首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6095篇
  免费   187篇
  国内免费   23篇
工业技术   6305篇
  2023年   102篇
  2022年   201篇
  2021年   235篇
  2020年   211篇
  2019年   186篇
  2018年   276篇
  2017年   236篇
  2016年   223篇
  2015年   150篇
  2014年   217篇
  2013年   453篇
  2012年   237篇
  2011年   292篇
  2010年   218篇
  2009年   227篇
  2008年   221篇
  2007年   167篇
  2006年   162篇
  2005年   99篇
  2004年   84篇
  2003年   90篇
  2002年   74篇
  2001年   56篇
  2000年   72篇
  1999年   85篇
  1998年   218篇
  1997年   145篇
  1996年   127篇
  1995年   95篇
  1994年   80篇
  1993年   83篇
  1992年   62篇
  1991年   60篇
  1990年   49篇
  1989年   60篇
  1988年   46篇
  1987年   43篇
  1986年   52篇
  1985年   66篇
  1984年   48篇
  1983年   55篇
  1982年   57篇
  1981年   56篇
  1980年   50篇
  1979年   44篇
  1978年   26篇
  1977年   39篇
  1976年   46篇
  1974年   28篇
  1973年   23篇
排序方式: 共有6305条查询结果,搜索用时 0 毫秒
81.

Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for such modern-day systems. An intrusion detection system (IDS) is a solution that has recently gained the researcher’s attention with the application of deep learning techniques in IDS. In this paper, we propose an IDS model that uses a deep learning algorithm, conditional generative adversarial network (CGAN), enabling unsupervised learning in the model and adding an eXtreme gradient boosting (XGBoost) classifier for faster comparison and visualization of results. The proposed method can reduce the need to deploy extra sensors to generate fake data to fool the intruder 1.2–2.6%, as the proposed system generates this fake data. The parameters were selected to give optimal results to our model without significant alterations and complications. The model learns from its dataset samples with the multiple-layer network for a refined training process. We aimed that the proposed model could improve the accuracy and thus, decrease the false detection rate and obtain good precision in the cases of both the datasets, NSL-KDD and the CICIDS2017, which can be used as a detector for cyber intrusions. The false alarm rate of the proposed model decreases by about 1.827%.

  相似文献   
82.
Wireless Personal Communications - Cloud is an environment where the resources are outsourced as service to the cloud consumers based on their demand. The cloud providers follows pay as you go...  相似文献   
83.
Wireless Personal Communications - This work aims to implement a clustering scheme to separate vehicles into a cluster that is based on various parameters, such as the total number of relay nodes,...  相似文献   
84.

Detection of the selfish node in a delay tolerant network (DTN) can sharply reduce the loss incurred in a network. The algorithm's current pedigree mainly focuses on the rely on nodes, records, and delivery performance. The community structure and social aspects have been overlooked. Analysis of individual and social tie preferences results in an extensive detection time and increases communication overhead. In this article, a heterogeneous DTN topology with high-power stationary nodes and mobile nodes on Manhattan's accurate map is designed. With the increasing complexity of social ties and the diversified nature of topology structure, there need for a method that can effectively capture the essence within the speculated time. In this article, a novel deep autoencoder-based nonnegative matrix factorization (DANMF) is proposed for DTN topology. The topology of social ties projected onto low-dimensional space leads to effective cluster formation. DANMF automatically learns an appropriate nonlinear mapping function by utilizing the features of data. Also, the inherent structure of the deep autoencoder is nonlinear and has strong generalization. The membership matrices extracted from the DANMF are used to design the weighted cumulative social tie that eventually, along with the residual energy, is used to detect the network's selfish node. The testing of the designed model is carried out on the real dataset of MIT reality. The proficiency of the developed algorithm has been well tested and proved at every step. The methods employed for social tie extraction are NMF and DANMF. The methodology is rigorously experimented on various scenarios and has improved around 80% in the worst-case scenario of 40% nodes turning selfish. A comprehensive comparison is made with the other existing state-of-the-art methods which are also incentive-based approaches. The developed method has outperformed and has shown the supremacy of the current methods to capture the latent, hidden structure of the social tie.

