全文获取类型
收费全文 | 1118篇 |
免费 | 178篇 |
国内免费 | 162篇 |
专业分类
电工技术 | 88篇 |
综合类 | 124篇 |
化学工业 | 60篇 |
金属工艺 | 12篇 |
机械仪表 | 48篇 |
建筑科学 | 65篇 |
矿业工程 | 12篇 |
能源动力 | 11篇 |
轻工业 | 52篇 |
水利工程 | 14篇 |
石油天然气 | 12篇 |
武器工业 | 4篇 |
无线电 | 219篇 |
一般工业技术 | 55篇 |
冶金工业 | 10篇 |
原子能技术 | 3篇 |
自动化技术 | 669篇 |
出版年
2024年 | 11篇 |
2023年 | 28篇 |
2022年 | 58篇 |
2021年 | 43篇 |
2020年 | 51篇 |
2019年 | 47篇 |
2018年 | 50篇 |
2017年 | 54篇 |
2016年 | 69篇 |
2015年 | 61篇 |
2014年 | 90篇 |
2013年 | 83篇 |
2012年 | 120篇 |
2011年 | 128篇 |
2010年 | 83篇 |
2009年 | 85篇 |
2008年 | 83篇 |
2007年 | 72篇 |
2006年 | 46篇 |
2005年 | 38篇 |
2004年 | 34篇 |
2003年 | 24篇 |
2002年 | 19篇 |
2001年 | 12篇 |
2000年 | 10篇 |
1999年 | 7篇 |
1998年 | 7篇 |
1997年 | 11篇 |
1996年 | 4篇 |
1995年 | 6篇 |
1994年 | 4篇 |
1993年 | 4篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1983年 | 2篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1978年 | 1篇 |
1976年 | 1篇 |
1972年 | 1篇 |
1964年 | 1篇 |
排序方式: 共有1458条查询结果,搜索用时 0 毫秒
1.
In sensor networks, a compromised node can either generate fabricated reports with false votes or inject false votes into real reports, which causes severe damage such as false alarms, energy drain and information loss. An interleaved hop-by-hop authentication (IHA) scheme addresses the former attack by detecting and filtering false reports in a deterministic and hop-by-hop fashion. Unfortunately, in IHA, all en-route nodes must join to verify reports while only a few are necessary to the authentication procedure. In this paper, we propose a fuzzy-based interleaved multi-hop authentication scheme based on IHA. In our scheme, the fuzzy logic system only selects some nodes for verification based on the network characteristics. Moreover, we apply a voting method and a hash-based key assignment mechanism to improve network security. Through performance evaluation, the proposed scheme is found to save up to 13% of the energy consumption and to provide more network protection compared to IHA. 相似文献
2.
Mohamad Maatouk Ahmad Ibrahim Lucile Pinault Nicholas Armstrong Said Azza Jean-Marc Rolain Fadi Bittar Didier Raoult 《International journal of molecular sciences》2022,23(10)
The increased exploitation of microbial sequencing methods has shed light on the high diversity of new microorganisms named Candidate Phyla Radiation (CPR). CPR are mainly detected via 16S rRNA/metabarcoding analyses or metagenomics and are found to be abundant in all environments and present in different human microbiomes. These microbes, characterized by their symbiotic/epiparasitic lifestyle with bacteria, are directly exposed to competition with other microorganisms sharing the same ecological niche. Recently, a rich repertoire of enzymes with antibiotic resistance activity has been found in CPR genomes by using an in silico adapted screening strategy. This reservoir has shown a high prevalence of putative beta-lactamase-encoding genes. We expressed and purified five putative beta-lactamase sequences having the essential domains and functional motifs from class A and class B beta-lactamase. Their enzymatic activities were tested against various beta-lactam substrates using liquid chromatography-mass spectrometry (LC-MS) and showed some beta-lactamase activity even in the presence of a beta-lactamase inhibitor. In addition, ribonuclease activity was demonstrated against RNA that was not inhibited by sulbactam and EDTA. None of these proteins could degrade single- and double-stranded-DNA. This study is the first to express and test putative CPR beta-lactamase protein sequences in vitro. Our findings highlight that the reduced genomes of CPR members harbor sequences encoding for beta-lactamases known to be multifunction hydrolase enzymes. 相似文献
3.
为简化旅客列车开行方案优化编制问题,采用聚类法对铁路客运节点进行类别划分。选取2014年日均旅客发送量排名前100位客运节点的相关属性数据为实例,以铁路客运节点的类别划分依据作为属性变量,首先运用分层聚类中的凝聚法对属性变量进行聚类,然后根据简化的客运节点变量指标,运用近邻传播算法对客运节点样本其进行聚类,并引用CH、KL、IGP等三种聚类有效性指标对聚类结果加以分析。研究结果表明,将100个客运节点分为5个类别时,具有最好的聚类效果,可为旅客列车开行方案的设计奠定基础。 相似文献
4.
5.
6.
传统的文本关键词提取方法忽略了上下文语义信息,不能解决一词多义问题,提取效果并不理想。基于LDA和BERT模型,文中提出LDA-BERT-LightG BM(LB-LightG BM)模型。该方法选择LDA主题模型获得每个评论的主题及其词分布,根据阈值筛选出候选关键词,将筛选出来的词和原评论文本拼接在一起输入到BERT模型中,进行词向量训练,得到包含文本主题词向量,从而将文本关键词提取问题通过LightG BM算法转化为二分类问题。通过实验对比了textrank算法、LDA算法、LightG BM算法及文中提出的LB-LightG BM模型对文本关键词提取的准确率P、召回率R以及F1。结果表明,当Top N取3~6时,F1的平均值比最优方法提升3.5%,该方法的抽取效果整体上优于实验中所选取的对比方法,能够更准确地发现文本关键词。 相似文献
7.
