全文获取类型
收费全文 | 5142篇 |
免费 | 148篇 |
国内免费 | 323篇 |
学科分类
工业技术 | 5613篇 |
出版年
2024年 | 7篇 |
2023年 | 34篇 |
2022年 | 60篇 |
2021年 | 57篇 |
2020年 | 54篇 |
2019年 | 30篇 |
2018年 | 42篇 |
2017年 | 65篇 |
2016年 | 99篇 |
2015年 | 95篇 |
2014年 | 351篇 |
2013年 | 250篇 |
2012年 | 323篇 |
2011年 | 565篇 |
2010年 | 359篇 |
2009年 | 291篇 |
2008年 | 357篇 |
2007年 | 482篇 |
2006年 | 417篇 |
2005年 | 422篇 |
2004年 | 289篇 |
2003年 | 278篇 |
2002年 | 225篇 |
2001年 | 148篇 |
2000年 | 97篇 |
1999年 | 42篇 |
1998年 | 35篇 |
1997年 | 20篇 |
1996年 | 18篇 |
1995年 | 14篇 |
1994年 | 18篇 |
1993年 | 12篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 5篇 |
1989年 | 1篇 |
1988年 | 2篇 |
1987年 | 3篇 |
1986年 | 4篇 |
1985年 | 7篇 |
1984年 | 7篇 |
1983年 | 12篇 |
1982年 | 5篇 |
1981年 | 1篇 |
1977年 | 1篇 |
1975年 | 1篇 |
1966年 | 1篇 |
1965年 | 1篇 |
排序方式: 共有5613条查询结果,搜索用时 31 毫秒
41.
去身份识别技术是在视频及图像数据中去除可以确定前景身份的相关信息以达到隐私保护的目的,但是要保留足够的信息去判断人物身份的行为.传统的模式识别算法需要固定的、具有统一形式的特征,但是去识别要求最大程度去除前景特征,而存留特征无统一形式,造成识别效果不理想.为了避免上述缺陷,提出了一种类模糊模式的去身份识别方法.利用主成分分析法,对采集的安防监控图像进行特征提取.利用学习集训练方法,获取初步选取的人脸中心,根据人脸特征计算人脸中心与所在类均值的误差,利用迭代处理,使误差达到极小值,从而确定人脸中心,识别对象的身份.实验结果表明,改进算法能够提高安防监控过程中去身份识别的准确性. 相似文献
42.
The ability to detect gun and gun held in hand or other body parts is a typical human skill. The same problem presents an imperative task for computer vision system. Automatic observer independent detection of hand held gun or gun held in the other body part, whether it is visible or concealed, provides enhance security in vulnerable places and initiates appropriate action there. Compare to the automatic object detection systems, automatic detection of gun has very few successful attempts. In the present scope of this paper, we present an extensive survey on automatic detection of gun and define a taxonomy for this particular detection system. We also describe the inherent difficulties related with this problem. In this survey of published papers, we examine different approaches used in state-of-the-art attempts and compare performances of these approaches. Finally, this paper concludes pointing to the possible research gaps in related fields. 相似文献
43.
In this paper, security constrained unit commitment (SCUC) is employed for simultaneous clearing of energy and reserve markets. Spinning reserve of generation units and interruptible loads (IL) are assumed as system operating reserves. In the proposed method, the unit commitment program is done with considering the wind power uncertainty. So, modeling the wind uncertainty has been done by a two-stage stochastic programming. Also, the economic evaluation of wind power uncertainty is discussed and the impacts of IL and wind farm locations have been studied on the system reliability. Expected energy not supplied (EENS) is considered as criterion for undesirable load shedding of power system. Finally, the proposed model is applied to the IEEE reliability test system (IEEE-RTS) to demonstrate its effectiveness. 相似文献
44.
During the excavation process of underground caverns, the rational selection of the ventilation scheme is very important for the safety and health of construction workers. The flood discharge tunnel groups at the Changheba Hydropower Station are selected as a case to study the design of ventilation schemes in inclined tunnel groups; these groups are characterized by a gradient of approximately 10% and a complex intersecting relationship among the tunnels. The Computational Fluid Dynamics (CFD) method is used to simulate the fluid dynamics in tunnel groups when different ventilation schemes are employed. Four ventilation schemes with the same duct at different positions along the transverse section are formulated, and the scheme approaching the right side with most of the construction adits is adopted in engineering after a comparative analysis, as it offers a well-distributed velocity field and sufficient security distance. The study reveals that flow vortices appear in the tunnels with a long axis length ranging from 5 m to 20 m; the observation that the flow velocity on the transverse sections is away from the heading face indicates that a low-velocity area is always present in the vicinity of an air duct, and the security distance on the upstream side is 60% shorter than on the downstream side with the same air-blower when the tunnels have a 10% gradient. In addition, when the excavation distance rises 200 m, the ventilation condition in the tunnels, especially in the areas around tunnel intersections, is greatly improved by the completion of pilot tunnels and shafts in advance. 相似文献
45.