  相似文献   
85.
Cloud computing is an Information Technology deployment model established on virtualization. Task scheduling states the set of rules for task allocations to an exact virtual machine in the cloud computing environment. However, task scheduling challenges such as optimal task scheduling performance solutions, are addressed in cloud computing. First, the cloud computing performance due to task scheduling is improved by proposing a Dynamic Weighted Round-Robin algorithm. This recommended DWRR algorithm improves the task scheduling performance by considering resource competencies, task priorities, and length. Second, a heuristic algorithm called Hybrid Particle Swarm Parallel Ant Colony Optimization is proposed to solve the task execution delay problem in DWRR based task scheduling. In the end, a fuzzy logic system is designed for HPSPACO that expands task scheduling in the cloud environment. A fuzzy method is proposed for the inertia weight update of the PSO and pheromone trails update of the PACO. Thus, the proposed Fuzzy Hybrid Particle Swarm Parallel Ant Colony Optimization on cloud computing achieves improved task scheduling by minimizing the execution and waiting time, system throughput, and maximizing resource utilization.  相似文献   
86.
The present article is concerned with the investigation of disturbances in a homogeneous transversely isotropic thermoelastic rotating medium with two temperatures, in the presence of the combined effects of Hall currents and magnetic field. The formulation is applied to the thermoelasticity theories developed by Green-Naghdi theories of type-II and type-III. Laplace and Fourier transform techniques are applied to solve the problem. The analytical expressions of displacements, stress components, temperature change, and current density components are obtained in the transformed domain. A numerical inversion technique has been applied to obtain the results in the physical domain. Numerical simulated results are depicted graphically to show the effect of Hall current and two temperatures on resulting quantities. Some special cases are also deduced from the present investigation.  相似文献   
87.
The two-dimensional problem of expanding ring load in a modified couple stress theory of thermoelastic diffusion with heat sources in time and frequency domains is investigated. The mathematical formulation prepared for thermoelastic diffusion solids with one and two relaxation times using Laplace and Hankel transforms. The displacements, stress components, temperature change, and chemical potential are obtained in a transformed domain. Numerical computation is performed for these quantities and the resulting quantities are shown graphically for the time and frequency domains. Comparisons are made with the results predicted by the two theories and different values of time and frequency. Particular cases of interest are also deduced.  相似文献   
88.
89.
90.
Sensors produce a large amount of multivariate time series data to record the states of Internet of Things (IoT) systems. Multivariate time series timestamp anomaly detection (TSAD) can identify timestamps of attacks and malfunctions. However, it is necessary to determine which sensor or indicator is abnormal to facilitate a more detailed diagnosis, a process referred to as fine-grained anomaly detection (FGAD). Although further FGAD can be extended based on TSAD methods, existing works do not provide a quantitative evaluation, and the performance is unknown. Therefore, to tackle the FGAD problem, this paper first verifies that the TSAD methods achieve low performance when applied to the FGAD task directly because of the excessive fusion of features and the ignoring of the relationship’s dynamic changes between indicators. Accordingly, this paper proposes a multivariate time series fine-grained anomaly detection (MFGAD) framework. To avoid excessive fusion of features, MFGAD constructs two sub-models to independently identify the abnormal timestamp and abnormal indicator instead of a single model and then combines the two kinds of abnormal results to detect the fine-grained anomaly. Based on this framework, an algorithm based on Graph Attention Neural Network (GAT) and Attention Convolutional Long-Short Term Memory (A-ConvLSTM) is proposed, in which GAT learns temporal features of multiple indicators to detect abnormal timestamps and A-ConvLSTM captures the dynamic relationship between indicators to identify abnormal indicators. Extensive simulations on a real-world dataset demonstrate that the proposed algorithm can achieve a higher F1 score and hit rate than the extension of existing TSAD methods with the benefit of two independent sub-models for timestamp and indicator detection.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号