首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   614篇
  免费   111篇
  国内免费   116篇
电工技术   30篇
综合类   6篇
化学工业   1篇
金属工艺   2篇
机械仪表   15篇
建筑科学   13篇
矿业工程   5篇
能源动力   6篇
轻工业   4篇
水利工程   4篇
石油天然气   2篇
武器工业   2篇
无线电   244篇
一般工业技术   74篇
自动化技术   433篇
  2024年   16篇
  2023年   99篇
  2022年   113篇
  2021年   113篇
  2020年   118篇
  2019年   64篇
  2018年   44篇
  2017年   45篇
  2016年   35篇
  2015年   35篇
  2014年   28篇
  2013年   39篇
  2012年   53篇
  2011年   29篇
  2010年   6篇
  2009年   3篇
  2005年   1篇
排序方式: 共有841条查询结果,搜索用时 15 毫秒
171.
刘小忠  方军予  蒋永彬 《电信科学》2022,38(10):153-162
在2G/3G减频退网背景下,窄带物联网(narrow band Internet of things,NB-IoT)和LTE UE-Category 1 (即用户设备能够支持的4G LTE网络传输速率的等级,简称LTE Cat.1)承接其业务发展已是大势所趋。在回顾分析2G/3G物联网业务的发展现状及趋势,重点梳理国内三大运营商在终端、网络以及应用层面的物联网业务发展策略的基础之上,总结概括了电信运营商在NB-IoT和LTE Cat.1业务领域现有的流量主导型、平台支撑型和应用赋能型3种商业模式。最后,从商机拓展、产品营销和团队服务3个方面展望了未来商业模式的升级之路。  相似文献   
172.
陈锐 《电子器件》2021,44(1):108-113
为了保障工业物联网采集数据的机密性,同时考虑到物联网终端设备资源受限与成本低廉的特点,提出以软硬件协同设计的方式实现SM4算法,以平衡资源开销、性能和延时。在开源RISC-V指令集的基础上,增加了两条自定义指令以实现密钥扩展和加解密算法的轮函数,设计了一款低开销的SM4指令功能单元硬件电路结构。从时钟周期精确的仿真结果来看,与无扩展指令的实现相比,延时缩减81.72%,吞吐率提升4.47倍。从SMIC 180 nm工艺下综合结果来看,SM4指令功能单元仅占用了1684门,与参考文献相比,资源开销至少降低38.9%。  相似文献   
173.
Wireless sensor network (WSN) based on IEEE 802.15.4 technology continues to gain considerable importance. The present work is based on this standard and a cluster tree network topology. This network is divided into many subgroups, each of which is characterized by its special IEEE parameters (beacon order [BO] and superframe order [SO]). A mathematical model for computing energy consumption was proposed to enable personal area network (PAN) coordinator to detect the current energy level in the battery. The proposed adaptive intervention is based on a comparison between the remaining energy and the diverse thresholds, which lead to an auto‐management of energy consumption. The proposed approach was evaluated using Inetmanet/Omnet++ simulator.  相似文献   
174.
In recent years, fog computing, a novel paradigm, has emerged for location and latency‐sensitive applications. It is a powerful complement for cloud computing that enables provisioning services and resources outside the cloud near the end devices. In a fog system, the existence of several nonhomogenous devices, which are potentially mobile, led to quality of service (QoS) worries. QoS‐aware approaches are presented in various parts of the fog system, and several different QoS factors are taken into account. In spite of the importance of QoS in fog computing, no comprehensive study on QoS‐aware approaches exists in fog computing. Hence, this paper reviews the current research used to guarantee QoS in fog computing. This paper investigates the QoS‐ensuring techniques that fall into three categories: service/resource management, communication management, and application management (published between 2013 and October 2018). Regarding the selected approaches, this paper represents merits, demerits, tools, evaluation types, and QoS factors. Finally, on the basis of the reviewed studies, we suggest some open issues and challenges which are worth further studying and researching in QoS‐aware approaches in fog computing.  相似文献   
175.
In the recent era, the security issues affecting the future Internet‐of‐Things (IoT) standards has fascinated noteworthy consideration from numerous research communities. In this view, numerous assessments in the form of surveys were proposed highlighting several future IoT‐centric subjects together with threat modeling, intrusion detection systems (IDS), and various emergent technologies. In contrast, in this article, we have focused exclusively on the emerging IoT‐related vulnerabilities. This article is a multi‐fold survey that emphasizes on understanding the crucial causes of novel vulnerabilities in IoT paradigms and issues in existing research. Initially, we have emphasized on different layers of IoT architecture and highlight various emerging security challenges associated with each layer along with the key issues of different IoT systems. Secondly, we discuss the exploitation, detection, and defense methodologies of IoT malware‐enabled distributed denial of service (DDoS), Sybil, and collusion attack capabilities. We have also discussed numerous state‐of‐the‐art strategies for intrusion detection and methods for IDS setup in future IoT systems. Third, we have presented a brief classification of existing IoT authentication protocols and a comparative analysis of such protocols based on different IoT‐enabled cyber attacks. For conducting a real‐time future IoT research, we have presented some emerging blockchain solutions. We have also discussed a comparative examination of some of the recently developed simulation tools and IoT test beds that are characterized based on different layers of IoT infrastructure. We have also outlined some of the open issues and future research directions and also facilitate the readers with broad classification of existing surveys in this domain that addresses several scopes related to the IoT paradigm. This survey article focuses in enabling IoT‐related research activities by comparing and merging scattered surveys in this domain.  相似文献   
176.
