首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   676篇
  免费   109篇
  国内免费   119篇
电工技术   30篇
综合类   6篇
化学工业   1篇
金属工艺   2篇
机械仪表   15篇
建筑科学   20篇
矿业工程   5篇
能源动力   6篇
轻工业   4篇
水利工程   4篇
石油天然气   2篇
武器工业   2篇
无线电   269篇
一般工业技术   75篇
自动化技术   463篇
  2024年   21篇
  2023年   108篇
  2022年   122篇
  2021年   120篇
  2020年   126篇
  2019年   71篇
  2018年   54篇
  2017年   50篇
  2016年   36篇
  2015年   36篇
  2014年   29篇
  2013年   39篇
  2012年   53篇
  2011年   29篇
  2010年   6篇
  2009年   3篇
  2005年   1篇
排序方式: 共有904条查询结果,搜索用时 9 毫秒
1.
王若明 《物联网技术》2012,(5):82-83,86
物联网是当前的研究热点,已受到了我国政府的重视。文章介绍了物联网的定义、物联网的体系结构,以及物联网的核心技术——感知识别技术、信号处理技术和架构技术,最后介绍了物联网在不停车收费系统、智能家居安防系统和手机支付等方面的应用。  相似文献   
2.
针对国内航空物流信息化建设方面的问题,提出并设计了一套基于物联网的航空物流查询系统。该系统通过RFID技术完成数据采集,并通过RS232串口将数据传输到ZigBee终端节点,然后利用ZigBee无线网络进行短距离传输到路由节点,最后经过 ZigBee 网关将信息传输出去。实验结果表明该平台可以对航空货物进行智能化、可视化、信息化管理。该设计为航空物流管理提供了新的思路,有良好的应用前景。  相似文献   
3.
闫华钰  陈岚  佟鑫  李莹 《计算机工程》2021,47(2):152-159
物联网(IoT)应用的快速发展和软硬件开源化趋势使得IoT设备所面临的硬件安全威胁日益严峻,尤其是利用运行时条件触发的系统级攻击,很难通过传统测试方法进行检测和防御,需要提供运行时安全检查机制。分析IoT系统芯片面临的安全威胁,结合数据加密传输路径中的攻击、任务流和检查内容,设计4条功能完整性安全检查策略,搭建SoC安全策略检查架构并植入运行时触发硬件木马。仿真结果显示,运行时策略检查状态机可以检查出加密核、内存和UART接口的功能完整性问题,并通过发送错误中断信号进行反馈,证明了所设计的系统级安全策略检查架构的正确性与有效性。  相似文献   
4.
基于Web服务的物联接入系统设计   总被引:3,自引:1,他引:2  
由于物联网接入设备与应用业务的多元性与复杂性的增加,实际物联网业务开发中需要对业务与设备做协同处理。针对此类问题,提出一种面向服务的模型架构,并据此以Web服务模式触发各类物联接入设备信息的消息管道流程,并在基础性接入信息处理过程中解决不必要的异构问题。基于Intel复杂指令集的嵌入式开发环境,利用多种语言协作设计实现一个物联接入系统。经实测可顺利完成应用层直接操控感知层的业务功能。  相似文献   
5.
在物联网中所有智能装置都可以上网,因此所带来的信息总量非常大,但每个东西所传送的信息却很小,因此需要新技术快速地处理或储存这些大量的小信息。基于批次处理循序送出技术,结合存储器式处理技术、快速封包处理技术与远端机器储存日志的方式,提供快速接收并处理物联网信息的方法,并以硬盘效能最大化的方式批次循序更新至硬盘。  相似文献   
6.
In this paper, an advanced and optimized Light Gradient Boosting Machine (LGBM) technique is proposed to identify the intrusive activities in the Internet of Things (IoT) network. The followings are the major contributions: i) An optimized LGBM model has been developed for the identification of malicious IoT activities in the IoT network; ii) An efficient evolutionary optimization approach has been adopted for finding the optimal set of hyper-parameters of LGBM for the projected problem. Here, a Genetic Algorithm (GA) with k-way tournament selection and uniform crossover operation is used for efficient exploration of hyper-parameter search space; iii) Finally, the performance of the proposed model is evaluated using state-of-the-art ensemble learning and machine learning-based model to achieve overall generalized performance and efficiency. Simulation outcomes reveal that the proposed approach is superior to other considered methods and proves to be a robust approach to intrusion detection in an IoT environment.  相似文献   
7.
