首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   95篇
  免费   0篇
  国内免费   1篇
电工技术   1篇
综合类   1篇
化学工业   13篇
金属工艺   1篇
建筑科学   1篇
能源动力   12篇
石油天然气   1篇
无线电   11篇
一般工业技术   9篇
冶金工业   23篇
原子能技术   2篇
自动化技术   21篇
  2023年   2篇
  2022年   2篇
  2021年   1篇
  2018年   1篇
  2017年   2篇
  2016年   4篇
  2015年   1篇
  2014年   2篇
  2013年   13篇
  2012年   6篇
  2011年   6篇
  2010年   4篇
  2009年   2篇
  2008年   4篇
  2007年   6篇
  2006年   2篇
  2004年   1篇
  2002年   2篇
  2001年   1篇
  2000年   4篇
  1999年   1篇
  1998年   7篇
  1997年   3篇
  1996年   5篇
  1995年   4篇
  1994年   1篇
  1988年   1篇
  1986年   1篇
  1980年   1篇
  1978年   1篇
  1977年   3篇
  1975年   1篇
  1960年   1篇
排序方式: 共有96条查询结果,搜索用时 15 毫秒
1.
Insider threats have gained prominence and pose the most challenging threats to a database system. In this paper, we have proposed a new approach for detecting intrusive attacks in databases by fusion of information sources and use of belief update. In database intrusion detection, only intra-transactional features are not sufficient for detecting attackers within the organization as they are potentially familiar with the day-to-day work. Thus, the proposed system uses inter-transactional as well as intra-transactional features for intrusion detection. Moreover, we have also considered three different sensitivity levels of table attributes for keeping track of the malicious modification of the highly sensitive attributes more carefully. We have analyzed the performance of the proposed database intrusion detection system using stochastic models. Our system performs significantly better compared to two intrusion detection systems recently proposed in the literature.  相似文献   
2.
A phenomenal growth in the number of credit card transactions, especially for online purchases, has recently led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. In real life, fraudulent transactions are interspersed with genuine transactions and simple pattern matching is not often sufficient to detect them accurately. Thus, there is a need for combining both anomaly detection as well as misuse detection techniques. In this paper, we propose to use two-stage sequence alignment in which a profile analyzer (PA) first determines the similarity of an incoming sequence of transactions on a given credit card with the genuine cardholder's past spending sequences. The unusual transactions traced by the profile analyzer are next passed on to a deviation analyzer (DA) for possible alignment with past fraudulent behavior. The final decision about the nature of a transaction is taken on the basis of the observations by these two analyzers. In order to achieve online response time for both PA and DA, we suggest a new approach for combining two sequence alignment algorithms BLAST and SSAHA.  相似文献   
3.
Security analysis is a formal verification technique to ascertain certain desirable guarantees on the access control policy specification. Given a set of access control policies, a general safety requirement in such a system is to determine whether a desirable property is satisfied in all the reachable states. Such an analysis calls for the use of formal verification techniques. While formal analysis on traditional Role Based Access Control (RBAC) has been done to some extent, recent extensions to RBAC lack such an analysis. In this paper, we consider the temporal RBAC extensions and propose a formal technique using timed automata to perform security analysis by analyzing both safety and liveness properties. Using safety properties one ensures that something bad never happens while liveness properties show that some good state is also achieved. GTRBAC is a well accepted generalized temporal RBAC model which can handle a wide range of temporal constraints while specifying different access control policies. Analysis of such a model involves a process of mapping a GTRBAC based system into a state transition system. Different reduction rules are proposed to simplify the modeling process depending upon the constraints supported by the system. The effect of different constraints on the modeling process is also studied.  相似文献   
4.
Pressure is an important thermodynamic property of the ocean and the deep biosphere that affects microbial physiology and biochemistry. Here, we report on our investigation of the response of Gram-positive piezotolerant bacterium Sporosarcina sp. DSK25 to hydrostatic pressure. Strain DSK25 responded in an adaptive manner to upshifts of growth pressure and showed systematic changes in phospholipid fatty acids. As the pressure increased from 0.1 to 10 MPa (Megapascal), unsaturated fatty acids in DSK25 increased from 21.7 to 31.1 % of total fatty acids, while the level of iso- and anteiso-branched fatty acids remained unchanged. At higher pressures (30, 50, and 60 MPa), the amount of unsaturated fatty acids decreased, and that of anteiso-branched fatty acids increased from 34.4 to 49.9 % at the expense of iso-branched fatty acids. For the first time, two polyunsaturated fatty acids (PUFA), 18:2n-6 and 18:2n-x, with the latter having much higher abundance than the former, were identified in DSK25. The concentration of the PUFA increased with growth pressure. These results indicate the involvement of unsaturated and methyl-branched fatty acids in the modulation of bacteria membrane fluidity and function over environmentally relevant parameter (pressure). Piezotolerant bacterium Sporosarcina sp. DSK25 appears to utilize two regulatory mechanisms for adaptation to high pressure, a rapid-responding mechanism on transient scale, expressed as increased biosynthesis of monounsaturated fatty acids, and a long-term adaptation mechanism in increased synthesis of anteiso-branched and polyunsaturated fatty acids. Our results further suggest that Gram-positive piezophilic bacteria respond differently than Gram-negative bacteria in adaptation to high pressure.  相似文献   
5.
