首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1744篇
  免费   453篇
  国内免费   282篇
电工技术   108篇
综合类   231篇
化学工业   34篇
金属工艺   22篇
机械仪表   62篇
建筑科学   224篇
矿业工程   187篇
能源动力   21篇
轻工业   18篇
水利工程   68篇
石油天然气   263篇
武器工业   19篇
无线电   222篇
一般工业技术   86篇
冶金工业   98篇
原子能技术   39篇
自动化技术   777篇
  2024年   34篇
  2023年   68篇
  2022年   127篇
  2021年   120篇
  2020年   143篇
  2019年   112篇
  2018年   77篇
  2017年   79篇
  2016年   80篇
  2015年   83篇
  2014年   127篇
  2013年   105篇
  2012年   145篇
  2011年   141篇
  2010年   114篇
  2009年   100篇
  2008年   95篇
  2007年   104篇
  2006年   119篇
  2005年   94篇
  2004年   58篇
  2003年   56篇
  2002年   34篇
  2001年   28篇
  2000年   30篇
  1999年   41篇
  1998年   26篇
  1997年   32篇
  1996年   24篇
  1995年   17篇
  1994年   16篇
  1993年   5篇
  1992年   8篇
  1991年   12篇
  1990年   5篇
  1989年   10篇
  1988年   3篇
  1987年   1篇
  1986年   2篇
  1984年   1篇
  1979年   1篇
  1978年   1篇
  1959年   1篇
排序方式: 共有2479条查询结果,搜索用时 15 毫秒
41.
A new image fusion scheme based on local accumulated gradient and PCA transform is presented. The image fusion process begins by taking the Dual tree complex wavelet transform of the source images. Then, the fused local detailed coefficients are chosen according to local accumulated gradient rule, and the fused approximate coefficients are acquired by selection or averaging rule based on PCA. Finally, the fused image can be obtained by taking the inverse dual tree complex wavelet transform of the fused composite coefficients. The experimental results show that the proposed method is an efficient approach to image fusion.  相似文献   
42.
基于灰色RBF神经网络模型的电梯层间交通分布预测   总被引:1,自引:0,他引:1  
为了有效预测电梯的层间交通分布状态,提出一种层间交通O-D矩阵的预测方法.该方法融合灰色预测和神经网络方法各自的优点,将灰色预测方法与RBF神经网络有机结合,构造灰色神经网络预测模型.利用灰色预测中的累加生成运算(accumulatedgeneratingoperation,AGO)对原始观测数据进行变换,得到规律性较强的累加数据,作为神经网络的建模和训练样本.还提出了对不良交通需求数据的修正方法,以进一步降低观测数据的随机性.所提方法既避免了灰色预测方法存在的理论误差,又提高了神经网络的训练速度和预测精度,适用于短期层间交通分布预测.仿真试验验证了该方法的有效性.  相似文献   
43.
风电场运行中产生了数量巨大的历史数据,而提升历史数据的质量是实现风电场高效智能运维的前提。为此,文中分析了风电场风功率数据的分布特征和形成机理,提出基于方差变化率判据-四分位法组合的风电场风功率异常数据识别方法。首先,利用物理规则对原始风功率曲线进行预处理,剔除明显异常的数据;然后,利用风功率方差变化率判据法识别并清洗风功率曲线的堆积型异常功率数据点,判据的阈值借助箱型图自动获取;同时,利用四分位法识别并清洗剩余的离散型异常数据点;最后,通过算例验证了所提算法的可行性。研究结果表明所提算法具有易实现、效率高和通用性强的优点,其异常识别效果优于局部离群因子(local outlier factor,LOF)算法和Thompson tau-四分位算法,其耗时比LOF和Thompson tau-四分位算法分别减少9.6 s和0.49 s,且在5个不同位置的风电场验证了所提算法的通用性。  相似文献   
44.
