首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5489篇
  免费   329篇
  国内免费   234篇
电工技术   143篇
综合类   243篇
化学工业   329篇
金属工艺   119篇
机械仪表   298篇
建筑科学   686篇
矿业工程   75篇
能源动力   192篇
轻工业   60篇
水利工程   40篇
石油天然气   56篇
武器工业   38篇
无线电   638篇
一般工业技术   571篇
冶金工业   115篇
原子能技术   48篇
自动化技术   2401篇
  2024年   6篇
  2023年   54篇
  2022年   81篇
  2021年   112篇
  2020年   128篇
  2019年   110篇
  2018年   145篇
  2017年   185篇
  2016年   220篇
  2015年   201篇
  2014年   385篇
  2013年   426篇
  2012年   364篇
  2011年   455篇
  2010年   304篇
  2009年   322篇
  2008年   295篇
  2007年   291篇
  2006年   301篇
  2005年   199篇
  2004年   201篇
  2003年   216篇
  2002年   181篇
  2001年   105篇
  2000年   111篇
  1999年   96篇
  1998年   63篇
  1997年   56篇
  1996年   50篇
  1995年   51篇
  1994年   38篇
  1993年   41篇
  1992年   33篇
  1991年   21篇
  1990年   26篇
  1989年   16篇
  1988年   21篇
  1987年   15篇
  1986年   18篇
  1985年   22篇
  1984年   15篇
  1983年   17篇
  1982年   11篇
  1981年   10篇
  1980年   7篇
  1978年   3篇
  1976年   3篇
  1965年   2篇
  1964年   2篇
  1958年   2篇
排序方式: 共有6052条查询结果,搜索用时 15 毫秒
71.
ABSTRACT

Social engineering is a methodology that allows an attacker to bypass technical controls by attacking the human element in an organization. There are many techniques commonly used in social engineering including but not limited to Trojan and phishing email messages, impersonation, persuasion, bribery, shoulder surfing, and dumpster diving. Hackers rely on social engineering attacks to bypass technical controls by focusing on the human factors. Social engineers often exploit the natural tendency people have toward trusting others who seem likeable or credible, deferring to authority or need to acquiesce to social conformity. Mitigation of social engineering begins with good policy and awareness training, but there are a number of other approaches an organization can take to defend against this type of an attack. Social engineering attacks are likely to increase, and it is becoming increasingly important for organizations to address this issue.  相似文献   
72.
ABSTRACT

Insider threats pose significant challenges to any organization. Many solutions have been proposed in the past to detect insider threats. Unfortunately, given the complexity of the problem and the human factors involved, many solutions which have been proposed face strict constraints and limitations when it comes to the working environment. As a result, many past insider threat solutions have in practice failed in their implementations. In this work, we review some of the recent insider threat detection solutions and explore their benefits and limitations. We also discuss insider threat issues for emerging areas such as cloud computing, virtualization, and social networking.  相似文献   
73.
State-of-the art atom probe tomography (APT) combined with transmission electron microscopy (TEM) were used to investigate the microstructure at different stages of the ageing process of an alloy of composition (at%) Al-1.68%Cu-4.62%Li-0.33%Mg-0.1%Ag. These alloys were shown to exhibit a complex microstructure of T1 plates and several metastable phases, including θ′ and S. We will highlight the early stages of clustering, precipitate interactions and possible solute segregation at the matrix/precipitate interfaces and detail the chemical composition of the different phases.  相似文献   
74.
针对P2P网络的特性,本文提出了一种局域搜索免疫。实验使用SIS病毒传播模型征BA无标度网络和实际网络中测试了局域搜索免疫策略,结果表明与其它免疫策略相比,该策略可以通过免疫相等或较少的节点来消灭病毒。  相似文献   
75.
张树波  赖剑煌 《计算机科学》2010,37(12):171-174
基因表达数据的出现,为人类从分子生物学的角度研究和探索癌症的发病机理提供了广阔的前景,利用基因表达数据发现与癌症相关的基因对于癌症的诊断和治疗具有重要的意义。在过去的十几年里,已经有很多种计算方法被成功地用于从基因表达数据中找出与癌症相关的关键基因,然而,不同的方法从不同的角度刻画基因对不同类型样本的区分能力,它们选择出来的关键基因可能不一致,这将给医学解释和应用带来困扰。现提出一种融合的方法,即将基因在不同方面对样本的判别能力结合起来,首先计算每个基因的信息增益、全局判别能力和局部判别能力,再用它们的识别率进行加权,进而计算每个基因的综合判别能力,最后筛选出判别能力最高的基因子集作为关键基因子集。实验结果表明,此方法得到了比采用单独一种评价标准更好的识别效果。  相似文献   
76.
