全文获取类型
收费全文 | 3986篇 |
免费 | 989篇 |
国内免费 | 712篇 |
专业分类
电工技术 | 123篇 |
综合类 | 500篇 |
化学工业 | 196篇 |
金属工艺 | 71篇 |
机械仪表 | 40篇 |
建筑科学 | 171篇 |
矿业工程 | 30篇 |
能源动力 | 36篇 |
轻工业 | 9篇 |
水利工程 | 28篇 |
石油天然气 | 12篇 |
武器工业 | 209篇 |
无线电 | 1087篇 |
一般工业技术 | 190篇 |
冶金工业 | 29篇 |
原子能技术 | 12篇 |
自动化技术 | 2944篇 |
出版年
2024年 | 18篇 |
2023年 | 118篇 |
2022年 | 195篇 |
2021年 | 214篇 |
2020年 | 203篇 |
2019年 | 167篇 |
2018年 | 164篇 |
2017年 | 197篇 |
2016年 | 169篇 |
2015年 | 227篇 |
2014年 | 354篇 |
2013年 | 334篇 |
2012年 | 390篇 |
2011年 | 448篇 |
2010年 | 371篇 |
2009年 | 333篇 |
2008年 | 362篇 |
2007年 | 364篇 |
2006年 | 274篇 |
2005年 | 232篇 |
2004年 | 145篇 |
2003年 | 129篇 |
2002年 | 68篇 |
2001年 | 55篇 |
2000年 | 44篇 |
1999年 | 28篇 |
1998年 | 13篇 |
1997年 | 13篇 |
1996年 | 12篇 |
1995年 | 10篇 |
1994年 | 5篇 |
1993年 | 7篇 |
1992年 | 3篇 |
1991年 | 4篇 |
1990年 | 4篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1985年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 2篇 |
排序方式: 共有5687条查询结果,搜索用时 15 毫秒
71.
HTML5 application cache (AppCache) allowed Web browser to access Web offline.But it also brought a new method of cache poisoning attack that was more persisting.As for websites which used the AppCache,a novel poisoning method RFTM (replace file twice method),in which the attacker replaced the manifest file twice to poison the client’s AppCache,was proposed.Compared with the original attack,the legal server would not receive abnormal HTTP requests from the client in the attack.Therefore,changing the server configuration could not prevent the client from the RFTM AppCache poisoning.To avoid the attack mentioned above,a lightweight signature defense scheme Sec-Cache in application layer was designed.Furthermore,experiments show that it has good performance and compatibility. 相似文献
72.
73.
The Grover's a1gorithm was used for fau1t attack against the pub1ic key cryptography.A fixed phase rotation based Grover's a1gorithm was proposed,and the probabi1ity of success achieved 99.23% with 0.1π phase rotation.Combined with the fau1t attack further,ECC(e11iptic curve cryptography)vo1tage burr attack a1gorithm based on Grover a1gorithm with 0.1π phase rotation was proposed.Then a safety Kob1itz curve,K-163,pub1ished successfu11y attacked by NIST on binary domain in simu1ation and the success rate was 100%.The comp1exity of the attack great1y reduces on the exponentia1.It was a new effective way,except the Shor's a1gorithm,to attack pub1ic key cryptography by quantum computing,and it contributed to extend the attack ways to the other pub1ic key cryptography. 相似文献
74.
SHCC (Strain Hardening Cement-based Composite) is a material known for its strain-hardening behavior under tensile and bending stress and its characteristic numerous small cracks. SHCC is expected to show superior durability because of the fineness of the cracks. In this study, chloride ingress through cracks into SHCC and progress of rebar corrosion in three mixtures of SHCC with various water-cement ratios were investigated. Through a chloride solution immersion test, it was confirmed that chloride could penetrate through even very fine cracks. The resistivity of cracked SHCC against chloride ingress is mainly governed by the accumulated crack width and the water cement ratio. Chloride pre-mixed SHCC specimens were left in a high-temperature, high-humidity chamber for 11 months to promote rebar corrosion. While the accumulated crack width and the water cement ratio were both influential to an increase in corrosion area, only the water cement ratio had bearing on corrosion loss. 相似文献
75.
This paper presents an investigation into the observed enhanced performance that alkali activated ground granulated blast furnace slag (GGBFS) and binary blends offer against sulphate attack. X-ray diffraction (XRD) was carried out to identify and quantify the crystalline phases formed in a wide range of GGBFS and GGBFS-OPC (ordinary Portland cement) blends. Furthermore, specimens were exposed to a sulphate solution to examine the evolution of compressive strength along with identification of activation and/or hydration products. XRD demonstrated that ettringite was completely decomposed into its constituents in the presence of NaOH while quantification ascertained the formation of considerable amounts of hydrotalcite in the activated GGBFS and binary blends. Alkali activated GGBFS and binary blends specimens with higher GGBFS content offered enhanced resistance against aggressive sulphate ions and no significant degradation products were observed in these specimens after 6 months of exposure to sulphate solution. The results demonstrated that hydrotalcite formation may be a major reason for the improved sulphate resistance of alkali activated GGBFS and binary blend pastes with higher GGBFS content. 相似文献
76.
Jingqiang Lin Jiwu Jing Peng Liu 《Quality and Reliability Engineering International》2012,28(8):825-841
Various intrusion‐tolerant certification authority (CA) systems have been proposed to provide attack resilient certificate signing (or update) services. However, it is difficult to compare them against each other directly, due to the diversity in system organizations, threshold signature schemes, protocols and usage scenarios. We present a framework for intrusion‐tolerant CA system evaluation, which consists of three components, namely, an intrusion‐tolerant CA model, a threat model and a metric for comparative evaluation. The evaluation framework covers system organizations, protocols, usage scenarios, the period of certificate validity, the revocation rate and the mean time to recovery. Based on the framework, four representative systems are evaluated and compared in three typical usage scenarios, producing reasonable and insightful results. The interdependence between usage scenarios and system characteristics is investigated, providing a guideline to design better systems for different usage scenarios. The proposed framework provides an effective and practicable method to evaluate intrusion‐tolerant CA systems quantitatively, and helps customers to choose and configure an intrusion‐tolerant CA system. Moreover, the comparison results offer valuable insights to further improve the attack resilience of intrusion‐tolerant CA systems. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
77.
结合具体物体打击事故,分析了研究脚手架、预留洞口和拆除落物打击安全事故发生的根本原因,总结脚手架、预留洞口和拆除落物打击事故的经验教训,指出应不断加强施工人员的安全教育培训,切实提高建筑从业人员的安全意识,以减少或避免施工过程中物体打击事故的发生。 相似文献
78.
79.
80.