全文获取类型
收费全文 | 449篇 |
免费 | 56篇 |
国内免费 | 6篇 |
学科分类
工业技术 | 511篇 |
出版年
2024年 | 1篇 |
2023年 | 17篇 |
2022年 | 21篇 |
2021年 | 40篇 |
2020年 | 28篇 |
2019年 | 23篇 |
2018年 | 28篇 |
2017年 | 30篇 |
2016年 | 32篇 |
2015年 | 23篇 |
2014年 | 32篇 |
2013年 | 36篇 |
2012年 | 29篇 |
2011年 | 27篇 |
2010年 | 24篇 |
2009年 | 15篇 |
2008年 | 17篇 |
2007年 | 24篇 |
2006年 | 15篇 |
2005年 | 6篇 |
2004年 | 4篇 |
2003年 | 5篇 |
2002年 | 7篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1999年 | 4篇 |
1998年 | 3篇 |
1997年 | 2篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1979年 | 1篇 |
1978年 | 2篇 |
排序方式: 共有511条查询结果,搜索用时 15 毫秒
1.
Aman Singh Jaydip Chandrakant Mehta Divya Anand Pinku Nath Babita Pandey Aditya Khamparia 《Expert Systems》2021,38(1)
In real world, the automatic detection of liver disease is a challenging problem among medical practitioners. The intent of this work is to propose an intelligent hybrid approach for the diagnosis of hepatitis disease. The diagnosis is performed with the combination of k‐means clustering and improved ensemble‐driven learning. To avoid clinical experience and to reduce the evaluation time, ensemble learning is deployed, which constructs a set of hypotheses by using multiple learners to solve a liver disease problem. The performance analysis of the proposed integrated hybrid system is compared in terms of accuracy, true positive rate, precision, f‐measure, kappa statistic, mean absolute error, and root mean squared error. Simulation results showed that the enhanced k‐means clustering and improved ensemble learning with enhanced adaptive boosting, bagged decision tree, and J48 decision tree‐based intelligent hybrid approach achieved better prediction outcomes than other existing individual and integrated methods. 相似文献
2.
Phan Alex Truong Phuong Schade Christoph Vasan Aditya Friend James Talke Frank E. 《Microsystem Technologies》2021,27(6):2473-2479
Microsystem Technologies - “Zero drift” behavior of an optical intraocular pressure sensor is studied using an analytical model based on the deflection of a circular membrane. Results... 相似文献
3.
Verma Amar Kumar Nagpal Shivika Desai Aditya Sudha Radhika 《Neural computing & applications》2021,33(4):1297-1310
Neural Computing and Applications - Induction machines have extensive demand in industries as they are used for large-scale production and, therefore, vulnerable to both electrical and mechanical... 相似文献
4.
Masoud Alahbakhshi Aditya Mishra Grigorii Verkhogliadov Emigdio E. Turner Ross Haroldson Austen C. Adams Qing Gu Jeffrey J. Rack Jason D. Slinker Anvar A. Zakhidov 《Advanced functional materials》2023,33(28):2214315
Perovskite light-emitting diodes (PeLEDs) are advancing because of their superior external quantum efficiencies (EQEs) and color purity. Still, additional work is needed for blue PeLEDs to achieve the same benchmarks as the other visible colors. This study demonstrates an extremely efficient blue PeLED with a 488 nm peak emission, a maximum luminance of 8600 cd m−2, and a maximum EQE of 12.2% by incorporating the double-sided ethane-1,2-diammonium bromide (EDBr2) ligand salt along with the long-chain ligand methylphenylammonium chloride (MeCl). The EDBr2 successfully improves the interaction between 2D perovskite layers by reducing the weak van der Waals interaction and creating a Dion–Jacobson (DJ) structure. Whereas the pristine sample (without EDBr2) is inhibited by small stacking number (n) 2D phases with nonradiative recombination regions that diminish the PeLED performance, adding EDBr2 successfully enables better energy transfer from small n phases to larger n phases. As evidenced by photoluminescence (PL), scanning electron microscopy (SEM), and atomic force microscopy (AFM) characterization, EDBr2 improves the morphology by reduction of pinholes and passivation of defects, subsequently improving the efficiencies and operational lifetimes of quasi-2D blue PeLEDs. 相似文献
5.
Anirban Sengupta Chandan Mazumdar Aditya Bagchi 《Journal of Network and Systems Management》2011,19(3):319-342
From information security point of view, an enterprise is considered as a collection of assets and their interrelationships.
