全文获取类型
收费全文 | 1316篇 |
免费 | 467篇 |
国内免费 | 359篇 |
专业分类
电工技术 | 100篇 |
综合类 | 119篇 |
化学工业 | 15篇 |
金属工艺 | 2篇 |
机械仪表 | 23篇 |
建筑科学 | 11篇 |
矿业工程 | 8篇 |
能源动力 | 10篇 |
轻工业 | 7篇 |
水利工程 | 1篇 |
石油天然气 | 2篇 |
武器工业 | 10篇 |
无线电 | 333篇 |
一般工业技术 | 64篇 |
冶金工业 | 35篇 |
自动化技术 | 1402篇 |
出版年
2024年 | 76篇 |
2023年 | 215篇 |
2022年 | 359篇 |
2021年 | 297篇 |
2020年 | 241篇 |
2019年 | 115篇 |
2018年 | 49篇 |
2017年 | 43篇 |
2016年 | 40篇 |
2015年 | 24篇 |
2014年 | 69篇 |
2013年 | 43篇 |
2012年 | 63篇 |
2011年 | 94篇 |
2010年 | 62篇 |
2009年 | 77篇 |
2008年 | 59篇 |
2007年 | 57篇 |
2006年 | 40篇 |
2005年 | 42篇 |
2004年 | 25篇 |
2003年 | 15篇 |
2002年 | 14篇 |
2001年 | 5篇 |
2000年 | 4篇 |
1998年 | 4篇 |
1997年 | 1篇 |
1996年 | 3篇 |
1994年 | 1篇 |
1990年 | 1篇 |
1986年 | 4篇 |
排序方式: 共有2142条查询结果,搜索用时 21 毫秒
101.
ZHANG Chuan-juan 《数字社区&智能家居》2008,(36)
基于缓冲区溢出的攻击是一种常见的安全攻击手段,也是目前惟一最重要最常见的安全威胁。在所有的软件安全漏洞中,缓冲区溢出漏洞大约占一半。该文从编程的角度分析了缓冲区溢出攻击,并提出在源代码阶段尽量避免缓冲区溢出的方法。 相似文献
102.
103.
Silver Steven M.; Rogers Susan; Knipe James; Colelli Gina 《Canadian Metallurgical Quarterly》2005,12(1):29
This article presents the results of a time-limited psychological relief effort using eye movement desensitization and reprocessing (EMDR) following the attacks on the World Trade Center on September 11, 2001. Clients made highly significant positive gains on a range of outcome variables, including validated psychometrics and self-report scales. Analyses of the data suggest 2 broad conclusions: EMDR is a useful treatment intervention both in the immediate aftermath of disaster as well as later; the longer treatment is delayed, the greater the level of disturbance experienced by clients. Also discussed are problems in conducting research during mass disaster response situations. A demonstration of an analog to a wait-list control group is provided. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
104.
本文介绍了一种安全灵活的入侵检测系统体系结构,通过运用关键主机隐藏技术,使关键主机对于主动探测,被动监听均不可见,提高了系统自身的安全性,同时,通过引入移动代理,限制入侵检测系统各部分之间的通信等机制,增强本体系结构对于拒绝服务攻击的抵抗力,系统通过使用智能移动代理在网络节点上收集处理信息,提高了入侵检检测系统的灵活性,减少了网络负载。 相似文献
105.
拒绝服务攻击严重威胁着Internet的安全,而且其入侵工具的发展是一种长期存在的趋势。文章介绍了一种新的拒绝服务攻击的安全方案,通过使用多点传送树作为基本的认证机制来进行IP多点传送认证,从而对拒绝服务攻击免疫。 相似文献
106.
Budson Andrew E.; Simons Jon S.; Sullivan Alison L.; Beier Jonathan S.; Solomon Paul R.; Scinto Leonard F.; Daffner Kirk R.; Schacter Daniel L. 《Canadian Metallurgical Quarterly》2004,18(2):315
National traumatic events can produce extremely vivid memories. Using a questionnaire administered during telephone interviews, the authors investigated emotional responses to, and memory for. the September 11, 2001, terrorist attacks in patients with Alzheimer's disease (AD), patients with mild cognitive impairment (MCI), and healthy older adults in the initial weeks following the event and again 3-4 months later. There were several notable findings. First, patients with AD showed less memory than patients with MCI and older adults. Second, patients with AD, but not patients with MCI or older adults, appeared to retain more memory for personal versus factual information. Third, patients with AD and older adults did not differ in the intensity of their reported emotional responses to the attacks, whereas patients with MCI reported relatively less intense emotional responses. Last, distortions of memory for personal information were frequent for all participants but were more common in patients with AD. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
107.
