首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   244篇
  免费   3篇
电工技术   1篇
化学工业   46篇
金属工艺   2篇
机械仪表   9篇
建筑科学   4篇
能源动力   7篇
轻工业   18篇
水利工程   2篇
石油天然气   3篇
无线电   31篇
一般工业技术   43篇
冶金工业   11篇
原子能技术   3篇
自动化技术   67篇
  2024年   2篇
  2023年   14篇
  2022年   26篇
  2021年   17篇
  2020年   15篇
  2019年   8篇
  2018年   20篇
  2017年   8篇
  2016年   10篇
  2015年   3篇
  2014年   7篇
  2013年   19篇
  2012年   10篇
  2011年   9篇
  2010年   4篇
  2009年   5篇
  2008年   9篇
  2007年   11篇
  2006年   5篇
  2005年   2篇
  2004年   3篇
  2003年   1篇
  2002年   3篇
  2001年   3篇
  2000年   2篇
  1998年   7篇
  1996年   1篇
  1995年   2篇
  1993年   2篇
  1992年   4篇
  1990年   2篇
  1989年   2篇
  1987年   1篇
  1985年   2篇
  1984年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1977年   1篇
  1965年   1篇
排序方式: 共有247条查询结果,搜索用时 15 毫秒
231.
In the twenty-first century, globalisation made corporate boundaries invisible and difficult to manage. This new macroeconomic transformation caused by globalisation introduced new challenges for critical infrastructure management. By replacing manual tasks with automated decision making and sophisticated technology, no doubt we feel much more secure than half a century ago. As the technological advancement takes root, so does the maturity of security threats. It is common that today’s critical infrastructures are operated by non-computer experts, e.g. nurses in health care, soldiers in military or firefighters in emergency services. In such challenging applications, protecting against insider attacks is often neither feasible nor economically possible, but these threats can be managed using suitable risk management strategies. Security technologies, e.g. firewalls, help protect data assets and computer systems against unauthorised entry. However, one area which is often largely ignored is the human factor of system security. Through social engineering techniques, malicious attackers are able to breach organisational security via people interactions. This paper presents a security awareness training framework, which can be used to train operators of critical infrastructure, on various social engineering security threats such as spear phishing, baiting, pretexting, among others.  相似文献   
232.
With the increased availability and complexity of distributed systems comes a greater need for solutions to assist in the management of distributed systems. Despite the significant contributions made towards the development of management tools that monitor and control distributed systems, little has been done to address issues such as optimizing the execution of management functions with respect to system and management requirements. This paper presents a management optimization model in which management agents and managed objects are efficiently configured on the basis of a set of system and management requirements. We illustrate our model and describe its implementation through a Branch- and Bound-based algorithm and a web-based interface. The latter enables users to specify the requirements used by the optimization algorithm to determine efficient management configurations. It also includes an XML-based interface through which management agents can be started independent of the underlying platforms. Performance characteristics of the proposed algorithm as well as experimental results to illustrate the validity of the model are also described.  相似文献   
233.
234.
235.
Programming languages which use dynamic identification for free variables (i.e., non-local references) are generally implemented with a deep or shallow binding variable access strategy. In this paper, variable access through the binding environment is assumed to be desirable. Given this assumption, it is demonstrated that the act of assigning values to variables may yield unexpected results for some of the binding strategies when functional arguments and results are used. A number of variations of deep and shallow binding strategies are examined along with the modifications necessary to implement the assignment operation in the expected manner.  相似文献   
236.
A ray tracing implementation is described that is based on an octree representation of a scene. Rays are traced through the scene by calculating the blocks through which they pass. This calculation is performed in a bottom-up manner through the use of neighbor finding. The octrees are assumed to be implemented by a pointer representation.  相似文献   
237.
A discussion of the relationship between two solid representation schemes is presented: CSG trees and recursive spatial subdivision exemplified by the bintree, a generalization of the quadtree and octree. Detailed algorithms are developed and analyzed for evaluating CSG trees by bintree conversion. These techniques are shown to enable the addition of the time dimension and motion to the approximate analysis of CSG trees. This facilitates the solution of problems such as static and dynamic interference detection. A technique for projecting across any dimension is also shown. For “well-behaved” CSG trees the execution time of the conversion algorithm is directly related to the spatial complexity of the object represented by the CSG tree (i.e., as the resolution increases, it is asymptotically proportional to the number of bintree nodes and does not depend on the size or form of the CSG tree representation). The set of well-behaved CSG trees include all trees that define multidimensional polyhedra in a manner that does not give rise to tangential intersections at CSG tree nodes. This is an expanded version of a paper titled “Bintrees, CSG Trees, and Time” which appeared inProceedings of the SIGGRAPH '85 Conference, San Francisco (July 1985), pp. 121–130. This work was supported in part by the National Science Foundation under Grants DCR-83-02118 and IRI-88-02457 and in part by the Finnish Academy Deceased on August 5, 1989  相似文献   
238.
    
