首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15811篇
  免费   2884篇
  国内免费   1977篇
电工技术   788篇
技术理论   4篇
综合类   1129篇
化学工业   291篇
金属工艺   147篇
机械仪表   662篇
建筑科学   319篇
矿业工程   217篇
能源动力   170篇
轻工业   122篇
水利工程   250篇
石油天然气   143篇
武器工业   141篇
无线电   3388篇
一般工业技术   697篇
冶金工业   76篇
原子能技术   54篇
自动化技术   12074篇
  2024年   48篇
  2023年   488篇
  2022年   792篇
  2021年   926篇
  2020年   1114篇
  2019年   1216篇
  2018年   667篇
  2017年   731篇
  2016年   804篇
  2015年   1051篇
  2014年   1688篇
  2013年   1330篇
  2012年   1551篇
  2011年   1296篇
  2010年   814篇
  2009年   744篇
  2008年   845篇
  2007年   897篇
  2006年   671篇
  2005年   623篇
  2004年   486篇
  2003年   412篇
  2002年   313篇
  2001年   270篇
  2000年   178篇
  1999年   153篇
  1998年   104篇
  1997年   82篇
  1996年   78篇
  1995年   55篇
  1994年   58篇
  1993年   30篇
  1992年   35篇
  1991年   20篇
  1990年   19篇
  1989年   14篇
  1988年   15篇
  1987年   8篇
  1986年   10篇
  1985年   5篇
  1984年   5篇
  1983年   7篇
  1982年   2篇
  1980年   3篇
  1979年   4篇
  1978年   1篇
  1977年   4篇
  1976年   1篇
  1972年   2篇
  1959年   1篇
排序方式: 共有10000条查询结果,搜索用时 21 毫秒
1.
大数据场景下,远程云服务器通常被部署用于数据处理与价值挖掘,但在面对时延敏感型或需要动态频繁交互的业务时,该种处理模式显得力不从心.作为对云计算模式的补充,雾计算因其可有效降低任务处理时延、能耗与带宽消耗而备受关注;同时,面向雾计算的计算迁移机制因其能有效缓解节点的处理负担并改善用户体验而成为领域研究焦点.在雾计算模式下,为了更好地满足计算密集型任务对时延与能耗的要求,基于区块链赋能物联网场景,本文提出了一种联合资源分配与控制的智能计算迁移方案.具体地,规划了一个在时延、能耗与资源约束下的最小化所有任务完成总成本的优化问题,其总成本构成综合考量了时延、能耗和挖掘成本,通过对通信、计算资源与迁移决策的联合优化,实现总成本的最小化.为完成任务迁移,终端以矿工的身份向雾节点挖掘(租借)计算资源,所提出的基于区块链技术的激励机制可充分调动终端和雾节点参与计算迁移的积极性并保障交易过程的安全性,设计的奖励分配规则可保证成功挖掘资源终端收获奖励的公平性.为解决上述规划的优化问题(即混合整数非线性规划问题),提出了一个联合通信、计算与控制的智能计算迁移算法,该算法融合深度确定性策略梯度算法思想,设计了基于反梯度更新的双“行动者-评论家”神经网络结构,使训练过程更加稳定并易于收敛;同时,通过对连读动作输出进行概率离散化运算,使其更加适用于混合整数非线性规划问题的求解.最后,仿真结果表明本文方案能以较快的速度收敛,且与其他三种基准方案相比,本文方案的总成本最低,例如,与其中性能最好的基于深度Q学习网络的计算迁移方案相比,总成本平均可降低15.2%.  相似文献   
2.
目前通过3D扫描仪获取的点云仍旧存在一些缺陷:点云含有噪声,点云在不同方向上分布不均匀等.本文针对上述问题开展研究.主要工作为提出一种新的算法用于在点云上进行高质量的重采样,即使用较为稀疏的重采样点集去表达较为密集的原始点云的几何形状,同时重采样点集的分布可以满足用户预先指定的目标分布,并具备一定的蓝噪声性质.在最优传输理论的基础之上,本文方法将传统的点云重采样问题转化为一个最优化问题,并在点云上构建离散网格,使得针对网格的受限制的Power剖分方法能够迁移至点云上.随后利用交叉优化框架对该优化问题进行求解,并对每一个重采样点执行精确的容积约束.大量实验结果表明,本文算法输出的重采样点集可以实现精确自适应控制密度的目标,并且具备较好的蓝噪声性质.  相似文献   
3.
The tremendous development of cloud computing with related technologies is an unexpected one. However, centralized cloud storage faces few challenges such as latency, storage, and packet drop in the network. Cloud storage gets more attention due to its huge data storage and ensures the security of secret information. Most of the developments in cloud storage have been positive except better cost model and effectiveness, but still data leakage in security are billion-dollar questions to consumers. Traditional data security techniques are usually based on cryptographic methods, but these approaches may not be able to withstand an attack from the cloud server's interior. So, we suggest a model called multi-layer storage (MLS) based on security using elliptical curve cryptography (ECC). The suggested model focuses on the significance of cloud storage along with data protection and removing duplicates at the initial level. Based on divide and combine methodologies, the data are divided into three parts. Here, the first two portions of data are stored in the local system and fog nodes to secure the data using the encoding and decoding technique. The other part of the encrypted data is saved in the cloud. The viability of our model has been tested by research in terms of safety measures and test evaluation, and it is truly a powerful complement to existing methods in cloud storage.  相似文献   
4.
