首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8745篇
  免费   364篇
  国内免费   332篇
电工技术   241篇
综合类   291篇
化学工业   540篇
金属工艺   183篇
机械仪表   626篇
建筑科学   542篇
矿业工程   516篇
能源动力   244篇
轻工业   695篇
水利工程   104篇
石油天然气   466篇
武器工业   67篇
无线电   706篇
一般工业技术   1124篇
冶金工业   245篇
原子能技术   376篇
自动化技术   2475篇
  2024年   21篇
  2023年   74篇
  2022年   245篇
  2021年   190篇
  2020年   188篇
  2019年   116篇
  2018年   142篇
  2017年   172篇
  2016年   257篇
  2015年   280篇
  2014年   535篇
  2013年   480篇
  2012年   566篇
  2011年   718篇
  2010年   587篇
  2009年   515篇
  2008年   522篇
  2007年   569篇
  2006年   550篇
  2005年   501篇
  2004年   402篇
  2003年   377篇
  2002年   262篇
  2001年   196篇
  2000年   209篇
  1999年   169篇
  1998年   101篇
  1997年   109篇
  1996年   86篇
  1995年   61篇
  1994年   51篇
  1993年   32篇
  1992年   36篇
  1991年   24篇
  1990年   28篇
  1989年   18篇
  1988年   7篇
  1987年   10篇
  1986年   6篇
  1985年   9篇
  1984年   6篇
  1983年   7篇
  1981年   1篇
  1980年   4篇
  1977年   1篇
  1973年   1篇
排序方式: 共有9441条查询结果,搜索用时 15 毫秒
81.
The rapid development of network communication along with the drastic increase in the number of smart devices has triggered a surge in network traffic, which can contain private data and in turn affect user privacy. Recently, Federated Learning (FL) has been proposed in Intrusion Detection Systems (IDS) to ensure attack detection, privacy preservation, and cost reduction, which are crucial issues in traditional centralized machine-learning-based IDS. However, FL-based approaches still exhibit vulnerabilities that can be exploited by adversaries to compromise user data. At the same time, meta-models (including the blending models) have been recognized as one of the solutions to improve generalization for attack detection and classification since they enhance generalization and predictive performances by combining multiple base models. Therefore, in this paper, we propose a Federated Blending model-driven IDS framework for the Internet of Things (IoT) and Industrial IoT (IIoT), called F-BIDS, in order to further protect the privacy of existing ML-based IDS. The proposition consists of a Decision Tree (DT) and Random Forest (RF) as base classifiers to first produce the meta-data. Then, the meta-classifier, which is a Neural Networks (NN) model, uses the meta-data during the federated training step, and finally, it makes the final classification on the test set. Specifically, in contrast to the classical FL approaches, the federated meta-classifier is trained on the meta-data (composite data) instead of user-sensitive data to further enhance privacy. To evaluate the performance of F-BIDS, we used the most recent and open cyber-security datasets, called Edge-IIoTset (published in 2022) and InSDN (in 2020). We chose these datasets because they are recent datasets and contain a large amount of network traffic including both malicious and benign traffic.  相似文献   
82.
Understanding the traffic patterns of construction workers on high-risk construction sites is important for implementing behaviour-based safety management. However, safety risks in worker trajectories are a complex system with high uncertainty. This resulted in few studies focusing on analysing the spatial–temporal risk in workers' trajectories from a systematic perspective. This study designs a new framework to explore the spatial–temporal patterns of safety risks in the trajectories of construction workers based on complex network theory. First, an integrated site safety risk classification method by combining hazard sources and group trajectory distribution is developed to accurately describe the spatial distribution of site risks. Second, a new complex network chronnet is used to construct complex networks containing risk information for spatial–temporal analysis. Finally, key risk areas and risk transition patterns are identified through the analysis of network measures. The study also developed a computational program that allows the network to be constructed and analysed in real-time. The feasibility and effectiveness of the method are verified through a case study. The results show that the method can reveal the risk distribution at the micro level, and explore the risk clustering and transition features in worker trajectories at the macro level. The study allows for an accurate analysis of dynamic risk patterns in construction workers' trajectories from a systematic perspective. It can also provide theoretical and practical support for personalized and adaptive behaviour-based safety management for construction workers.  相似文献   
83.