Internet of Things (IoT) is an ecosystem that can improve the life quality of humans through smart services, thereby facilitating everyday tasks. Connecting to cloud and utilizing its services are now public and common, and the experts seek to find some ways to complete cloud computing to use it in IoT, which in next decades will make everything online. Fog computing, where the cloud computing expands to the edge of the network, is one way to achieve the objectives of delay reduction, immediate processing, and network congestion. Since IoT devices produce variations of workloads over time, IoT application services will experience traffic trace fluctuations. So knowing about the distribution of future workloads required to handle IoT workload while meeting the QoS constraint. As a result, in the context of fog computing, the main objective of resource management is dynamic resource provisioning such that it avoids the excess or dearth of provisioning. In the present work, we first propose a distributed computing framework for autonomic resource management in the context of fog computing. Then, we provide a customized version of a provisioning system for IoT services based on control MAPE‐k loop. The system makes use of a reinforcement learning technique as decision maker in planning phase and support vector regression technique in analysis phase. At the end, we conduct a family of simulation‐based experiments to assess the performance of our introduced system. The average delay, cost, and delay violation are decreased by 1.95%, 11%, and 5.1%, respectively, compared with existing solutions.  相似文献   
177.
文章提出物联网的下一个发展阶段——可视物联网的基本架构,并将发展愿景概括为“看得清”“看得快”“看得懂”“看得广”以及“看得远”,深度分析所面临的技术挑战,包括物联网设备可视类数据的收集、物联网设备的多样性、高维异构性、环境复杂性、极低时延要求、承载可视数据的差异性、复杂系统中的智能控制、支持社交的可视物联网、可视数据的智慧管理以及具备类人功能的可视物联网。提出一种实现万物可视的新技术架构,包括采用边缘智能驱动的灵巧可视物联网端边云系统架构设计、软件可定义的可视信息生成技术、多特征流可视信息传输、边缘计算下多源可视数据的智能表达、基于内容的计算任务迁移模型以及大规模分散计算中的边缘智能控制技术,从而系统地实现物联网的视觉引擎,为物联网注入可视能力。  相似文献   
178.
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through decentralized, trustless, peer-to-peer systems. This research identifies peer-reviewed literature that seeks to utilize blockchain for cyber security purposes and presents a systematic analysis of the most frequently adopted blockchain security applications. Our findings show that the Internet of Things (IoT) lends itself well to novel blockchain applications, as do networks and machine visualization, public-key cryptography, web applications, certification schemes and the secure storage of Personally Identifiable Information (PII). This timely systematic review also sheds light on future directions of research, education and practices in the blockchain and cyber security space, such as security of blockchain in IoT, security of blockchain for AI data, and sidechain security.  相似文献   
179.
The Internet of Things (IoT) provides new opportunities for different IoT platforms connecting various devices together. The need to identify those devices is the foremost important to perform any kind of operation. Many organizations and standard bodies that provide specifications and frameworks for the IoT currently have their own identification mechanisms. Some existing industrial identification mechanisms can also be used in the IoT. There is no common Identification Scheme (IS) for the IoT as yet, because of the political and commercial differences amongst the standard bodies. The unavailability of a unified IS method makes the inter-working among IoT platforms challenging. This paper analyses and compares ISs used by several selected IoT platforms. This work will help in understanding the need for a common identification mechanism to provide inter-working among different IoT platforms.  相似文献   
180.
With the proliferation of the Internet of Things (IoT), various services are emerging with totally different features and requirements, which cannot be supported by the current fifth generation of mobile cellular networks (5G). The future sixth generation of mobile cellular networks (6G) is expected to have the capability to support new and unknown services with changing requirements. Hence, in addition to enhancing its capability by 10–100 times compared with 5G, 6G should also be intelligent and open to adapt to the ever-changing services in the IoT, which requires a convergence of Communication, Computing and Caching (3C). Based on the analysis of the requirements of new services for 6G, this paper identifies key enabling technologies for an intelligent and open 6G network, all featured with 3C convergence. These technologies cover fundamental and emerging topics, including 3C-based spectrum management, radio channel construction, delay-aware transmission, wireless distributed computing, and network self-evolution. From the detailed analysis of these 3C-based technologies presented in this paper, we can see that although they are promising to enable an intelligent and open 6G, more efforts are needed to realize the expected 6G network.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号