The advantages of a cloud computing service are cost advantages, availability, scalability, flexibility, reduced time to market, and dynamic access to computing resources. Enterprises can improve the successful adoption rate of cloud computing services if they understand the critical factors. To find critical factors, this study first reviewed the literature and established a three-layer hierarchical factor table for adopting a cloud computing service based on the Technology-Organization-Environment framework. Then, a hybrid method that combines two multi-criteria decision-making tools—called the Fuzzy Analytic Network Process method and the concept of VlseKriterijumska Optimizacija I Kompromisno Resenje acceptable advantage—was used to objectively identify critical factors for the adoption of a cloud computing service, replacing the subjective decision of the authors. The results of this study determined five critical factors, namely data access security, information transmission security, senior management support, fallback cloud management, and employee acceptance. Finally, the paper presents the findings and implications of the study.  相似文献   
5.
In today’s world, Cloud Computing (CC) enables the users to access computing resources and services over cloud without any need to own the infrastructure. Cloud Computing is a concept in which a network of devices, located in remote locations, is integrated to perform operations like data collection, processing, data profiling and data storage. In this context, resource allocation and task scheduling are important processes which must be managed based on the requirements of a user. In order to allocate the resources effectively, hybrid cloud is employed since it is a capable solution to process large-scale consumer applications in a pay-by-use manner. Hence, the model is to be designed as a profit-driven framework to reduce cost and make span. With this motivation, the current research work develops a Cost-Effective Optimal Task Scheduling Model (CEOTS). A novel algorithm called Target-based Cost Derivation (TCD) model is used in the proposed work for hybrid clouds. Moreover, the algorithm works on the basis of multi-intentional task completion process with optimal resource allocation. The model was successfully simulated to validate its effectiveness based on factors such as processing time, make span and efficient utilization of virtual machines. The results infer that the proposed model outperformed the existing works and can be relied in future for real-time applications.  相似文献   
6.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method.  相似文献   
7.
Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password. Unfortunately, this approach has many security problems because personal data can be stolen or recognized by hackers. This paper aims to present a cloud-based biometric authentication model (CBioAM) for improving and securing cloud services. The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system (CBioAS), where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the users’ information. The paper presents the performance evaluation of the proposed model in terms of three main characteristics including accuracy, sensitivity, and specificity. The research study introduces a novel algorithm called “Bio_Authen_as_a_Service” for implementing and evaluating the proposed model. The proposed system performs the biometric authentication process securely and preserves the privacy of user information. The experimental result was highly promising for securing cloud services using the proposed model. The experiments showed encouraging results with a performance average of 93.94%, an accuracy average of 96.15%, a sensitivity average of 87.69%, and a specificity average of 97.99%.  相似文献   
8.
Identity management is based on the creation and management of user identities for granting access to the cloud resources based on the user attributes. The cloud identity and access management (IAM) grants the authorization to the end-users to perform different actions on the specified cloud resources. The authorizations in the IAM are grouped into roles instead of granting them directly to the end-users. Due to the multiplicity of cloud locations where data resides and due to the lack of a centralized user authority for granting or denying cloud user requests, there must be several security strategies and models to overcome these issues. Another major concern in IAM services is the excessive or the lack of access level to different users with previously granted authorizations. This paper proposes a comprehensive review of security services and threats. Based on the presented services and threats, advanced frameworks for IAM that provide authentication mechanisms in public and private cloud platforms. A threat model has been applied to validate the proposed authentication frameworks with different security threats. The proposed models proved high efficiency in protecting cloud platforms from insider attacks, single sign-on failure, brute force attacks, denial of service, user privacy threats, and data privacy threats.  相似文献   
9.
蔡璋 《铜业工程》2022,(4):73-76
采用三维激光扫描非接触倾斜测量法,可以高效获取矿仓中精矿产品的物料堆积形态。通过优化精矿盘点扫描测量流程,精准计算出矿仓库存量,提高了精矿盘点数据的准确性、测量的高效性和操作的安全性。  相似文献   
10.
For businesses to benefit from the many opportunities of cloud computing, they must first address a number of security challenges, such as the potential leakage of confidential data to unintended third parties. An inter-VM (where VM is virtual machine) attack, also known as cross-VM attack, is one threat through which cloud-hosted confidential data could be leaked to unintended third parties. An inter-VM attack exploits vulnerabilities between co-resident guest VMs that share the same cloud infrastructure. In an attempt to stop such an attack, this paper uses the principles of logical analysis to model a solution that provides physical separation of VMs belonging to conflicting tenants based on their levels of conflict. The derived mathematical model is founded on scientific principles and implemented using four conflict-aware VM placement algorithms. The resultant algorithms consider a tenant's risk appetite and cost implications. The model offers guidance to VM placement and is validated using a proof of concept. A cloud simulation tool was used to test and evaluate the effectiveness and efficiency of the model. The findings reflect that the introduction of the proposed model introduced a time lag in the time it took to place VM instances. On top of this, it was also discovered that the number and size of the VM instances has an effect on the VM placement performance. The findings further illustrate that the conflict tolerance level of a VM has a direct impact on the time it took to place.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号