首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5142篇
  免费   148篇
  国内免费   323篇
工业技术   5613篇
  2024年   7篇
  2023年   34篇
  2022年   60篇
  2021年   57篇
  2020年   54篇
  2019年   30篇
  2018年   42篇
  2017年   65篇
  2016年   99篇
  2015年   95篇
  2014年   351篇
  2013年   250篇
  2012年   323篇
  2011年   565篇
  2010年   359篇
  2009年   291篇
  2008年   357篇
  2007年   482篇
  2006年   417篇
  2005年   422篇
  2004年   289篇
  2003年   278篇
  2002年   225篇
  2001年   148篇
  2000年   97篇
  1999年   42篇
  1998年   35篇
  1997年   20篇
  1996年   18篇
  1995年   14篇
  1994年   18篇
  1993年   12篇
  1992年   3篇
  1991年   3篇
  1990年   5篇
  1989年   1篇
  1988年   2篇
  1987年   3篇
  1986年   4篇
  1985年   7篇
  1984年   7篇
  1983年   12篇
  1982年   5篇
  1981年   1篇
  1977年   1篇
  1975年   1篇
  1966年   1篇
  1965年   1篇
排序方式: 共有5613条查询结果,搜索用时 31 毫秒
41.
去身份识别技术是在视频及图像数据中去除可以确定前景身份的相关信息以达到隐私保护的目的,但是要保留足够的信息去判断人物身份的行为.传统的模式识别算法需要固定的、具有统一形式的特征,但是去识别要求最大程度去除前景特征,而存留特征无统一形式,造成识别效果不理想.为了避免上述缺陷,提出了一种类模糊模式的去身份识别方法.利用主成分分析法,对采集的安防监控图像进行特征提取.利用学习集训练方法,获取初步选取的人脸中心,根据人脸特征计算人脸中心与所在类均值的误差,利用迭代处理,使误差达到极小值,从而确定人脸中心,识别对象的身份.实验结果表明,改进算法能够提高安防监控过程中去身份识别的准确性.  相似文献   
42.
The ability to detect gun and gun held in hand or other body parts is a typical human skill. The same problem presents an imperative task for computer vision system. Automatic observer independent detection of hand held gun or gun held in the other body part, whether it is visible or concealed, provides enhance security in vulnerable places and initiates appropriate action there. Compare to the automatic object detection systems, automatic detection of gun has very few successful attempts. In the present scope of this paper, we present an extensive survey on automatic detection of gun and define a taxonomy for this particular detection system. We also describe the inherent difficulties related with this problem. In this survey of published papers, we examine different approaches used in state-of-the-art attempts and compare performances of these approaches. Finally, this paper concludes pointing to the possible research gaps in related fields.  相似文献   
43.
In this paper, security constrained unit commitment (SCUC) is employed for simultaneous clearing of energy and reserve markets. Spinning reserve of generation units and interruptible loads (IL) are assumed as system operating reserves. In the proposed method, the unit commitment program is done with considering the wind power uncertainty. So, modeling the wind uncertainty has been done by a two-stage stochastic programming. Also, the economic evaluation of wind power uncertainty is discussed and the impacts of IL and wind farm locations have been studied on the system reliability. Expected energy not supplied (EENS) is considered as criterion for undesirable load shedding of power system. Finally, the proposed model is applied to the IEEE reliability test system (IEEE-RTS) to demonstrate its effectiveness.  相似文献   
44.
During the excavation process of underground caverns, the rational selection of the ventilation scheme is very important for the safety and health of construction workers. The flood discharge tunnel groups at the Changheba Hydropower Station are selected as a case to study the design of ventilation schemes in inclined tunnel groups; these groups are characterized by a gradient of approximately 10% and a complex intersecting relationship among the tunnels. The Computational Fluid Dynamics (CFD) method is used to simulate the fluid dynamics in tunnel groups when different ventilation schemes are employed. Four ventilation schemes with the same duct at different positions along the transverse section are formulated, and the scheme approaching the right side with most of the construction adits is adopted in engineering after a comparative analysis, as it offers a well-distributed velocity field and sufficient security distance. The study reveals that flow vortices appear in the tunnels with a long axis length ranging from 5 m to 20 m; the observation that the flow velocity on the transverse sections is away from the heading face indicates that a low-velocity area is always present in the vicinity of an air duct, and the security distance on the upstream side is 60% shorter than on the downstream side with the same air-blower when the tunnels have a 10% gradient. In addition, when the excavation distance rises 200 m, the ventilation condition in the tunnels, especially in the areas around tunnel intersections, is greatly improved by the completion of pilot tunnels and shafts in advance.  相似文献   
45.
