全文获取类型
收费全文 | 2892篇 |
免费 | 493篇 |
国内免费 | 406篇 |
专业分类
电工技术 | 72篇 |
综合类 | 394篇 |
化学工业 | 52篇 |
金属工艺 | 7篇 |
机械仪表 | 32篇 |
建筑科学 | 91篇 |
矿业工程 | 89篇 |
能源动力 | 21篇 |
轻工业 | 13篇 |
水利工程 | 125篇 |
石油天然气 | 72篇 |
武器工业 | 5篇 |
无线电 | 503篇 |
一般工业技术 | 85篇 |
冶金工业 | 39篇 |
原子能技术 | 3篇 |
自动化技术 | 2188篇 |
出版年
2024年 | 11篇 |
2023年 | 48篇 |
2022年 | 71篇 |
2021年 | 80篇 |
2020年 | 93篇 |
2019年 | 64篇 |
2018年 | 52篇 |
2017年 | 68篇 |
2016年 | 68篇 |
2015年 | 86篇 |
2014年 | 159篇 |
2013年 | 149篇 |
2012年 | 229篇 |
2011年 | 251篇 |
2010年 | 228篇 |
2009年 | 302篇 |
2008年 | 353篇 |
2007年 | 369篇 |
2006年 | 332篇 |
2005年 | 257篇 |
2004年 | 221篇 |
2003年 | 135篇 |
2002年 | 72篇 |
2001年 | 31篇 |
2000年 | 20篇 |
1999年 | 11篇 |
1998年 | 6篇 |
1997年 | 5篇 |
1996年 | 5篇 |
1995年 | 6篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1988年 | 1篇 |
1986年 | 1篇 |
1958年 | 1篇 |
排序方式: 共有3791条查询结果,搜索用时 31 毫秒
91.
92.
93.
在高速网络环境中,对复杂多样的网络入侵进行快速准确的检测成为目前亟待解决的问题。联邦学习作为一种新兴技术,在缩短入侵检测时间与提高数据安全性上取得了很好的效果,同时深度神经网络(DNN)在处理海量数据时具有较好的并行计算能力。结合联邦学习框架并将基于自动编码器优化的DNN作为通用模型,建立一种网络入侵检测模型DFC-NID。对初始数据进行符号数据预处理与归一化处理,使用自动编码器技术对DNN实现特征降维,以得到DNN通用模型模块。利用联邦学习特性使得多个参与方使用通用模型参与训练,训练完成后将参数上传至中心服务器并不断迭代更新通用模型,通过Softmax分类器得到最终的分类预测结果。实验结果表明,DFC-NID模型在NSL-KDD与KDDCup99数据集上的准确率平均达到94.1%,与决策树、随机森林等常用入侵检测模型相比,准确率平均提升3.1%,在攻击类DoS与Probe上,DFC-NID的准确率分别达到99.8%与98.7%。此外,相较不使用联邦学习的NO-FC模型,DFC-NID减少了83.9%的训练时间。 相似文献
94.
The technological innovations and wide use of Wireless Sensor Network (WSN) applications need to handle diverse data. These huge data possess network security issues as intrusions that cannot be neglected or ignored. An effective strategy to counteract security issues in WSN can be achieved through the Intrusion Detection System (IDS). IDS ensures network integrity, availability, and confidentiality by detecting different attacks. Regardless of efforts by various researchers, the domain is still open to obtain an IDS with improved detection accuracy with minimum false alarms to detect intrusions. Machine learning models are deployed as IDS, but their potential solutions need to be improved in terms of detection accuracy. The neural network performance depends on feature selection, and hence, it is essential to bring an efficient feature selection model for better performance. An optimized deep learning model has been presented to detect different types of attacks in WSN. Instead of the conventional parameter selection procedure for Convolutional Neural Network (CNN) architecture, a nature-inspired whale optimization algorithm is included to optimize the CNN parameters such as kernel size, feature map count, padding, and pooling type. These optimized features greatly improved the intrusion detection accuracy compared to Deep Neural network (DNN), Random Forest (RF), and Decision Tree (DT) models. 相似文献
95.
