首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1118篇
  免费   178篇
  国内免费   162篇
电工技术   88篇
综合类   124篇
化学工业   60篇
金属工艺   12篇
机械仪表   48篇
建筑科学   65篇
矿业工程   12篇
能源动力   11篇
轻工业   52篇
水利工程   14篇
石油天然气   12篇
武器工业   4篇
无线电   219篇
一般工业技术   55篇
冶金工业   10篇
原子能技术   3篇
自动化技术   669篇
  2024年   11篇
  2023年   28篇
  2022年   58篇
  2021年   43篇
  2020年   51篇
  2019年   47篇
  2018年   50篇
  2017年   54篇
  2016年   69篇
  2015年   61篇
  2014年   90篇
  2013年   83篇
  2012年   120篇
  2011年   128篇
  2010年   83篇
  2009年   85篇
  2008年   83篇
  2007年   72篇
  2006年   46篇
  2005年   38篇
  2004年   34篇
  2003年   24篇
  2002年   19篇
  2001年   12篇
  2000年   10篇
  1999年   7篇
  1998年   7篇
  1997年   11篇
  1996年   4篇
  1995年   6篇
  1994年   4篇
  1993年   4篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1989年   2篇
  1987年   1篇
  1986年   1篇
  1983年   2篇
  1981年   1篇
  1980年   1篇
  1978年   1篇
  1976年   1篇
  1972年   1篇
  1964年   1篇
排序方式: 共有1458条查询结果,搜索用时 0 毫秒
1.
In sensor networks, a compromised node can either generate fabricated reports with false votes or inject false votes into real reports, which causes severe damage such as false alarms, energy drain and information loss. An interleaved hop-by-hop authentication (IHA) scheme addresses the former attack by detecting and filtering false reports in a deterministic and hop-by-hop fashion. Unfortunately, in IHA, all en-route nodes must join to verify reports while only a few are necessary to the authentication procedure. In this paper, we propose a fuzzy-based interleaved multi-hop authentication scheme based on IHA. In our scheme, the fuzzy logic system only selects some nodes for verification based on the network characteristics. Moreover, we apply a voting method and a hash-based key assignment mechanism to improve network security. Through performance evaluation, the proposed scheme is found to save up to 13% of the energy consumption and to provide more network protection compared to IHA.  相似文献   
2.
The increased exploitation of microbial sequencing methods has shed light on the high diversity of new microorganisms named Candidate Phyla Radiation (CPR). CPR are mainly detected via 16S rRNA/metabarcoding analyses or metagenomics and are found to be abundant in all environments and present in different human microbiomes. These microbes, characterized by their symbiotic/epiparasitic lifestyle with bacteria, are directly exposed to competition with other microorganisms sharing the same ecological niche. Recently, a rich repertoire of enzymes with antibiotic resistance activity has been found in CPR genomes by using an in silico adapted screening strategy. This reservoir has shown a high prevalence of putative beta-lactamase-encoding genes. We expressed and purified five putative beta-lactamase sequences having the essential domains and functional motifs from class A and class B beta-lactamase. Their enzymatic activities were tested against various beta-lactam substrates using liquid chromatography-mass spectrometry (LC-MS) and showed some beta-lactamase activity even in the presence of a beta-lactamase inhibitor. In addition, ribonuclease activity was demonstrated against RNA that was not inhibited by sulbactam and EDTA. None of these proteins could degrade single- and double-stranded-DNA. This study is the first to express and test putative CPR beta-lactamase protein sequences in vitro. Our findings highlight that the reduced genomes of CPR members harbor sequences encoding for beta-lactamases known to be multifunction hydrolase enzymes.  相似文献   
3.
