全文获取类型
收费全文 | 5142篇 |
免费 | 148篇 |
国内免费 | 323篇 |
学科分类
工业技术 | 5613篇 |
出版年
2024年 | 7篇 |
2023年 | 34篇 |
2022年 | 60篇 |
2021年 | 57篇 |
2020年 | 54篇 |
2019年 | 30篇 |
2018年 | 42篇 |
2017年 | 65篇 |
2016年 | 99篇 |
2015年 | 95篇 |
2014年 | 351篇 |
2013年 | 250篇 |
2012年 | 323篇 |
2011年 | 565篇 |
2010年 | 359篇 |
2009年 | 291篇 |
2008年 | 357篇 |
2007年 | 482篇 |
2006年 | 417篇 |
2005年 | 422篇 |
2004年 | 289篇 |
2003年 | 278篇 |
2002年 | 225篇 |
2001年 | 148篇 |
2000年 | 97篇 |
1999年 | 42篇 |
1998年 | 35篇 |
1997年 | 20篇 |
1996年 | 18篇 |
1995年 | 14篇 |
1994年 | 18篇 |
1993年 | 12篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 5篇 |
1989年 | 1篇 |
1988年 | 2篇 |
1987年 | 3篇 |
1986年 | 4篇 |
1985年 | 7篇 |
1984年 | 7篇 |
1983年 | 12篇 |
1982年 | 5篇 |
1981年 | 1篇 |
1977年 | 1篇 |
1975年 | 1篇 |
1966年 | 1篇 |
1965年 | 1篇 |
排序方式: 共有5613条查询结果,搜索用时 31 毫秒
91.
There has been a slight surge in the study of technology adoption in developing countries. However, little attention has been paid to the adoption of biometric security systems. This paper reports a study that analyzed the adoption of biometric technology in a developing country from an institutional point of view. The results show that job positions (managerial and operational) could influence perceptions of innovation characteristics (especially ease of use and usefulness) in the decision to adopt biometrics. However, the unified organizational analyses indicate that ease of use, communication, size and type of organizations have significant impacts on the decision to adopt biometrics. 相似文献
92.
Organizations, such as federally-funded medical research centers, must share de-identified data on their consumers to publicly accessible repositories to adhere to regulatory requirements. Many repositories are managed by third-parties and it is often unknown if records received from disparate organizations correspond to the same individual. Failure to resolve this issue can lead to biased (e.g., double counting of identical records) and underpowered (e.g., unlinked records of different data types) investigations. In this paper, we present a secure multiparty computation protocol that enables record joins via consumers’ encrypted identifiers. Our solution is more practical than prior secure join models in that data holders need to interact with the third party one time per data submission. Though technically feasible, the speed of the basic protocol scales quadratically with the number of records. Thus, we introduce an extended version of our protocol in which data holders append k-anonymous features of their consumers to their encrypted submissions. These features facilitate a more efficient join computation, while providing a formal guarantee that each record is linkable to no less than k individuals in the union of all organizations’ consumers. Beyond a theoretical treatment of the problem, we provide an extensive experimental investigation with data derived from the US Census to illustrate the significant gains in efficiency such an approach can achieve. 相似文献
93.
关于数据库系统安全现状的研究 总被引:1,自引:0,他引:1
介绍了数据库系统安全的概念,分析了保证数据库系统安全的重要性,指出数据库系统存在着来自操作系统、人员、网络三个方面的威胁,在此基础上详细介绍了保证数据库系统安全的三个重要技术手段:标识和鉴别、访问控制和数据加密。最后结合实际情况,研究阐述了保证数据库系统安全应该采取的措施,主要有:备份措施、防火墙和入侵检测、审计和视图机制。 相似文献
94.
95.
由于地下空间的自身特点,其内部灾害的防御相当复杂,防灾成为科学合理、安全有效开发利用地下空间的重要课题。从理论角度阐述地下空间内部灾害特点、类型及综合防治,具体以防火为重点,探讨灾害的早期控制系统,指挥和管理系统。以浙江杭州萧山钱江世纪城核心区地下空间防灾概念规划为例,对地下空间内部防灾设计对策进行了研究和探讨。 相似文献
96.
电子商务安全的研究分析 总被引:1,自引:0,他引:1
本文主要介绍了电子商务的安全目标,并重点介绍电子商务安全性的实现。 相似文献
97.
With the expansion of China's power system, there are more and more factors contributing to Large-area Power Outages. The snow disaster that hit Southern China in 2008 caused serious damages to the power systems, which made Chinese government realize that they cannot solely depend on power enterprises to effectively control the risk involved in power system. The Chinese government needs to collaborate with power enterprises in strengthening Electricity Regulation and taking countermeasures to reduce the risk of Large-area Power Outages. This paper first proposes an objective, practical and adaptive Electrical Security Risk Assessment System based on Electricity Regulation. The system consists of an assessment process with 278 indices, which are used to calculate the risk of Large-area Power Outages by the use of Analytic Hierarchy Process and the Delphi Method. Then, an example of Guangdong power system serves to illustrate the detailed implementation procedures of the proposed assessment system and the results show that Guangdong power system faces a moderate risk of Large-area Power Outages. Finally, some countermeasures are proposed to overcome the defects in the existing power system. 相似文献
98.
The article explores the energy security concerns faced by China from the point of view of energy users working in government, university, civil society and business sectors. The authors first derive a set of seven hypotheses related to Chinese energy security drawn from a review of the recent academic literature. We then explain each of these seven hypotheses, relating to (1) security of energy supply, (2) geopolitics, (3) climate change, (4) decentralization, (5) energy efficiency, (6) research and innovation of new energy technologies, and (7) self sufficiency and trade. Lastly, the article tests these hypotheses through a survey distributed in English and Mandarin completed by 312 Chinese participants. The conclusion presents insights for policymakers and energy scholars. 相似文献
99.
Benjamin K. Sovacool Ishani Mukherjee Ira Martina Drupady Anthony L. D’Agostino 《Energy》2011,36(10):5846-5853
This study provides an index for evaluating national energy security policies and performance among the United States, European Union, Australia, New Zealand, China, India, Japan, South Korea, and the ten countries comprising the Association of Southeast Asian Nations (ASEAN). Drawn from research interviews, a survey instrument, and a focused workshop, the article first argues that energy security ought to be comprised of five dimensions related to availability, affordability, technology development, sustainability, and regulation. The article then breaks these dimensions down into 20 components and correlates them with 20 metrics that constitute a comprehensive energy security index. We find that the top three performers of our index for all data points and times are Japan, Brunei, and the United States and the worst performers Vietnam, India, and Myanmar. Malaysia, Australia, and Brunei saw their energy security improve the most from 1990 to 2010 whereas Laos, Cambodia, and Myanmar saw it decline the most. The article concludes by calling for more research on various aspects of our index and its results. 相似文献
100.
In this paper a new algorithm for allocating energy and determining the optimum amount of network active power reserve capacity and the share of generating units and demand side contribution in providing reserve capacity requirements for day-ahead market is presented. In the proposed method, the optimum amount of reserve requirement is determined based on network security set by operator. In this regard, Expected Load Not Supplied (ELNS) is used to evaluate system security in each hour. The proposed method has been implemented over the IEEE 24-bus test system and the results are compared with a deterministic security approach, which considers certain and fixed amount of reserve capacity in each hour. This comparison is done from economic and technical points of view. The promising results show the effectiveness of the proposed model which is formulated as mixed integer linear programming (MILP) and solved by GAMS software. 相似文献