首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6305篇
  免费   1296篇
  国内免费   962篇
电工技术   333篇
综合类   771篇
化学工业   214篇
金属工艺   80篇
机械仪表   134篇
建筑科学   196篇
矿业工程   50篇
能源动力   45篇
轻工业   21篇
水利工程   60篇
石油天然气   22篇
武器工业   223篇
无线电   1649篇
一般工业技术   238篇
冶金工业   73篇
原子能技术   22篇
自动化技术   4432篇
  2024年   22篇
  2023年   130篇
  2022年   231篇
  2021年   244篇
  2020年   251篇
  2019年   212篇
  2018年   216篇
  2017年   241篇
  2016年   235篇
  2015年   320篇
  2014年   491篇
  2013年   471篇
  2012年   564篇
  2011年   624篇
  2010年   508篇
  2009年   498篇
  2008年   563篇
  2007年   587篇
  2006年   467篇
  2005年   436篇
  2004年   306篇
  2003年   257篇
  2002年   185篇
  2001年   107篇
  2000年   101篇
  1999年   60篇
  1998年   44篇
  1997年   40篇
  1996年   37篇
  1995年   23篇
  1994年   17篇
  1993年   21篇
  1992年   7篇
  1991年   8篇
  1990年   9篇
  1989年   3篇
  1988年   9篇
  1986年   3篇
  1985年   1篇
  1984年   3篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1977年   2篇
  1975年   1篇
  1966年   1篇
  1961年   1篇
  1959年   1篇
排序方式: 共有8563条查询结果,搜索用时 164 毫秒
61.
Road network robustness is the ability of a road network to operate correctly under a wide range of attacks. A structural robustness analysis can describe the survivability of a city road network that is under attack and can help improve functions such as urban planning and emergency response. In this paper, a novel approach is presented to quantitatively evaluate road network robustness based on the community structure derived from a city road network, in which communities refer to those densely connected subsets of nodes that are sparsely linked to the remaining network. First, a road network is reconstructed into a set of connected communities. Then, successive simulated attacks are conducted on the reconstructed road networks to test the performance of the networks under attack. The performance of the networks is represented by efficiency and the occurrence of fragmentation. Three attack strategies, including a random attack and two intentional attacks, are performed to evaluate the survivability of the road network under different situations. Contrary to the traditional road segment-based approach, the community-based robustness analysis on a city road network shows distinct structural diversity between communities, providing greater insight into network vulnerability under intentional attacks. Six typical city road networks on three different continents are used to demonstrate the proposed approach. The evaluation results reveal an important feature of the structure of city road networks from a community-based perspective, i.e., that the structure is robust under random failure but fragile under intentional attack. This result is highly consistent in different city road network forms.  相似文献   
62.
Olaf Ostwald 《Cryptologia》2017,41(5):395-421
“Breaking German Army Ciphers” is the title of a Cryptologia article from 2005, describing the lucky survival of several hundred authentic Enigma messages of World War II, and an account of a ciphertext-only cryptanalysis of a large number of these messages, leaving only a few (mostly short messages) unbroken. After reviewing the work done, and investigating the reasons for both lucky breaks and close misses, the modern ciphertext-only attack on Enigma messages is improved, especially on genuine ones with short lengths and/or many garbles. The difficulties of a proper measure for the candidate’s closeness to a plaintext are clarified. The influence on the decryption process of an empty plugboard and one with only a few correct plugs is examined. The method is extended by a partial exhaustion of the plugboard combined with an optimized hillclimbing strategy. The newly designed software succeeds in breaking formerly unbroken messages.  相似文献   
63.
SHCC (Strain Hardening Cement-based Composite) is a material known for its strain-hardening behavior under tensile and bending stress and its characteristic numerous small cracks. SHCC is expected to show superior durability because of the fineness of the cracks. In this study, chloride ingress through cracks into SHCC and progress of rebar corrosion in three mixtures of SHCC with various water-cement ratios were investigated. Through a chloride solution immersion test, it was confirmed that chloride could penetrate through even very fine cracks. The resistivity of cracked SHCC against chloride ingress is mainly governed by the accumulated crack width and the water cement ratio. Chloride pre-mixed SHCC specimens were left in a high-temperature, high-humidity chamber for 11 months to promote rebar corrosion. While the accumulated crack width and the water cement ratio were both influential to an increase in corrosion area, only the water cement ratio had bearing on corrosion loss.  相似文献   
64.
