首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   836篇
  免费   51篇
  国内免费   3篇
工业技术   890篇
  2023年   24篇
  2022年   37篇
  2021年   50篇
  2020年   38篇
  2019年   30篇
  2018年   52篇
  2017年   42篇
  2016年   41篇
  2015年   38篇
  2014年   36篇
  2013年   67篇
  2012年   46篇
  2011年   49篇
  2010年   39篇
  2009年   27篇
  2008年   44篇
  2007年   22篇
  2006年   15篇
  2005年   17篇
  2004年   14篇
  2003年   16篇
  2002年   11篇
  2001年   16篇
  2000年   7篇
  1999年   6篇
  1998年   11篇
  1997年   10篇
  1996年   16篇
  1995年   6篇
  1994年   6篇
  1992年   2篇
  1991年   1篇
  1990年   3篇
  1989年   1篇
  1988年   2篇
  1987年   2篇
  1986年   10篇
  1985年   4篇
  1984年   3篇
  1983年   4篇
  1982年   2篇
  1981年   3篇
  1980年   1篇
  1979年   4篇
  1978年   3篇
  1977年   1篇
  1976年   8篇
  1974年   2篇
  1967年   1篇
排序方式: 共有890条查询结果,搜索用时 937 毫秒
11.
Of 27 amino acids studied, most had some antioxidant activity when added in aqueous solution to either safflower oil or a mixture of sunflower and cottonseed oil (active oxygen and storage methods). Cysteine-HCl, glutamic acid-HCl (in the mixture), and glutamic acid-HCl (in safflower oil) behaved as prooxidants. When added as a solid, most amino acids were ineffective. The protection factors of these amino acids were less than 1.3 in safflower oil with methionine, proline, lysine and cysteine providing the highest activ-ity. In the oil mixture (which had a higher metal content) lysine, arginine, glutamic acid, methionine, and hydroxyproline were anti-oxidant with protection factors of up to 1.85. Chelation of metals by amino acids was presumably responsible for the antioxidant activity. The increase in cysteine concentration up to 1% has more than doubled the protection factor in Bint oil (compared with the 0.01% level), whereas with some other amino acids the increase was either small or slight.  相似文献   
12.
The assignment and scheduling problem is inherently multiobjective. It generally involves multiple conflicting objectives and large and highly complex search spaces. The problem allows the determination of an efficient allocation of a set of limited and shared resources to perform tasks, and an efficient arrangement scheme of a set of tasks over time, while fulfilling spatiotemporal constraints. The main objective is to minimize the project makespan as well as the total cost. Finding a good approximation set is the result of trade‐offs between diversity of solutions and convergence toward the Pareto‐optimal front. It is difficult to achieve such a balance with NP‐hard problems. In this respect, and in order to efficiently explore the search space, a hybrid bidirectional ant‐based approach is proposed in this paper, which is an improvement of a bi‐colony ant‐based approach. Its main characteristic is that it combines a solution construction developed for a more complicated problem with a Pareto‐guided local search engine.  相似文献   
13.

Developing new watermarking approaches that consider special features of medical images become increasingly necessary. This paper proposes a new watermarking approach to ensure medical images authenticity, using MinEigen value features, chaotic sequence, and Quantization Index Modulation (QIM) in the spatial domain. The idea is to choose the 3?×?3 non overlapping blocks around MinEigen values points, then embed the watermark bits in these blocks using a novel blind way based on chaotic sequence and QIM. The proposed technique is purely blind and fast in terms of execution time. Experimental results demonstrate that the proposed approach is robust against all DICOM JPEG compression attacks while keeping high imperceptibility.

  相似文献   
14.

Automated techniques for Arabic content recognition are at a beginning period contrasted with their partners for the Latin and Chinese contents recognition. There is a bulk of handwritten Arabic archives available in libraries, data centers, historical centers, and workplaces. Digitization of these documents facilitates (1) to preserve and transfer the country’s history electronically, (2) to save the physical storage space, (3) to proper handling of the documents, and (4) to enhance the retrieval of information through the Internet and other mediums. Arabic handwritten character recognition (AHCR) systems face several challenges including the unlimited variations in human handwriting and the leakage of large and public databases. In the current study, the segmentation and recognition phases are addressed. The text segmentation challenges and a set of solutions for each challenge are presented. The convolutional neural network (CNN), deep learning approach, is used in the recognition phase. The usage of CNN leads to significant improvements across different machine learning classification algorithms. It facilitates the automatic feature extraction of images. 14 different native CNN architectures are proposed after a set of try-and-error trials. They are trained and tested on the HMBD database that contains 54,115 of the handwritten Arabic characters. Experiments are performed on the native CNN architectures and the best-reported testing accuracy is 91.96%. A transfer learning (TF) and genetic algorithm (GA) approach named “HMB-AHCR-DLGA” is suggested to optimize the training parameters and hyperparameters in the recognition phase. The pre-trained CNN models (VGG16, VGG19, and MobileNetV2) are used in the later approach. Five optimization experiments are performed and the best combinations are reported. The highest reported testing accuracy is 92.88%.