为简化旅客列车开行方案优化编制问题,采用聚类法对铁路客运节点进行类别划分。选取2014年日均旅客发送量排名前100位客运节点的相关属性数据为实例,以铁路客运节点的类别划分依据作为属性变量,首先运用分层聚类中的凝聚法对属性变量进行聚类,然后根据简化的客运节点变量指标,运用近邻传播算法对客运节点样本其进行聚类,并引用CH、KL、IGP等三种聚类有效性指标对聚类结果加以分析。研究结果表明,将100个客运节点分为5个类别时,具有最好的聚类效果,可为旅客列车开行方案的设计奠定基础。  相似文献   
4.
姬正洲  成立  许杰 《现代电子技术》2005,28(12):74-75,79
网格(Grid)是近年来兴起的一个研究热点。他旨在使互联网上所有资源(计算资源、存储资源、通信资源、软件资源、信息资源、知识资源等)实现全面共享与协同工作,使整个因特网整合成一台巨大的超级计算机,为用户提供一个有效的平台,支持全球范围内分布异构应用程序的运行。本文不仅介绍了网格技术的涵义、特.最、功能,并且从网格技术能支持异构结点在网络环境下的分布动态协同工作的角度出发,给出了基于网格平台的通用视频会议系统的设计构想。  相似文献   
5.
孙力娟  魏静  郭剑  肖甫  王汝传 《电子学报》2014,42(10):1907-1912
针对传感器网络中的节点冗余问题,提出了一种冗余判别方法来关闭冗余节点,以达到延长网络生命周期的目的.首先按邻居节点的不同位置对节点进行分类,研究了每组邻居节点的网络覆盖率与工作节点数k之间的约束关系,在此基础上,按不同的冗余法则对节点进行判断,关闭冗余节点.理论分析和实验结果表明,提出的算法能关闭网络中的冗余节点从而有效地延长网络的生存时间.  相似文献   
6.
传统的文本关键词提取方法忽略了上下文语义信息,不能解决一词多义问题,提取效果并不理想。基于LDA和BERT模型,文中提出LDA-BERT-LightG BM(LB-LightG BM)模型。该方法选择LDA主题模型获得每个评论的主题及其词分布,根据阈值筛选出候选关键词,将筛选出来的词和原评论文本拼接在一起输入到BERT模型中,进行词向量训练,得到包含文本主题词向量,从而将文本关键词提取问题通过LightG BM算法转化为二分类问题。通过实验对比了textrank算法、LDA算法、LightG BM算法及文中提出的LB-LightG BM模型对文本关键词提取的准确率P、召回率R以及F1。结果表明,当Top N取3~6时,F1的平均值比最优方法提升3.5%,该方法的抽取效果整体上优于实验中所选取的对比方法,能够更准确地发现文本关键词。  相似文献   
7.
针对DV-Hop定位算法存在的定位精度较低的不足,提出了邻居节点相似度概念,克服了DV-Hop定位算法中节点间距离区分度单一的缺点,同时在多跳通信中,考虑了通信路径的情况,将DV-Hop算法直接计算折线距离代替实际中直线距离这一不足,采用余弦定理和邻近节点相似度对其进行修正。从而实现了对DV-Hop算法的改进,提高了定位精度。最后对改进后的算法和DV-Hop算法以及参考文献中的算法进行仿真比较,结果表明:改进后的算法较DV-Hop算法在节点定位精度上提高了30%以上。  相似文献   
8.
李川  李学俊 《电信科学》2016,32(11):82-92
能耗与覆盖问题是无线传感器网络研究领域的基本问题,也是一个重点问题。针对传感器节点所呈现的同构性特点,提出了一种带有可控动态参数的优化覆盖算法(OCCDP)。该算法首先给出了3节点联合覆盖时,最大无缝覆盖率的求解过程;其次,给出了在监测区域内存在传感器节点覆盖时,覆盖质量期望值求解方法以及与邻居节点进行覆盖比对时覆盖率的判定方法;当存在冗余覆盖时,给出了任意传感器节点处于冗余节点覆盖时的覆盖率的计算过程;最后,通过仿真实验与其他算法在覆盖质量和网络生存周期等方面进行对比,其性能指标平均提升了11.02%和13.27%,从而验证了提出算法的有效性和可行性。  相似文献   
9.
