全文获取类型
收费全文 | 486篇 |
免费 | 96篇 |
国内免费 | 83篇 |
专业分类
电工技术 | 3篇 |
综合类 | 50篇 |
化学工业 | 46篇 |
机械仪表 | 6篇 |
建筑科学 | 12篇 |
矿业工程 | 2篇 |
能源动力 | 12篇 |
轻工业 | 10篇 |
石油天然气 | 3篇 |
武器工业 | 1篇 |
无线电 | 132篇 |
一般工业技术 | 17篇 |
冶金工业 | 5篇 |
原子能技术 | 12篇 |
自动化技术 | 354篇 |
出版年
2024年 | 4篇 |
2023年 | 7篇 |
2022年 | 31篇 |
2021年 | 28篇 |
2020年 | 29篇 |
2019年 | 10篇 |
2018年 | 18篇 |
2017年 | 25篇 |
2016年 | 23篇 |
2015年 | 41篇 |
2014年 | 76篇 |
2013年 | 50篇 |
2012年 | 58篇 |
2011年 | 62篇 |
2010年 | 49篇 |
2009年 | 39篇 |
2008年 | 29篇 |
2007年 | 25篇 |
2006年 | 17篇 |
2005年 | 19篇 |
2004年 | 10篇 |
2003年 | 6篇 |
2002年 | 1篇 |
2001年 | 3篇 |
1998年 | 1篇 |
1996年 | 1篇 |
1991年 | 1篇 |
1981年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有665条查询结果,搜索用时 46 毫秒
141.
142.
143.
Muhammad Asim Mubarik Zhijian Wang Yunyoung Nam Seifedine Kadry Muhammad Azam waqar 《计算机系统科学与工程》2021,37(2):169-186
In this research, we developed a plugin for our automated digital forensics framework to extract and preserve the evidence from the Android and the IOS-based mobile phone application, Instagram. This plugin extracts personal details from Instagram users, e.g., name, user name, mobile number, ID, direct text or audio, video, and picture messages exchanged between different Instagram users. While developing the plugin, we identified resources available in both Android and IOS-based devices holding key forensics artifacts. We highlighted the poor privacy scheme employed by Instagram. This work, has shown how the sensitive data posted in the Instagram mobile application can easily be reconstructed, and how the traces, as well as the URL links of visual messages, can be used to access the privacy of any Instagram user without any critical credential verification. We also employed the anti-forensics method on the Instagram Android’s application and were able to restore the application from the altered or corrupted database file, which any criminal mind can use to set up or trap someone else. The outcome of this research is a plugin for our digital forensics ready framework software which could be used by law enforcement and regulatory agencies to reconstruct the digital evidence available in the Instagram mobile application directories on both Android and IOS-based mobile phones. 相似文献
144.
Star & Horizon sensor based autonomous navigation methods play an increasingly important role in spacecraft celestial navigation. However,the measurements of star sensors and horizon sensor are frequently affected by uncertain noises from space environment. To improve the estimation precision,a state estimation algorithm named Switch Strong Tracking Unscented Kalman Filter( SSTUKF) is presented. Firstly,the adaptive fading factor is deduced through the adoption of unknown instrumental diagonal matrixes to real time rectify the measurement covariance matrix. Secondly,according to the deduction of Chebyshev law of large numbers,innovation criterion is introduced during estimation to decrease the unnecessary calculation. Finally,SSTUKF is suggested through the adoption of adaptive fading factor and innovation criterion. The filter can switch between the normal filter mode and adaptive filter mode. As the calculation of innovation criterion is less than the adaptive fading factor,SSTUKF improves the estimation efficiency. To demonstrate the effectiveness,SSTUKF is applied to Star & Horizon sensor based autonomous navigation system with uncertain measurement noises. The simulation results verify the proposed algorithm. 相似文献
145.
研究了计算机动态取证的相关技术,提出了一个计算机动态取证系统模型并对相关模块进行设计。根据动态取证的特点,将数据挖掘技术和多智能代理技术结合起来应用于动态取证系统中,系统在体系结构上使用基于智能代理的分布式结构,采用数据挖掘技术进行动态取证的海量数据分析,针对基本挖掘算法在取证分析实际应用中可能存在的不足,提出了相应的改进方法,通过实验分析,证明了改进算法在动态取证应用中的有效性。 相似文献
146.
147.
网络信息监控与取证的核心技术是目前保障网络安全最有效的应用技术。针对网络文化信息监控的需要和监控的特点,在现有监控技术基础上,对监控与取证技术的新内涵进行了简要介绍,对几种监控与取证的核心技术进行了仿真分析,采用原理推论的方法,得出了5种监控应用技术的应用范围、适用性及其特点,以及监控与取证的最终目的在于信息审计与证据留存的结论,提出了在线监控网络文化信息系统建设的新的建议。 相似文献
148.
149.
Peter Frühwirt Peter Kieseberg Sebastian Schrittwieser Markus Huber Edgar Weippl 《Information Security Technical Report》2013,17(4):227-238
The InnoDB storage engine is one of the most widely used storage engines for MySQL. This paper discusses possibilities of utilizing the redo logs of InnoDB databases for forensic analysis, as well as the extraction of the information needed from the MySQL definition files, in order to carry out this kind of analysis. Since the redo logs are internal log files of the storage engine and thus cannot easily be changed undetected, this forensic method can be very useful against adversaries with administrator privileges, which could otherwise cover their tracks by manipulating traditional log files intended for audit and control purposes. Based on a prototype implementation, we show methods for recovering Insert, Delete and Update statements issued against a database. 相似文献
150.
随着计算机技术的发展,借助计算机及网络等高科技的犯罪事件逐年增加,危害也越来越大。为了打击计算机犯罪,计算机取证技术应运而生。文章设计并实现了一款基于Windows的电子证据收集与还原系统。该系统主要采用AES算法,基于RSA的数字签名、MD5散列算法及密钥分配与管理等技术,实现从海量信息中有效快速地收集电子证据,同时还确保了电子证据从提取到分析过程中的有效性、完整性和防篡改性,使得收集的电子证据更具有证明力。通过测试与分析,证明了该系统设计合理、效率高、操作简单,具有很强的实用性。 相似文献