全文获取类型
收费全文 | 109篇 |
免费 | 25篇 |
国内免费 | 20篇 |
专业分类
综合类 | 10篇 |
机械仪表 | 1篇 |
建筑科学 | 1篇 |
水利工程 | 1篇 |
武器工业 | 2篇 |
无线电 | 43篇 |
一般工业技术 | 3篇 |
冶金工业 | 2篇 |
自动化技术 | 91篇 |
出版年
2023年 | 1篇 |
2022年 | 2篇 |
2021年 | 5篇 |
2020年 | 10篇 |
2019年 | 6篇 |
2018年 | 9篇 |
2017年 | 7篇 |
2016年 | 10篇 |
2015年 | 4篇 |
2014年 | 11篇 |
2013年 | 10篇 |
2012年 | 37篇 |
2011年 | 14篇 |
2010年 | 9篇 |
2009年 | 8篇 |
2008年 | 1篇 |
2007年 | 1篇 |
2006年 | 1篇 |
2005年 | 6篇 |
1996年 | 1篇 |
1988年 | 1篇 |
排序方式: 共有154条查询结果,搜索用时 93 毫秒
1.
The relationship between location and land use patterns is one of the classic theoretical issues in urban studies. Classic models based on the monocentricity hypothesis have limitations in the interpretation of modern urban structure. China has experienced institutional transformation in recent decades, and the interaction of national government policy, market forces and the natural environment has influenced urban planning in Chinese metropolises, resulting in urban structures with special characteristics. This paper examines the distribution of location and land use intensity, and tested the Alonso model by the relationship between them in five Chinese metropolises using Point of Interest data, space syntax methodology, the grid weighted statistical method and the Geographically Weighted Regression (GWR) model. Universal patterns about the scaling relation between intensity of land use types and the centrality of location are revealed. The elasticity of land use types to location, from high to low sensitivity, is commercial, residential then industrial land in most of the five metropolises studied. The sensitivity sequence of land use studied suggests that the hypothetical model based on the classical Alonso model can explain the spatial structure of modern metropolises in China to some extent, especially for the commercial land. But the order of sensitivity of residential land and industrial land to location does not conform to the model. The spatial heterogeneity in land use intensity and centrality were explored and the factors embedded were discussed. It can be found that the relation between centrality and land use intensity conforms to power law. In most of the metropolises studied, when the scaling relation between land use intensity and centrality is super linear, the sequence of the frequency value from high to low are commercial, residential and industrial land; when the scaling relation is sublinear, the sequence of the frequency value is industrial, residential and commercial land. 相似文献
2.
3.
域名生成算法(DGA)存在变化多、部分类别样本难获取的特点,使得采用传统机器学习的恶意域名检测模型准确性不高。提出一种基于迁移学习和多核CNN的小样本DGA恶意域名检测模型。该模型将目标域名映射到向量空间中,使用样本充足的DGA种类进行预训练,并迁移预训练得到的参数到小样本检测模型。采用多核CNN小样本分类模型根据发音习惯进行域名特征提取并分类。通过实验对比发现,无知识迁移的小样本分类模型只有11类域名准确率超过92%,经过迁移学习的多核CNN模型20类准确率超过92%,11类准确率超过97%,检测效果接近数据充足时的分类效果。 相似文献
4.
工控网络协议Fuzzing测试技术研究综述 总被引:1,自引:0,他引:1
随着信息化和工业化的深度融合,控制系统在工业生产过程中得到了越来越广泛的应用,很多研究者开始针对工控系统,特别是具有控制功能的工控网络协议的安全性展开研究,漏洞分析则是其中较为活跃的领域之一.由于工控网络协议具有专用性和面向控制的特点,通常在封闭环境下运行,无法直接应用传统Fuzzing测试技术进行网络协议的漏洞挖掘.本文阐述了工控网络协议的特点以及Fuzzing测试的困难,讨论并比较了现有各种Fuzzing测试技术应用于工控网络协议的优缺点,提出工控网络协议的专用Fuzzing测试工具的设计准则,最后展望了工控网络协议Fuzzing测试技术的未来研究方向. 相似文献
5.
Baojiang Cui Fuwei Wang Yongle Hao Lingyu Wang 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2016,20(9):3563-3578
File format vulnerabilities have been highlighted in recent years, and the performance of fuzzing tests relies heavily on the knowledge of target formats. In this paper, we present systematic algorithms and methods to automatically reverse engineer input file formats. The methodology employs dynamic taint analysis to reveal implicit relational information between input file and binary procedures, which is used for the measurement of correlations among data bytes, format segmentation and data type inference. We have implemented a prototype, and its general tests on 10 well-published binary formats yielded an average of over 85 % successful identification rate, while more detailed structural information was unveiled beyond coarse granular format analysis. Besides, a practical pseudo-fuzzing evaluation method is discussed in accordance with real-world demands on security analysis, and the evaluation results demonstrated the practical effectiveness of our system. 相似文献
6.
7.
SHE(结构化异常处理),是Windows操作系统所提供的对错误或异常的一种处理机制。但是,由于SEH设计存在缺陷,使得在存在缓冲区溢出时,攻击者可以利用SEHC-J异常处理链结构实施成功的攻击。所以,微软在不同版本的Windows操作系统中分别都SEH实现上做了相应的改动,分别出现了SafeSEH和SEHOP两个改进机制。但是,在改进之后的SEH机制中又分别出现了不同程度的缺陷。本文结合微软的GS、ASLR等技术对不同版本的SEH机制的实现以及其存在的安全缺陷进行深入研究,并针对安全缺陷提出相应的修改意见。 相似文献
8.
9.
Naive Bayes is one of the most widely used algorithms in classification problems because of its simplicity, effectiveness, and robustness. It is suitable for many learning scenarios, such as image classification, fraud detection, web mining, and text classification. Naive Bayes is a probabilistic approach based on assumptions that features are independent of each other and that their weights are equally important. However, in practice, features may be interrelated. In that case, such assumptions may cause a dramatic decrease in performance. In this study, by following preprocessing steps, a Feature Dependent Naive Bayes (FDNB) classification method is proposed. Features are included for calculation as pairs to create dependence between one another. This method was applied to the software defect prediction problem and experiments were carried out using widely recognized NASA PROMISE data sets. The obtained results show that this new method is more successful than the standard Naive Bayes approach and that it has a competitive performance with other feature-weighting techniques. A further aim of this study is to demonstrate that to be reliable, a learning model must be constructed by using only training data, as otherwise misleading results arise from the use of the entire data set. 相似文献
10.