首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   217篇
  免费   29篇
  国内免费   40篇
电工技术   14篇
化学工业   1篇
建筑科学   1篇
能源动力   3篇
轻工业   3篇
无线电   57篇
一般工业技术   47篇
自动化技术   160篇
  2024年   3篇
  2023年   34篇
  2022年   65篇
  2021年   75篇
  2020年   74篇
  2019年   8篇
  2018年   20篇
  2017年   6篇
  2016年   1篇
排序方式: 共有286条查询结果,搜索用时 15 毫秒
1.
目前配电网中分布式光伏发电渗透率越来越高,利用区块链技术的去中心化、难篡改等特点,有助于分布式发电就地或就近消纳,提高配电网运行的经济性。提出了一种基于区块链的光伏就地消纳交易模式,建立了光伏发电用户和分布式光伏聚合商的效益函数,运用Stackelberg博弈模型确定内部电价,通过边缘计算制定最优用电计划,设计了基于信誉值的就地消纳交易机制,对就地消纳程度低的用户进行惩罚,鼓励用户通过可时移负荷消纳光伏出力。配电网仿真结果表明,在采用区块链的交易模式下,配电网的就地消纳情况得到改善,用户的综合效益得到提升。  相似文献   
2.
Since the inception of blockchain-related technologies over a decade ago, investors’ uptake of the technologies has grown rapidly. But even with the advancement in standing from conceptual beginnings to real-world experimentation, mainstream adoption of the technologies in either organizational or individual contexts has yet to eventuate. To resolve this paradox, we examine progression of the technologies’ diffusion instead, and in the process, seek to uncover the underlying dynamics of sentiments at play. Diffusion involves multiple actions by different parties, with social discourses via diverse media playing an essential role. In demonstrating the interplay of support to resistance via media framing and the diffusion of innovation theory, findings from our paper contribute to the technology adoption literature. Understanding resistant behavior toward a new technology area could help resolve potential issues that may arise. This would hopefully lead to better technological implementation outcomes in future.  相似文献   
3.
With the rapid development and widespread application of Wireless Body Area Networks (WBANs), the traditional centralized system architecture cannot handle the massive data generated by the edge devices. Meanwhile, in order to ensure the security of physiological privacy data and the identity privacy of patients, this paper presents a privacy protection strategy for Mobile Edge Computing(MEC) enhanced WBANs, which leverages the blockchain-based decentralized MEC paradigm to support efficient transmission of privacy information with low latency, high reliability within a high-demand data security scenario. On this basis, the Merkle tree optimization model is designed to authenticate nodes and to verify the source of physiological data. Furthermore, a hybrid signature algorithm is devised to guarantee the node anonymity with unforgeability, data integrity and reduced delay. The security performance analysis and simulation results show that our proposed strategy not only reduces the delay, but also secures the privacy and transmission of sensitive WBANs data.  相似文献   
4.
食品安全关系国计民生。近年来食品安全问题频发,加强出口食品安全监管特别是加强溯源体系建设愈发重要。本文首先对区块链技术的概念、特点和应用情况进行分析,结合出口食品溯源现状,对追踪信息及程序烦琐、信息易篡改易造假及缺乏统一平台进行有效监管等目前存在的问题进行研究,通过论证区块链技术在食品追溯应用的技术可行性及现实应用成功实例,足以证明以区块链技术为基础来构建出口食品溯源监管体系完全可行,最后提出相关应用探索方案,建立海关、地方监管部门、种养殖户、生产加工企业、消费者等各方参与,由国内生产源头到国外分销的出口食品全链条质量安全溯源体系,以期对提高我国出口食品质量和完善我国出口食品安全溯源管理体系建设提供一定参考。  相似文献   
5.
There is growing recognition that blockchain technology has significant potential to alter how organizations and people work and communicate. However, theoretical guidance concerning how organizations leverage blockchain technology to enhance value creation for users is still limited. Grounded in the socio-technical perspective and leveraging the rich data obtained from case analyses of blockchain-enabled online communities, this paper develops a theoretical model to identify the core value drivers that blockchain enables for online communities. The core value drivers include: a reputation-value system, data ownership mechanisms, and verification & tracking mechanisms. Our findings suggest that these three value drivers enhance value creation of online communities by motivating participation and protecting contributions.  相似文献   
6.