Contemporary attackers, mainly motivated by financial gain, consistently devise sophisticated penetration techniques to access important information or data. The growing use of Internet of Things (IoT) technology in the contemporary convergence environment to connect to corporate networks and cloud-based applications only worsens this situation, as it facilitates multiple new attack vectors to emerge effortlessly. As such, existing intrusion detection systems suffer from performance degradation mainly because of insufficient considerations and poorly modeled detection systems. To address this problem, we designed a blended threat detection approach, considering the possible impact and dimensionality of new attack surfaces due to the aforementioned convergence. We collectively refer to the convergence of different technology sectors as the internet of blended environment. The proposed approach encompasses an ensemble of heterogeneous probabilistic autoencoders that leverage the corresponding advantages of a convolutional variational autoencoder and long short-term memory variational autoencoder. An extensive experimental analysis conducted on the TON_IoT dataset demonstrated 96.02% detection accuracy. Furthermore, performance of the proposed approach was compared with various single model (autoencoder)-based network intrusion detection approaches: autoencoder, variational autoencoder, convolutional variational autoencoder, and long short-term memory variational autoencoder. The proposed model outperformed all compared models, demonstrating F1-score improvements of 4.99%, 2.25%, 1.92%, and 3.69%, respectively.  相似文献   
45.
Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS) is a monitoring system of the security of a network that detects suspicious activities and deals with a massive amount of data comprised of repetitive and inappropriate features which affect the detection rate. A feature selection (FS) technique helps to reduce the computation time and complexity by selecting the optimum subset of features. This paper proposes a method for detecting DDoS flooding attacks (FA) based on ICMPv6 messages using a Binary Flower Pollination Algorithm (BFPA-FA). The proposed method (BFPA-FA) employs FS technology with a support vector machine (SVM) to identify the most relevant, influential features. Moreover, The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios. The results show that the proposed method BFPA-FA achieved the best accuracy rate (97.96%) for the ICMPv6 DDoS detection with a reduced number of features (9) to half the total (19) features. The proven proposed method BFPA-FA is effective in the ICMPv6 DDoS attacks via IDS.  相似文献   
46.
无标签的序列在异常检测算法中往往存在着对数据的信息掌握不全面、不能合理使用的情况,而采用深度学习的技术实现检测时往往对其计算的解释性欠佳;对于攻克这些难题,以直升机飞行数据为例对时间序列的反常检测问题展开了深入研究,并利用Iforest技术和PCA算法,给出了一个采用滑动窗口的时间序列异常检测方法,利用从滑动窗口采集信息的时间变化状态等数据信息,将序列异常检测问题转换为点异常检测问题;同时以auc评分为衡量标准,从带有时刻特殊标志的多个信息集上检验了检测效率的提高;在无标签的直升机飞行数据集上进行实验,验证了算法的有效性,并通过对比检测过程中不同特征变量的变化情况,从算法层面和现实层面上阐述了算法的可解释性。  相似文献   
47.
流量异常检测能够有效识别网络流量数据中的攻击行为,是一种重要的网络安全防护手段。近年来,深度学习在流量异常检测领域得到了广泛应用,现有的深度学习模型进行流量异常检测存在两个问题:一是数据受噪声影响导致检测鲁棒性差、准确率低;二是数据特征维度高以及模型参数多导致训练和检测速度慢。为了在降低流量数据噪声影响的基础上提高检测速度和准确性,本文提出了一种基于去噪自编码器(Denoising Auto Encoder,DAE)和门控循环单元(Gated Recurrent Unit,GRU)组合的流量异常检测方法。首先设计了基于DAE的流量特征提取算法,采用小批量梯度下降算法对DAE进行训练,通过最小化含噪声数据的重构向量与原始输入向量间的差异,有效提取具有较强鲁棒性的流量特征,降低特征维度。然后设计了基于GRU的异常检测算法,利用提取的低维流量特征数据训练GRU,从而构建异常流量分类器,实现对攻击流量的准确检测。最后在NSL-KDD、UNSW-NB15、CICIDS2017数据集上的实验结果表明:与其他的机器学习、深度学习方法相比,本文所提方法的检测准确率最大提升了18.71%。同时,本文方法可以实现较高的精确率、召回率和检测效率,同时具有较低的误报率。在面对数据受到噪声破坏时,具有较强的检测鲁棒性。  相似文献   
48.
