全文获取类型
收费全文 | 715篇 |
免费 | 96篇 |
国内免费 | 48篇 |
专业分类
电工技术 | 116篇 |
综合类 | 143篇 |
化学工业 | 7篇 |
机械仪表 | 9篇 |
建筑科学 | 48篇 |
矿业工程 | 2篇 |
能源动力 | 5篇 |
轻工业 | 17篇 |
石油天然气 | 1篇 |
武器工业 | 3篇 |
无线电 | 77篇 |
一般工业技术 | 26篇 |
冶金工业 | 49篇 |
原子能技术 | 2篇 |
自动化技术 | 354篇 |
出版年
2024年 | 5篇 |
2023年 | 32篇 |
2022年 | 47篇 |
2021年 | 73篇 |
2020年 | 58篇 |
2019年 | 57篇 |
2018年 | 23篇 |
2017年 | 31篇 |
2016年 | 35篇 |
2015年 | 29篇 |
2014年 | 57篇 |
2013年 | 52篇 |
2012年 | 37篇 |
2011年 | 59篇 |
2010年 | 33篇 |
2009年 | 17篇 |
2008年 | 28篇 |
2007年 | 34篇 |
2006年 | 31篇 |
2005年 | 27篇 |
2004年 | 23篇 |
2003年 | 18篇 |
2002年 | 5篇 |
2001年 | 13篇 |
2000年 | 4篇 |
1999年 | 7篇 |
1998年 | 2篇 |
1995年 | 3篇 |
1992年 | 1篇 |
1988年 | 1篇 |
1987年 | 4篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1982年 | 4篇 |
1971年 | 1篇 |
1963年 | 1篇 |
1962年 | 1篇 |
排序方式: 共有859条查询结果,搜索用时 281 毫秒
111.
In a sample of 48 nonliterate societies, frequency of theft and personal crime were separately correlated wtih a number of variables which were suspected to be casual factors in the development of crime. Lack or limitation of opportunity for the young boy to form an identification with his father was associated with both types of crime. A high degree of socialization anxiety in childhood and a high degree of status differentiation in adulthood were significantly associated with theft only; a general adult attitude of suspicion and distrust was more decidedly associated with personal crime. (17 ref.) (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
112.
Tolga İslam 《Architectural Design》2010,80(1):58-63
In the mid-2000s, unprecedented economic growth provided a catalyst for Istanbul's transformation. Tolga İslam outlines the background to large-scale urban development and renewal projects that have been undertaken by local authorities throughout the city. Copyright © 2010 John Wiley & Sons, Ltd. 相似文献
113.
电力CPS环境下电力4G无线专网向5G演进策略 总被引:1,自引:0,他引:1
构建高效连接、大容量带宽、低通信时延的电力无线专网,是电力信息物理系统(cyber physical system, CPS)业务可靠运行的重要保障,有必要对电力CPS环境下电力无线专网进行研究。首先分析了电力CPS环境下电力业务对通信网络的需求,结合电力业务特征研究了5G通信技术的通信组网架构。然后结合电力业务需求和5G通技术特点,提出了电力4G无线专网向5G演进目标,并构建了循序渐进的演进思路。分别提出电力4G无线专网终端、基站、回传网、核心网的演进策略。最后,对电力无线专网的演进策略进行了展望。 相似文献
114.
2007年IEEE PES学术会议电网调度自动化部分综述与讨论 总被引:1,自引:0,他引:1
本文为2007 IEEE PES 学术会议电网调度自动化部分的综述。此次会议上发表的论文很多,但本文只选择了其中3个重点课题进行综述,即大型电力系统网络模型、电力企业计算机网络的信息安全和防止大面积停电的系统解列技术。选择这3个课题是因为其论文对我国相关技术人员较有使用价值实用。文章最后对相关问题进行了讨论和评述。 相似文献
115.
Hamidreza Jafarnejadsani Neng Wan Naira Hovakimyan Petros G. Voulgaris 《国际强度与非线性控制杂志
》2020,30(3):1071-1097
》2020,30(3):1071-1097
Autonomous systems are rapidly becoming an integrated part of the modern life. Safe and secure navigation and control of these systems present significant challenges in the presence of uncertainties, physical failures, and cyber attacks. In this paper, we formulate a navigation and control problem for autonomous systems using a multilevel control structure, in which the high‐level reference commands are limited by a saturation function, whereas the low‐level controller tracks the reference by compensating for disturbances and uncertainties. For this purpose, we consider a class of nested, uncertain, multiple‐input–multiple‐output systems subject to reference command saturation, possibly with nonminimum phase zeros. A multirate output‐feedback adaptive controller is developed as the low‐level controller. The sampled‐data (SD) design of this controller facilitates the direct implementation on digital computers, where the input/output signals are available at discrete time instances with different sampling rates. In addition, stealthy zero‐dynamics attacks become detectable by considering a multirate SD formulation. Robust stability and performance of the overall closed‐loop system with command saturation and multirate adaptive control are analyzed. Simulation scenarios for navigation and control of a fixed‐wing drone under failures/attacks are provided to validate the theoretical findings. 相似文献
116.
