全文获取类型
收费全文 | 557篇 |
免费 | 80篇 |
国内免费 | 81篇 |
专业分类
电工技术 | 2篇 |
综合类 | 48篇 |
化学工业 | 4篇 |
机械仪表 | 8篇 |
建筑科学 | 6篇 |
矿业工程 | 1篇 |
轻工业 | 2篇 |
石油天然气 | 1篇 |
武器工业 | 1篇 |
无线电 | 156篇 |
一般工业技术 | 23篇 |
冶金工业 | 4篇 |
原子能技术 | 11篇 |
自动化技术 | 451篇 |
出版年
2024年 | 4篇 |
2023年 | 9篇 |
2022年 | 28篇 |
2021年 | 37篇 |
2020年 | 31篇 |
2019年 | 17篇 |
2018年 | 16篇 |
2017年 | 43篇 |
2016年 | 41篇 |
2015年 | 36篇 |
2014年 | 76篇 |
2013年 | 52篇 |
2012年 | 58篇 |
2011年 | 69篇 |
2010年 | 48篇 |
2009年 | 39篇 |
2008年 | 33篇 |
2007年 | 25篇 |
2006年 | 19篇 |
2005年 | 19篇 |
2004年 | 9篇 |
2003年 | 4篇 |
2001年 | 1篇 |
1998年 | 1篇 |
1991年 | 1篇 |
1981年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有718条查询结果,搜索用时 31 毫秒
71.
72.
基于计算机取证的ID3改进算法 总被引:2,自引:0,他引:2
随着数据挖掘技术在计算机取证领域的应用,作为分类分析的经典算法ID3也相继出现在一些取证原型系统中,如何让原来不基于任何应用环境的ID3算法更适合计算机取证成为一个值得关注的课题.文章首先介绍了ID3算法,然后基于计算机取证的应用环境,从引入权值和两次信息增益的角度对算法进行了改进,最后通过举例,验证了该算法的先进性. 相似文献
73.
This paper addresses the issue of face and lip tracking via chromatic detector, CCL algorithm and canny edge detector. It aims to track face and lip region from static color images including frames read from videos, which is expected to be an important part of the robust and reliable person identification in the field of computer forensics. We use the M2VTS face database and pictures took from my colleagues as the test resource. This project is based on the concept of image processing and computer version. 相似文献
74.
75.
杨维亮 《网络安全技术与应用》2005,(12):73-75
计算机取证过程中,取证人员往往要对涉及MicrosoftOffice文件进行取证分析,以发现线索,获取证据,但是其安全性功能的设置往往对侦查人员的取证活动造成障碍,本文主要介绍一款名为AdvancedOfficePasswordRecovery(AOPR)的软件,该软件使用多种方法破解文件,获取密码,最终成功打开文件,以及在使用中的优点和应当注意的问题。 相似文献
76.
入侵检测系统研究及其展望 总被引:6,自引:0,他引:6
对入侵检测系统(IDS)作了简要的分析,把它与防火墙在功能上进行了较为深入的比较;主要阐述了入侵检测系统对计算机安全系统的重要性、入侵检测系统的分类和工作原理,并针对入侵检测系统的发展趋势展开了讨论。 相似文献
77.
Current approaches to measuring people’s everyday usage of technology-based media and other computer-related activities have proved to be problematic as they use varied outcome measures, fail to measure behavior in a broad range of technology-related domains and do not take into account recently developed types of technology including smartphones. In the present study, a wide variety of items, covering a range of up-to-date technology and media usage behaviors. Sixty-six items concerning technology and media usage, along with 18 additional items assessing attitudes toward technology, were administered to two independent samples of individuals, comprising 942 participants. Factor analyses were used to create 11 usage subscales representing smartphone usage, general social media usage, Internet searching, e-mailing, media sharing, text messaging, video gaming, online friendships, Facebook friendships, phone calling, and watching television in addition to four attitude-based subscales: positive attitudes, negative attitudes, technological anxiety/dependence, and attitudes toward task-switching. All subscales showed strong reliabilities and relationships between the subscales and pre-existing measures of daily media usage and Internet addiction were as predicted. Given the reliability and validity results, the new Media and Technology Usage and Attitudes Scale was suggested as a method of measuring media and technology involvement across a variety of types of research studies either as a single 60-item scale or any subset of the 15 subscales. 相似文献
78.
林晓丹 《计算机工程与设计》2013,34(9)
针对音频篡改被动取证的问题,提出了一种基于改进离散余弦变换(MDCT)域的盲检测方法.音频信号MDCT系数直方图可用广义高斯分布模型进行拟合.原始音频的广义高斯模型形状参数集中分布在一定的区间内,而篡改后的音频信号在篡改发生边界,其广义高斯模型的形状参数将发生明显变化,通过设置形状参数阈值区分音频信号是否遭受篡改.实验结果表明,对于改变音频内容的删除、替换和拼接操作,该方法在篡改检测和定位方面具备有效性. 相似文献
79.
Network forensics supports capabilities such as attacker identification and attack reconstruction, which complement the traditional intrusion detection and perimeter defense techniques in building a robust security mechanism. Attacker identification pinpoints attack origin to deter future attackers, while attack reconstruction reveals attack causality and network vulnerabilities. In this paper, we discuss the problem and feasibility of back tracking the origin of a self-propagating stealth attack when given a network traffic trace for a sufficiently long period of time. We propose a network forensics mechanism that is scalable in computation time and space while maintaining high accuracy in the identification of the attack origin. We further develop a data reduction method to filter out attack-irrelevant data and only retain evidence relevant to potential attacks for a post-mortem investigation. Using real-world trace driven experiments, we evaluate the performance of the proposed mechanism and show that we can trim down up to 97% of attack-irrelevant network traffic and successfully identify attack origin. 相似文献
80.
Sanna-Mari Kuoppamäki Sakari Taipale Terhi-Anna Wilska 《Telematics and Informatics》2017,34(4):110-117
Older adults are becoming an important market segment for all internet-based services, but few studies to date have considered older adults as online shoppers and users of entertainment media. Utilising the concept of life course, this article investigates the use of mobile technologies for online shopping and entertainment among consumers aged 55 to 74. The data were collected with a web-based survey completed by a panel of respondents representing Finnish television viewers (N = 322). The results reveal that consumers aged 55 to 74 use a smartphone or tablet to purchase products or services online as often as younger consumers. In contrast, listening to internet radio and watching videos or programmes online with a smartphone or tablet are most typical for younger male consumers. The results demonstrate that mobile-based online shopping is best predicted by age, higher education, and household type (children living at home), and use of entertainment media by age and gender. 相似文献