全文获取类型
收费全文 | 677篇 |
免费 | 108篇 |
国内免费 | 119篇 |
专业分类
电工技术 | 30篇 |
综合类 | 6篇 |
化学工业 | 1篇 |
金属工艺 | 2篇 |
机械仪表 | 15篇 |
建筑科学 | 20篇 |
矿业工程 | 5篇 |
能源动力 | 6篇 |
轻工业 | 4篇 |
水利工程 | 4篇 |
石油天然气 | 2篇 |
武器工业 | 2篇 |
无线电 | 269篇 |
一般工业技术 | 75篇 |
自动化技术 | 463篇 |
出版年
2024年 | 21篇 |
2023年 | 108篇 |
2022年 | 122篇 |
2021年 | 120篇 |
2020年 | 126篇 |
2019年 | 71篇 |
2018年 | 54篇 |
2017年 | 50篇 |
2016年 | 36篇 |
2015年 | 36篇 |
2014年 | 29篇 |
2013年 | 39篇 |
2012年 | 53篇 |
2011年 | 29篇 |
2010年 | 6篇 |
2009年 | 3篇 |
2005年 | 1篇 |
排序方式: 共有904条查询结果,搜索用时 15 毫秒
1.
物联网是当前的研究热点,已受到了我国政府的重视。文章介绍了物联网的定义、物联网的体系结构,以及物联网的核心技术——感知识别技术、信号处理技术和架构技术,最后介绍了物联网在不停车收费系统、智能家居安防系统和手机支付等方面的应用。 相似文献
2.
针对国内航空物流信息化建设方面的问题,提出并设计了一套基于物联网的航空物流查询系统。该系统通过RFID技术完成数据采集,并通过RS232串口将数据传输到ZigBee终端节点,然后利用ZigBee无线网络进行短距离传输到路由节点,最后经过 ZigBee 网关将信息传输出去。实验结果表明该平台可以对航空货物进行智能化、可视化、信息化管理。该设计为航空物流管理提供了新的思路,有良好的应用前景。 相似文献
3.
物联网(IoT)应用的快速发展和软硬件开源化趋势使得IoT设备所面临的硬件安全威胁日益严峻,尤其是利用运行时条件触发的系统级攻击,很难通过传统测试方法进行检测和防御,需要提供运行时安全检查机制。分析IoT系统芯片面临的安全威胁,结合数据加密传输路径中的攻击、任务流和检查内容,设计4条功能完整性安全检查策略,搭建SoC安全策略检查架构并植入运行时触发硬件木马。仿真结果显示,运行时策略检查状态机可以检查出加密核、内存和UART接口的功能完整性问题,并通过发送错误中断信号进行反馈,证明了所设计的系统级安全策略检查架构的正确性与有效性。 相似文献
4.
5.
在物联网中所有智能装置都可以上网,因此所带来的信息总量非常大,但每个东西所传送的信息却很小,因此需要新技术快速地处理或储存这些大量的小信息。基于批次处理循序送出技术,结合存储器式处理技术、快速封包处理技术与远端机器储存日志的方式,提供快速接收并处理物联网信息的方法,并以硬盘效能最大化的方式批次循序更新至硬盘。 相似文献
6.
《Digital Communications & Networks》2023,9(1):125-137
In this paper, an advanced and optimized Light Gradient Boosting Machine (LGBM) technique is proposed to identify the intrusive activities in the Internet of Things (IoT) network. The followings are the major contributions: i) An optimized LGBM model has been developed for the identification of malicious IoT activities in the IoT network; ii) An efficient evolutionary optimization approach has been adopted for finding the optimal set of hyper-parameters of LGBM for the projected problem. Here, a Genetic Algorithm (GA) with k-way tournament selection and uniform crossover operation is used for efficient exploration of hyper-parameter search space; iii) Finally, the performance of the proposed model is evaluated using state-of-the-art ensemble learning and machine learning-based model to achieve overall generalized performance and efficiency. Simulation outcomes reveal that the proposed approach is superior to other considered methods and proves to be a robust approach to intrusion detection in an IoT environment. 相似文献
7.