李可欣  郭健  王宇君  李宗明  缪坤  陈辉 《包装工程》2023,44(11):284-292
目的 有效分析和探索海洋船舶时空轨迹行为模式,提高船舶轨迹聚类的效率与质量,更好地检测真实船舶的异常行为。方法 针对当前船舶轨迹数据研究中存在的对多维特征信息利用不足、检测效率不高、检测精度较差等问题,提出一种精确度高、能自主识别分析多维特征的船舶异常轨迹识别方法。首先利用随机森林分类器评估多维特征重要性,构建轨迹特征的最优组合;然后提出一种降维密度聚类方法,将T–分布随机邻域嵌入(T–SNE)和自适应密度聚类(DBSCAN)模型结合,通过构建特征选择层和无监督聚类层实现对数据元素非线性关系的高效提取以及对聚类参数的智能选择;最后根据聚类结果构建类簇特征向量,计算距离阈值判别轨迹相似度,实现轨迹异常检测模型的构建。结果 以UCI数据集为例,降维密度聚类方法对4、13、30、64维特征数据集的F1分数能达到0.9 048、0.9 534、0.8 218、0.6 627,多个聚类指标均优于DBSCAN、K–Means等常见聚类算法的。结论 研究结果表明,降维密度聚类方法能有效提取数据多维特征结构,实现聚类参数自适应,弥补密度聚类中参数难以确定的问题,有效实现对多种类型船舶轨迹异常的识别。  相似文献   
49.
Sensors produce a large amount of multivariate time series data to record the states of Internet of Things (IoT) systems. Multivariate time series timestamp anomaly detection (TSAD) can identify timestamps of attacks and malfunctions. However, it is necessary to determine which sensor or indicator is abnormal to facilitate a more detailed diagnosis, a process referred to as fine-grained anomaly detection (FGAD). Although further FGAD can be extended based on TSAD methods, existing works do not provide a quantitative evaluation, and the performance is unknown. Therefore, to tackle the FGAD problem, this paper first verifies that the TSAD methods achieve low performance when applied to the FGAD task directly because of the excessive fusion of features and the ignoring of the relationship’s dynamic changes between indicators. Accordingly, this paper proposes a multivariate time series fine-grained anomaly detection (MFGAD) framework. To avoid excessive fusion of features, MFGAD constructs two sub-models to independently identify the abnormal timestamp and abnormal indicator instead of a single model and then combines the two kinds of abnormal results to detect the fine-grained anomaly. Based on this framework, an algorithm based on Graph Attention Neural Network (GAT) and Attention Convolutional Long-Short Term Memory (A-ConvLSTM) is proposed, in which GAT learns temporal features of multiple indicators to detect abnormal timestamps and A-ConvLSTM captures the dynamic relationship between indicators to identify abnormal indicators. Extensive simulations on a real-world dataset demonstrate that the proposed algorithm can achieve a higher F1 score and hit rate than the extension of existing TSAD methods with the benefit of two independent sub-models for timestamp and indicator detection.  相似文献   
50.
We consider the problem of prioritizing a collection of discrete pieces of information, or transactions. The goal is to rank the transactions in such a way that the user can best pursue a subset of the transactions in hopes of discovering those which were generated by an interesting source. The problem is shown to differ from traditional classification in several fundamental ways. Ranking algorithms are divided into classes, depending on the amount of information they may utilize. We demonstrate that while ranking by the least constrained algorithm class is consistent with classification, such is not the case for a more constrained class of algorithms. We demonstrate also that while optimal ranking by the former class is easy, optimal ranking by the latter class is NP-hard. Finally, we present detectors which solve optimally restricted versions of the ranking problem, including symmetric anomaly detection.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号