全文获取类型
收费全文 | 28018篇 |
免费 | 2183篇 |
国内免费 | 2732篇 |
学科分类
工业技术 | 32933篇 |
出版年
2024年 | 45篇 |
2023年 | 303篇 |
2022年 | 676篇 |
2021年 | 1022篇 |
2020年 | 961篇 |
2019年 | 541篇 |
2018年 | 577篇 |
2017年 | 698篇 |
2016年 | 757篇 |
2015年 | 897篇 |
2014年 | 1716篇 |
2013年 | 1633篇 |
2012年 | 1934篇 |
2011年 | 2400篇 |
2010年 | 1549篇 |
2009年 | 1410篇 |
2008年 | 1680篇 |
2007年 | 1941篇 |
2006年 | 1900篇 |
2005年 | 1767篇 |
2004年 | 1529篇 |
2003年 | 1539篇 |
2002年 | 1331篇 |
2001年 | 1057篇 |
2000年 | 953篇 |
1999年 | 707篇 |
1998年 | 428篇 |
1997年 | 270篇 |
1996年 | 182篇 |
1995年 | 135篇 |
1994年 | 97篇 |
1993年 | 76篇 |
1992年 | 46篇 |
1991年 | 28篇 |
1990年 | 25篇 |
1989年 | 30篇 |
1988年 | 23篇 |
1987年 | 8篇 |
1986年 | 16篇 |
1985年 | 5篇 |
1984年 | 16篇 |
1983年 | 9篇 |
1982年 | 6篇 |
1981年 | 4篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1977年 | 2篇 |
1972年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 109 毫秒
1.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability. 相似文献
2.
Accurate and timely network traffic measurement is essential for network status monitoring, network fault analysis, network intrusion detection, and network security management. With the rapid development of the network, massive network traffic brings severe challenges to network traffic measurement. However, existing measurement methods suffer from many limitations for effectively recording and accurately analyzing big-volume traffic. Recently, sketches, a family of probabilistic data structures that employ hashing technology for summarizing traffic data, have been widely used to solve these problems. However, current literature still lacks a thorough review on sketch-based traffic measurement methods to offer a comprehensive insight on how to apply sketches for fulfilling various traffic measurement tasks. In this paper, we provide a detailed and comprehensive review on the applications of sketches in network traffic measurement. To this end, we classify the network traffic measurement tasks into four categories based on the target of traffic measurement, namely cardinality estimation, flow size estimation, change anomaly detection, and persistent spreader identification. First, we briefly introduce these four types of traffic measurement tasks and discuss the advantages of applying sketches. Then, we propose a series of requirements with regard to the applications of sketches in network traffic measurement. After that, we perform a fine-grained classification for each sketch-based measurement category according to the technologies applied on sketches. During the review, we evaluate the performance, advantages and disadvantages of current sketch-based traffic measurement methods based on the proposed requirements. Through the thorough review, we gain a number of valuable implications that can guide us to choose and design proper traffic measurement methods based on sketches. We also review a number of general sketches that are highly expected in modern network systems to simultaneously perform multiple traffic measurement tasks and discuss their performance based on the proposed requirements. Finally, through our serious review, we summarize a number of open issues and identify several promising research directions. 相似文献
3.
分析研究目前通信工程网络安全问题,提出几点解决问题的对策,旨在为提升通信工程网络安全性提供一定的帮助,以此来促使通信工程网络系统安全性的提升。 相似文献
4.
