首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4293篇
  免费   630篇
  国内免费   538篇
电工技术   192篇
综合类   473篇
化学工业   428篇
金属工艺   263篇
机械仪表   122篇
建筑科学   259篇
矿业工程   105篇
能源动力   90篇
轻工业   93篇
水利工程   153篇
石油天然气   104篇
武器工业   12篇
无线电   540篇
一般工业技术   261篇
冶金工业   80篇
原子能技术   64篇
自动化技术   2222篇
  2024年   22篇
  2023年   95篇
  2022年   137篇
  2021年   138篇
  2020年   146篇
  2019年   117篇
  2018年   90篇
  2017年   127篇
  2016年   128篇
  2015年   143篇
  2014年   261篇
  2013年   244篇
  2012年   349篇
  2011年   356篇
  2010年   309篇
  2009年   405篇
  2008年   412篇
  2007年   465篇
  2006年   421篇
  2005年   327篇
  2004年   271篇
  2003年   176篇
  2002年   98篇
  2001年   53篇
  2000年   42篇
  1999年   28篇
  1998年   13篇
  1997年   19篇
  1996年   11篇
  1995年   16篇
  1994年   3篇
  1993年   4篇
  1992年   7篇
  1991年   2篇
  1990年   1篇
  1988年   1篇
  1987年   1篇
  1986年   4篇
  1985年   10篇
  1984年   2篇
  1983年   1篇
  1982年   1篇
  1979年   1篇
  1959年   1篇
  1958年   1篇
  1951年   2篇
排序方式: 共有5461条查询结果,搜索用时 31 毫秒
101.
With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL) can be employed to identify anonymous intrusions. Therefore, the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection (HGSODL-ID) model for the IIoT environment. The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format. The HGSO algorithm is employed for Feature Selection (HGSO-FS) to reduce the curse of dimensionality. Moreover, Sparrow Search Optimization (SSO) is utilized with a Graph Convolutional Network (GCN) to classify and identify intrusions in the network. Finally, the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model. The proposed HGSODL-ID model was experimentally validated using a benchmark dataset, and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches.  相似文献   
102.
互联网快速发展使得网络空间越来越复杂,网络入侵导致网络安全问题备受关注。为提升网络入侵的检测效率和精度,构建了基于支持向量机的网络入侵检测模型。支持向量机模型的惩罚系数和核函数参数直接影响入侵模型的检测精度,采用麻雀搜索算法对惩罚系数和核函数参数进行优化,提出了基于麻雀搜索算法和支持向量机的网络入侵检测模型。将提出的网络入侵检测模型应用于实际的网络入侵检测中,并与PSO-SVM和SVM模型进行对比。结果表明,所提出的网络入侵检测模型能够有效降低网络入侵的误报率,这对确保网络安全具有一定的现实意义。  相似文献   
103.
轨道车智能防护会涉及轨道车侵入物检测与行驶区域分割任务,在深度学习领域已有针对各任务的算法,却无法很好满足多任务情形时的需求.该算法使用轻量级卷积神经网络(CNN)作为编码器提取特征图,随之将特征图送到两个基于one-stage检测网络的解码器中,进而完成各自的任务.不同级别和尺度的语义特征在编码器输出的特征图中被融合,良好地完成像素级语义预测,在检测和分割效果上有明显提升.采用本算法的设备将掌握对新目标的识别检测判断与追踪,为提升轨道车行驶安全做出保障.  相似文献   
104.
白鹤滩大坝的建设使用了低热水泥混凝土,为了解它在干燥养护下的特性,本研究探讨了低热水泥混凝土干燥养护下的抗压强度与劈裂抗拉强度发展规律,并通过扫描电镜和压汞法分析微观形貌与孔结构。结果表明:相比标准养护,在干燥养护下低热水泥混凝土28 d抗压强度损失33.3%,劈裂抗拉强度损失31.6%,且水化产物较少、混凝土孔隙率和孔体积会明显增大、孔隙总面积减小,孔径分布以100~1000 nm的大孔为主。本研究表明干燥养护不利于低热水泥混凝土微观结构与强度发展,可为大坝混凝土的养护与强度提供依据。  相似文献   
105.