《Journal of Process Control》2014,24(5):621-639
Complex, high performance, engineering systems have to be closely monitored and controlled to ensure safe operation and protect public from potential hazards. One of the main challenges in designing monitoring and control algorithms for these systems is that sensors and actuators may be malfunctioning due to malicious or natural causes. To address this challenge, this paper addresses a resilient monitoring and control (ReMAC) system by expanding previously developed resilient condition assessment monitoring systems and Kalman filter-based diagnostic methods and integrating them with a supervisory controller developed here. While the monitoring and diagnostic algorithms assess plant cyber and physical health conditions, the supervisory controller selects, from a set of candidates, the best controller based on the current plant health assessments. To experimentally demonstrate its enhanced performance, the developed ReMAC system is then used for monitoring and control of a chemical reactor with a water cooling system in a hardware-in-the-loop setting, where the reactor is computer simulated and the water cooling system is implemented by a machine condition monitoring testbed at Idaho National Laboratory. Results show that the ReMAC system is able to make correct plant health assessments despite sensor malfunctioning due to cyber attacks and make decisions that achieve best control actions despite possible actuator malfunctioning. Monitoring challenges caused by mismatches between assumed system component models and actual measurements are also identified for future work. 相似文献
108.
We consider image transformation problems, and the objective is to translate images from a source domain to a target one. The problem is challenging since it is difficult to preserve the key properties of the source images, and to make the details of target being as distinguishable as possible. To solve this problem, we propose an informative coupled generative adversarial networks (ICoGAN). For each domain, an adversarial generator-and-discriminator network is constructed. Basically, we make an approximately-shared latent space assumption by a mutual information mechanism, which enables the algorithm to learn representations of both domains in unsupervised setting, and to transform the key properties of images from source to target.Moreover, to further enhance the performance, a weightsharing constraint between two subnetworks, and different level perceptual losses extracted from the intermediate layers of the networks are combined. With quantitative and visual results presented on the tasks of edge to photo transformation, face attribute transfer, and image inpainting, we demonstrate the ICo- GAN’s effectiveness, as compared with other state-of-the-art algorithms. 相似文献
109.
This paper focuses on the protection issues for supply systems involving random attacks, which are described as attacks whose targets cannot be predicted. We present the random-attack median fortification problem (RAMF) to identify the fortification strategy that minimizes the expected operation cost after random attacks. RAMF is formulated as an integer-linear program and solved directly using general-purpose MIP solver. Moreover, a more complex problem, the fortification median problem for disruptions caused by mixed types of attacks (FMMA), is introduced to find a balance between defending the worst-case attacks and random attacks. Solving FMMA can achieve good protection results, which are more practical in dealing with systems with mixed types of attacks, if the proportion between the types is properly estimated. We formulate FMMA as a non-linear bilevel program and extend a typical implicit enumeration (IE) algorithm to solve the problem. Finally, computational experiments demonstrate the effectiveness of both RAMF and FMMA in dealing with protective affairs involving random attacks. The efficiency of solving the formulations of RAMF and FMMA is also testified. 相似文献
110.
元学习期望训练所得的元模型在学习到的“元知识”基础上利用来自新任务的少量标注样本,仅通过较少的梯度下降步骤微调模型就能够快速适应该任务。但是,由于缺乏训练样本,元学习算法在元训练期间对现有任务过度训练时所得的分类器决策边界不够准确,不合理的决策边界使得元模型更容易受到微小对抗扰动的影响,导致元模型在新任务上的鲁棒性能降低。提出一种半监督对抗鲁棒模型无关元学习(semi-ARMAML)方法,在目标函数中分别引入半监督的对抗鲁棒正则项和基于信息熵的任务无偏正则项,以此优化决策边界,其中对抗鲁棒正则项的计算允许未标注样本包含未见过类样本,从而使得元模型能更好地适应真实应用场景,降低对输入扰动的敏感性,提高对抗鲁棒性。实验结果表明,相比ADML、R-MAML-TRADES等当下主流的对抗元学习方法,semi-ARMAML方法在干净样本上准确率较高,在MiniImageNet数据集的5-way 1-shot与5-way 5-shot任务上对抗鲁棒性能分别约提升1.8%和2.7%,在CIFAR-FS数据集上分别约提升5.2%和8.1%。 相似文献