首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   618篇
  免费   12篇
工业技术   630篇
  2024年   1篇
  2023年   3篇
  2022年   4篇
  2021年   9篇
  2020年   3篇
  2019年   7篇
  2018年   12篇
  2017年   7篇
  2016年   26篇
  2015年   17篇
  2014年   28篇
  2013年   36篇
  2012年   39篇
  2011年   50篇
  2010年   45篇
  2009年   45篇
  2008年   40篇
  2007年   34篇
  2006年   32篇
  2005年   20篇
  2004年   16篇
  2003年   19篇
  2002年   19篇
  2001年   11篇
  2000年   9篇
  1999年   6篇
  1998年   8篇
  1997年   8篇
  1996年   6篇
  1995年   4篇
  1994年   4篇
  1993年   5篇
  1992年   5篇
  1991年   1篇
  1990年   3篇
  1989年   10篇
  1987年   7篇
  1986年   2篇
  1985年   3篇
  1984年   5篇
  1983年   1篇
  1982年   2篇
  1981年   3篇
  1980年   2篇
  1979年   5篇
  1978年   1篇
  1977年   2篇
  1976年   2篇
  1975年   1篇
  1973年   2篇
排序方式: 共有630条查询结果,搜索用时 125 毫秒
71.
Nikos  Dimitris  Christos   《Ad hoc Networks》2007,5(3):289-298
Security of mobile ad hoc networks (MANET) has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. In this paper, the security challenges in intrusion detection and authentication are identified and the different types of attacks are discussed. We propose a two-phase detection procedure of nodes that are not authorized for specific services and nodes that have been compromised during their operation in MANET. The detection framework is enabled with the main operations of ad hoc networking, which are found at the link and network layers. The proposed framework is based on zero knowledge techniques, which are presented through proofs.  相似文献   
72.
An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer‐to‐peer network model. In this article, we propose a multifold node authentication approach for protecting mobile ad hoc networks. The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using multiple authentication protocols are analysed. Such protocols, which are based on zero‐knowledge and challenge‐response techniques, are presented through proofs and simulation results. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   
73.
The performance of recent dereverberation methods for reverberant speech preprocessing prior to Automatic Speech Recognition (ASR) is compared for an extensive range of room and source-receiver configurations. It is shown that room acoustic parameters such as the clarity (C50) and the definition (D50) correlate well with the ASR results. When available, such room acoustic parameters can provide insight into reverberant speech ASR performance and potential improvement via dereverberation preprocessing. It is also shown that the application of a recent dereverberation method based on perceptual modelling can be used in the above context and achieve significant Phone Recognition (PR) improvement, especially under highly reverberant conditions.  相似文献   
74.
This study presents a new semi-automatic method to map burned areas by using multi-temporal Land Remote Sensing Satellite Program (Landsat) Thematic Mapper (TM) and Enhanced TM Plus (ETM+) images. The method consists of a set of rules that are valid especially when the post-fire satellite image has been captured shortly after the fire event. The overall accuracy of the method when applied to two case studies in Mt Parnitha and Samos Island in Greece were 95.69% and 93.98%, respectively. The commission and omission errors for Mt Parnitha were 6.92% and 10.24%, while those for Samos Island were 3.97% and 8.80%, respectively. Between the two types of error, it is preferred to minimize omission errors, since commission errors can be easily identified as part of product quality assessment and algorithm tuning procedures. The rule-based approach minimizes human interventions and makes it possible to run the mapping algorithm for a series of images that would otherwise need extensive time investment. In case of failure to capture burned areas correctly, it is possible either to make some adjustments by modifying the thresholding coefficients of the rules, or to discard some of the rules, since some editing is usually required to correct errors following the automated extraction procedures. When this method was applied to a series of US Geological Survey (USGS) Landsat TM and ETM+ archived satellite images covering the periods 1984–1991 and 1999–2009, a total of 1773 fires were identified and mapped from six different scenes that covered Attica and the Peloponnese in Greece. The majority of uncaptured burned areas corresponded to fires with size classes of 0–1 ha and 1–5 ha, where the loss in capturing fire scars is generally significant. This was expected since it is possible that small fires, identified and recorded by forest authorities, may not have been captured by satellite data due to limitations arising either from the spatial resolution of the sensor or imposed by the temporal series, which do not systematically cover the full period.  相似文献   
75.
The dynamics of piecewise linear interval maps is studied with two branches, one expanding and one contracting. It is proved that such a map either has a periodic attractor or it is eventually expanding. In the latter case there exists an absolutely continuous invariant measure.  相似文献   
76.
Lactobacillus plantarum 2035 and Lactobacillus plantarum ACA-DC 2640 are two lactic acid bacteria (LAB) strains that have been isolated from Feta cheese. Both display significant potential for the production of novel probiotic food products. The aim of the present study was the development of an accurate and efficient method for the molecular detection and identification of the above strains in a single reaction. A multiplex PCR assay was designed for each strain, based on specific primers derived from Random Amplified Polymorphic DNA (RAPD) Sequenced Characterized Amplified Region (SCAR) analysis. The specificity of the assay was tested with a total of 23 different LAB strains, for L. plantarum 2035 and L. plantarum ACA-DC 2640. The multiplex PCR assay was also successfully applied for the detection of the above cultures in yogurt samples prepared in our lab. The proposed methodology may be applied for monitoring the presence of these strains in food products, thus evaluating their probiotic character. Moreover, our strategy may be adapted for other novel LAB strains with probiotic potential, thus providing a powerful tool for molecular discrimination that could be invaluable to the food industry.  相似文献   
77.
78.
The charge separation and transport dynamics in CdSe nanoparticle:poly(3‐hexylthiophene) (P3HT) blends are reported as a function of the shape of the CdSe‐nanoparticle electron acceptor (dot, rod, and tetrapod). For optimization of organic photovoltaic device performance it is crucial to understand the role of various nanostructures in the generation and transport of charge carriers. The sample processing conditions are carefully controlled to eliminate any processing‐related effects on the carrier generation and on device performance with the aim of keeping the conjugated polymer phase constant and only varying the shape of the inorganic nanoparticle acceptor phase. The electrodeless, flash photolysis time‐resolved microwave conductivity (FP‐TRMC) technique is used and the results are compared to the efficiency of photovoltaic devices that incorporate the same active layer. It is observed that in nanorods and tetrapods blended with P3HT, the high aspect ratios provide a pathway for the electrons to move away from the dissociation site even in the absence of an applied electric field, resulting in enhanced carrier lifetimes that correlate to increased efficiencies in devices. The processing conditions that yield optimum performance in high aspect ratio CdSe nanoparticles blended with P3HT result in poorly performing quantum dot CdSe:P3HT devices, indicating that the latter devices are inherently limited by the absence of the dimensionality that allows for efficient, prolonged charge separation at the polymer:CdSe interface.  相似文献   
79.
80.
Distributed video coding (DVC) features simple encoders but complex decoders, which lies in contrast to conventional video compression solutions such as H.264/AVC. This shift in complexity is realized by performing motion estimation at the decoder side instead of at the encoder, which brings a number of problems that need to be dealt with. One of these problems is that, while employing different coding modes yields significant coding gains in classical video compression systems, it is still difficult to fully exploit this in DVC without increasing the complexity at the encoder side. Therefore, in this paper, instead of using an encoder-side approach, techniques for decoder-side mode decision are proposed. A rate-distortion model is derived that takes into account the position of the side information in the quantization bin. This model is then used to perform mode decision at the coefficient level and bitplane level. Average rate gains of 13–28% over the state-of-the-art DISCOVER codec are reported, for a GOP of size four, for several test sequences.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号