全文获取类型
收费全文 | 518篇 |
免费 | 54篇 |
国内免费 | 47篇 |
专业分类
电工技术 | 21篇 |
综合类 | 34篇 |
化学工业 | 11篇 |
金属工艺 | 9篇 |
机械仪表 | 22篇 |
建筑科学 | 20篇 |
矿业工程 | 10篇 |
能源动力 | 3篇 |
轻工业 | 21篇 |
水利工程 | 10篇 |
石油天然气 | 5篇 |
武器工业 | 7篇 |
无线电 | 121篇 |
一般工业技术 | 43篇 |
冶金工业 | 4篇 |
原子能技术 | 3篇 |
自动化技术 | 275篇 |
出版年
2023年 | 12篇 |
2022年 | 9篇 |
2021年 | 11篇 |
2020年 | 19篇 |
2019年 | 13篇 |
2018年 | 7篇 |
2017年 | 22篇 |
2016年 | 22篇 |
2015年 | 19篇 |
2014年 | 37篇 |
2013年 | 30篇 |
2012年 | 35篇 |
2011年 | 51篇 |
2010年 | 24篇 |
2009年 | 44篇 |
2008年 | 37篇 |
2007年 | 48篇 |
2006年 | 40篇 |
2005年 | 35篇 |
2004年 | 29篇 |
2003年 | 18篇 |
2002年 | 8篇 |
2001年 | 9篇 |
2000年 | 9篇 |
1999年 | 4篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1996年 | 1篇 |
1995年 | 5篇 |
1994年 | 2篇 |
1993年 | 5篇 |
1992年 | 1篇 |
1990年 | 2篇 |
1988年 | 1篇 |
1981年 | 1篇 |
排序方式: 共有619条查询结果,搜索用时 15 毫秒
1.
2.
通过实例分析,给出快速判定易产生假废品的范围的办法,与传统的方法比,节省了检查人员与工人的时间,提高了劳动效率。具有操作简梗、切实可靠等特点. 相似文献
3.
传统入侵检测系统虽然可以根据特征匹配的方法检测出攻击企图,却无法验证攻击企图是否成功,生成的报警不仅数量巨大而且误警率很高。该文提出一种结合漏洞扫描工具对入侵检测系统生成的报警进行验证的方法,根据被攻击主机是否包含能使攻击成功的漏洞来判定攻击能否成功,对攻击的目标主机不存在对应漏洞的报警降低优先级,从而提高报警质量。说明了报警验证模型各部分的设计和实现方法,系统运行结果显示该方法能有效地压缩报警量,降低误警率,帮助管理员从大量数据中找到最应该关注的真实报警。 相似文献
4.
异常入侵检测系统虚警率问题研究 总被引:3,自引:0,他引:3
入侵检测系统的虚警率影响检测结果的可信性.通过分析入侵检测系统的可信问题及异常入侵检测系统的虚警率问题,提出了降低虚警率的方法:基于进程检测行为的入侵检测方法、多检测系统协作工作模式.重点描述了基于人工免疫思想,动态构建正常系统轮廓,抑制虚警率的方法,并对其进行了仿真实验.实验表明,本方法可以提高检测效率,有效降低系统虚警率. 相似文献
5.
6.
In the network security system, intrusion detection plays a significant role. The network security system detects the malicious actions in the network and also conforms the availability, integrity and confidentiality of data information resources. Intrusion identification system can easily detect the false positive alerts. If large number of false positive alerts are created then it makes intrusion detection system as difficult to differentiate the false positive alerts from genuine attacks. Many research works have been done. The issues in the existing algorithms are more memory space and need more time to execute the transactions of records. This paper proposes a novel framework of network security Intrusion Detection System (IDS) using Modified Frequent Pattern (MFP-Tree) via K-means algorithm. The accuracy rate of Modified Frequent Pattern Tree (MFPT)-K means method in finding the various attacks are Normal 94.89%, for DoS based attack 98.34%, for User to Root (U2R) attacks got 96.73%, Remote to Local (R2L) got 95.89% and Probe attack got 92.67% and is optimal when it is compared with other existing algorithms of K-Means and APRIORI. 相似文献
7.
Jordan Navarro Elsa Yousfi Jonathan Deniel Christophe Jallais Mercedes Bueno Alexandra Fort 《Ergonomics》2016,59(12):1553-1564
In the past, lane departure warnings (LDWs) were demonstrated to improve driving behaviours during lane departures but little is known about the effects of unreliable warnings. This experiment focused on the influence of false warnings alone or in combination with missed warnings and warning onset on assistance effectiveness and acceptance. Two assistance unreliability levels (33 and 17%) and two warning onsets (partial and full lane departure) were manipulated in order to investigate interaction. Results showed that assistance, regardless unreliability levels and warning onsets, improved driving behaviours during lane departure episodes and outside of these episodes by favouring better lane-keeping performances. Full lane departure and highly unreliable warnings, however, reduced assistance efficiency. Drivers’ assistance acceptance was better for the most reliable warnings and for the subsequent warnings. The data indicate that imperfect LDWs (false warnings or false and missed warnings) further improve driving behaviours compared to no assistance.
Practitioner Summary: This study revealed that imperfect lane departure warnings are able to significantly improve driving performances and that warning onset is a key element for assistance effectiveness and acceptance. The conclusion may be of particular interest for lane departure warning designers. 相似文献
8.
An automatic, adaptive, spectrogram-based algorithm for picking the arrival time of microseismic data is proposed. The algorithm provides a significant improvement in the ratio of detected events to false triggers and in the resolution of the microseismic structure. It mainly addresses the problem of automatic picking when the signal-to-noise ratio (S/N) is low and so false and missed triggers frequently occur. It combines the short time average/long time average (STA/LTA) algorithm with an envelope algorithm. It also constructs an envelope from a time-frequency representation of the signal. The threshold is set dynamically, according to the existing noise level and the S/N ratio. The algorithm also uses the fixed LTA value to represent the noise level for a seismic record. It is applied to pick the arrival times of P-waves of local events recorded at eight stations. 相似文献
9.
We consider the stochastic input-output properties of a simple non-linear dynamical system, the so-called Page-Hinkley detector, playing a key role in change detection, and also in queuing theory. We show that for L-mixing inputs with negative expectation the output process of this system is L-mixing. The result is applied to get an upper bound for the false alarm rate. The proof is then adapted to get a similar result for the case of random i.i.d. inputs. Possible extensions and open problems are given in the discussion. 相似文献
10.
The drawbacks of SVD-based image watermarking are false positive, robust and transparency. The former can be overcome by embedding the principal components of the watermark into the host image, the latter is dependent on how much the quantity (i.e., scaling factor) of the principal components is embedded. For the existing methods, the scaling factor is a fixed value; actually, it is image-dependent. Different watermarks need the different scaling factors, although they are embedded in the same host image. In this paper, two methods are proposed to improve the reliability and robustness. To improve the reliability, for the first method, the principal components of the watermark are embedded into the host image in discrete cosine transform (DCT); and for the second method, those are embedded into the host image in discrete wavelets transform (DWT). To improve the robustness, the particle swarm optimization (PSO) is used for finding the suitable scaling factors. The experimental results demonstrate that the performance of the proposed methods outperforms than those of the existing methods. 相似文献