Energy shortages, climate change and environmental pollution are critical issues that the entire world is faced with currently. To tackle the challenge and realize sustainable development, the Chinese government launched the Energy-Saving Generation Dispatch (ESGD) in 2007. In the ESGD scheme, generating units are dispatched based on fuel consumption rates and pollutant emission intensities from low to high. However, annual generation quotas still widely exist. With the mandatory shutdown of small-capacity and low-efficiency thermal generating units in 2006–2010, most of the currently running thermal generating units are large-capacity and highly efficient units. The additional improvement of the overall energy efficiency under this situation is a key problem for the Chinese electric power industry. To this end, a new type of ESGD framework is designed in this paper. Sequential coordination among yearly, monthly, day-ahead and real-time generation schedules is proposed. Based on the framework, the corresponding models are formulated. Empirical analysis is conducted using the realistic data obtained from the Guangdong Power Grid Corporation. Four generation dispatch modes are compared. The results indicate that the proposed ESGD mode can further reduce energy consumption and pollutant emissions. Hopefully, this paper can provide a valuable reference for policy making in the Chinese power sector.  相似文献   
46.
本文探讨利用RouterOS软路由来建设图书馆电子阅览室网络的低成本、高性能解决方案,介绍了ROS的特点及其安装和配置过程,尤其在电子阅览室网络安全方面进行了详细分析并给出有效的配置.  相似文献   
47.
In this study, we propose a hierarchy of password importance, and we use an experiment to examine the degree of similarity between passwords for lower-level (e.g. news portal) and higher-level (e.g. banking) websites in this hierarchy. We asked subjects to construct passwords for websites at both levels. Leveraging the lower-level passwords along with a dictionary attack, we successfully cracked almost one-third of the subjects׳ higher-level passwords. In a survey, subjects reported frequently reusing higher-level passwords, with or without modifications, as well as using a similar process to construct both levels of passwords. We thus conclude that unsafely shared or leaked lower-level passwords can be used by attackers to crack higher-level passwords.  相似文献   
48.
Designing and executing test cases for security-critical protocols is a technically complicated and tedious process. SecureMDD is a model-driven approach that enables development of security-critical applications based on cryptographic protocols. In this paper we introduce a method which combines the model-driven approach used in SecureMDD with the design of functional and security tests. We construct and evaluate new modeling guidelines that allow the modeler to easily define such test cases during the modeling stage. We also implement model transformation routines to generate runnable tests for actual implementation of applications developed with SecureMDD.  相似文献   
49.
The increasing diffusion of services enabled by Internet of Things (IoT) technologies raises several risks associated to security and data quality. Together with the high number of heterogeneous interconnected devices, this creates scalability issues, thereby calling for a flexible middleware platform able to deal with both security threats and data quality issues in a dynamic IoT environment. In this paper a lightweight and cross-domain prototype of a distributed architecture for IoT is presented, providing minimum data caching functionality and in-memory data processing. A number of supporting algorithms for the assessment of data quality and security are presented and discussed. In the presented system, users can request services on the basis of a publish/subscribe mechanism, data from IoT devices being filtered according to users requirements in terms of security and quality. The prototype is validated in an experimental setting characterized by the usage of real-time open data feeds presenting different levels of reliability, quality and security.  相似文献   
50.
In this paper, a novel image encryption scheme based on two rounds of substitution–diffusion is proposed. Two main objectives have guided the design of this scheme: (a) robustness against the most known type of attacks (statistical, chosen/known plaintext, ciphertext-only and brute force attacks) and (b) efficiency in terms of computational complexity (i.e., execution time reduction) in order to meet recent mobiles’ applications’ requirements. First, a dynamic key, changed for every input image is generated and used as the basis to construct the substitution and diffusion processes. Then, the encryption process is performed by the transmitter based on a non-linear S-box (substitution) and a matrix multiplication (diffusion), applied on each sub-matrix of the image. At the destination side, decryption is applied in the reverse order. We have conducted several series of experiments to evaluate the effectiveness of the proposed scheme. The obtained results validated the robustness of our scheme against all considered types of attacks and showed an improvement in terms of execution time reduction compared to the recent existed image-encryption schemes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号