全文获取类型
收费全文 | 3003篇 |
免费 | 209篇 |
国内免费 | 92篇 |
专业分类
电工技术 | 108篇 |
综合类 | 125篇 |
化学工业 | 568篇 |
金属工艺 | 155篇 |
机械仪表 | 189篇 |
建筑科学 | 189篇 |
矿业工程 | 66篇 |
能源动力 | 121篇 |
轻工业 | 284篇 |
水利工程 | 58篇 |
石油天然气 | 120篇 |
武器工业 | 22篇 |
无线电 | 306篇 |
一般工业技术 | 453篇 |
冶金工业 | 173篇 |
原子能技术 | 16篇 |
自动化技术 | 351篇 |
出版年
2024年 | 25篇 |
2023年 | 63篇 |
2022年 | 93篇 |
2021年 | 128篇 |
2020年 | 91篇 |
2019年 | 107篇 |
2018年 | 101篇 |
2017年 | 93篇 |
2016年 | 74篇 |
2015年 | 112篇 |
2014年 | 135篇 |
2013年 | 254篇 |
2012年 | 174篇 |
2011年 | 194篇 |
2010年 | 168篇 |
2009年 | 173篇 |
2008年 | 184篇 |
2007年 | 122篇 |
2006年 | 132篇 |
2005年 | 119篇 |
2004年 | 71篇 |
2003年 | 84篇 |
2002年 | 79篇 |
2001年 | 69篇 |
2000年 | 61篇 |
1999年 | 69篇 |
1998年 | 64篇 |
1997年 | 49篇 |
1996年 | 40篇 |
1995年 | 53篇 |
1994年 | 37篇 |
1993年 | 15篇 |
1992年 | 13篇 |
1991年 | 13篇 |
1990年 | 10篇 |
1989年 | 8篇 |
1988年 | 4篇 |
1987年 | 7篇 |
1986年 | 3篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 3篇 |
1977年 | 1篇 |
1966年 | 2篇 |
排序方式: 共有3304条查询结果,搜索用时 15 毫秒
31.
Detection of rapidly evolving malware requires classification techniques that can effectively and efficiently detect zero-day
attacks. Such detection is based on a robust model of benign behavior and deviations from that model are used to detect malicious
behavior. In this paper we propose a low-complexity host-based technique that uses deviations in static file attributes to
detect malicious executables. We first develop simple statistical models of static file attributes derived from the empirical
data of thousands of benign executables. Deviations among the attribute models of benign and malware executables are then
quantified using information-theoretic (Kullback-Leibler-based) divergence measures. This quantification reveals distinguishing
attributes that are considerably divergent between benign and malware executables and therefore can be used for detection.
We use the benign models of divergent attributes in cross-correlation and log-likelihood frameworks to classify malicious
executables. Our results, using over 4,000 malicious file samples, indicate that the proposed detector provides reasonably
high detection accuracy, while having significantly lower complexity than existing detectors. 相似文献
32.
提出一种以词性为参考值的文本挖掘算法,能有效挖掘与种子词有关的关联规则。基于Bootstrapping算法思想,既减少了预处理阶段对于词根还原的依赖,能处理日志中出现的中文词汇。增加了对于日志文本上下的理解,提高了关联规则的有效性,并应用与IDS日志挖掘之中,有效改善挖掘效率,为规则库提供关联规则。 相似文献
33.
This paper presents a knowledge exchange framework that can leverage the interoperability among semantically heterogeneous learning objects. With the release of various e-Learning standards, learning contents and digital courses are easy to achieve cross-platform sharing, exchanging, and even reorganizing. However, knowledge sharing in semantic level is still a challenge due to that the learning materials can be presented in any form, such as audios, videos, web pages, and even flash files. The proposed knowledge exchange framework allows users to share their learning materials (also called “learning objects”) in semantic level automatically. This framework contains two methodologies: the first is a semantic mapping between knowledge bases (i.e. ontologies) which have essentially similar concepts, and the second is an ontology-based classification algorithm for sharable learning objects. The proposed algorithm adopts the IMS DRI standard and classifies the sharable learning objects from heterogeneous repositories into a local knowledge base by their inner meaning instead of keyword matching. Significance of this research lies in the semantic inferring rules for ontology mapping and learning objects classification as well as the full automatic processing and self-optimizing capability. Focused on digital learning materials and contrasted to other traditional technologies, the proposed approach has experimentally demonstrated significantly improvement in performance. 相似文献
34.
