首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   31篇
  免费   1篇
电工技术   7篇
化学工业   5篇
建筑科学   1篇
能源动力   1篇
轻工业   1篇
无线电   2篇
一般工业技术   6篇
冶金工业   3篇
自动化技术   6篇
  2022年   1篇
  2021年   4篇
  2019年   1篇
  2018年   2篇
  2016年   1篇
  2015年   1篇
  2013年   1篇
  2011年   3篇
  2010年   1篇
  2009年   1篇
  2007年   1篇
  2004年   1篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   3篇
  1997年   1篇
  1995年   1篇
  1992年   1篇
  1981年   1篇
  1978年   1篇
  1973年   1篇
排序方式: 共有32条查询结果,搜索用时 15 毫秒
1.
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are. Recently, blockchain was integrated into intrusion detection systems to enhance their overall performance. Blockchain has also been adopted in healthcare, supply chain management, and the Internet of Things. Blockchain uses robust cryptography with private and public keys, and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party. To explore and highlight the importance of integrating blockchain with intrusion detection systems, this paper provides a comprehensive background of intrusion detection systems and blockchain technology. Furthermore, a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented. Finally, this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology.  相似文献   
2.
Clinical thermal imaging today   总被引:3,自引:0,他引:3  
In order to make thermal imaging a universally acceptable clinical technique, one must try to understand what is being observed, and what the observation signifies. One must also prove the validity of hypotheses about underlying causes of a given local hyper or hypothermia. Such an understanding is absolutely necessary before one can adapt the available technology to meet given clinical needs effectively. This paper demonstrates that such an understanding is now developing and will lead to a far better utilization of infrared imaging technology  相似文献   
3.
In light of the coronavirus disease 2019 (COVID-19) outbreak caused by the novel coronavirus, companies and institutions have instructed their employees to work from home as a precautionary measure to reduce the risk of contagion. Employees, however, have been exposed to different security risks because of working from home. Moreover, the rapid global spread of COVID-19 has increased the volume of data generated from various sources. Working from home depends mainly on cloud computing (CC) applications that help employees to efficiently accomplish their tasks. The cloud computing environment (CCE) is an unsung hero in the COVID-19 pandemic crisis. It consists of the fast-paced practices for services that reflect the trend of rapidly deployable applications for maintaining data. Despite the increase in the use of CC applications, there is an ongoing research challenge in the domains of CCE concerning data, guaranteeing security, and the availability of CC applications. This paper, to the best of our knowledge, is the first paper that thoroughly explains the impact of the COVID-19 pandemic on CCE. Additionally, this paper also highlights the security risks of working from home during the COVID-19 pandemic.  相似文献   
4.
Children with asthma are at increased risk for waking in the night, and there is the potential for the entire household to feel the effects. The authors conducted a telephone-based diary study to examine whether daily fluctuations in parent mood, parenting hassles, and family routines would distinguish nights in which waking occurred from nights in which they did not. Forty-seven families with a child with asthma were contacted 4 times a week every 3 months over a period of 1 year, resulting in 500 daily observations. Parent negative mood, perceived parenting hassles, and disruptions in bedtime routines were associated with increased odds that the child would wake in the middle of the night. Results underscore the importance of considering family climate in children's disturbed sleep. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
5.
It has been suggested that dynamic area telethermometry (DAT) can be used to detect the presence of breast cancer by measuring the attenuation of modulation of skin temperature. This effect is caused by the production of nitric oxide (NO) by cancerous cells. In this article we show that DAT enables one to locate areas on the breast surface that exhibit abnormally low temperature modulation. DAT measures the time profile of temperature of every pixel of a two-dimensional array of pixels in a thermal image  相似文献   
6.
A relationship has been derived for diffusion of an associating solute forming a dimer complex. Experimental data reported in this investigation for diffusion of acetic acid in carbon tetra chloride, benzene and toluene indicate dimer formation of acetic acid molecules while diffusing into the non-associating solvents.  相似文献   
7.
8.
Providing good quality of service (QoS) in cellular IP networks is an important requirement for performance improvement of the cellular IP network. Resource reservation is one of the methods used in achieving this goal and is proven to be effective. The main resources to be reserved in a cellular IP network are bandwidth, buffer and central processing unit (CPU) cycles. Router CPU cycle is the time taken by the router to process the packet of the flow before forwarding it to the next router (hop). This paper proposes a model for CPU cycle optimization of routers for real‐time flows in a cellular IP network. The model applies both genetic algorithm (GA) and particle swarm optimization (PSO) as soft computing tools to optimize the CPU cycles and reduces the flow processing time at each router in the route taken by a flow. Simulation experiments illustrate a comparative study of the model.  相似文献   
9.
We describe a new chemical separation method to isolate Ca from other matrix elements in biological samples, developed with the long-term goal of making high-precision measurement of natural stable Ca isotope variations a clinically applicable tool to assess bone mineral balance. A new two-column procedure utilizing HBr achieves the purity required to accurately and precisely measure two Ca isotope ratios ((44)Ca/(42)Ca and (44)Ca/(43)Ca) on a Neptune multiple collector inductively coupled plasma mass spectrometer (MC-ICPMS) in urine. Purification requirements for Sr, Ti, and K (Ca/Sr > 10?000; Ca/Ti > 10?000?000; and Ca/K > 10) were determined by addition of these elements to Ca standards of known isotopic composition. Accuracy was determined by (1) comparing Ca isotope results for samples and standards to published data obtained using thermal ionization mass spectrometry (TIMS), (2) adding a Ca standard of known isotopic composition to a urine sample purified of Ca, and (3) analyzing mixtures of urine samples and standards in varying proportions. The accuracy and precision of δ(44/42)Ca measurements of purified samples containing 25 μg of Ca can be determined with typical errors less than ±0.2‰ (2σ).  相似文献   
10.
Methods for the precise, routine measurement of Ir in seawater, riverwater, and estuarine water using isotope dilution negative thermal ionization mass spectrometry (ID-NTIMS) have been developed. After equilibration with a (191)Ir-enriched spike, Ir is separated from solution by coprecipitation with ferric hydroxide, followed by anion exchange chromatography using a reductive elution technique. UV irradiation is employed for the decomposition of trace organics, which interfere with negative ion production. IrO(2)(-) ions are produced in the mass spectrometer by heating the sample on a Ni-wire filament in the presence of Ba(OH)(2). Detection efficiencies ranged from 0.1% to 0.3%. We have used these procedures to determine the concentrations of Ir in 4 kg samples from the Pacific Ocean, the Atlantic Ocean, the Baltic Sea, and the rivers supplying the Baltic. Our chemical procedures introduce a total blank of ~2 × 10(8) atoms per sample. The distribution of Ir in the oceans is fairly uniform, averaging ~4 × 10(8) atoms kg(-)(1). The concentrations in the rivers supplying the Baltic Sea range from (17.4 ± 0.9) × 10(8) for a pristine river to (92.9 ± 2.2) × 10(8) atoms kg(-)(1) for a polluted river. The distribution, speciation, and transport of Ir in natural waters can now be subjected to intensive study.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号