全文获取类型
收费全文 | 7124篇 |
免费 | 1288篇 |
国内免费 | 1377篇 |
专业分类
电工技术 | 405篇 |
综合类 | 1128篇 |
化学工业 | 107篇 |
金属工艺 | 89篇 |
机械仪表 | 505篇 |
建筑科学 | 110篇 |
矿业工程 | 108篇 |
能源动力 | 64篇 |
轻工业 | 82篇 |
水利工程 | 71篇 |
石油天然气 | 59篇 |
武器工业 | 40篇 |
无线电 | 796篇 |
一般工业技术 | 365篇 |
冶金工业 | 49篇 |
原子能技术 | 12篇 |
自动化技术 | 5799篇 |
出版年
2024年 | 156篇 |
2023年 | 365篇 |
2022年 | 508篇 |
2021年 | 460篇 |
2020年 | 312篇 |
2019年 | 231篇 |
2018年 | 233篇 |
2017年 | 266篇 |
2016年 | 273篇 |
2015年 | 330篇 |
2014年 | 384篇 |
2013年 | 405篇 |
2012年 | 533篇 |
2011年 | 531篇 |
2010年 | 422篇 |
2009年 | 463篇 |
2008年 | 486篇 |
2007年 | 461篇 |
2006年 | 434篇 |
2005年 | 365篇 |
2004年 | 290篇 |
2003年 | 262篇 |
2002年 | 194篇 |
2001年 | 193篇 |
2000年 | 162篇 |
1999年 | 165篇 |
1998年 | 123篇 |
1997年 | 133篇 |
1996年 | 94篇 |
1995年 | 94篇 |
1994年 | 77篇 |
1993年 | 61篇 |
1992年 | 54篇 |
1991年 | 45篇 |
1990年 | 43篇 |
1989年 | 33篇 |
1988年 | 35篇 |
1987年 | 10篇 |
1986年 | 11篇 |
1985年 | 11篇 |
1984年 | 16篇 |
1983年 | 7篇 |
1982年 | 11篇 |
1981年 | 7篇 |
1980年 | 7篇 |
1979年 | 5篇 |
1978年 | 4篇 |
1976年 | 8篇 |
1975年 | 4篇 |
1973年 | 3篇 |
排序方式: 共有9789条查询结果,搜索用时 0 毫秒
91.
Blockchain merges technology with the Internet of Things (IoT) for addressing security and privacy-related issues. However, conventional blockchain suffers from scalability issues due to its linear structure, which increases the storage overhead, and Intrusion detection performed was limited with attack severity, leading to performance degradation. To overcome these issues, we proposed MZWB (Multi-Zone-Wise Blockchain) model. Initially, all the authenticated IoT nodes in the network ensure their legitimacy by using the Enhanced Blowfish Algorithm (EBA), considering several metrics. Then, the legitimately considered nodes for network construction for managing the network using Bayesian-Direct Acyclic Graph (B-DAG), which considers several metrics. The intrusion detection is performed based on two tiers. In the first tier, a Deep Convolution Neural Network (DCNN) analyzes the data packets by extracting packet flow features to classify the packets as normal, malicious, and suspicious. In the second tier, the suspicious packets are classified as normal or malicious using the Generative Adversarial Network (GAN). Finally, intrusion scenario performed reconstruction to reduce the severity of attacks in which Improved Monkey Optimization (IMO) is used for attack path discovery by considering several metrics, and the Graph cut utilized algorithm for attack scenario reconstruction (ASR). UNSW-NB15 and BoT-IoT utilized datasets for the MZWB method simulated using a Network simulator (NS-3.26). Compared with previous performance metrics such as energy consumption, storage overhead accuracy, response time, attack detection rate, precision, recall, and F-measure. The simulation result shows that the proposed MZWB method achieves high performance than existing works 相似文献
92.
Zibo Wang Chaobin Huo Yaofang Zhang Shengtao Cheng Yilu Chen Xiaojie Wei Chao Li Bailing Wang 《计算机、材料和连续体(英文)》2023,75(2):2957-2979
With the growing discovery of exposed vulnerabilities in the Industrial Control Components (ICCs), identification of the exploitable ones is urgent for Industrial Control System (ICS) administrators to proactively forecast potential threats. However, it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods. To address these challenges, we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph (KG) in which relation paths contain abundant potential evidence to support the reasoning. The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths. The proposed method consists of three primary building blocks: KG construction, relation path representation, and query relation reasoning. A security-oriented ontology combines exploit modeling, which provides a guideline for the integration of the scattered knowledge while constructing the KG. We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning. In order to acquire a high-quality representation, the entity and relation embeddings take advantage of their local structure and related semantics. Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity. In particular, similarity calculation is introduced into a critical path selection algorithm, which improves search and reasoning performance. Meanwhile, the proposed algorithm avoids redundant paths between the given pairs of entities. Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy. 相似文献
93.