The survivability of the future Internet is largely dependent on whether it will be able to successfully address both security and performance issues facing the Internet. On one hand, the Internet becomes more and more vulnerable due to fast spreading malicious attacks. On the other hand, it is under great stress to meet ever growing/changing application demands while having to sustain multi-gigabit forwarding performance. In this paper, we propose a Ternary Content Addressable Memory (TCAM) coprocessor based solution for high speed, integrated TCP flow anomaly detection and policy filtering. The attacking packets with spoofed source IP addresses are detected through two-dimensional (2D) matching. The key features of the solution are: (1) setting flag bits in TCAM action code to support various packet treatments; (2) managing TCP flow state in pair to do 2D matching. We evaluate the solution’s ability to detect TCP-based flooding attacks based on real-world-trace simulations. The results show that the proposed solution can match up OC-192 line rate. The possible modifications of the solution for the detection of low rate TCP-targeted attacks are also discussed. 相似文献
35.
Lei Ye Zhijun Wang Hao Che Henry B.C. Chan Constantino M. Lagoa 《Computer Communications》2009,32(5):800-805
Understanding the TCP congestion control mechanism from a global optimization point of view is not only important in its own right, but also crucial to the design of other transport layer traffic control protocols with provable properties. In this paper, we derive a global utility function and the corresponding optimal control law, known as TCP control law, which maximizes the global utility. The TCP control law captures the essential behaviors of TCP, including slow start, congestion avoidance, and the binary nature of congestion feedback in TCP. We find that the utility function of TCP is linear in the slow start phase and is proportional to the additive increase rate and approaches the well-known logarithm function as the data rate becomes large in the congestion avoidance phase. We also find that understanding the slow start phase with a fixed threshold is critical to the design of new transport layer control protocols to enable quality of service features. Finally, as an application, we design a Minimum Rate Guaranteed (MRG) traffic control law that shares the same utility function as the TCP control law. Our simulation study of the MRG control law indicates that it is indeed TCP friendly and can provide minimum rate guarantee as long as the percentage of network resource consumed by the MRG flows is moderately small. 相似文献
36.
An enterprise resource planning (ERP) software selection is known to be multi attribute decision making (MADM) problem. This problem has been modeled according with analytic network process (ANP) method due to fact that it considers criteria and sub criteria relations and interrelations in selecting the software.Opinions of many experts are obtained while building ANP model for the selection ERP then opinions are reduced to one single value by methods like geometric means so as to get desired results. To use ANP model for the selection of ERP for a new organization, a new group of expert’s opinions are needed. In this case the same problem will be in counter. In the proposed model, when ANP and ANN models are setup, an ERP software selection can be made easily by the opinions of one single expert. In that case calculation of geometric mean of answers that obtained from many experts will be unnecessary. Additionally the effect of subjective opinion of one single decision maker will be avoided. In terms of difficulty, ANP has some difficulties due to eigenvalue and their limit value calculation.An ANN model has been designed and trained with using ANP results in order to calculate ERP software priority. The artificial neural network (ANN) model is trained by results obtained from ANP. It seems that there is no any major difficulty in order to predict software priorities with trained ANN model. By this results ANN model has been come suitable for using in the selection of ERP for another new decision. 相似文献
37.
38.
文章从分析系统集成策略对信息系统研究和发展的重要作用入手,阐述了建立通用一致应用系统集成框架的重要性,并给出基于CORBA规范的集成框架总体结构及实现策略;在此基础上实现了RPC部件的包装集成,并对遇到的关键技术问题进行论述。 相似文献
39.
40.
Salman A. Al‐Shami Md Rawi Che Salmah Siti Azizah Mohd Nor Abu Hassan Ahmad Nur Adibah Mohd Ishadi Hamady Dieng 《河流研究与利用》2013,29(9):1195-1204
Rapid industrialization and urbanization has led to increasing input of chemical contaminants into the aquatic environment of Malaysia. Despite the threat civilization poses to the biota, there are still very few relevant studies on ecotoxicological testing of river ecosystems. To overcome this knowledge gap, we examined lethal and genotoxic effects of sediments from different rivers of the northern Malaysia against Chironomus kiiensis, a group well represented in the aquatic fauna of this region. We exposed the larvae to sediments from Selama River (SR), Permatang Rawa River (PRR) and Kilang Ubi River (KUR) at various durations (0, 6, 12, 24 and 48 h). The larval mortality was monitored, whereas DNA damage in survivors' cells was determined using the comet assay. Pollution level indexed by the amounts of heavy metals and other organic contaminants in the sediment showed progressive increases from SR to PRR to KUR. Highly polluted sediments (PRR to KUR) were detrimental to C. kiiensis larvae, most of which did not survive following exposure for long periods. DNA analyses revealed greater damages in nuclei derived from larvae maintained on polluted sediments, in particular, those from KUR. The effects on the genomic material of C. kiiensis larvae occurred in a time‐dependent manner, with damage level increasing as exposure time progressed. Our results highlight the genotoxic properties of polluted sediments. More importantly, this study showed that C. kiiensis larvae could respond to different levels of pollution with respect to exposure time. It is concluded that C. kiiensis larvae is a potential candidate for river ecotoxicological monitoring. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献