首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5142篇
  免费   148篇
  国内免费   323篇
工业技术   5613篇
  2024年   7篇
  2023年   34篇
  2022年   60篇
  2021年   57篇
  2020年   54篇
  2019年   30篇
  2018年   42篇
  2017年   65篇
  2016年   99篇
  2015年   95篇
  2014年   351篇
  2013年   250篇
  2012年   323篇
  2011年   565篇
  2010年   359篇
  2009年   291篇
  2008年   357篇
  2007年   482篇
  2006年   417篇
  2005年   422篇
  2004年   289篇
  2003年   278篇
  2002年   225篇
  2001年   148篇
  2000年   97篇
  1999年   42篇
  1998年   35篇
  1997年   20篇
  1996年   18篇
  1995年   14篇
  1994年   18篇
  1993年   12篇
  1992年   3篇
  1991年   3篇
  1990年   5篇
  1989年   1篇
  1988年   2篇
  1987年   3篇
  1986年   4篇
  1985年   7篇
  1984年   7篇
  1983年   12篇
  1982年   5篇
  1981年   1篇
  1977年   1篇
  1975年   1篇
  1966年   1篇
  1965年   1篇
排序方式: 共有5613条查询结果,搜索用时 218 毫秒
31.
The socio-economic and ecological impacts of selected projects of the BMBF funding program “r4 – Innovative Technologies for Resource Efficiency – Research for the Provision of Raw Materials of Strategic Economic Importance” are presented. Many, but not all, research projects indicate a potential improvement of the supply situation in Germany. In some cases, the provision of secondary raw materials is unprofitable or ecologically detrimental. These cases require a balancing between security of supply and other economic and ecological objectives.  相似文献   
32.
Various intrusion detection systems (IDSs) have been proposed in recent years to provide safe and reliable services in cloud computing. However, few of them have considered the existence of service attackers who can adapt their attacking strategies to the topology-varying environment and service providers’ strategies. In this paper, we investigate the security and dependability mechanism when service providers are facing service attacks of software and hardware, and propose a stochastic evolutionary coalition game (SECG) framework for secure and reliable defenses in virtual sensor services. At each stage of the game, service providers observe the resource availability, the quality of service (QoS), and the attackers’ strategies from cloud monitoring systems (CMSs) and IDSs. According to these observations, they will decide how evolutionary coalitions should be dynamically formed for reliable virtual-sensor-service composites to deliver data and how to adaptively defend in the face of uncertain attack strategies. Using the evolutionary coalition game, virtual-sensor-service nodes can form a reliable service composite by a reliability update function. With the Markov chain constructed, virtual-sensor-service nodes can gradually learn the optimal strategy and evolutionary coalition structure through the minimax-Q learning, which maximizes the expected sum of discounted payoffs defined as QoS for virtual-sensor-service composites. The proposed SECG strategy in the virtual-sensor-service attack-defense game is shown to achieve much better performance than strategies obtained from the evolutionary coalition game or stochastic game, which only maximizes each stage's payoff and optimizes a defense strategy of stochastic evolutionary, since it successfully accommodates the environment dynamics and the strategic behavior of the service attackers.  相似文献   
33.
Energy shortages, climate change and environmental pollution are critical issues that the entire world is faced with currently. To tackle the challenge and realize sustainable development, the Chinese government launched the Energy-Saving Generation Dispatch (ESGD) in 2007. In the ESGD scheme, generating units are dispatched based on fuel consumption rates and pollutant emission intensities from low to high. However, annual generation quotas still widely exist. With the mandatory shutdown of small-capacity and low-efficiency thermal generating units in 2006–2010, most of the currently running thermal generating units are large-capacity and highly efficient units. The additional improvement of the overall energy efficiency under this situation is a key problem for the Chinese electric power industry. To this end, a new type of ESGD framework is designed in this paper. Sequential coordination among yearly, monthly, day-ahead and real-time generation schedules is proposed. Based on the framework, the corresponding models are formulated. Empirical analysis is conducted using the realistic data obtained from the Guangdong Power Grid Corporation. Four generation dispatch modes are compared. The results indicate that the proposed ESGD mode can further reduce energy consumption and pollutant emissions. Hopefully, this paper can provide a valuable reference for policy making in the Chinese power sector.  相似文献   
34.
Recently, the Tactile Internet (TI) becomes a new era of the Internet. The TI provides ultra-reliable, ultra-responsive and intelligent network connectivity for delivering real-time control and physical haptic experiences from a remote location. The TI provides a different feeling to human–machine interaction by implementing the real-time interactive systems. In this review article, we discuss a generalized authentication model which can be used to perform authentication procedure among different communicating parties in order to secure remote surgery in the TI environment. By using the proposed authentication model, an authentication protocol can be designed so that an authenticated surgeon can use the robot/robotic arms to perform the surgery securely as well as remotely. Since the application is very critical, the important instructions provided by the surgeon to the robot/robotic arms must not be leaked in between the communication during the surgical procedure. To deal with this emerging research area, a secure mutual user authentication mechanism should be provided between a remote surgeon and the robot/robotic arms so that they can communicate securely using the established session key among them. Further, several security issues and challenges for such kind of communication are also discussed in this article. Finally, we discuss few points that need to be considered as future research works that are related to authentication for securing remote surgery in the TI environment.  相似文献   
35.
