全文获取类型
收费全文 | 676篇 |
免费 | 109篇 |
国内免费 | 119篇 |
专业分类
电工技术 | 30篇 |
综合类 | 6篇 |
化学工业 | 1篇 |
金属工艺 | 2篇 |
机械仪表 | 15篇 |
建筑科学 | 20篇 |
矿业工程 | 5篇 |
能源动力 | 6篇 |
轻工业 | 4篇 |
水利工程 | 4篇 |
石油天然气 | 2篇 |
武器工业 | 2篇 |
无线电 | 269篇 |
一般工业技术 | 75篇 |
自动化技术 | 463篇 |
出版年
2024年 | 21篇 |
2023年 | 108篇 |
2022年 | 122篇 |
2021年 | 120篇 |
2020年 | 126篇 |
2019年 | 71篇 |
2018年 | 54篇 |
2017年 | 50篇 |
2016年 | 36篇 |
2015年 | 36篇 |
2014年 | 29篇 |
2013年 | 39篇 |
2012年 | 53篇 |
2011年 | 29篇 |
2010年 | 6篇 |
2009年 | 3篇 |
2005年 | 1篇 |
排序方式: 共有904条查询结果,搜索用时 0 毫秒
131.
132.
Q/CVC 0028-2019《智能家电(IoT设备、互联设备)网络安全评价及测试规范》标准针对当前市场上物联网设备网络安全现状,规定了不同等级的安全要求,对提升家用物联网产品网络应用规范具有重要作用。本文从Q/CVC 0028-2019标准中选取了数个技术要点来剖析编制思路和应用实践,对家电企业在产品设计过程中如何通过该标准改进和提升就可避免陷入传统产品设计的路径依赖进行研究。本文中还攫取数项常见网络安全缺陷问题,解读Q/CVC 0028-2019标准的架构及其背后的技术脉络。 相似文献
133.
134.
135.
针对无线网络不能为多样化应用需求提供支持及卸载移动通信核心成本较高的问题,提出了一种改进整数线性规划模型(IILP)结合二进制穷举择优法的低成本混合物联网流量多目标路由感知方法。首先,基于IILP对混合物联网流量路由感知进行建模,获得准确的能量感知模型;其次,采用多目标MAXI路由感知算法对多目标路由感知模型进行了求解,降低了流量路由求解的延时;最后,采用二进制穷举择优法对流量路由感知的吞吐量进行扩展。仿真实验表明,与现有算法相比,提出方法降低了求解的延时,提高了流量的吞吐量,减少了流量的丢包率,同时还降低了混合物联网多目标路由感知的成本。 相似文献
136.
Cloud-orchestrated Internet of Things (IoT) facilitates proper utilization of network resources and placating user demands in smart communications. Multiple concurrent access (MCA) techniques designed for cloud-assisted communication helps to achieve better resource sharing features with fault tolerance ability. A multi-objective resource allocation and sharing (RAS) for balancing MCA in cloud-orchestrated IoT is presented in this article. The RAS constraints are modeled through linear programming (LP) as an optimization approach. The constraints are resolved using genetic representations (GR) for reducing the unserviced requests and failed resource allocations. Conventional genetic stages are inherited by the LP model to solve resource allocation and access issues reducing latency. The combined LP and GR jointly resolve resource allocation and MCA stagnation in cloud network. A fair outcome of LP-GR is estimation using the metrics response latency, resource utilization, request handled, and average latency. 相似文献
137.
多接入边缘计算(multi-access edge computing,MEC)技术将计算和存储资源下沉到网络边缘,可大幅提高物联网(Internet of things,IoT)系统的计算能力和实时性。然而,MEC往往面临计算需求增长和能量受限的约束,高效的计算卸载及能耗优化机制是MEC技术中重要的研究领域。为保证计算效率的同时最大程度提升计算过程中的能效,提出了两级边缘节点(edge nodes,ENs)中继网络模型,并设计了一种计算资源及信道资源联合优化的最优能耗卸载策略算法(optimal energy consumption algorithm,OECA)。将MEC中的能效建模为0-1背包问题;以最小化系统总体能耗为目标,系统自适应地选择计算模式和分配无线信道资源;在Python环境下仿真验证了算法性能。仿真结果表明,相比于基于有向无环图的卸载策略算法(directed acyclic graph algorithm,DAGA),OECA可将网络容量提升18.3%,能耗缩减13.1%。 相似文献
138.
139.
The use of IoT devices in water end use disaggregation verification is an emerging field which offers benefits over conventional approaches, in terms of cost, accuracy and scalability. Having reliably disaggregated water appliance consumption data will enable smart water meter data to be used in household water conservation approaches and for understanding water consumption behaviours. The FEAT device provides a low cost, easily applied and scalable solution that is demonstrated to work even for very low flow conditions of 0.03 l/s. The FEAT device is a combination of a battery, Wi-fi board and MPU6050 sensors providing multi-modal accelerometer and thermometer data. The study places 7 of these FEAT devices onto hot and cold water pipes leading to a shower, which is operated 4 times in a high flow situation, 0.13 l/s, and 4 times in a low flow situation, 0.03 l/s. The data is then analysed and compared with a flow logger to determine if the FEAT device can detect when a domestic appliance is using water. There are limiting cases where the level of noise or external interference limits distorts the data, obscuring the distinguishable peaks in the data due to the similarity of the values. By using high and low pass filtering methods it was possible to enhance the peaks but there are still situations where peaks cannot be detected: for example, if a rigid pipe is not able to vibrate easily or if a hot water boiler is not triggered due to the low flow rate. However, the results show it should be possible to overcome these limiting cases, as it is much less likely for both the vibration and temperature data to be adversely affected by noise or external influences simultaneously, therefore decreasing the effect of noise and external influences. In conclusion, this research paper demonstrates that FEAT devices are a low cost, easily applied and scalable solution for detecting flow. By using high and low pass filtering, placing sensors on freely moving pipes and through the use of multi-modal verification, the FEAT device is shown to work on both metal and plastic pipes even in the lowest flow situations of 0.03 l/s. Therefore the FEAT device is a suitable solution for appliance identification in disaggregation verification datasets. 相似文献
140.
Delegation mechanism in Internet of Things (IoT) allows users to share some of their permissions with others. Cloud-based delegation solutions require that only the user who has registered in the cloud can be delegated permissions. It is not convenient when a permission is delegated to a large number of temporarily users. Therefore, some works like CapBAC delegate permissions locally in an offline way. However, this is difficult to revoke and modify the offline delegated permissions. In this work, we propose a traceable capability-based access control approach (TCAC) that can revoke and modify permissions by tracking the trajectories of permissions delegation. We define a time capability tree (TCT) that can automatically extract permissions trajectories, and we also design a new capability token to improve the permission verification, revocation and modification efficiency. The experiment results show that TCAC has less token verification and revocation/modification time than those of CapBAC and xDBAuth. TCAC can discover 73.3% unvisited users in the case of delegating and accessing randomly. This provides more information about the permissions delegation relationships, and opens up new possibilities to guarantee the global security in IoT delegation system. To the best of our knowledge, TCAC is the first work to capture the unvisited permissions. 相似文献