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are. Recently, blockchain was integrated into intrusion detection systems to enhance their overall performance. Blockchain has also been adopted in healthcare, supply chain management, and the Internet of Things. Blockchain uses robust cryptography with private and public keys, and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party. To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology. Furthermore, a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented. Finally, this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology.  相似文献   
106.
107.
With the recent developments in the Internet of Things (IoT), the amount of data collected has expanded tremendously, resulting in a higher demand for data storage, computational capacity, and real-time processing capabilities. Cloud computing has traditionally played an important role in establishing IoT. However, fog computing has recently emerged as a new field complementing cloud computing due to its enhanced mobility, location awareness, heterogeneity, scalability, low latency, and geographic distribution. However, IoT networks are vulnerable to unwanted assaults because of their open and shared nature. As a result, various fog computing-based security models that protect IoT networks have been developed. A distributed architecture based on an intrusion detection system (IDS) ensures that a dynamic, scalable IoT environment with the ability to disperse centralized tasks to local fog nodes and which successfully detects advanced malicious threats is available. In this study, we examined the time-related aspects of network traffic data. We presented an intrusion detection model based on a two-layered bidirectional long short-term memory (Bi-LSTM) with an attention mechanism for traffic data classification verified on the UNSW-NB15 benchmark dataset. We showed that the suggested model outperformed numerous leading-edge Network IDS that used machine learning models in terms of accuracy, precision, recall and F1 score.  相似文献   
108.
Blockchain merges technology with the Internet of Things (IoT) for addressing security and privacy-related issues. However, conventional blockchain suffers from scalability issues due to its linear structure, which increases the storage overhead, and Intrusion detection performed was limited with attack severity, leading to performance degradation. To overcome these issues, we proposed MZWB (Multi-Zone-Wise Blockchain) model. Initially, all the authenticated IoT nodes in the network ensure their legitimacy by using the Enhanced Blowfish Algorithm (EBA), considering several metrics. Then, the legitimately considered nodes for network construction for managing the network using Bayesian-Direct Acyclic Graph (B-DAG), which considers several metrics. The intrusion detection is performed based on two tiers. In the first tier, a Deep Convolution Neural Network (DCNN) analyzes the data packets by extracting packet flow features to classify the packets as normal, malicious, and suspicious. In the second tier, the suspicious packets are classified as normal or malicious using the Generative Adversarial Network (GAN). Finally, intrusion scenario performed reconstruction to reduce the severity of attacks in which Improved Monkey Optimization (IMO) is used for attack path discovery by considering several metrics, and the Graph cut utilized algorithm for attack scenario reconstruction (ASR). UNSW-NB15 and BoT-IoT utilized datasets for the MZWB method simulated using a Network simulator (NS-3.26). Compared with previous performance metrics such as energy consumption, storage overhead accuracy, response time, attack detection rate, precision, recall, and F-measure. The simulation result shows that the proposed MZWB method achieves high performance than existing works  相似文献   
109.
文章首先对传统的防火墙技术及其局限性做了简要分析,其次设计了基于云计算的入侵检测系统模型,并对其技术实现进行了探讨.该系统可以迅速判断并阻止已知和未知的安全问题,使之在发生之前加以拦截,展示了基于云计算架构的Web内容防护解决方案.本模型可用于进一步阻止目前快速增长且极具动态性的网络威胁,提高了网络整体的安全性能.  相似文献   
110.
改进BM算法策略的网络入侵检测系统设计   总被引:1,自引:0,他引:1  
入侵检测系统是近几年来网络安全领域的热门技术;传统的网络入侵检测对复杂数据信息和外来攻击都不能进行有效的特征识别,从而导致网络入侵检测准确率较低;因此,为确保网络的安全,结合实际应用过程,将事件防御策略思想引入到网络入侵检测设计中,首先,对网络安全框架和分布式网络检测系统进行了分析,在此基础上对网络检测系统进行改进,最后,利用改进BM算法策略对网络入侵系统进行有效地检测,以满足网络入侵检测实时性的要求;实验表明,该方法的性能优于静态分类器选择的检测方法,提高了检测精确性和安全性,为网络安全的运行提供了可靠的保证。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号