大数据正在改变着我们的生活,也在改变着企业的运营模式,数据已经慢慢成为企业的核心资产、战略资源。数据在被深度挖掘、共享应用的同时,也成为不法分子盗取的主要目标,因此数据安全已经成为网络安全的重要组成部分。本论文立足于数据被访问过程中可能出现的泄露场景,基于任何一次数据访问过程中的5W1H六要素,利用聚类和标签算法构建一种实时的数据异常访问综合分析方法。  相似文献   
36.
During the excavation process of underground caverns, the rational selection of the ventilation scheme is very important for the safety and health of construction workers. The flood discharge tunnel groups at the Changheba Hydropower Station are selected as a case to study the design of ventilation schemes in inclined tunnel groups; these groups are characterized by a gradient of approximately 10% and a complex intersecting relationship among the tunnels. The Computational Fluid Dynamics (CFD) method is used to simulate the fluid dynamics in tunnel groups when different ventilation schemes are employed. Four ventilation schemes with the same duct at different positions along the transverse section are formulated, and the scheme approaching the right side with most of the construction adits is adopted in engineering after a comparative analysis, as it offers a well-distributed velocity field and sufficient security distance. The study reveals that flow vortices appear in the tunnels with a long axis length ranging from 5 m to 20 m; the observation that the flow velocity on the transverse sections is away from the heading face indicates that a low-velocity area is always present in the vicinity of an air duct, and the security distance on the upstream side is 60% shorter than on the downstream side with the same air-blower when the tunnels have a 10% gradient. In addition, when the excavation distance rises 200 m, the ventilation condition in the tunnels, especially in the areas around tunnel intersections, is greatly improved by the completion of pilot tunnels and shafts in advance.  相似文献   
37.
This paper presents an adjustable robust security constrained economic dispatch (SCED) model with wind power uncertainties. First, the scenario based adjustable robust SCED model is presented. It considers multiple scenarios from historical data as well as the spatial correlation among wind farms. Then, the proposed SCED model becomes an optimization problem with a large amount of constraints which is skillfully solved using a lift-and-project minimum volume enclosing ellipsoid (MVEE) based convex hull. Furthermore, the proposed model is transformed into a second order cone programming (SOCP) model by the use of participation factors to generate adjustable generation outputs and thus guarantee the energy balance. In order to further reduce the computational complexity, the inactive constraints reduction strategy is proposed to quickly eliminate inactive SOC security constraints before solving the model. Numerical results of IEEE 14-bus and 118-bus test systems as well as the practical Polish power systems with several wind farms show that the proposed model can achieve better economies. Moreover, more than 82% of security constraints are identified as inactive in various cases of the simulation, and the proposed inactive constraints reduction strategy is promising for improving the computational performance.  相似文献   
38.
The adoption of the cloud paradigm to access IT resources and services has posed many security issues which need to be cared of. Security becomes even a much bigger concern when services built on top of many commercial clouds have to interoperate. Among others, the value of the service delivered to end customers is strongly affected by the security of network which providers are able to build in typical SOA contexts. Currently, every provider advertises its own security strategy by means of proprietary policies, which are sometimes ambiguous and very often address the security problem from a non-uniform perspective. Even policies expressed in standardized languages do not appear to fit a dynamic scenario like the SOA’s, where services need to be sought and composed on the fly in a way that is compatible with the end-to-end security requirements. We then propose an approach that leverages on the semantic technology to enrich standardized security policies with an ad-hoc content. The semantic annotation of policies enables machine reasoning which is then used for both the discovery and the composition of security-enabled services. In the presented approach the semantic enrichment of policies is enforced by an automatic procedure. We further developed a semantic framework capable of matchmaking in a smart way security capabilities of providers and security requirements of customers, and tested it on a use case scenario.  相似文献   
39.
在国际社会中认同与制度化构成一个互动的关系。从认同的角度来看,正向的国家间认同为制度化的发展打下良好基础;从制度的角度来看,国际制度为国家认同的塑造提供平台,高级制度化往往伴随着一个国家内化规范及认同建构的过程。二战后的欧美安全关系的发展就是一个认同与制度化良好互动的典型例证。双方在良好认同的基础上开始制度化进程,而在国际制度基础上的国家间交往,则进一步加深二者对彼此的认知程度,推动欧美关系朝积极的方向发展,最终建立一个稳定有效的欧美安全共同体。  相似文献   
40.
This special issue assembles a set of twelve papers, which provide new insights on the security and privacy technology of big data in cloud computing environments. This preface provides overview of all articles in the viewpoint set.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号