Over the past 30 years, Sudan has experienced several severe floods which have caused loss of life and significant damage to property. The frequency and intensity of floods in Sudan are predicted to increase as a result of climate change. The main objective of this research was to assist policymakers in establishing a mechanism for public participation in Sudan to enable communities to be engaged in improving flood risk management. This paper focuses on Tuti Island, which is located near the confluence of the Blue and White Niles in Khartoum which is severely affected by flooding. The research was based on surveys and interviews with both officials and the public to examine the degree of public participation in mitigating flood risks. The research concluded that Sudan has no policy or official way of engaging the public in disaster risk reduction; however, the traditional method of social mobilization called Nafeer (building together) can play a significant role in increasing communities' flood resilience. Establishing a clear framework for public participation, such as Nafeer, for the various stages of the flood management cycle that coordinates with decision-makers can help increase the resilience of urban areas in low-income countries like Sudan.  相似文献   
239.
    
In Sohag City, 400 samples were collected from different food markets of different meat products from two companies with high and low prices (e.g., minced meat, kofta sausage, beef burger, and luncheon meat) for determining food fraud. Light, fluorescence, and scanning electron microscopy (SEM) were used to examine the samples. “Special histochemical stains” permit the microscopic examination of different cell types, structures, and/or microorganisms. Histological examination revealed variant tissue types, besides skeletal muscles. Nuchal ligaments, bones, hyaline cartilages, white fibrocartilages, large and medium arteries, cardiac muscles, tendons, and collagenous connective tissues comprised the capsule of a parenchymatous organ. Additionally, a crystal of food additives was recognized using light microscopy and SEM. SEM allows the visualization of bacterial contamination. Using different microscopic anatomy techniques is an efficient methodology for qualitative evaluations of various meat products. No difference in quality was observed between low- and high-priced meat products.  相似文献   
240.
    
New sulfadiazine tin complexes were synthesized in 67–80% yields from the reaction of sulfadiazine, and different organotin(IV) chlorides and their structures were established. The synthesized complexes were used as additives at a low concentration (0.5% by weight) to enhance poly(vinyl chloride) (PVC) photostability. The PVC samples containing sulfadiazine tin complexes (thickness = 40 μm) were fabricated and irradiated with ultraviolet light at room temperature for 300 h. The changes that occurred within the PVC samples upon irradiation were investigated by inspecting the loss in weight, reduction in the average molecular weight, formation of small degradation fragments containing polyene, carbonyl, and hydroxyl moieties, and changes in the ultraviolet absorption intensity of polymeric materials. The surface morphology of irradiated PVC samples was investigated using optical, atomic force, and scanning electron microscopies. There were lesser changes within the PVC samples with sulfadiazine tin complexes compared to the blank PVC sample. The dimethyltin(IV) complex was found to be the most efficient additive in stabilizing PVC against irradiation. The role played by the complexes in reducing the photodegradation of PVC was investigated, and a mechanism was proposed. J. VINYL ADDIT. TECHNOL., 26:370–379, 2020. © 2019 Society of Plastics Engineers  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号