with a cloud revocation authority, seeking to provide scalability and improve both performance and security level. In this paper, we present a new revocable IBE scheme with a cloud revocation server (CRS). The CRS holds only one secret time update key for all users, which provides the capability to scale our scheme. We demonstrate that our scheme is secure against adaptive‐ID and chosen ciphertext attacks under the k‐CAA assumption and outperforms both schemes mentioned above, in terms of having lower computation and communication overheads.  相似文献   
3.
Zhang  Zhimin  Ning  Huansheng  Shi  Feifei  Farha  Fadi  Xu  Yang  Xu  Jiabo  Zhang  Fan  Choo  Kim-Kwang Raymond 《Artificial Intelligence Review》2022,55(2):1029-1053
Artificial Intelligence Review - In recent times, there have been attempts to leverage artificial intelligence (AI) techniques in a broad range of cyber security applications. Therefore, this paper...  相似文献   
4.
Lifelog is a digital record of an individual’s daily life. It collects, records, and archives a large amount of unstructured data; therefore, techniques are required to organize and summarize those data for easy retrieval. Lifelogging has been utilized for diverse applications including healthcare, self-tracking, and entertainment, among others. With regard to the image-based lifelogging, even though most users prefer to present photos with facial expressions that allow us to infer their emotions, there have been few studies on lifelogging techniques that focus upon users’ emotions. In this paper, we develop a system that extracts users’ own photos from their smartphones and configures their lifelogs with a focus on their emotions. We design an emotion classifier based on convolutional neural networks (CNN) to predict the users’ emotions. To train the model, we create a new dataset by collecting facial images from the CelebFaces Attributes (CelebA) dataset and labeling their facial emotion expressions, and by integrating parts of the Radboud Faces Database (RaFD). Our dataset consists of 4,715 high-resolution images. We propose Representative Emotional Data Extraction Scheme (REDES) to select representative photos based on inferring users’ emotions from their facial expressions. In addition, we develop a system that allows users to easily configure diaries for a special day and summaize their lifelogs. Our experimental results show that our method is able to effectively incorporate emotions into lifelog, allowing an enriched experience.  相似文献   
5.
Electromagnetic enhancement effects through localized surface plasmon resonance considerably amplify the intensity of incident light when molecules are positioned in the vicinity of miniscule nanogaps. The aggregation of plasmonic nanoparticles synthesized using bottom-up methods has been extensively used to generate hot spots in solutions. These methods assist in obtaining non-periodic plasmonic signals, because the realization of uniform nanogaps through particle aggregation is difficult. Nanostructured substrates with gaps of 20–100 nm have also been fabricated using the top-down approach. However, the fabrication of smaller nanogap templates using these methods is difficult owing to high costs and low throughput. Therefore, a nanodimple array internalized with AuNPs is developed in this study to mitigate the challenges encountered in the bottom-up and top-down approaches. Precise nanogaps are generated by regularly internalizing AuNPs in the cavities of nanodimples through DNA hybridization. Simulations of the electric field distribution indicate that the incorporation of 80 nm-sized AuNPs into a curved nanodimpled Au substrate generate high-density volumetric hot spots within a detection volume, and result in a high plasmonic enhancement factor of 8.25 × 107. The tremendous potential of the proposed plasmonic platform as an SERS-based biomedical diagnostic device is also verified.  相似文献   
6.
7.
The mechanistic modeling of biodiesel production process in membrane reactor with the consideration of chemical reaction, phase equilibrium, and ultrafiltration is important for the membrane reactor design. In part II of this work, the chemical and phase equilibrium (CPE) model for crude palm oil transesterification reaction in the membrane reactor developed in part I is extended to an integration of CPE with modified Maxwell–Stefan model, which considers multicomponent mass transport phenomena of concentration polarization and intramembrane. A good fit of simulated permeate fluxes and apparent solute rejection to the experimental data shows that the model has a good prediction capability. Reversible fouling was found to be the major fouling and no pore plugging was observed. Simulation results verified that micelles were retained by the membrane at CPO:MEOH molar ratio of 1:24 and catalyst concentration of 0.5 wt %. However, phase inversion happened when catalyst concentration of 0.05 and 0.1 wt % were used. © 2015 American Institute of Chemical Engineers AIChE J, 61: 1981–1996, 2015  相似文献   
8.
In the quest on improving composite formulations for environmental sustainability, maleic acid (MA) cross-linked poly(vinyl alcohol) (PVA)-α-chitin composites reinforced by oil palm empty fruit bunch fibers (OPEFB)-derived nanocellulose crystals (NCC) had been successfully prepared. Based on the Fourier transform infrared (FTIR) spectroscopic analysis, it was proven that molecular interactions of the cross-linker to the polymeric networks was through conjugated ester linkage. Differential scanning calorimetry (DSC) showed that the influence of MA was minimal toward crystallization in the PVA/chitin/NCC composite. Maximum tensile strength, elongation at break and Young's modulus of the respective PVA/chitin/NCC composites were achieved at different content of MA, dependent on the PVA/chitin mass ratio. Among all compositions, a maximum Young's modulus was achieved at 30 wt% MA loading in PVA/chitin-30/NCC, amounting to 2,413.81 ± 167.36 MPa. Moreover, the mechanical properties and selected physicochemical properties (swelling, gel content, and contact angle) of the PVA/chitin/NCC composites could be tailored by varying the chitin content (10–30 wt%) and MA content (10–50 wt% based on total mass of composite). In brief, this chemically cross-linked PVA-based biocomposites formulated with sustainable resources exhibited tunable physicochemical and mechanical properties.  相似文献   
9.
Android productivity apps have provided the facility of having a constantly accessible and productive workforce to the information and work capabilities needed by the users. With hundreds of productivity apps available in the Android app market, it is necessary to develop a taxonomy for the forensic investigators and the end users to allow them to know what personal data remnants are available from the productivity apps. In this paper, 30 popular Android productivity apps were examined. A logical extraction of the Android phone was collected by using a well-known mobile forensic tool- XRY to extract various information of forensic interest such as user email ID and list of tasks. Based on the findings, a two-dimensional taxonomy of the forensic artefacts of the productivity apps is proposed with the app categories in one dimension and the classes of artefacts in the other dimension. The artefacts identified in the study of the apps are summarised using the taxonomy. In addition, a comparison with the existing forensic taxonomies of different categories of Android apps is provided to facilitate timely collection and analysis of evidentiary materials from mobile devices.  相似文献   
10.
The majority of visualizations on the web are still stored as raster images, making them inaccessible to visually impaired users. We propose a deep‐neural‐network‐based approach that automatically recognizes key elements in a visualization, including a visualization type, graphical elements, labels, legends, and most importantly, the original data conveyed in the visualization. We leverage such extracted information to provide visually impaired people with the reading of the extracted information. Based on interviews with visually impaired users, we built a Google Chrome extension designed to work with screen reader software to automatically decode charts on a webpage using our pipeline. We compared the performance of the back‐end algorithm with existing methods and evaluated the utility using qualitative feedback from visually impaired users.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号