In recent years, the usage and applications of Internet of Things (IoT) have increased exponentially. IoT connects multiple heterogeneous devices like sensors, micro controllers, actuators, smart devices like mobiles, watches, etc. IoT contributes the data produced in the context of data collection, including the domains like military, agriculture, healthcare, etc. The diversity of possible applications at the intersection of the IoT and the web semantics has prompted many research teams to work at the interface between these two disciplines. This makes it possible to collect data and control various objects in transparent way. The challenge lies in the use of this data. Ontologies address this challenge to meet specific data needs in the IoT field. This paper presents the implementation of a dynamic agriculture ontology-building tool that parses the ontology files to extract full data and update it based on the user needs. The technology is used to create the angular library for parsing the OWL files. The proposed ontology framework would accept user-defined ontologies and provide an interface for an online updating of the owl files to ensure the interoperability in the agriculture IoT.  相似文献   
8.
Nowadays, the emerging internet of things (IoT) technology offers the connectivity and communication between all things (various objects/things, devices, actuators, sensors, and mobile devices) at anywhere and anytime. These devices have embedded environment monitoring capabilities (sensors) and significant computational responsibilities. Most of the devices are working by utilizing their limited resources such as energy, memory, and bandwidth. Obviously, battery power is a crucial factor in any network. It makes tedious overheads to the network operations. Prediction of the future energy of the devices could be more helpful for managing resources, connectivity, and communication between the devices in IoT and wireless sensor networks (WSNs). It also facilitates the reliable internet and network connection establishment to the nodes. Hence, this paper presents an energy estimation model to predict the future energy of devices using the Markov and autoregression model. The proposed model facilitates smarter energy management among internet-connected devices. Performance results show that the proposed method gives significant improvement compared with the neural network and other existing predictions. Further, the proposed model has very lower error performance metrics such as mean square error and computation overhead. The proposed model yields more perfect energy predictions for a node with 64% to 97% and 16% to 43% of higher prediction accuracy throughout the time series.  相似文献   
9.
The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies. Early diagnosis of many diseases will improve the patient life. The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things (IoT), Wireless Sensor Networks (WSN), Embedded systems, Deep learning approaches and Optimization and aggregation methods. The data generated through these technologies will demand the bandwidth, data rate, latency of the network. In this proposed work, efficient discrete grey wolf optimization (DGWO) based data aggregation scheme using Elliptic curve Elgamal with Message Authentication code (ECEMAC) has been used to aggregate the parameters generated from the wearable sensor devices of the patient. The nodes that are far away from edge node will forward the data to its neighbor cluster head using DGWO. Aggregation scheme will reduce the number of transmissions over the network. The aggregated data are preprocessed at edge node to remove the noise for better diagnosis. Edge node will reduce the overhead of cloud server. The aggregated data are forward to cloud server for central storage and diagnosis. This proposed smart diagnosis will reduce the transmission cost through aggregation scheme which will reduce the energy of the system. Energy cost for proposed system for 300 nodes is 0.34μJ. Various energy cost of existing approaches such as secure privacy preserving data aggregation scheme (SPPDA), concealed data aggregation scheme for multiple application (CDAMA) and secure aggregation scheme (ASAS) are 1.3 μJ, 0.81 μJ and 0.51 μJ respectively. The optimization approaches and encryption method will ensure the data privacy.  相似文献   
10.
The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated view of the trends in the IoT authentication area. Among the issues covered include a series of authentication protocols that have remained research gaps in various studies. This study applies a comparative evaluation of authentication protocols, including their strengths and weaknesses. Thus, it forms the foundation in the IoT authentication field of study. In that direction, a multi authentication architecture that involves secured means is proposed for protocol authentication. Informal analysis can affect the security of the protocols. Burrows-Abadi-Needham (BAN) logic provides proof of the attainment of mutual authentication. NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号