Meckel's diverticulum is one of the primary concerns in the differential diagnosis of the pediatric patient with massive, acute gastrointestinal bleeding, intussusception, or abdominal pain of uncertain cause. The hospital course of two children with Meckel's diverticulum, successfully treated by laparoscopic excision, is presented, along with details of the operative procedure. Both patients recovered from the procedure without incident and were discharged at 24 and 48 hours after surgery. The authors believe a laparoscopic approach is safe and effective in the diagnosis and treatment of Meckel's diverticulum.  相似文献   
6.
We report 40-Gb/s capability of 50-mum core plastic optical fiber using differential modal delay measurements and power penalty due to intersymbol interference computations. The results are explained via a comprehensive multimode fiber model that includes mode coupling (MC) and differential modal attenuation (DMA). We show that strong MC can enable 40-Gb/s transmission for reach in excess of 100 m even in the presence of irregularities in the refractive index profile that prevent 10-Gb/s performance without MC. Furthermore, we show that DMA effects are negligible and that the mode power distributions are not a good indicator of bandwidth.  相似文献   
7.
This study explored influences of story structure properties on recall of story events by children with and without attention deficit hyperactivity disorder (ADHD). Participants listened to and retold 2 stories. Two properties of the stories' causal structure were derived: the number of causal connections an event has to other events and whether an event is on the causal chain linking events from beginning to end. The extent to which causal properties and the more subjective property of perceived importance predicted recall in the 2 groups of children was examined. Each property predicted recall, but there were group differences in sensitivity to causal structure that were moderated by intelligence level and gender. Variations in amount and allocation of cognitive resources applied to comprehension contributed to performance of children with ADHD. There are implications for understanding academic and social difficulties common in children with ADHD. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
8.
Even state of the art database protection mechanisms often fail to prevent occurrence of malicious attacks. Since in a database environment, the modifications made by one transaction may affect the execution of some of the later transactions, it leads to spreading of the damage caused by malicious (bad) transactions. Following traditional log-based recovery schemes, one can rollback (undo) the effect of all the transactions, both malicious as well as non-malicious. In such a scenario, even the unaffected transactions are also rolled back. In this paper, we propose a column dependency-based approach to identify the affected transactions which need to be compensated along with the malicious transactions. To ensure durability, committed non-malicious transactions are then re-executed in a manner that retains database consistency. We present a static recovery algorithm as well as an on-line version of the same and prove their correctness. A detailed performance evaluation of the proposed scheme with TPC-C benchmark suite is also presented.  相似文献   
9.
X-band performance, high temperature D.C. operation and uniformity have been evaluated for 1 μm gate AlGaN/GaN HEMTs grown by RF atomic nitrogen plasma MBE. Deposition and fabrication were performed on 2-inch (0001) sapphire substrates to determine process uniformity. HEMTs with 300 μm total gate width and dual gate finger geometry have been fabricated with 650–700 cm2 V−1×s mobility. Maximum frequency cut-offs on the order of 8–10 GHz were achieved. D.C. performance at room temperature was >500 mA mm−1, and external transconductance was >70 mS mm−1. The transistors operated at test temperatures of 425°C in air.  相似文献   
10.
Four experiments were conducted to assess infants' ability to solve isomorphic problems and to explore the nature of early representations. Ten- and 13-month-olds attempted to solve problems that required combining 2 subgoals to bring a toy (goal object) within reach. A problem-series paradigm was used in which 3 tasks differing in surface features but sharing common goal structures and similar solutions were presented. The results indicate that 13-month-olds transferred a modeled solution strategy across isomorphic problems, whereas 10-month-olds did so only after experiencing either multiple source problems or high perceptual similarity between problems. Comprehension of the relations between solution actions and outcome, and between tools and target object, appeared critical to transfer. The results suggest that 1-year-olds can construct relatively abstract and flexible mental representations and that analogical problem solving may be 1 of the major accomplishments during the 1st year of life. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号