In this paper we aim to identify certain social factors that influence, and thus can be used to predict, the occurrence of crimes. The factors under consideration for this analytic are social demographics such as age, sex, poverty, etc., train ridership, traffic density and the number of business licenses per community area in Chicago, IL. A factor will be considered pertinent if there is high correlation between it and the number of crimes of a particular type in that community area. 相似文献
117.
利用传统的k匿名技术在社会网络中进行隐私保护时会存在聚类准则单一、图中数据信息利用不足等问题. 针对该问题, 提出了一种利用Kullback-Leibler (KL)散度衡量节点1-邻居图相似性的匿名技术(anonymization techniques for measuring the similarity of node 1-neighbor graph based on Kullback-Leibler divergence, SNKL). 根据节点1-邻居图分布的相似性对原始图节点集进行划分, 按照划分好的类进行图修改, 使修改后的图满足k匿名, 完成图的匿名发布. 实验结果表明, SNKL方法与HIGA方法相比在聚类系数上的改变量平均降低了17.3%, 同时生成的匿名图与原始图重要性节点重合度保持在95%以上. 所提方法在有效保证隐私的基础上, 可以显著的降低对原始图结构信息的改变. 相似文献
118.
Weidong Fang Wuxiong Zhang QianQian Zhao Xiaohong Ji Wei Chen Biruk Assefa 《计算机、材料和连续体(英文)》2019,61(2):583-599
As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation is facing more and more challenges. Currently, the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating, alternately, the aim at enhancing the security of data. The performances of the secure data aggregation protocols are the trade-off of several metrics, which involves the transmission/fusion, the energy efficiency and the security in Wireless Sensor Network (WSN). Unfortunately, there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN. In consideration of IWSN, we firstly review the security requirements and techniques in WSN data aggregation in this paper. Then, we give a holistic overview of the classical secure data aggregation protocols, which are divided into three categories: hop-by-hop encrypted data aggregation, end-to-end encrypted data aggregation and unencrypted secure data aggregation. Along this way, combining with the characteristics of industrial applications, we analyze the pros and cons of the existing security schemes in each category qualitatively, and realize that the security and the energy efficiency are suitable for IWSN. Finally, we make the conclusion about the techniques and approach in these categories, and highlight the future research directions of privacy preserving data aggregation in IWSN. 相似文献
119.
在电网转变为电力信息物理系统(电力CPS)的过程中,信息侧和物理侧体现出明显的相互依赖性,信息侧作为通信、计算、控制的支撑性组成部分,在电力CPS安全可靠运行中具有重要的地位。而针对电力CPS的恶意网络攻击行为在近年来不断发生,引发关注,大量针对电力CPS的网络攻击研究取得了一些成果。针对当前的电力CPS网络攻击研究,从攻击建模和电力CPS安全性评估方面进行了归纳和整理,对已有方法进行分析,明确了研究课题的问题本质。随后结合电力CPS的特点和发展趋势,指出当前研究的不足,提出需要关注的问题和可能的解决方法,以完善电力CPS恶意网络攻击研究。 相似文献
120.
Saleem Raza Muhammad Faheem Mesut Guenes 《International Journal of Communication Systems》2019,32(15)
The vision to connect everyday physical objects to the Internet promises to create the Internet of Things (IoT), which is expected to integrate the diverse technologies such as sensors, actuators, radio frequency identification, communication technologies, and Internet protocols. Thus, IoT promises to transfer traditional industry to advance digital industry known as the Industry 4.0. At the core of the Industry 4.0 are the wireless sensor networks (WSNs) and wireless sensor and actuator networks (WSANs) that led to the development of industrial wireless sensor networks (IWSNs) and industrial wireless sensor and actuator networks (IWSANs). These networks play a central role of connecting machines, parts, products, and humans and create a diverse set of new applications to support intelligent and autonomous decision making. The IWSAN is a promising technology for numerous industrial applications because of their several potential benefits such as simple deployment, low cost, less complexity, and mobility support. However, despite such benefits, they impose several unique challenges at different layers of the protocol stack when deploying them for various monitoring and control applications in the Industry 4.0. In this article, we explore IWSAN, its applications, requirements, challenges, and solutions in the context of industrial control applications. Our main focus is on the medium access control (MAC) layer that can be exploited to satisfy such requirements. Our discussion presents extensive background study of the MAC schemes and it reviews the MAC protocols of the existing wireless standards and technologies. A number of application‐specific MAC protocols developed to support industrial applications, which are not part of these standards, are also elaborated. We rationalize to what extent the existing standards and protocols help in solving such requirements as laid down by the Industry 4.0. In the end, we emphasize on existing challenges and present important future directions. 相似文献