Shiming He Meng Guo Bo Yang Osama Alfarraj Amr Tolba Pradip Kumar Sharma Xi’ai Yan 《计算机、材料和连续体(英文)》2023,75(3):5027-5047
Sensors produce a large amount of multivariate time series data to record the states of Internet of Things (IoT) systems. Multivariate time series timestamp anomaly detection (TSAD) can identify timestamps of attacks and malfunctions. However, it is necessary to determine which sensor or indicator is abnormal to facilitate a more detailed diagnosis, a process referred to as fine-grained anomaly detection (FGAD). Although further FGAD can be extended based on TSAD methods, existing works do not provide a quantitative evaluation, and the performance is unknown. Therefore, to tackle the FGAD problem, this paper first verifies that the TSAD methods achieve low performance when applied to the FGAD task directly because of the excessive fusion of features and the ignoring of the relationship’s dynamic changes between indicators. Accordingly, this paper proposes a multivariate time series fine-grained anomaly detection (MFGAD) framework. To avoid excessive fusion of features, MFGAD constructs two sub-models to independently identify the abnormal timestamp and abnormal indicator instead of a single model and then combines the two kinds of abnormal results to detect the fine-grained anomaly. Based on this framework, an algorithm based on Graph Attention Neural Network (GAT) and Attention Convolutional Long-Short Term Memory (A-ConvLSTM) is proposed, in which GAT learns temporal features of multiple indicators to detect abnormal timestamps and A-ConvLSTM captures the dynamic relationship between indicators to identify abnormal indicators. Extensive simulations on a real-world dataset demonstrate that the proposed algorithm can achieve a higher F1 score and hit rate than the extension of existing TSAD methods with the benefit of two independent sub-models for timestamp and indicator detection. 相似文献
94.
设g和f分别是定义在图G的顶点集合V(G)上的整数值函数且对每一个x∈V(G)有2≤g(x)≤f(x).证明了若G是(mg+m-1,mf-m+1)—图,则对G中任意一个给定的有m条边的子图H,G有一个(g,f)—因子分解与H正交. 相似文献
95.
We give drawings of a complete graphK
n
withO(n
4 log2
g/g) many crossings on an orientable or nonorientable surface of genusg 2. We use these drawings ofK
n
and give a polynomial-time algorithm for drawing any graph withn vertices andm edges withO(m
2 log2
g/g) many crossings on an orientable or nonorientable surface of genusg 2. Moreover, we derive lower bounds on the crossing number of any graph on a surface of genusg 0. The number of crossings in the drawings produced by our algorithm are within a multiplicative factor ofO(log2
g) from the lower bound (and hence from the optimal) for any graph withm 8n andn
2/m g m/64.The research of the third and the fourth authors was partially supported by Grant No. 2/1138/94 of the Slovak Academy of Sciences and by EC Cooperative action IC1000 Algorithms for Future Technologies (Project ALTEC). A preliminary version of this paper was presented at WG93 and published in Lecture Notes in Computer Science, Vol. 790, 1993, pp. 388–396. 相似文献
96.
D. Zuckerman 《Algorithmica》1996,16(4-5):367-391
We show how to simulate BPP and approximation algorithms in polynomial time using the output from a -source. A -source is a weak random source that is asked only once forR bits, and must output anR-bit string according to some distribution that places probability no more than 2–R
on any particular string. We also give an application to the unapproximability of MAX CLIQUE.This paper appeared in preliminary form in theProceedings of the 32nd Annual Symposium on Foundations of Computer Science, 1991, pp. 79–89. Most of this research was done while the author was at U.C. Berkeley, and supported by an AT&T Graduate Fellowship, NSF PYI Grant No. CCR-8896202, and NSF Grant No. IRI-8902813. Part of this research was done while the author was at MIT, supported by an NSF Postdoctoral Fellowship, NSF Grant No. 92-12184 CCR, and DARPA Grant No. N00014-92-J-1799. Part of this research was done at UT Austin, where the author was supported by NSF NYI Grant No. CCR-9457799. 相似文献
97.
基于PERT图的虚拟拆装过程建模 总被引:1,自引:0,他引:1
提出了使用PERT图来建立虚拟拆装过程模型的方法,根据零件之间的约束关系构造PERT图及其对应的依赖矩阵,并且能够根据它来指导虚拟拆装训练过程的实施.所提供的方法在对某设备的虚拟维修中得到了验证. 相似文献
98.
二进制翻译技术能够有效解决二进制兼容问题,促进新型体系结构的发展,也是虚拟机技术的重要组成部分,具有重要的研究和应用价值,但是其效率仍然有待提升,特别是目标代码生成的效率。设计了一种高效的目标代码生成算法——代码生成的子图覆盖算法(subgraph covering for code generation,SCCG),能够以尽可能少的代价生成精简的目标代码。该算法应用数据流图对二进制代码中的基本块进行建模,获取指令间的数据相关,并采用基于子图覆盖的贪心算法得到目标代码。在TransARM原型系统中进行了实现和测试,结果表明该算法获得了更优质的目标代码,并且成本得到了有效控制。 相似文献
99.
The spectral properties of the incidence matrix of the communication graph are exploited to provide solutions to two multi-agent control problems. In particular, we consider the problem of state agreement with quantized communication and the problem of distance-based formation control. In both cases, stabilizing control laws are provided when the communication graph is a tree. It is shown how the relation between tree graphs and the null space of the corresponding incidence matrix encode fundamental properties for these two multi-agent control problems. 相似文献
100.
This communique presents forced second-order consensus protocols with communication time-delays for the network of agents with double integrator dynamics and gives a measure of the robustness of the protocols to the communication time-delays. By employing a frequency domain method, it is proven that the forced consensus is achieved asymptotically for appropriate time-delay if the network is connected. Particularly, the maximum fixed time-delay that can be tolerated by the network is found. The forced consensus protocols are distributed in the sense that each agent only needs information from its neighboring agents, which reduces the complexity of connections between agents significantly. Numerical simulation results are provided to demonstrate the effectiveness and the sharpness of the theoretical results. 相似文献