针对DV-Hop定位算法存在的定位精度较低的不足,提出了邻居节点相似度概念,克服了DV-Hop定位算法中节点间距离区分度单一的缺点,同时在多跳通信中,考虑了通信路径的情况,将DV-Hop算法直接计算折线距离代替实际中直线距离这一不足,采用余弦定理和邻近节点相似度对其进行修正。从而实现了对DV-Hop算法的改进,提高了定位精度。最后对改进后的算法和DV-Hop算法以及参考文献中的算法进行仿真比较,结果表明:改进后的算法较DV-Hop算法在节点定位精度上提高了30%以上。 相似文献
8.
能耗与覆盖问题是无线传感器网络研究领域的基本问题,也是一个重点问题。针对传感器节点所呈现的同构性特点,提出了一种带有可控动态参数的优化覆盖算法(OCCDP)。该算法首先给出了3节点联合覆盖时,最大无缝覆盖率的求解过程;其次,给出了在监测区域内存在传感器节点覆盖时,覆盖质量期望值求解方法以及与邻居节点进行覆盖比对时覆盖率的判定方法;当存在冗余覆盖时,给出了任意传感器节点处于冗余节点覆盖时的覆盖率的计算过程;最后,通过仿真实验与其他算法在覆盖质量和网络生存周期等方面进行对比,其性能指标平均提升了11.02%和13.27%,从而验证了提出算法的有效性和可行性。 相似文献
9.
In a wireless sensor network (WSN), the data transmission technique based on the cooperative multiple‐input multiple‐output (CMIMO) scheme reduces the energy consumption of sensor nodes quite effectively by utilizing the space‐time block coding scheme. However, in networks with high node density, the scheme is ineffective due to the high degree of correlated data. Therefore, to enhance the energy efficiency in high node density WSNs, we implemented the distributed source coding (DSC) with the virtual multiple‐input multiple‐output (MIMO) data transmission technique in the WSNs. The DSC‐MIMO first compresses redundant source data using the DSC and then sends it to a virtual MIMO link. The results reveal that, in the DSC‐MIMO scheme, energy consumption is lower than that in the CMIMO technique; it is also lower in the DSC single‐input single‐output (SISO) scheme, compared to that in the SISO technique at various code rates, compression rates, and training overhead factors. The results also indicate that the energy consumption per bit is directly proportional to the velocity and training overhead factor in all the energy saving schemes. 相似文献
10.
Tirthankar?GhoshEmail author Niki?Pissinou Kami?Sam?Makki 《Mobile Networks and Applications》2005,10(6):985-995
Designing a trusted and secure routing solution in an untrustworthy scenario is always a challenging problem. Lack of physical
security and low trust levels among nodes in an ad hoc network demands a secure end-to-end route free of any malicious entity.
This is particularly challenging when malicious nodes collude with one another to disrupt the network operation. In this paper
we have designed a secure routing solution to find an end-to-end route free of malicious nodes with collaborative effort from
the neighbors. We have also extended the solution to secure the network against colluding malicious nodes, which, to the best
of our knowledge, is the first such solution proposed. We have also proposed a framework for computing and distributing trusts
that can be used with out trusted routing protocol. Our proposed framework is unique and different from the other schemes
in that it tries to analyze the psychology of the attacker and quantifies the behavior in the computational model. Extensive
simulation has been carried out to evaluate the design of our protocol.
Partially funded by Department of Defense Award No. H98230-04-C-0460, Department of Transportation Project No. FL-26-7102-00
and National Science Foundation Grant Nos. ANI-0123950 and CCR-0196557.
Tirthankar Ghosh is a PhD candidate in the Telecommunications and Information Technology Institute at Florida International University. His
area of research is routing security and trust computation in wireless ad hoc and sensor networks. He received his Bachelor
of Electrical Engineering from Jadavpur University, India and Masters in Computer Engineering from Florida International University.
Dr. Niki Pissinou received her Ph.D. in Computer Science from the University of Southern California, her M.S. in Computer Science from the
University of California at Riverside, and her B.S.I.S.E. in Industrial and Systems Engineering from The Ohio State University.
She is currently a tenured professor and the director of the Telecommunication & Information Technology Institute at FIU.
Previously Dr. Pissinou was a tenured faculty at the Center for Advanced Computer Studies at the University of Louisiana at
Lafayette where she was also the director of the Telecommunication & Information & Technology Laboratory partially funded
by NASA, and the co-director of the NOMAD: A Wireless and Nomadic Laboratory partially funded by NSF, and the Advanced Network
Laboratory. Dr. Pissinou is active in the fields computer networks, information technology and distributed systems.
Dr. Kami (Sam) Makki has earned his Ph.D. in Computer Science from the University of Queensland in Brisbane Australia, his Masters degree in Computer
Science and Engineering from the University of New South Wales in Sydney Australia, and his Bachelor and Masters Degrees in
Civil Engineering from the University of Tehran Iran. Before joining the department of Electrical Engineering and Computer
Science at the University of Toledo he has held a number of academic positions and research appointments at the Queensland
University of Technology in Brisbane, Royal Melbourne Institution of Technology in Melbourne and at The University of Queensland
in Brisbane Australia. He is an active researcher in the fields of distributed systems, databases, mobile and wireless communications,
and has more than 30 publications in peerreviewed journals and international proceedings. He has served as a chair and technical
program committee member and reviewer for a number of IEEE and ACM sponsored technical conferences and has received a number
of achievement awards. 相似文献