《Energy Policy》2015
Energy shortages, climate change and environmental pollution are critical issues that the entire world is faced with currently. To tackle the challenge and realize sustainable development, the Chinese government launched the Energy-Saving Generation Dispatch (ESGD) in 2007. In the ESGD scheme, generating units are dispatched based on fuel consumption rates and pollutant emission intensities from low to high. However, annual generation quotas still widely exist. With the mandatory shutdown of small-capacity and low-efficiency thermal generating units in 2006–2010, most of the currently running thermal generating units are large-capacity and highly efficient units. The additional improvement of the overall energy efficiency under this situation is a key problem for the Chinese electric power industry. To this end, a new type of ESGD framework is designed in this paper. Sequential coordination among yearly, monthly, day-ahead and real-time generation schedules is proposed. Based on the framework, the corresponding models are formulated. Empirical analysis is conducted using the realistic data obtained from the Guangdong Power Grid Corporation. Four generation dispatch modes are compared. The results indicate that the proposed ESGD mode can further reduce energy consumption and pollutant emissions. Hopefully, this paper can provide a valuable reference for policy making in the Chinese power sector. 相似文献
46.
刘景锦 《网络安全技术与应用》2014,(5):25-26
本文探讨利用RouterOS软路由来建设图书馆电子阅览室网络的低成本、高性能解决方案,介绍了ROS的特点及其安装和配置过程,尤其在电子阅览室网络安全方面进行了详细分析并给出有效的配置. 相似文献
47.
《International journal of human-computer studies》2014,72(12):860-874
In this study, we propose a hierarchy of password importance, and we use an experiment to examine the degree of similarity between passwords for lower-level (e.g. news portal) and higher-level (e.g. banking) websites in this hierarchy. We asked subjects to construct passwords for websites at both levels. Leveraging the lower-level passwords along with a dictionary attack, we successfully cracked almost one-third of the subjects׳ higher-level passwords. In a survey, subjects reported frequently reusing higher-level passwords, with or without modifications, as well as using a similar process to construct both levels of passwords. We thus conclude that unsafely shared or leaked lower-level passwords can be used by attackers to crack higher-level passwords. 相似文献
48.
Designing and executing test cases for security-critical protocols is a technically complicated and tedious process. SecureMDD is a model-driven approach that enables development of security-critical applications based on cryptographic protocols. In this paper we introduce a method which combines the model-driven approach used in SecureMDD with the design of functional and security tests. We construct and evaluate new modeling guidelines that allow the modeler to easily define such test cases during the modeling stage. We also implement model transformation routines to generate runnable tests for actual implementation of applications developed with SecureMDD. 相似文献
49.
The increasing diffusion of services enabled by Internet of Things (IoT) technologies raises several risks associated to security and data quality. Together with the high number of heterogeneous interconnected devices, this creates scalability issues, thereby calling for a flexible middleware platform able to deal with both security threats and data quality issues in a dynamic IoT environment. In this paper a lightweight and cross-domain prototype of a distributed architecture for IoT is presented, providing minimum data caching functionality and in-memory data processing. A number of supporting algorithms for the assessment of data quality and security are presented and discussed. In the presented system, users can request services on the basis of a publish/subscribe mechanism, data from IoT devices being filtered according to users requirements in terms of security and quality. The prototype is validated in an experimental setting characterized by the usage of real-time open data feeds presenting different levels of reliability, quality and security. 相似文献
50.
In this paper, a novel image encryption scheme based on two rounds of substitution–diffusion is proposed. Two main objectives have guided the design of this scheme: (a) robustness against the most known type of attacks (statistical, chosen/known plaintext, ciphertext-only and brute force attacks) and (b) efficiency in terms of computational complexity (i.e., execution time reduction) in order to meet recent mobiles’ applications’ requirements. First, a dynamic key, changed for every input image is generated and used as the basis to construct the substitution and diffusion processes. Then, the encryption process is performed by the transmitter based on a non-linear S-box (substitution) and a matrix multiplication (diffusion), applied on each sub-matrix of the image. At the destination side, decryption is applied in the reverse order. We have conducted several series of experiments to evaluate the effectiveness of the proposed scheme. The obtained results validated the robustness of our scheme against all considered types of attacks and showed an improvement in terms of execution time reduction compared to the recent existed image-encryption schemes. 相似文献