首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5142篇
  免费   148篇
  国内免费   323篇
工业技术   5613篇
  2024年   7篇
  2023年   34篇
  2022年   60篇
  2021年   57篇
  2020年   54篇
  2019年   30篇
  2018年   42篇
  2017年   65篇
  2016年   99篇
  2015年   95篇
  2014年   351篇
  2013年   250篇
  2012年   323篇
  2011年   565篇
  2010年   359篇
  2009年   291篇
  2008年   357篇
  2007年   482篇
  2006年   417篇
  2005年   422篇
  2004年   289篇
  2003年   278篇
  2002年   225篇
  2001年   148篇
  2000年   97篇
  1999年   42篇
  1998年   35篇
  1997年   20篇
  1996年   18篇
  1995年   14篇
  1994年   18篇
  1993年   12篇
  1992年   3篇
  1991年   3篇
  1990年   5篇
  1989年   1篇
  1988年   2篇
  1987年   3篇
  1986年   4篇
  1985年   7篇
  1984年   7篇
  1983年   12篇
  1982年   5篇
  1981年   1篇
  1977年   1篇
  1975年   1篇
  1966年   1篇
  1965年   1篇
排序方式: 共有5613条查询结果,搜索用时 31 毫秒
91.
There has been a slight surge in the study of technology adoption in developing countries. However, little attention has been paid to the adoption of biometric security systems. This paper reports a study that analyzed the adoption of biometric technology in a developing country from an institutional point of view. The results show that job positions (managerial and operational) could influence perceptions of innovation characteristics (especially ease of use and usefulness) in the decision to adopt biometrics. However, the unified organizational analyses indicate that ease of use, communication, size and type of organizations have significant impacts on the decision to adopt biometrics.  相似文献   
92.
Murat  Ali  Wei  Bradley   《Data & Knowledge Engineering》2009,68(11):1206
Organizations, such as federally-funded medical research centers, must share de-identified data on their consumers to publicly accessible repositories to adhere to regulatory requirements. Many repositories are managed by third-parties and it is often unknown if records received from disparate organizations correspond to the same individual. Failure to resolve this issue can lead to biased (e.g., double counting of identical records) and underpowered (e.g., unlinked records of different data types) investigations. In this paper, we present a secure multiparty computation protocol that enables record joins via consumers’ encrypted identifiers. Our solution is more practical than prior secure join models in that data holders need to interact with the third party one time per data submission. Though technically feasible, the speed of the basic protocol scales quadratically with the number of records. Thus, we introduce an extended version of our protocol in which data holders append k-anonymous features of their consumers to their encrypted submissions. These features facilitate a more efficient join computation, while providing a formal guarantee that each record is linkable to no less than k individuals in the union of all organizations’ consumers. Beyond a theoretical treatment of the problem, we provide an extensive experimental investigation with data derived from the US Census to illustrate the significant gains in efficiency such an approach can achieve.  相似文献   
93.
关于数据库系统安全现状的研究   总被引:1,自引:0,他引:1  
介绍了数据库系统安全的概念,分析了保证数据库系统安全的重要性,指出数据库系统存在着来自操作系统、人员、网络三个方面的威胁,在此基础上详细介绍了保证数据库系统安全的三个重要技术手段:标识和鉴别、访问控制和数据加密。最后结合实际情况,研究阐述了保证数据库系统安全应该采取的措施,主要有:备份措施、防火墙和入侵检测、审计和视图机制。  相似文献   
94.
杜焕强  袁思达  陈军 《计算机教育》2010,(16):141-143,146
操作系统安全实训综合运用操作系统安全与局域网组建的基础知识,是一个实用性很强的综合实践环节。针对目前高职院校实习实训基地条件受限、实训过程跟踪困难及评价方式单一,提出工作场景模拟的实训课程思想,以具体教学过程为主线指出工作场景模拟、学生角色扮演和教师的作用。  相似文献   
95.
由于地下空间的自身特点,其内部灾害的防御相当复杂,防灾成为科学合理、安全有效开发利用地下空间的重要课题。从理论角度阐述地下空间内部灾害特点、类型及综合防治,具体以防火为重点,探讨灾害的早期控制系统,指挥和管理系统。以浙江杭州萧山钱江世纪城核心区地下空间防灾概念规划为例,对地下空间内部防灾设计对策进行了研究和探讨。  相似文献   
96.
电子商务安全的研究分析   总被引:1,自引:0,他引:1  
本文主要介绍了电子商务的安全目标,并重点介绍电子商务安全性的实现。  相似文献   
97.
With the expansion of China's power system, there are more and more factors contributing to Large-area Power Outages. The snow disaster that hit Southern China in 2008 caused serious damages to the power systems, which made Chinese government realize that they cannot solely depend on power enterprises to effectively control the risk involved in power system. The Chinese government needs to collaborate with power enterprises in strengthening Electricity Regulation and taking countermeasures to reduce the risk of Large-area Power Outages. This paper first proposes an objective, practical and adaptive Electrical Security Risk Assessment System based on Electricity Regulation. The system consists of an assessment process with 278 indices, which are used to calculate the risk of Large-area Power Outages by the use of Analytic Hierarchy Process and the Delphi Method. Then, an example of Guangdong power system serves to illustrate the detailed implementation procedures of the proposed assessment system and the results show that Guangdong power system faces a moderate risk of Large-area Power Outages. Finally, some countermeasures are proposed to overcome the defects in the existing power system.  相似文献   
98.
The article explores the energy security concerns faced by China from the point of view of energy users working in government, university, civil society and business sectors. The authors first derive a set of seven hypotheses related to Chinese energy security drawn from a review of the recent academic literature. We then explain each of these seven hypotheses, relating to (1) security of energy supply, (2) geopolitics, (3) climate change, (4) decentralization, (5) energy efficiency, (6) research and innovation of new energy technologies, and (7) self sufficiency and trade. Lastly, the article tests these hypotheses through a survey distributed in English and Mandarin completed by 312 Chinese participants. The conclusion presents insights for policymakers and energy scholars.  相似文献   
99.
This study provides an index for evaluating national energy security policies and performance among the United States, European Union, Australia, New Zealand, China, India, Japan, South Korea, and the ten countries comprising the Association of Southeast Asian Nations (ASEAN). Drawn from research interviews, a survey instrument, and a focused workshop, the article first argues that energy security ought to be comprised of five dimensions related to availability, affordability, technology development, sustainability, and regulation. The article then breaks these dimensions down into 20 components and correlates them with 20 metrics that constitute a comprehensive energy security index. We find that the top three performers of our index for all data points and times are Japan, Brunei, and the United States and the worst performers Vietnam, India, and Myanmar. Malaysia, Australia, and Brunei saw their energy security improve the most from 1990 to 2010 whereas Laos, Cambodia, and Myanmar saw it decline the most. The article concludes by calling for more research on various aspects of our index and its results.  相似文献   
100.
In this paper a new algorithm for allocating energy and determining the optimum amount of network active power reserve capacity and the share of generating units and demand side contribution in providing reserve capacity requirements for day-ahead market is presented. In the proposed method, the optimum amount of reserve requirement is determined based on network security set by operator. In this regard, Expected Load Not Supplied (ELNS) is used to evaluate system security in each hour. The proposed method has been implemented over the IEEE 24-bus test system and the results are compared with a deterministic security approach, which considers certain and fixed amount of reserve capacity in each hour. This comparison is done from economic and technical points of view. The promising results show the effectiveness of the proposed model which is formulated as mixed integer linear programming (MILP) and solved by GAMS software.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号