局域网环境下利用DHCP欺骗技术实现DNS劫持攻击   总被引:1,自引:0,他引:1  
利用DHCP协议的缺陷,实现对局域网计算机的DNS劫持攻击,并给出将此类攻击应用于网站钓鱼的实现方法,旨在引起人们对局域网安全问题的重视。  相似文献   
77.
为解决移动业务数据日稽核、监控物资发放情况等问题,设计并实现了基于BOSS的移动营业操作系统。通过对BOSS克隆数据库中自动抽取业务数据与营业操作系统中业务数据的对比实现了业务稽核功能,满足了公司精细化管理的要求。实践表明,该系统有效提高了工作效率,减少了员工工作量,节约了大量的人力成本。  相似文献   
78.
Though numerous approaches have been proposed for face recognition, little attention is given to the moment-based face recognition techniques. In this paper we propose a novel face recognition approach based on adaptively weighted patch pseudo Zernike moment array (AWPPZMA) when only one exemplar image per person is available. In this approach, a face image is represented as an array of patch pseudo Zernike moments (PPZM) extracted from a partitioned face image containing moment information of local areas instead of global information of a face. An adaptively weighting scheme is used to assign proper weights to each PPZM to adjust the contribution of each local area of a face in terms of the quantity of identity information that a patch contains and the likelihood of a patch is occluded. An extensive experimental investigation is conducted using AR and Yale face databases covering face recognition under controlled/ideal conditions, different illumination conditions, different facial expressions and partial occlusion. The system performance is compared with the performance of four benchmark approaches. The encouraging experimental results demonstrate that moments can be used for face recognition and patch-based moment array provides a novel way for face representation and recognition in single model databases.  相似文献   
79.
Instance-based learning (IBL), so called memory-based reasoning (MBR), is a commonly used non-parametric learning algorithm. k-nearest neighbor (k-NN) learning is the most popular realization of IBL. Due to its usability and adaptability, k-NN has been successfully applied to a wide range of applications. However, in practice, one has to set important model parameters only empirically: the number of neighbors (k) and weights to those neighbors. In this paper, we propose structured ways to set these parameters, based on locally linear reconstruction (LLR). We then employed sequential minimal optimization (SMO) for solving quadratic programming step involved in LLR for classification to reduce the computational complexity. Experimental results from 11 classification and eight regression tasks were promising enough to merit further investigation: not only did LLR outperform the conventional weight allocation methods without much additional computational cost, but also LLR was found to be robust to the change of k.  相似文献   
80.
Change detection based on the comparison of independently classified images (i.e. post-classification comparison) is well-known to be negatively affected by classification errors of individual maps. Incorporating spatial-temporal contextual information in the classification helps to reduce the classification errors, thus improving change detection results. In this paper, spatial-temporal Markov Random Fields (MRF) models were used to integrate spatial-temporal information with spectral information for multi-temporal classification in an attempt to mitigate the impacts of classification errors on change detection. One important component in spatial-temporal MRF models is the specification of transition probabilities. Traditionally, a global transition probability model is used that assumes spatial stationarity of transition probabilities across an image scene, which may be invalid if areas have varying transition probabilities. By relaxing the stationarity assumption, we developed two local transition probability models to make the transition model locally adaptive to spatially varying transition probabilities. The first model called locally adjusted global transition model adapts to the local variation by multiplying a pixel-wise probability of change with the global transition model. The second model called pixel-wise transition model was developed as a fully local model based on the estimation of the pixel-wise joint probabilities. When applied to the forest change detection in Paraguay, the two local models showed significant improvements in the accuracy of identifying the change from forest to non-forest compared with traditional models. This indicates that the local transition probability models can present temporal information more accurately in change detection algorithms based on spatial-temporal classification of multi-temporal images. The comparison between the two local transition models showed that the fully local model better captured the spatial heterogeneity of the transition probabilities and achieved more stable and consistent results over different regions of a large image scene.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号