As blockchain technology is gaining popularity in industry and society, solutions for Verification and Validation (V&V) of blockchain-based software applications (BC-Apps) have started gaining equal attention. To ensure that BC-Apps are properly developed before deployment, it is paramount to apply systematic V&V to verify their functional and non-functional requirements. While existing research aims at addressing the challenges of engineering BC-Apps by providing testing techniques and tools, blockchain-based software development is still an emerging research discipline, and therefore, best practices and tools for the V&V of BC-Apps are not yet sufficiently developed. In this paper, we provide a comprehensive survey on V&V solutions for BC-Apps. Specifically, using a layered approach, we synthesize V&V tools and techniques addressing different components at various layers of the BC-App stack, as well as across the whole stack. Next, we provide a discussion on the challenges associated with BC-App V&V, and summarize a set of future research directions based on the challenges and gaps identified in existing research work. Our study aims to highlight the importance of BC-App V&V and pave the way for a disciplined, testable, and verifiable BC development.  相似文献   
7.
The development of data-driven artificial intelligence technology has given birth to a variety of big data applications. Data has become an essential factor to improve these applications. Federated learning, a privacy-preserving machine learning method, is proposed to leverage data from different data owners. It is typically used in conjunction with cryptographic methods, in which data owners train the global model by sharing encrypted model updates. However, data encryption makes it difficult to identify the quality of these model updates. Malicious data owners may launch attacks such as data poisoning and free-riding. To defend against such attacks, it is necessary to find an approach to audit encrypted model updates. In this paper, we propose a blockchain-based audit approach for encrypted gradients. It uses a behavior chain to record the encrypted gradients from data owners, and an audit chain to evaluate the gradients’ quality. Specifically, we propose a privacy-preserving homomorphic noise mechanism in which the noise of each gradient sums to zero after aggregation, ensuring the availability of aggregated gradient. In addition, we design a joint audit algorithm that can locate malicious data owners without decrypting individual gradients. Through security analysis and experimental evaluation, we demonstrate that our approach can defend against malicious gradient attacks in federated learning.  相似文献   
8.
Recently, the applications of Blockchain technology have begun to revolutionise different aspects of supply chain (SC) management. Among others, Blockchain is a platform to execute the smart contracts in the SC as transactions. We develop and test a new model for smart contract design in the SC with multiple logistics service providers and show that this problem can be presented as a multi-processor flexible flow shop scheduling. A distinctive feature of our approach is that the execution of physical operations is modelled inside the start and completion of cyber information services. We name this modelling concept ‘virtual operation’. The constructed model and the developed experimental environment constitute an event-driven dynamic approach to task and service composition when designing the smart contract. Our approach is also of value when considering the contract execution stage. The use of state control variables in our model allows for operations status updates in the Blockchain that in turn, feeds automated information feedbacks, disruption detection and control of contract execution. The latter launches the re-scheduling procedure, comprehensively combining planning and adaptation decisions within a unified methodological framework of dynamic control theory. The modelling complex developed can be used to design and control smart contracts in the SC.  相似文献   
9.
ABSTRACT

Recently, cryptocurrencies such as Bitcoin, Ethereum, etc, have rapidly been recognized as an asset, often called a digital asset. Comparing to the real assets, it would be handled carefully due to its own characteristics that are completely different. The disadvantage of such digital assets, on the one hand, is that whoever knows the private key of the wallet, they can easily take over that digital asset. On the other hand, if the wallet’s owners are dead without passing credential information to others, that asset will be lost forever. We thus propose the novel secure testament methodology for a digital asset such as Bitcoin to solve the mentioned problems. The mechanism is based on managing the mnemonic seed of the wallet so that an inheritor will obtain the mnemonic seed in a secure way. Two mechanisms of the proposed methodology are implemented. The first is to save the mnemonic seed in a secure repository. Therefore, no one can access to the cryptocurrency wallet while the owner still being alive and does not wish anybody to access. The second is to deliver the mnemonic seed securely to legitimate inheritor when the owner is suspected to be dead or disappeared. Finally, based on our experiment, the results show that the aforementioned problems can be solved. Furthermore, the proposed mechanism can help the owner of the asset to managing the confidentiality of their assets.  相似文献   
10.
In online shopping, consumers often rely on information such as sales, reviews or ratings to inform their decision making. Such preferences or user behaviors can be subjected to manipulation. For example, a merchant can artificially inflate product sales by paying a click farm. Specifically, the click farm will recruit a number of non-genuine buyers to purchase the products. After the purchases have been made, the buyers will either refund the product minus the commission or no product exchange actually takes place and these buyers are paid a commission for their role in the activity. Increasingly due to the popularity of cryptocurrency, such as bitcoin, such payment mechanisms are used in such activities. Hence, in this paper, we seek to detect click farm transactions using cryptocurrency. Specifically, we propose three models to capture click farm operations, and based on the models we design three algorithms to detect anonymous click farm transactions. Extensive analysis demonstrates that our model achieves a high accuracy rate in detecting anonymous click farm transactions, without incurring expensive computational costs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号