全文获取类型
收费全文 | 655篇 |
免费 | 42篇 |
国内免费 | 3篇 |
学科分类
工业技术 | 700篇 |
出版年
2024年 | 3篇 |
2023年 | 25篇 |
2022年 | 44篇 |
2021年 | 50篇 |
2020年 | 36篇 |
2019年 | 29篇 |
2018年 | 40篇 |
2017年 | 33篇 |
2016年 | 35篇 |
2015年 | 24篇 |
2014年 | 34篇 |
2013年 | 42篇 |
2012年 | 31篇 |
2011年 | 41篇 |
2010年 | 24篇 |
2009年 | 17篇 |
2008年 | 25篇 |
2007年 | 19篇 |
2006年 | 24篇 |
2005年 | 13篇 |
2004年 | 8篇 |
2003年 | 8篇 |
2002年 | 9篇 |
2001年 | 9篇 |
2000年 | 3篇 |
1999年 | 5篇 |
1998年 | 8篇 |
1997年 | 7篇 |
1996年 | 10篇 |
1995年 | 5篇 |
1994年 | 3篇 |
1993年 | 4篇 |
1992年 | 1篇 |
1991年 | 4篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 2篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1982年 | 4篇 |
1981年 | 4篇 |
1980年 | 3篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有700条查询结果,搜索用时 15 毫秒
1.
2.
3.
An environmental factor converts reliability test results at one environmental condition into equivalent “failure” information at other environments. This paper studies environmental-factor estimation for the binomial distribution. Under general conditions, Bayes point estimates and credibility limits for environmental factors are derived. Classical point and confidence interval estimates are introduced and compared with the Bayes estimators. The characteristics of Bayes and classical estimators for the binomial distribution are summarized through numerical computation and theoretical analysis. A numerical example of reliability assessment by means of environmental factors is presented 相似文献
4.
Over the last few decades, many different evolutionary algorithms have been introduced for solving constrained optimization problems. However, due to the variability of problem characteristics, no single algorithm performs consistently over a range of problems. In this paper, instead of introducing another such algorithm, we propose an evolutionary framework that utilizes existing knowledge to make logical changes for better performance. The algorithmic aspects considered here are: the way of using search operators, dealing with feasibility, setting parameters, and refining solutions. The combined impact of such modifications is significant as has been shown by solving two sets of test problems: (i) a set of 24 test problems that were used for the CEC2006 constrained optimization competition and (ii) a second set of 36 test instances introduced for the CEC2010 constrained optimization competition. The results demonstrate that the proposed algorithm shows better performance in comparison to the state-of-the-art algorithms. 相似文献
5.
S. E. Afifi A. A. Elsayed A. E. Elsherief 《JOM Journal of the Minerals, Metals and Materials Society》1987,39(2):38-41
This paper reports on the mode of action of two different organic additives—gelatine and thiourea—during the electrorefining of copper from acid copper sulfate solutions. Gelatine increases the cathode current efficiency and produces smoother deposits up to a certain level of concentration, beyond which, however, these effects are diminished by the steric hinderance of bulky molecular entities adsorbed to the electrode surface. Thiourea decreases the cathode current efficiency when present at concentrations around 5 mg/1. Nonetheless, it improves deposit quality. In higher concentrations, thiourea increases the cathodic current efficiency but also promotes nodule formation and rough deposits. The degradation and/or hydrolysis of both additives and the various interactions with the electrode surface and with cupric ions in solution are also examined. 相似文献
6.
Ayman M. Atta Manar E. Abdel‐Raouf Shimaa M. Elsaeed Abdel‐Azim A. Abdel‐Azim 《应用聚合物科学杂志》2007,103(5):3175-3182
Unsaturated polyester resin (UP) was prepared from glycolyzed oligomer of poly(ethylene terephthalate) (PET) waste based on diethylene glycol (DEG). New diacrylate and dimethacrylate vinyl ester resins prepared from glycolysis of PET with tetraethylene glycol were blended with UP to study the mechanical characteristics of the cured UP. The vinyl ester resins were used as crosslinking agents for unsaturated polyester resin diluted with styrene, using free‐radical initiator and accelerator. The mechanical properties of the cured UP resins were evaluated. The compressive properties of the cured UP/styrene resins in the presence of different vinyl ester concentrations were evaluated. Increasing the vinyl ester content led to a pronounced improvement in the compression strength. The chemical resistances of the cured resins were evaluated through hot water, solvents, acid, and alkali resistance measurements. © 2006 Wiley Periodicals, Inc. J Appl Polym Sci 103: 3175–3182, 2007 相似文献
7.
Adnan Hasan Bdair Aighuraibawi Selvakumar Manickam Rosni Abdullah Zaid Abdi Alkareem Alyasseri Ayman Khallel Dilovan Asaad Zebari Hussam Mohammed Jasim Mazin Mohammed Abed Zainb Hussein Arif 《计算机系统科学与工程》2023,47(1):553-574
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS. 相似文献
8.
Almawgani A. H. M. Alhawari Adam R. H. Hindi Ayman Taher Al-Arashi Waled Hussein Al-Ashwal A. Y. 《Multidimensional Systems and Signal Processing》2022,33(2):561-578
Multidimensional Systems and Signal Processing - Digital images are commonly used in steganography due to the popularity of digital image transfer and exchange through the Internet. However, the... 相似文献
9.
Ikram Muhammad Jawad Saleh Mostafa Elsayed Al-Hashimi Muhammad Abdulhamid Abulnaja Osama Ahmed 《The Journal of supercomputing》2022,78(13):14919-14939
The Journal of Supercomputing - Power consumption is likely to remain a significant concern for exascale performance in the foreseeable future. In addition, graphics processing units (GPUs) have... 相似文献
10.
Identity management is based on the creation and management of user identities for granting access to the cloud resources based on the user attributes. The cloud identity and access management (IAM) grants the authorization to the end-users to perform different actions on the specified cloud resources. The authorizations in the IAM are grouped into roles instead of granting them directly to the end-users. Due to the multiplicity of cloud locations where data resides and due to the lack of a centralized user authority for granting or denying cloud user requests, there must be several security strategies and models to overcome these issues. Another major concern in IAM services is the excessive or the lack of access level to different users with previously granted authorizations. This paper proposes a comprehensive review of security services and threats. Based on the presented services and threats, advanced frameworks for IAM that provide authentication mechanisms in public and private cloud platforms. A threat model has been applied to validate the proposed authentication frameworks with different security threats. The proposed models proved high efficiency in protecting cloud platforms from insider attacks, single sign-on failure, brute force attacks, denial of service, user privacy threats, and data privacy threats. 相似文献