Zhenkun Ke Xin Cao Chuanli Shan Lifen Shi Pingping Wang Yong Yang Fengyang Zhao Jiedong Cui Jinwei Li Gang Zhou Min Guan Tao Yu 《Ceramics International》2021,47(14):19605-19613
The purpose of the current work was to research the effect of alkali metal oxide on the structure, thermal properties, viscosity and chemical stability in the glass system (R2O–CaO–B2O3–SiO2) systematically. Because the glass would emulsify when Li2O was added to the glass batch, this article did not discuss Li2O. The results showed that when the amount of Na2O was less than 4 mol.%, there was a higher interconnectivity of borate and silicate sub-networks in glass, as more mixed Si–O–B bonds were present in glass. The glass samples exhibited excellent thermal properties and chemical stabilities. As the amount of Na2O exceeded 4 mol.%, the interconnectivity of borate and silicate sub-networks was weakened. The thermal properties and chemical stabilities of the glass samples were reduced. The connectivity of the silicate sub-network was weakened slightly as the Na/K ratio varied, and the coefficient of thermal expansion (CTE) of the glass samples gradually increased, and the resistance to thermal shock (RTS) value gradually decreased. Moreover, the viscosity of the glass samples decreased with the ratio of Na/Si and Na/K increased. 相似文献
5.
Face aging (FA) for young faces refers to rendering the aging faces at target age for an individual, generally under 20s, which is an important topic of facial age analysis. Unlike traditional FA for adults, it is challenging to age children with one deep learning-based FA network, since there are deformations of facial shapes and variations of textural details. To alleviate the deficiency, a unified FA framework for young faces is proposed, which consists of two decoupled networks to apply aging image translation. It explicitly models transformations of geometry and appearance using two components: GD-GAN, which simulates the Geometric Deformation using Generative Adversarial Network; TV-GAN, which simulates the Textural Variations guided by the age-related saliency map. Extensive experiments demonstrate that our method has advantages over the state-of-the-art methods in terms of synthesizing visually plausible images for young faces, as well as preserving the personalized features. 相似文献
6.
7.
PC2425破碎机是较为常用的锤式破碎机规格之一,主要用于石灰石的破碎,台时产量800~1 000 t,出料粒度≤70 mm,筛余5%,配套4 500~5 000 t水泥生产线。PC2425破碎机篦条为易损件,由于物料的冲击会导致篦条变形,但其原有的弓形架与篦条型式,更换时很难将篦条从弓形架中抽出,导致更换非常不便。此次改造,用户最初适量降低破碎机的出料粒度,以提高生料磨的产量及降低生料粉磨的电耗,虽然通过调整篦条与锤头的间距及篦条间隙可以达到降低出料粒度的要求。但是为了彻底解决篦条更换困难问题,重新设计了篦架结构。 相似文献
8.
9.
Most real-world vehicle nodes can be structured into an interconnected network of vehicles. Through structuring these services and vehicle device interactions into multiple types, such internet of vehicles becomes multidimensional heterogeneous overlay networks. The heterogeneousness of the overlays makes it difficult for the overlay networks to coordinate with each other to improve their performance. Therefore, it poses an interesting but critical challenge to the effective analysis of heterogeneous virtual vehicular networks. A variety of virtual vehicular networks can be easily deployed onto the native network by applying the concept of SDN (Software Defined Networking). These virtual networks reflect their heterogeneousness due to their different performance goals, and they compete for the same physical resources of the underlying network, so that a sub-optimal performance of the virtual networks may be achieved. Therefore, we propose a Deep Reinforcement Learning (DRL) approach to make the virtual networks cooperate with each other through the SDN controller. A cooperative solution based on the asymmetric Nash bargaining is proposed for co-existing virtual networks to improve their performance. Moreover, the Markov Chain model and DRL resolution are introduced to leverage the heterogeneous performance goals of virtual networks. The implementation of the approach is introduced, and simulation results confirm the performance improvement of the latency sensitive, loss-rate sensitive and throughput sensitive heterogeneous vehicular networks using our cooperative solution. 相似文献
10.
Fog computing has emerged to support the requirements of IoT applications that could not be met by today’s solutions. Different initiatives have been presented to drive the development of fog, and much work has been done to improve certain aspects. However, an in-depth analysis of the different solutions, detailing how they can be integrated and applied to meet specific requirements, is still required. In this work, we present a unified architectural model and a new taxonomy, by comparing a large number of solutions. Finally, we draw some conclusions and guidelines for the development of IoT applications based on fog. 相似文献