首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   86781篇
  免费   1099篇
  国内免费   406篇
电工技术   815篇
综合类   2321篇
化学工业   12178篇
金属工艺   4854篇
机械仪表   3091篇
建筑科学   2284篇
矿业工程   587篇
能源动力   1240篇
轻工业   3767篇
水利工程   1296篇
石油天然气   354篇
无线电   9477篇
一般工业技术   16854篇
冶金工业   3138篇
原子能技术   293篇
自动化技术   25737篇
  2021年   60篇
  2020年   37篇
  2019年   43篇
  2018年   14483篇
  2017年   13412篇
  2016年   10018篇
  2015年   653篇
  2014年   302篇
  2013年   434篇
  2012年   3257篇
  2011年   9556篇
  2010年   8382篇
  2009年   5678篇
  2008年   6913篇
  2007年   7896篇
  2006年   243篇
  2005年   1336篇
  2004年   1211篇
  2003年   1252篇
  2002年   602篇
  2001年   154篇
  2000年   204篇
  1999年   117篇
  1998年   126篇
  1997年   89篇
  1996年   97篇
  1995年   61篇
  1994年   59篇
  1993年   51篇
  1992年   57篇
  1991年   55篇
  1989年   38篇
  1987年   37篇
  1985年   47篇
  1983年   37篇
  1982年   36篇
  1981年   41篇
  1979年   40篇
  1974年   43篇
  1969年   38篇
  1968年   48篇
  1967年   40篇
  1966年   55篇
  1965年   55篇
  1959年   38篇
  1958年   42篇
  1957年   39篇
  1956年   37篇
  1955年   80篇
  1954年   72篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
971.
Statistical detection of mass malware has been shown to be highly successful. However, this type of malware is less interesting to cyber security officers of larger organizations, who are more concerned with detecting malware indicative of a targeted attack. Here we investigate the potential of statistically based approaches to detect such malware using a malware family associated with a large number of targeted network intrusions. Our approach is complementary to the bulk of statistical based malware classifiers, which are typically based on measures of overall similarity between executable files. One problem with this approach is that a malicious executable that shares some, but limited, functionality with known malware is likely to be misclassified as benign. Here a new approach to malware classification is introduced that classifies programs based on their similarity with known malware subroutines. It is illustrated that malware and benign programs can share a substantial amount of code, implying that classification should be based on malicious subroutines that occur infrequently, or not at all in benign programs. Various approaches to accomplishing this task are investigated, and a particularly simple approach appears the most effective. This approach simply computes the fraction of subroutines of a program that are similar to malware subroutines whose likes have not been found in a larger benign set. If this fraction exceeds around 1.5 %, the corresponding program can be classified as malicious at a 1 in 1000 false alarm rate. It is further shown that combining a local and overall similarity based approach can lead to considerably better prediction due to the relatively low correlation of their predictions.  相似文献   
972.
The wide availability of affordable RGB-D sensors changes the landscape of indoor scene analysis. Years of research on simultaneous localization and mapping (SLAM) have made it possible to merge multiple RGB-D images into a single point cloud and provide a 3D model for a complete indoor scene. However, these reconstructed models only have geometry information, not including semantic knowledge. The advancements in robot autonomy and capabilities for carrying out more complex tasks in unstructured environments can be greatly enhanced by endowing environment models with semantic knowledge. Towards this goal, we propose a novel approach to generate 3D semantic maps for an indoor scene. Our approach creates a 3D reconstructed map from a RGB-D image sequence firstly, then we jointly infer the semantic object category and structural class for each point of the global map. 12 object categories (e.g. walls, tables, chairs) and 4 structural classes (ground, structure, furniture and props) are labeled in the global map. In this way, we can totally understand both the object and structure information. In order to get semantic information, we compute semantic segmentation for each RGB-D image and merge the labeling results by a Dense Conditional Random Field. Different from previous techniques, we use temporal information and higher-order cliques to enforce the label consistency for each image labeling result. Our experiments demonstrate that temporal information and higher-order cliques are significant for the semantic mapping procedure and can improve the precision of the semantic mapping results.  相似文献   
973.
974.
Range of applications for Wireless Sensor Networks (WSNs) is increasing rapidly. One class of such applications is Energy-Aware Wireless Positioning Systems for situation awareness. Localization deals with determining a target node’s position in WSN by analyzing signals exchanged between nodes. Received Signal Strength Indicator (RSSI) represents the ratio between received signal power and a reference power, and is typically used to estimate distances between nodes. RSSI distance estimations are affected by many factors. This paper aims to enhance the accuracy of RSSI-based localization techniques in ZigBee Networks through studying the communication channel status between two nodes. As the network nodes are exposed to high noise levels, position estimation accuracy deteriorates. A novel adaptive localization scheme is proposed; Two-State Markov model with moving average is employed to detect unpredictable RSSI readings that may reflect badly on the estimation. The proposed scheme achieves better estimation accuracy, for example, the estimation error was reduced from 11.7 m to just 3 m using the proposed scheme.  相似文献   
975.