In a wireless sensor network (WSN), the data transmission technique based on the cooperative multiple‐input multiple‐output (CMIMO) scheme reduces the energy consumption of sensor nodes quite effectively by utilizing the space‐time block coding scheme. However, in networks with high node density, the scheme is ineffective due to the high degree of correlated data. Therefore, to enhance the energy efficiency in high node density WSNs, we implemented the distributed source coding (DSC) with the virtual multiple‐input multiple‐output (MIMO) data transmission technique in the WSNs. The DSC‐MIMO first compresses redundant source data using the DSC and then sends it to a virtual MIMO link. The results reveal that, in the DSC‐MIMO scheme, energy consumption is lower than that in the CMIMO technique; it is also lower in the DSC single‐input single‐output (SISO) scheme, compared to that in the SISO technique at various code rates, compression rates, and training overhead factors. The results also indicate that the energy consumption per bit is directly proportional to the velocity and training overhead factor in all the energy saving schemes.  相似文献   
10.
Designing a trusted and secure routing solution in an untrustworthy scenario is always a challenging problem. Lack of physical security and low trust levels among nodes in an ad hoc network demands a secure end-to-end route free of any malicious entity. This is particularly challenging when malicious nodes collude with one another to disrupt the network operation. In this paper we have designed a secure routing solution to find an end-to-end route free of malicious nodes with collaborative effort from the neighbors. We have also extended the solution to secure the network against colluding malicious nodes, which, to the best of our knowledge, is the first such solution proposed. We have also proposed a framework for computing and distributing trusts that can be used with out trusted routing protocol. Our proposed framework is unique and different from the other schemes in that it tries to analyze the psychology of the attacker and quantifies the behavior in the computational model. Extensive simulation has been carried out to evaluate the design of our protocol. Partially funded by Department of Defense Award No. H98230-04-C-0460, Department of Transportation Project No. FL-26-7102-00 and National Science Foundation Grant Nos. ANI-0123950 and CCR-0196557. Tirthankar Ghosh is a PhD candidate in the Telecommunications and Information Technology Institute at Florida International University. His area of research is routing security and trust computation in wireless ad hoc and sensor networks. He received his Bachelor of Electrical Engineering from Jadavpur University, India and Masters in Computer Engineering from Florida International University. Dr. Niki Pissinou received her Ph.D. in Computer Science from the University of Southern California, her M.S. in Computer Science from the University of California at Riverside, and her B.S.I.S.E. in Industrial and Systems Engineering from The Ohio State University. She is currently a tenured professor and the director of the Telecommunication & Information Technology Institute at FIU. Previously Dr. Pissinou was a tenured faculty at the Center for Advanced Computer Studies at the University of Louisiana at Lafayette where she was also the director of the Telecommunication & Information & Technology Laboratory partially funded by NASA, and the co-director of the NOMAD: A Wireless and Nomadic Laboratory partially funded by NSF, and the Advanced Network Laboratory. Dr. Pissinou is active in the fields computer networks, information technology and distributed systems. Dr. Kami (Sam) Makki has earned his Ph.D. in Computer Science from the University of Queensland in Brisbane Australia, his Masters degree in Computer Science and Engineering from the University of New South Wales in Sydney Australia, and his Bachelor and Masters Degrees in Civil Engineering from the University of Tehran Iran. Before joining the department of Electrical Engineering and Computer Science at the University of Toledo he has held a number of academic positions and research appointments at the Queensland University of Technology in Brisbane, Royal Melbourne Institution of Technology in Melbourne and at The University of Queensland in Brisbane Australia. He is an active researcher in the fields of distributed systems, databases, mobile and wireless communications, and has more than 30 publications in peerreviewed journals and international proceedings. He has served as a chair and technical program committee member and reviewer for a number of IEEE and ACM sponsored technical conferences and has received a number of achievement awards.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号