首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   143篇
  免费   12篇
  国内免费   2篇
工业技术   157篇
  2024年   1篇
  2023年   5篇
  2022年   11篇
  2021年   16篇
  2020年   11篇
  2019年   12篇
  2018年   11篇
  2017年   6篇
  2016年   8篇
  2015年   3篇
  2014年   8篇
  2013年   16篇
  2012年   4篇
  2011年   4篇
  2010年   4篇
  2009年   2篇
  2008年   1篇
  2007年   2篇
  2006年   1篇
  2005年   4篇
  2004年   2篇
  2002年   1篇
  2001年   1篇
  1999年   1篇
  1998年   2篇
  1997年   3篇
  1996年   3篇
  1995年   1篇
  1994年   1篇
  1993年   3篇
  1990年   1篇
  1988年   1篇
  1980年   1篇
  1977年   2篇
  1976年   2篇
  1975年   2篇
排序方式: 共有157条查询结果,搜索用时 31 毫秒
1.
2.
The Journal of Supercomputing - Power consumption is likely to remain a significant concern for exascale performance in the foreseeable future. In addition, graphics processing units (GPUs) have...  相似文献   
3.

The Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by offering them the ability to connect to the Internet and communicate. Integrating the social component into IoT gave rise to the Social Internet of Things (SIoT), which has helped overcome various issues such as heterogeneity and navigability. In this kind of environment, participants compete to offer a variety of attractive services. Nevertheless, some of them resort to malicious behaviour to spread poor-quality services. They perform so-called Trust-Attacks and break the basic functionality of the system. Trust management mechanisms aim to counter these attacks and provide the user with an estimate of the trust degree they can place in other users, thus ensuring reliable and qualified exchanges and interactions. Several works in literature have interfered with this problem and have proposed different Trust-Models. The majority tried to adapt and reapply Trust-Models designed for common social networks or peer-to-peer ones. That is, despite the similarities between these types of networks, SIoT ones present specific peculiarities. In SIoT, users, devices and services are collaborating. Devices entities can present constrained computing and storage capabilities, and their number can reach some millions. The resulting network is complex, constrained and highly dynamic, and the attacks-implications can be more significant. In this paper, we propose DSL-STM a new dynamic and scalable multi-level Trust-Model, specifically designed for SIoT environments. We propose multidimensional metrics to describe and SIoT entities behaviours. The latter are aggregated via a Machine Learning-based method, allowing classifying users, detecting attack types and countering them. Finally, a hybrid propagation method is suggested to spread trust values in the network, while minimizing resource consumption and preserving scalability and dynamism. Experimentation made on various simulated scenarios allows us to prove the resilience and performance of DSL-STM.

  相似文献   
4.
In this work, trajectory optimization of an aerodynamically controlled hypersonic boost glide class of flight vehicle is presented. In order to meet the mission constraints such as controllability, skin temperature, and terminal conditions etc., the trajectory is optimized using a pattern search algorithm with the lift to drag (L/D) ratio as a control parameter. It is brought out that the approach offers a viable tool for optimizing trajectories for the considered class of vehicles. Further, the effects of the constraints on trajectory shape and performance are studied and the analysis is used to bring out an optimal vehicle configuration at the initial stage of the design process itself. The research also reveals that the pattern search algorithm offers superior performance in comparison with the genetic algorithm for this class of optimization problem.  相似文献   
5.
A visible light active and stable photoelectrode has been developed by depositing a passivating layer of ZnS QDs on CdS QDs sensitized hematite photoelectrode (Hematite‐CdS/ZnS) for PEC generation of hydrogen. Photoelectrochemical properties, in terms of stability and efficiency, have been investigated on the various hematite photoelectrodes sensitized with CdS QDs and CdS/ZnS QDs by varying number of SILAR cycles. I–V characteristics show that two layers of ZnS QDs deposited over three layers of CdS could enhance PEC response of hematite and efficiency by a factor of 3 and 11 respectively. Chronoamperometry measurement ensures that after adding a layer of ZnS QDs, CdS sensitized hematite film turns out to be a stable photoelectrode in the electrolyte. Prepared photoelectrodes have been characterized by XRD, SEM, HRTEM and UV–Vis spectrophotometer for various structural, morphological and optical properties to analyze PEC results. Mott–Schottky analysis and incident photon to current conversion efficiency (IPCE) measurements of sensitized hematite photoelectrode supported the improved PEC response of CdS/ZnS QDs sensitized hematite thin films. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
6.