Contemporary attackers, mainly motivated by financial gain, consistently devise sophisticated penetration techniques to access important information or data. The growing use of Internet of Things (IoT) technology in the contemporary convergence environment to connect to corporate networks and cloud-based applications only worsens this situation, as it facilitates multiple new attack vectors to emerge effortlessly. As such, existing intrusion detection systems suffer from performance degradation mainly because of insufficient considerations and poorly modeled detection systems. To address this problem, we designed a blended threat detection approach, considering the possible impact and dimensionality of new attack surfaces due to the aforementioned convergence. We collectively refer to the convergence of different technology sectors as the internet of blended environment. The proposed approach encompasses an ensemble of heterogeneous probabilistic autoencoders that leverage the corresponding advantages of a convolutional variational autoencoder and long short-term memory variational autoencoder. An extensive experimental analysis conducted on the TON_IoT dataset demonstrated 96.02% detection accuracy. Furthermore, performance of the proposed approach was compared with various single model (autoencoder)-based network intrusion detection approaches: autoencoder, variational autoencoder, convolutional variational autoencoder, and long short-term memory variational autoencoder. The proposed model outperformed all compared models, demonstrating F1-score improvements of 4.99%, 2.25%, 1.92%, and 3.69%, respectively. 相似文献
96.
Khaled M. Alalayah Fatma S. Alrayes Jaber S. Alzahrani Khadija M. Alaidarous Ibrahim M. Alwayle Heba Mohsen Ibrahim Abdulrab Ahmed Mesfer Al Duhayyim 《计算机系统科学与工程》2023,46(3):3121-3139
With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL) can be employed to identify anonymous intrusions. Therefore, the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection (HGSODL-ID) model for the IIoT environment. The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format. The HGSO algorithm is employed for Feature Selection (HGSO-FS) to reduce the curse of dimensionality. Moreover, Sparrow Search Optimization (SSO) is utilized with a Graph Convolutional Network (GCN) to classify and identify intrusions in the network. Finally, the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model. The proposed HGSODL-ID model was experimentally validated using a benchmark dataset, and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches. 相似文献
97.
互联网快速发展使得网络空间越来越复杂,网络入侵导致网络安全问题备受关注。为提升网络入侵的检测效率和精度,构建了基于支持向量机的网络入侵检测模型。支持向量机模型的惩罚系数和核函数参数直接影响入侵模型的检测精度,采用麻雀搜索算法对惩罚系数和核函数参数进行优化,提出了基于麻雀搜索算法和支持向量机的网络入侵检测模型。将提出的网络入侵检测模型应用于实际的网络入侵检测中,并与PSO-SVM和SVM模型进行对比。结果表明,所提出的网络入侵检测模型能够有效降低网络入侵的误报率,这对确保网络安全具有一定的现实意义。 相似文献
98.
轨道车智能防护会涉及轨道车侵入物检测与行驶区域分割任务,在深度学习领域已有针对各任务的算法,却无法很好满足多任务情形时的需求.该算法使用轻量级卷积神经网络(CNN)作为编码器提取特征图,随之将特征图送到两个基于one-stage检测网络的解码器中,进而完成各自的任务.不同级别和尺度的语义特征在编码器输出的特征图中被融合,良好地完成像素级语义预测,在检测和分割效果上有明显提升.采用本算法的设备将掌握对新目标的识别检测判断与追踪,为提升轨道车行驶安全做出保障. 相似文献
99.
白鹤滩大坝的建设使用了低热水泥混凝土,为了解它在干燥养护下的特性,本研究探讨了低热水泥混凝土干燥养护下的抗压强度与劈裂抗拉强度发展规律,并通过扫描电镜和压汞法分析微观形貌与孔结构。结果表明:相比标准养护,在干燥养护下低热水泥混凝土28 d抗压强度损失33.3%,劈裂抗拉强度损失31.6%,且水化产物较少、混凝土孔隙率和孔体积会明显增大、孔隙总面积减小,孔径分布以100~1000 nm的大孔为主。本研究表明干燥养护不利于低热水泥混凝土微观结构与强度发展,可为大坝混凝土的养护与强度提供依据。 相似文献
100.
Salam Al-E’mari Mohammed Anbar Yousef Sanjalawe Selvakumar Manickam Iznan Hasbullah 《计算机系统科学与工程》2022,40(1):87-102
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are. Recently, blockchain was integrated into intrusion detection systems to enhance their overall performance. Blockchain has also been adopted in healthcare, supply chain management, and the Internet of Things. Blockchain uses robust cryptography with private and public keys, and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party. To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology. Furthermore, a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented. Finally, this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology. 相似文献