HTML5 application cache (AppCache) allowed Web browser to access Web offline.But it also brought a new method of cache poisoning attack that was more persisting.As for websites which used the AppCache,a novel poisoning method RFTM (replace file twice method),in which the attacker replaced the manifest file twice to poison the client’s AppCache,was proposed.Compared with the original attack,the legal server would not receive abnormal HTTP requests from the client in the attack.Therefore,changing the server configuration could not prevent the client from the RFTM AppCache poisoning.To avoid the attack mentioned above,a lightweight signature defense scheme Sec-Cache in application layer was designed.Furthermore,experiments show that it has good performance and compatibility.  相似文献   
65.
The Grover's a1gorithm was used for fau1t attack against the pub1ic key cryptography.A fixed phase rotation based Grover's a1gorithm was proposed,and the probabi1ity of success achieved 99.23% with 0.1π phase rotation.Combined with the fau1t attack further,ECC(e11iptic curve cryptography)vo1tage burr attack a1gorithm based on Grover a1gorithm with 0.1π phase rotation was proposed.Then a safety Kob1itz curve,K-163,pub1ished successfu11y attacked by NIST on binary domain in simu1ation and the success rate was 100%.The comp1exity of the attack great1y reduces on the exponentia1.It was a new effective way,except the Shor's a1gorithm,to attack pub1ic key cryptography by quantum computing,and it contributed to extend the attack ways to the other pub1ic key cryptography.  相似文献   
66.
介绍了我国开放非点对点消息网间互联互通的背景,并分阶段对我国实现非点对点消息网间互联互通的技术方案进行了介绍和分析。  相似文献   
67.
Various intrusion‐tolerant certification authority (CA) systems have been proposed to provide attack resilient certificate signing (or update) services. However, it is difficult to compare them against each other directly, due to the diversity in system organizations, threshold signature schemes, protocols and usage scenarios. We present a framework for intrusion‐tolerant CA system evaluation, which consists of three components, namely, an intrusion‐tolerant CA model, a threat model and a metric for comparative evaluation. The evaluation framework covers system organizations, protocols, usage scenarios, the period of certificate validity, the revocation rate and the mean time to recovery. Based on the framework, four representative systems are evaluated and compared in three typical usage scenarios, producing reasonable and insightful results. The interdependence between usage scenarios and system characteristics is investigated, providing a guideline to design better systems for different usage scenarios. The proposed framework provides an effective and practicable method to evaluate intrusion‐tolerant CA systems quantitatively, and helps customers to choose and configure an intrusion‐tolerant CA system. Moreover, the comparison results offer valuable insights to further improve the attack resilience of intrusion‐tolerant CA systems. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
68.
自由振动试验识别得到的气动参数已包含了一定的、但与实桥不严格相似的风致静力扭角的影响.为了在颤振分析中能精确考虑风致静力扭角的影响,首先必须消除节段模型试验中风致静力扭角对气动导数识别结果的影响.通过在试验过程中使节段模型作受控反向旋转可以消除平均风附加攻角,然后以象山港大桥为背景,将消除平均风附加攻角后的试验结果与常规试验结果相比较,对风致静力扭角对节段模型系统的阻尼比、气动导数和临界风速的影响进行了初步讨论.研究结果表明:风致静力扭角对模型扭转阻尼比和与扭转有关的气动导数有明显的影响.象山港大桥节段模型在+3°攻角发生颤振时风致静力扭角约为0.32°,攻角修正以后节段模型颤振临界风速识别结果提高了7%.  相似文献   
69.
物联网射频识别技术是利用无线射频方式进行非接触双向通信,自动识别目标对象并获取相关数据的高新技术,广泛应用于门禁系统、车辆防盗、物流管理等安全防范领域中。本文在简要介绍射频识别系统的工作原理和应用的基础上,针对射频识别系统面临的安全问题,提出相应的防范策略,以促进射频识别技术的健康发展。  相似文献   
70.
商品包装的视觉流程设计及应用   总被引:1,自引:1,他引:0  
白蕊 《包装工程》2011,32(22):5-7,22
对商品包装的视觉流程的认知过程以及消费者在购买商品时的视觉心理进行了分析,归纳了商品包装视觉流程设计要充分运用视觉中心、视觉惯性和视觉特性的三大原则;解析了色彩、图形、文字三大基本要素在商品包装视觉流程设计中的应用,最终实现商品包装设计完全符合消费者视觉心理、符合商品的内涵特质及功能需求、符合时代审美变化的目的。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号