In recent years, the usage and applications of Internet of Things (IoT) have increased exponentially. IoT connects multiple heterogeneous devices like sensors, micro controllers, actuators, smart devices like mobiles, watches, etc. IoT contributes the data produced in the context of data collection, including the domains like military, agriculture, healthcare, etc. The diversity of possible applications at the intersection of the IoT and the web semantics has prompted many research teams to work at the interface between these two disciplines. This makes it possible to collect data and control various objects in transparent way. The challenge lies in the use of this data. Ontologies address this challenge to meet specific data needs in the IoT field. This paper presents the implementation of a dynamic agriculture ontology-building tool that parses the ontology files to extract full data and update it based on the user needs. The technology is used to create the angular library for parsing the OWL files. The proposed ontology framework would accept user-defined ontologies and provide an interface for an online updating of the owl files to ensure the interoperability in the agriculture IoT. 相似文献
8.
Nowadays, the emerging internet of things (IoT) technology offers the connectivity and communication between all things (various objects/things, devices, actuators, sensors, and mobile devices) at anywhere and anytime. These devices have embedded environment monitoring capabilities (sensors) and significant computational responsibilities. Most of the devices are working by utilizing their limited resources such as energy, memory, and bandwidth. Obviously, battery power is a crucial factor in any network. It makes tedious overheads to the network operations. Prediction of the future energy of the devices could be more helpful for managing resources, connectivity, and communication between the devices in IoT and wireless sensor networks (WSNs). It also facilitates the reliable internet and network connection establishment to the nodes. Hence, this paper presents an energy estimation model to predict the future energy of devices using the Markov and autoregression model. The proposed model facilitates smarter energy management among internet-connected devices. Performance results show that the proposed method gives significant improvement compared with the neural network and other existing predictions. Further, the proposed model has very lower error performance metrics such as mean square error and computation overhead. The proposed model yields more perfect energy predictions for a node with 64% to 97% and 16% to 43% of higher prediction accuracy throughout the time series. 相似文献
9.
The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies. Early diagnosis of many diseases will improve the patient life. The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things (IoT), Wireless Sensor Networks (WSN), Embedded systems, Deep learning approaches and Optimization and aggregation methods. The data generated through these technologies will demand the bandwidth, data rate, latency of the network. In this proposed work, efficient discrete grey wolf optimization (DGWO) based data aggregation scheme using Elliptic curve Elgamal with Message Authentication code (ECEMAC) has been used to aggregate the parameters generated from the wearable sensor devices of the patient. The nodes that are far away from edge node will forward the data to its neighbor cluster head using DGWO. Aggregation scheme will reduce the number of transmissions over the network. The aggregated data are preprocessed at edge node to remove the noise for better diagnosis. Edge node will reduce the overhead of cloud server. The aggregated data are forward to cloud server for central storage and diagnosis. This proposed smart diagnosis will reduce the transmission cost through aggregation scheme which will reduce the energy of the system. Energy cost for proposed system for 300 nodes is 0.34μJ. Various energy cost of existing approaches such as secure privacy preserving data aggregation scheme (SPPDA), concealed data aggregation scheme for multiple application (CDAMA) and secure aggregation scheme (ASAS) are 1.3 μJ, 0.81 μJ and 0.51 μJ respectively. The optimization approaches and encryption method will ensure the data privacy. 相似文献
10.
Khalid Alhusayni Raniyah Wazirali Mousa AlAkhras Marwah Almasri Samah Alhazmi 《计算机系统科学与工程》2023,45(1):459-481
The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated view of the trends in the IoT authentication area. Among the issues covered include a series of authentication protocols that have remained research gaps in various studies. This study applies a comparative evaluation of authentication protocols, including their strengths and weaknesses. Thus, it forms the foundation in the IoT authentication field of study. In that direction, a multi authentication architecture that involves secured means is proposed for protocol authentication. Informal analysis can affect the security of the protocols. Burrows-Abadi-Needham (BAN) logic provides proof of the attainment of mutual authentication. NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic. 相似文献