While workers’ safety risk tolerances have been regarded as a main reason for their unsafe behaviors, little is known about why different people have different risk tolerances even when confronting the same situation. The aim of this research is to identify the critical factors and paths that influence workers’ safety risk tolerance and to explore how they contribute to accident causal model from a system thinking perceptive. A number of methods were carried out to analyze the data collected through interviews and questionnaire surveys. In the first and second steps of the research, factor identification, factor ranking and factor analysis were carried out, and the results show that workers’ safety risk tolerance can be influenced by four groups of factors, namely: (1) personal subjective perception; (2) work knowledge and experiences; (3) work characteristics; and (4) safety management. In the third step of the research, hypothetical influencing path model was developed and tested by using structural equation modeling (SEM). It is found that the effects of external factors (safety management and work characteristics) on risk tolerance are larger than that of internal factors (personal subjective perception and work knowledge & experiences). Specifically, safety management contributes the most to workers’ safety risk tolerance through its direct effect and indirect effect; while personal subjective perception comes the second and can act as an intermedia for work characteristics. This research provides an in-depth insight of workers’ unsafe behaviors by depicting the contributing factors as shown in the accident causal model developed in this research.  相似文献   
84.
The primary objective of this study was to evaluate the effects of parallelogram-shaped pavement markings on vehicle speed and crashes in the vicinity of urban pedestrian crosswalks. The research team measured speed data at twelve sites, and crash data at eleven sites. Observational cross-sectional studies were conducted to identify if the effects of parallelogram-shaped pavement markings on vehicle speeds and speed violations were statistically significant. The results showed that parallelogram-shaped pavement markings significantly reduced vehicle speeds and speed violations in the vicinity of pedestrian crosswalks. More specifically, the speed reduction effects varied from 1.89 km/h to 4.41 km/h with an average of 3.79 km/h. The reduction in the 85th percentile speed varied from 0.81 km/h to 5.34 km/h with an average of 4.19 km/h. Odds ratios (OR) showed that the parallelogram-shaped pavement markings had effects of a 7.1% reduction in the mean speed and a 6.9% reduction in the 85th percentile speed at the pedestrian crosswalks. The reduction of proportion of drivers exceeding the speed limit varied from 8.64% to 14.15% with an average of 11.03%. The results of the crash data analysis suggested that the use of parallelogram-shaped pavement markings reduced both the frequency and severity of crashes at pedestrian crosswalks. The parallelogram-shaped pavement markings had a significant effect on reducing the vehicle–pedestrian crashes. Two crash prediction models were developed for vehicle–pedestrian crashes and rear-end crashes. According to the crash models, the presence of parallelogram-shaped pavement markings reduced vehicle–pedestrian crashes at pedestrian crosswalks by 24.87% with a 95% confidence interval of [10.06–30.78%]. However, the model results also showed that the presence of parallelogram-shaped pavement markings increased rear-end crashes at pedestrian crosswalks by 5.4% with a 95% confidence interval of [0–11.2%].  相似文献   
85.
主要研究Windows平台下异常检测方法,提出了一种利用Windows Native API调用序列和基于贝叶斯树算法的主机服务进程规则和对应概率分布的生成算法,并建立正常模型.根据长为N-1的Windows Native APIs调用序列预测第N个调用的概率分布,对生成的概率序列用U检验方法作为异常检测算法.实验结果...  相似文献   
86.