These interrelationships may be built into the enterprise information infrastructure, as in the case of connection of hardware
elements in network architecture, or in the installation of software or in the information assets. As a result, access to
one element may enable access to another if they are connected. An enterprise may specify conditions on the access of certain
assets in certain mode (read, write etc.) as policies. The interconnection of assets, along with specified policies, may lead
to managerial vulnerabilities in the enterprise information system. These vulnerabilities, if exploited by threats, may cause
disruption to the normal functioning of information systems. This paper presents a formal methodology for detection of managerial
vulnerabilities of, and threats to, enterprise information systems in linear time. 相似文献
6.
7.
Multimedia Tools and Applications - Identification and authentication are ubiquitous questions which pan across various systems. In certain domains, they are of paramount importance. Like, security... 相似文献
8.
Stephanie A C Schuckers Natalia A Schmid Aditya Abhyankar Vivekanand Dorairaj Christopher K Boyce Lawrence A Hornak 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》2007,37(5):1176-1190
The popularity of the iris biometric has grown considerably over the past two to three years. Most research has been focused on the development of new iris processing and recognition algorithms for frontal view iris images. However, a few challenging directions in iris research have been identified, including processing of a nonideal iris and iris at a distance. In this paper, we describe two nonideal iris recognition systems and analyze their performance. The word "nonideal" is used in the sense of compensating for off-angle occluded iris images. The system is designed to process nonideal iris images in two steps: 1) compensation for off-angle gaze direction and 2) processing and encoding of the rotated iris image. Two approaches are presented to account for angular variations in the iris images. In the first approach, we use Daugman's integrodifferential operator as an objective function to estimate the gaze direction. After the angle is estimated, the off-angle iris image undergoes geometric transformations involving the estimated angle and is further processed as if it were a frontal view image. The encoding technique developed for a frontal image is based on the application of the global independent component analysis. The second approach uses an angular deformation calibration model. The angular deformations are modeled, and calibration parameters are calculated. The proposed method consists of a closed-form solution, followed by an iterative optimization procedure. The images are projected on the plane closest to the base calibrated plane. Biorthogonal wavelets are used for encoding to perform iris recognition. We use a special dataset of the off-angle iris images to quantify the performance of the designed systems. A series of receiver operating characteristics demonstrate various effects on the performance of the nonideal-iris-based recognition system. 相似文献
9.
The SWAT (Soil and Water Assessment Tool) was used to evaluate the impacts of a climate scenario based on IPCC A1B emissions on flows in the Volta River basin in West Africa for 2021–2050 and 2071–2100, using 1983–2012 as the reference period. Overall, the simulation indicates increased variability and a decrease of up to 40% in river flow as a consequence of decreasing rainfall and increasing temperature. In particular, the analysis shows smaller absolute but greater relative changes in the hydrology of the northern (upper) part of the basin, particularly at the end of the century. 相似文献
10.
Shipra Agrawal Jayant R. Haritsa B. Aditya Prakash 《Data mining and knowledge discovery》2009,18(1):101-139
To preserve client privacy in the data mining process, a variety of techniques based on random perturbation of individual
data records have been proposed recently. In this paper, we present FRAPP, a generalized matrix-theoretic framework of random
perturbation, which facilitates a systematic approach to the design of perturbation mechanisms for privacy-preserving mining.
Specifically, FRAPP is used to demonstrate that (a) the prior techniques differ only in their choices for the perturbation
matrix elements, and (b) a symmetric positive-definite perturbation matrix with minimal condition number can be identified,
substantially enhancing the accuracy even under strict privacy requirements. We also propose a novel perturbation mechanism
wherein the matrix elements are themselves characterized as random variables, and demonstrate that this feature provides significant
improvements in privacy at only a marginal reduction in accuracy. The quantitative utility of FRAPP, which is a general-purpose
random-perturbation-based privacy-preserving mining technique, is evaluated specifically with regard to association and classification
rule mining on a variety of real datasets. Our experimental results indicate that, for a given privacy requirement, either
substantially lower modeling errors are incurred as compared to the prior techniques, or the errors are comparable to those
of direct mining on the true database.
A partial and preliminary version of this paper appeared in the Proc. of the 21st IEEE Intl. Conf. on Data Engineering (ICDE),
Tokyo, Japan, 2005, pgs. 193–204. 相似文献