全文获取类型
收费全文 | 8639篇 |
免费 | 609篇 |
国内免费 | 636篇 |
学科分类
工业技术 | 9884篇 |
出版年
2024年 | 17篇 |
2023年 | 138篇 |
2022年 | 262篇 |
2021年 | 394篇 |
2020年 | 424篇 |
2019年 | 214篇 |
2018年 | 192篇 |
2017年 | 287篇 |
2016年 | 297篇 |
2015年 | 301篇 |
2014年 | 586篇 |
2013年 | 598篇 |
2012年 | 648篇 |
2011年 | 606篇 |
2010年 | 380篇 |
2009年 | 283篇 |
2008年 | 328篇 |
2007年 | 380篇 |
2006年 | 376篇 |
2005年 | 395篇 |
2004年 | 408篇 |
2003年 | 460篇 |
2002年 | 480篇 |
2001年 | 474篇 |
2000年 | 443篇 |
1999年 | 280篇 |
1998年 | 137篇 |
1997年 | 53篇 |
1996年 | 26篇 |
1995年 | 12篇 |
1994年 | 1篇 |
1993年 | 2篇 |
1986年 | 1篇 |
1981年 | 1篇 |
排序方式: 共有9884条查询结果,搜索用时 15 毫秒
21.
Alexander J.A.M. van Deursen Jan A.G.M. van Dijk Peter M. ten Klooster 《Telematics and Informatics》2015
We investigate types of Internet activities among a representative sample of the Dutch population from 2010 to 2013. We examined usage patterns of seven types of Internet activities (i.e., information, news, personal development, commercial transaction, social interaction, leisure, and gaming) and related these patterns with gender, age, education, and income. Activities related to news, personal development, commercial transaction, and social interaction increased in popularity. For most capital enhancing activities, men, younger people, higher educated people, and people with higher than average incomes were prominent. These observations, however, are subject to change. The Internet seems to provide increasingly more capital-enhancing opportunities for those with higher education and income, which would accordingly reinforce their already strong positions in society. 相似文献
22.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability. 相似文献
23.
Internet adoption fosters economic growth and development. Specifying policy control drivers is particularly relevant for developing countries. However, there is no consensus on the most relevant variables. We explored 33.6 million potential models to identify the most important determinants of household internet adoption using stochastic search variable selection and socioeconomic data from Medellín, Colombia. We found that monthly income, the head of household education and voting, and having a computer and cable television at home are the most relevant variables. 相似文献
24.
《矿业科学技术学报(英文版)》2020,30(6):747-757
Digitalisation in mining refers to the use of computerised or digital devices or systems and digitised data that are to reduce costs, improve business productivity, and transform mining practices. However, it remains increasingly difficult for mining companies to decide which digital technologies are most relevant to their needs and individual mines. This paper provides an overview of digital technologies currently relevant to mining companies as presented and discussed by mining journals, the media and insight reports of leading consultancy agencies. Relevant technologies were systematically identified using text-mining techniques, and network analyses established the relations between significant technologies. Results demonstrated that currently 107 different digital technologies are pursued in the mining sector. Also, an analysis of the actual implementation of digital technologies in 158 active surface and underground mines reveals a limited uptake of digital technologies in general and that the uptake increases with the run-of-mine production. Large-scale mining operations appear to select and apply digital technologies suitable to their needs, whereas operations with lower production rates do not implement the currently available digital technologies to the same extent. These minor producers may require other digital transformation solutions tailored to their capabilities and needs and applicable to their scale of operations. 相似文献
25.
尾矿库监测指标的安全稳定对于矿山在生产安全和环境保护中具有极高的参考价值。但对于我国矿山企业而言,由于受到企业规模、资金能力等因素限制,很多中小矿山企业在尾矿库安全在线监测系统建设过程中进展缓慢。如今,SaaS模式(软件即服务模式)发展迅速,SaaS模式具有互联网、多重租赁、服务、可扩展等特性,能有效解决我国中小矿山企业由于规模小、资金不足导致无法构建尾矿库安全在线监测系统的问题。 相似文献
26.
随着社会的发展,物联网已成为社会发展的重要新兴产业,在各个领域中广泛应用。物联网是基于互联网技术产生的,在物联网的运行过程中势必会产生大量数据,这些数据都是客户的隐私,切实保护好客户隐私是物联网进一步发展的首要条件。在面向物联网的隐私数据安全问题时,相关技术人员一定要清楚威胁物联网隐私数据安全的主要途径,加大安全防护力度,保护人们的隐私。文章从信息获取、信息传输以及信息处理3个途径,对隐私数据安全问题进行探讨,并提出一些加大隐私安全防护的举措。 相似文献
27.
28.
随着物联网(IoT)的快速发展,越来越多的IoT节点设备被部署,但伴随而来的安全问题也不可忽视。IoT的网络层节点设备主要通过无线传感网进行通信,其相较于互联网更开放也更容易受到拒绝服务等网络攻击。针对无线传感网面临的网络层安全问题,提出了一种基于序列模型的网络入侵检测系统,对网络层入侵进行检测和报警,具有较高的识别率以及较低的误报率。另外,针对无线传感网节点设备面临的节点主机设备的安全问题,在考虑节点开销的基础上,提出了一种基于简单序列模型的主机入侵检测系统。实验结果表明,针对无线传感网的网络层以及主机层的两个入侵检测系统的准确率都达到了99%以上,误报率在1%左右,达到了工业需求,这两个系统可以全面有效地保护无线传感网安全。 相似文献
29.
30.
针对物联网密钥不可随机拆分与撤销,本体存储数据容易遭到外界入侵,导致用户隐私信息泄露,提出物联网本体存储数据可撤销加密方法。根据数据可撤销加密的理论确定双线性映射函数,通过加密撤销的困难假设构建了物联网本体存储数据可撤销模型。对存储数据进行可撤销运算,采用了周期更新思想,将用户密钥属性、用户身份以及时间进行划分,并根据访问树的节点数据对用户存储数据进行加密计算。通过主要密钥随机拆分撤销运算,根据结果对存储数据可撤销加密进行安全认证。仿真结果表明,采用可撤销加密方法能够实现物联网密钥的随机拆分,缩短用户密钥更新周期,数据安全性更高。 相似文献