A Peer-to-Peer (P2P) network can boost its performance if peers are provided with underlying network-layer routing topology. The task of inferring the network-layer routing topology and link performance from an end host to a set of other hosts is termed as network tomography, and it normally requires host computers to send probing messages. We design a passive network tomography method that does not require any probing messages and takes a free ride over data flows in P2P networks. It infers routing topology based on end-to-end delay correlation estimation (DCE) without requiring any synchronization or cooperation from the intermediate routers. We implement and test our method in the real world Internet environment and achieved the accuracy of 92 % in topology recovery. We also perform extensive simulation in OMNeT++ to evaluate its performance over large scale networks, showing that its topology recovery accuracy is about 95 % for large networks.  相似文献   
976.
Crowd sensing networks can be used for large scale sensing of the physical world or other information service by leveraging the available sensors on the phones. The collector hopes to collect as much as sensed data at relatively low cost. However, the sensing participants want to earn much money at low cost. This paper examines the evolutionary process among participants sensing networks and proposes an evolutionary game model to depict collaborative game phenomenon in the crowd sensing networks based on the principles of game theory in economics. A effectively incentive mechanism is established through corrected the penalty function of the game model accordance with the cooperation rates of the participant, and corrected the game times in accordance with it’s payoff. The collector controls the process of game by adjusting the price function. We find that the proposed incentive game based evolutionary model can help decision makers simulate evolutionary process under various scenarios. The crowd sensing networks structure significantly influence cooperation ratio and the total number of participant involved in the game, and the distribution of population with different game strategy. Through evolutionary game model, the manager can select an optimal price to facilitate the system reach equilibrium state quickly, and get the number of participants involved in the game. The incentive game based evolutionary model in crowd sensing networks provides valuable decision-making support to managers.  相似文献   
977.
This article presents an in-depth qualitative study using a phenomenological approach to understand loneliness among elderly individuals in Malaysia. The objective of the study was to understand how the Malaysian elderly perceive and understand social isolation as well as loneliness, with the aim of identifying the factors that cause emotional loneliness among the elderly in nursing homes. In addition, this study also explored their coping strategies when dealing with loneliness. Semi-structured interviews were conducted with ten elderly participants from two different nursing homes in Kuala Lumpur and Selangor with representatives from the three major ethnic groups of Malaysia. Based on the results, there are several factors that cause the elderly to feel lonely – health factors, lack of family ties, and the lack of communication and cognitive factors, such as memory and perception. It was also found that internal (expectations and optimism) and external (work and activities) coping strategies play major roles in overcoming loneliness. In conclusion, some recommendations are made to respective party families and the government to consider when developing plans to help the elderly overcome loneliness, which could strengthen the family and social support system in Malaysia.  相似文献   
978.
This research focused on determining the sociocultural factors that build the social perception of the social roles of senior citizens in Chile in the 2002–2012 period. For this purpose, public opinion was studied in newspapers El Mercurio and La Cuarta. Specialized opinion included the Senior Citizen Program of Pontificia Universidad Católica de Chile, the National Service for Senior Citizens, the Social Observatory for Aging and Old Age of Universidad de Chile, and the Society of Geriatrics and Gerontology of Chile. A comprehensive methodology was used, along with a bibliographical four-stage design. The following ten sociocultural factors were identified: Health and Quality of Life, Studies and Data, Social Images of Aging, Gerontological Concepts and Sociopolitical Participation, Gerontological Policies, Plans and Principles, Aging, Production and Gender, Institutionalization, Demographic Growth, Gerontological Training, and Exclusion and Old Age. This work suggests modifying the conceptual premise that emphasizes the inexistence of a social role for elderly people with a vision centered on the heterogeneity of social roles under permanent sociocultural construction.  相似文献   
979.
The Session Initiation Protocol (SIP) as the core signaling protocol for multimedia services is receiving much attention. Authentication is becoming increasingly crucial issue when a user asks to use SIP services. Many authentication schemes for the SIP have been proposed. Very recently, Zhang et al. has presented an authentication scheme for SIP and claimed their scheme could overcome various attacks while maintaining efficiency. In this research, we illustrate that their scheme is susceptible to the insider attack and does not provide proper mutual authentication. We then propose a modified secure mutual authentication scheme to conquer the security flaws in Zhang et al.’s scheme. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Zhang et al.’s scheme. In addition, the performance analysis shows that our scheme has better efficiency in comparison with other related ECC-based authentication schemes for SIP.  相似文献   
980.
In this paper, we use the concept of prospective age to illuminate patterns of aging by gender, and education in Europe. We find that, within countries, the patterns of aging of men and women with high education are comparatively similar to one another, but that the patterns of aging are quite dissimilar for men and women in the low education group. Across countries the patterns of aging become more similar as education levels increase. Thus, when we look across educational strata, we find increasing convergence in the pattern of aging both across countries and by gender within countries. The distinctive patterns of aging in the Eastern European countries are largely associated with the comparatively rapid aging of men in the low education category. If aging patterns by education persist, improvements in the education composition of Eastern European countries would result in the patterns of aging there becoming more similar to those in Western European countries.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号