首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8639篇
  免费   609篇
  国内免费   636篇
工业技术   9884篇
  2024年   17篇
  2023年   138篇
  2022年   262篇
  2021年   394篇
  2020年   424篇
  2019年   214篇
  2018年   192篇
  2017年   287篇
  2016年   297篇
  2015年   301篇
  2014年   586篇
  2013年   598篇
  2012年   648篇
  2011年   606篇
  2010年   380篇
  2009年   283篇
  2008年   328篇
  2007年   380篇
  2006年   376篇
  2005年   395篇
  2004年   408篇
  2003年   460篇
  2002年   480篇
  2001年   474篇
  2000年   443篇
  1999年   280篇
  1998年   137篇
  1997年   53篇
  1996年   26篇
  1995年   12篇
  1994年   1篇
  1993年   2篇
  1986年   1篇
  1981年   1篇
排序方式: 共有9884条查询结果,搜索用时 15 毫秒
21.
We investigate types of Internet activities among a representative sample of the Dutch population from 2010 to 2013. We examined usage patterns of seven types of Internet activities (i.e., information, news, personal development, commercial transaction, social interaction, leisure, and gaming) and related these patterns with gender, age, education, and income. Activities related to news, personal development, commercial transaction, and social interaction increased in popularity. For most capital enhancing activities, men, younger people, higher educated people, and people with higher than average incomes were prominent. These observations, however, are subject to change. The Internet seems to provide increasingly more capital-enhancing opportunities for those with higher education and income, which would accordingly reinforce their already strong positions in society.  相似文献   
22.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability.  相似文献   
23.
Internet adoption fosters economic growth and development. Specifying policy control drivers is particularly relevant for developing countries. However, there is no consensus on the most relevant variables. We explored 33.6 million potential models to identify the most important determinants of household internet adoption using stochastic search variable selection and socioeconomic data from Medellín, Colombia. We found that monthly income, the head of household education and voting, and having a computer and cable television at home are the most relevant variables.  相似文献   
24.
Digitalisation in mining refers to the use of computerised or digital devices or systems and digitised data that are to reduce costs, improve business productivity, and transform mining practices. However, it remains increasingly difficult for mining companies to decide which digital technologies are most relevant to their needs and individual mines. This paper provides an overview of digital technologies currently relevant to mining companies as presented and discussed by mining journals, the media and insight reports of leading consultancy agencies. Relevant technologies were systematically identified using text-mining techniques, and network analyses established the relations between significant technologies. Results demonstrated that currently 107 different digital technologies are pursued in the mining sector. Also, an analysis of the actual implementation of digital technologies in 158 active surface and underground mines reveals a limited uptake of digital technologies in general and that the uptake increases with the run-of-mine production. Large-scale mining operations appear to select and apply digital technologies suitable to their needs, whereas operations with lower production rates do not implement the currently available digital technologies to the same extent. These minor producers may require other digital transformation solutions tailored to their capabilities and needs and applicable to their scale of operations.  相似文献   
25.
尾矿库监测指标的安全稳定对于矿山在生产安全和环境保护中具有极高的参考价值。但对于我国矿山企业而言,由于受到企业规模、资金能力等因素限制,很多中小矿山企业在尾矿库安全在线监测系统建设过程中进展缓慢。如今,SaaS模式(软件即服务模式)发展迅速,SaaS模式具有互联网、多重租赁、服务、可扩展等特性,能有效解决我国中小矿山企业由于规模小、资金不足导致无法构建尾矿库安全在线监测系统的问题。  相似文献   
26.
随着社会的发展,物联网已成为社会发展的重要新兴产业,在各个领域中广泛应用。物联网是基于互联网技术产生的,在物联网的运行过程中势必会产生大量数据,这些数据都是客户的隐私,切实保护好客户隐私是物联网进一步发展的首要条件。在面向物联网的隐私数据安全问题时,相关技术人员一定要清楚威胁物联网隐私数据安全的主要途径,加大安全防护力度,保护人们的隐私。文章从信息获取、信息传输以及信息处理3个途径,对隐私数据安全问题进行探讨,并提出一些加大隐私安全防护的举措。  相似文献   
27.
基于物联网的智慧林业可持续发展策略研究   总被引:1,自引:0,他引:1  
随着我国科技的不断进步,在“互联网+”大数据的背景下,林业的智慧化发展是必经之路。虽然我国智慧林业的发展已经取得了一定的突破,但是仍然存在着许多问题。基于此,文章在物联网技术的基础上,对智慧林业的可持续发展策略进行探讨。  相似文献   
28.
程小辉  牛童  汪彦君 《计算机应用》2020,40(6):1680-1684
随着物联网(IoT)的快速发展,越来越多的IoT节点设备被部署,但伴随而来的安全问题也不可忽视。IoT的网络层节点设备主要通过无线传感网进行通信,其相较于互联网更开放也更容易受到拒绝服务等网络攻击。针对无线传感网面临的网络层安全问题,提出了一种基于序列模型的网络入侵检测系统,对网络层入侵进行检测和报警,具有较高的识别率以及较低的误报率。另外,针对无线传感网节点设备面临的节点主机设备的安全问题,在考虑节点开销的基础上,提出了一种基于简单序列模型的主机入侵检测系统。实验结果表明,针对无线传感网的网络层以及主机层的两个入侵检测系统的准确率都达到了99%以上,误报率在1%左右,达到了工业需求,这两个系统可以全面有效地保护无线传感网安全。  相似文献   
29.
为降低专网物联网(P-IoT)的建网成本,实现灵活部署和增强抗毁性以满足行业用户的应用要求,需对P-IoT自组网模式进行研究。首先,阐述了P-IoT自组网模式的重要性;在此基础上,从系统架构、支持的拓扑类型、协议栈设计以及技术优势对P-IoT自组网模式加以分析;最后,分析了P-IoT自组网模式在智能抄表与智能林防领域的创新应用。P-IoT自组网模式在多种应用环境下都能很好地满足行业用户的需求,在未来专网市场P-IoT自组网模式必将具备极强的竞争力。  相似文献   
30.
文竹 《计算机仿真》2020,37(4):322-325
针对物联网密钥不可随机拆分与撤销,本体存储数据容易遭到外界入侵,导致用户隐私信息泄露,提出物联网本体存储数据可撤销加密方法。根据数据可撤销加密的理论确定双线性映射函数,通过加密撤销的困难假设构建了物联网本体存储数据可撤销模型。对存储数据进行可撤销运算,采用了周期更新思想,将用户密钥属性、用户身份以及时间进行划分,并根据访问树的节点数据对用户存储数据进行加密计算。通过主要密钥随机拆分撤销运算,根据结果对存储数据可撤销加密进行安全认证。仿真结果表明,采用可撤销加密方法能够实现物联网密钥的随机拆分,缩短用户密钥更新周期,数据安全性更高。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号