The Key Expansion Function is a vital constituent component of any block cipher. Many of Key Expansion Functions generate subkeys through the algorithms which are based on Feistel or Substitution Permutation Network (SPN) structures against which cryptanalytic methods have been well researched. In this very paper, an efficient method for generating subkeys based on chaotic maps has been suggested. The phenomenon behind the proposed Key Expansion Function is the mixing property of Tent Map. Using chaotic binary sequences, the proposed Key Expansion Function satisfies the specific statistical and cryptographic properties of chaotic generators. A new Bit Extraction Technique based on IEEE-754 Floating-point Standard (binary32) is used to extract the bits of subkeys from the chaotic binary sequences. The generated subkeys are then analyzed. The results show that the given Chaos-based Key Expansion Function is well protected and fully strengthened in all respects.  相似文献   
7.
Composite biomaterials are in high demand in the medical field of today. The combination of bioactive wollastonite (WA) glass ceramic with the biocompatibility of alloy titanium (Ti6Al4V) could be a good candidate for implant applications. The rheological properties of Ti6Al4V/WA feedstock show a pseudoplastic behaviour with low activation energy. The feedstock was successfully injected as a green part with no defects. The green part was solvent debound for 6?h in heptane and thermal debound in an argon environment for 1?h. The brown part was successfully sintered at 1300?°C for 3?h with 5?°C/min heating and cooling rates. The average sintered density was 4.12?g/cm3; which is 97.5% from the theoretical density. The highest Young's modulus obtained was 18.10?GPa; which is in the range of human bone strength. EDX analysis shows that by increasing sintering temperature, the level of oxygen decreased. Cell viability test shown an absorbance increased with days increasing indicated that the cellular were proliferated on the composite Ti6Al4V/WA composite which also proved that the composite was non-toxic. This indicates that the Ti6Al4V/WA composite is suitable for bone implant applications.  相似文献   
8.
Computational Economics - This paper investigates the implications for portfolio theory of using multivariate semiparametric estimators and a copula-based approach, especially when the number of...  相似文献   
9.
An abstract file system is defined here as a partial function from (absolute) paths to data. Such a file system determines the set of valid paths. It allows the file system to be read and written at a valid path, and it allows the system to be modified by the Unix operations for creation, removal, and moving of files and directories. We present abstract definitions (axioms) for these operations. This specification is refined towards a pointer implementation. The challenge is to have a natural abstraction function from the implementation to the specification, to define operations on the concrete store that behave exactly in the same way as the corresponding functions on the abstract store, and to prove these facts. To mitigate the problems attached to partial functions, we do this in two steps: first a refinement towards a pointer implementation with total functions, followed by one that allows partial functions. These two refinements are proved correct by means of a number of invariants. Indeed, the insights gained consist, on the one hand, of the invariants of the pointer implementation that are needed for the refinement functions, and on the other hand of the precise enabling conditions of the operations on the different levels of abstraction. Each of the three specification levels is enriched with a permission system for reading, writing, or executing, and the refinement relations between these permission systems are explored. Files and directories are distinguished from the outset, but this rarely affects our part of the specifications. All results have been verified with the proof assistant PVS, in particular, that the invariants are preserved by the operations, and that, where the invariants hold, the operations commute with the refinement functions.  相似文献   
10.
Melanoma is the deadliest type of skin cancer with highest mortality rate. However, the annihilation in early stage implies a high survival rate therefore, it demands early diagnosis. The accustomed diagnosis methods are costly and cumbersome due to the involvement of experienced experts as well as the requirements for highly equipped environment. The recent advancements in computerized solutions for these diagnoses are highly promising with improved accuracy and efficiency. In this article, we proposed a method for the classification of melanoma and benign skin lesions. Our approach integrates preprocessing, lesion segmentation, features extraction, features selection, and classification. Preprocessing is executed in the context of hair removal by DullRazor, whereas lesion texture and color information are utilized to enhance the lesion contrast. In lesion segmentation, a hybrid technique has been implemented and results are fused using additive law of probability. Serial based method is applied subsequently that extracts and fuses the traits such as color, texture, and HOG (shape). The fused features are selected afterwards by implementing a novel Boltzman Entropy method. Finally, the selected features are classified by Support Vector Machine. The proposed method is evaluated on publically available data set PH2. Our approach has provided promising results of sensitivity 97.7%, specificity 96.7%, accuracy 97.5%, and F‐score 97.5%, which are significantly better than the results of existing methods available on the same data set. The proposed method detects and classifies melanoma significantly good as compared to existing methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号