The European Directive on computer work (VDU 90/270/EEC) is implemented in the Finnish Government Decree. The aim of the present study was to evaluate the effects of the legislation and its applications in practice. The quantitative method used an online questionnaire. The respondents were employers (N = 934), employees (N = 1872) and occupational health care (OHC) units (N = 289). The majority of all these three groups considered the provisions clear and easy to understand, comprehensive, and easy to comply with. The provisions had a great impact on preventing mental overloading, arranging sight tests at the employer's cost, and on the refunding of eyeglasses for computer work. Most employers felt they did not need any more specific provisions, whereas half of the employees and OHC professionals would have liked the provisions to be more detailed. More explicit and specific regulations were also needed for practice applications in particular, as well as for the refunding of the costs of special eyeglasses for computer work. A total of 59% of the employers reported that costs of glasses are refunded, whereas the figure for employees was clearly lower (37%). OHC professionals reported that the costs of glasses were refunded in 82% of their customer workplaces. The practical conclusion is that employees' sight examinations and compensation for eyeglasses should be promoted in computer work. Moreover, ergonomic applications are best carried out in co-operation with OHC personnel.  相似文献   
87.
Multi-spectral fusion for surveillance systems   总被引:1,自引:0,他引:1  
Surveillance systems such as object tracking and abandoned object detection systems typically rely on a single modality of colour video for their input. These systems work well in controlled conditions but often fail when low lighting, shadowing, smoke, dust or unstable backgrounds are present, or when the objects of interest are a similar colour to the background. Thermal images are not affected by lighting changes or shadowing, and are not overtly affected by smoke, dust or unstable backgrounds. However, thermal images lack colour information which makes distinguishing between different people or objects of interest within the same scene difficult.By using modalities from both the visible and thermal infrared spectra, we are able to obtain more information from a scene and overcome the problems associated with using either modality individually. We evaluate four approaches for fusing visual and thermal images for use in a person tracking system (two early fusion methods, one mid fusion and one late fusion method), in order to determine the most appropriate method for fusing multiple modalities. We also evaluate two of these approaches for use in abandoned object detection, and propose an abandoned object detection routine that utilises multiple modalities. To aid in the tracking and fusion of the modalities we propose a modified condensation filter that can dynamically change the particle count and features used according to the needs of the system.We compare tracking and abandoned object detection performance for the proposed fusion schemes and the visual and thermal domains on their own. Testing is conducted using the OTCBVS database to evaluate object tracking, and data captured in-house to evaluate the abandoned object detection. Our results show that significant improvement can be achieved, and that a middle fusion scheme is most effective.  相似文献   
88.
基于Snort的IPv6入侵检测技术   总被引:1,自引:0,他引:1       下载免费PDF全文
针对开源入侵检测系统Snort没有提供对IPv6协议的AH和ESP扩展首部支持的问题,提出利用Snort检测ESP加密报文的解决方案。构造ESP检测规则,在Snort协议分析模块加入DecodeESP()函数并添加密钥管理模块,实现Snort对IPv6报文中ESP扩展报头的解析,管理其产生的密钥。给出一种面向ESP的入侵检测系统模型,以验证IPv6加密通信入侵检测的可行性,并给出实验验证过程。  相似文献   
89.
周剑玲  王秀艳 《计算机工程》2010,36(10):181-183
鉴于动态r匹配算法对为了提高入侵检测系统的性能的重要性,通过研究内分泌系统对生物体内环境的调节机制,提出一个内分泌激素浓度的动态平衡模型及一种基于激素浓度调节的动态r匹配算法。仿真实验结果表明,该匹配算法能根据网络状态的变化,自适应地调整匹配参数,具有较好的匹配效果。  相似文献   
90.
浅议网站的安全及应对策略   总被引:1,自引:0,他引:1  
网站发展的迅猛,虽然方便了很多行业,但同时安全隐患也随之而生。病毒、黑客程序、邮件炸弹、远程侦听等日益猖獗,由此引起网站安全问题日益严重。如何保护计算机信息安全,也即信息内容的保密问题显得越来越重要。本文介绍了目前网站中主要存在的不安全因素,并在提出了相应有利于保护网站的安全应对策略。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号