  相似文献   
15.
Highly porous free-standing co-poly(vinylidene fluoride)/modacrylic/SiO2 nanofibrous membrane was developed using electrically-assisted solution blow spinning method. The performance and the potential of the membrane as a lithium-ion battery separator were investigated. The addition of modacrylic enhanced the solution spinnability that resulted in defect-free membranes. Moreover, the presence of modacrylic enhanced the dimensional and thermal stabilities, while the addition of hydrophilic SiO2 nanoparticle enhanced both mechanical property and ionic conductivity. Combustion test results illustrated that the presence of modacrylic provide flame retarding property over a set of different polymeric-based membranes. Electrochemical performance results showed that the developed membrane can increase the battery capacity compared with the commercial separator.  相似文献   
16.

We perceive big data with massive datasets of complex and variegated structures in the modern era. Such attributes formulate hindrances while analyzing and storing the data to generate apt aftermaths. Privacy and security are the colossal perturb in the domain space of extensive data analysis. In this paper, our foremost priority is the computing technologies that focus on big data, IoT (Internet of Things), Cloud Computing, Blockchain, and fog computing. Among these, Cloud Computing follows the role of providing on-demand services to their customers by optimizing the cost factor. AWS, Azure, Google Cloud are the major cloud providers today. Fog computing offers new insights into the extension of cloud computing systems by procuring services to the edges of the network. In collaboration with multiple technologies, the Internet of Things takes this into effect, which solves the labyrinth of dealing with advanced services considering its significance in varied application domains. The Blockchain is a dataset that entertains many applications ranging from the fields of crypto-currency to smart contracts. The prospect of this research paper is to present the critical analysis and review it under the umbrella of existing extensive data systems. In this paper, we attend to critics' reviews and address the existing threats to the security of extensive data systems. Moreover, we scrutinize the security attacks on computing systems based upon Cloud, Blockchain, IoT, and fog. This paper lucidly illustrates the different threat behaviour and their impacts on complementary computational technologies. The authors have mooted a precise analysis of cloud-based technologies and discussed their defense mechanism and the security issues of mobile healthcare.

  相似文献   
17.
Wireless Personal Communications - In this paper, we propose a new reputation approach, called I-WD (improved WatchDog). We attempt to eliminate selective dropping attack that ensue when malicious...  相似文献   
18.
Quality of service (QoS) provisioning generally assumes more than one QoS measure that implies that QoS routing can be categorized as an instance of routing subject to multiple constraints: delay jitter, bandwidth, cost, etc. We study the problem of constructing multicast trees to meet the QoS requirements of real-time interactive applications where it is necessary to provide bounded delays and bounded delay variation among the source and all destinations while keeping overall cost of the multicast tree low. The main contribution of our work is a new strategy for constructing multiconstrained multicast trees. We first derive mathematically a new delay-variation estimation scheme and prove its efficiency. Thereafter, we propose a simple and competitive (in terms of running time) heuristic algorithm, for delay and delay variation constrained routing problem based on the proposed delay-variation estimation scheme and using the Extended Prim-Dijkstra tradeoffs’ algorithm. Our contribution also extends previous works in providing some properties and analyses of delay bounded paths satisfying delay variation constraints. Extensive simulation results show that our algorithm outperforms DVDMR in terms of multicast delay variation with the same time complexity as DVDMR.  相似文献   
19.
We present two new classifiers for two-class classification problems using a new Beta-SVM kernel transformation and an iterative algorithm to concurrently select the support vectors for a support vector machine (SVM) and the hidden units for a single hidden layer neural network to achieve a better generalization performance. To construct the classifiers, the contributing data points are chosen on the basis of a thresholding scheme of the outputs of a single perceptron trained using all training data samples. The chosen support vectors are used to construct a new SVM classifier that we call Beta-SVN. The number of chosen support vectors is used to determine the structure of the hidden layer in a single hidden layer neural network that we call Beta-NN. The Beta-SVN and Beta-NN structures produced by our method outperformed other commonly used classifiers when tested on a 2-dimensional non-linearly separable data set.  相似文献   
20.
Crisp input and output data are fundamentally indispensable in traditional data envelopment analysis (DEA). However, the input and output data in real-world problems are often imprecise or ambiguous. Some researchers have proposed interval DEA (IDEA) and fuzzy DEA (FDEA) to deal with imprecise and ambiguous data in DEA. Nevertheless, many real-life problems use linguistic data that cannot be used as interval data and a large number of input variables in fuzzy logic could result in a significant number of rules that are needed to specify a dynamic model. In this paper, we propose an adaptation of the standard DEA under conditions of uncertainty. The proposed approach is based on a robust optimization model in which the input and output parameters are constrained to be within an uncertainty set with additional constraints based on the worst case solution with respect to the uncertainty set. Our robust DEA (RDEA) model seeks to maximize efficiency (similar to standard DEA) but under the assumption of a worst case efficiency defied by the uncertainty set and it’s supporting constraint. A Monte-Carlo simulation is used to compute the conformity of the rankings in the RDEA model. The contribution of this paper is fourfold: (1) we consider ambiguous, uncertain and imprecise input and output data in DEA; (2) we address the gap in the imprecise DEA literature for problems not suitable or difficult to model with interval or fuzzy representations; (3) we propose a robust optimization model in which the input and output parameters are constrained to be within an uncertainty set with additional constraints based on the worst case solution with respect to the uncertainty set; and (4) we use Monte-Carlo simulation to specify a range of Gamma in which the rankings of the DMUs occur with high probability.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号