首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1375篇
  免费   312篇
  国内免费   201篇
电工技术   187篇
技术理论   2篇
综合类   160篇
化学工业   20篇
金属工艺   3篇
机械仪表   21篇
建筑科学   187篇
矿业工程   40篇
能源动力   36篇
轻工业   6篇
水利工程   151篇
石油天然气   5篇
武器工业   66篇
无线电   162篇
一般工业技术   100篇
冶金工业   91篇
原子能技术   5篇
自动化技术   646篇
  2024年   8篇
  2023年   30篇
  2022年   74篇
  2021年   64篇
  2020年   90篇
  2019年   82篇
  2018年   69篇
  2017年   76篇
  2016年   92篇
  2015年   65篇
  2014年   135篇
  2013年   131篇
  2012年   126篇
  2011年   144篇
  2010年   106篇
  2009年   95篇
  2008年   91篇
  2007年   98篇
  2006年   83篇
  2005年   61篇
  2004年   56篇
  2003年   25篇
  2002年   23篇
  2001年   13篇
  2000年   10篇
  1999年   7篇
  1998年   8篇
  1996年   1篇
  1995年   2篇
  1994年   5篇
  1993年   1篇
  1992年   1篇
  1991年   3篇
  1988年   2篇
  1986年   3篇
  1984年   1篇
  1983年   3篇
  1982年   1篇
  1981年   1篇
  1979年   1篇
  1966年   1篇
排序方式: 共有1888条查询结果,搜索用时 46 毫秒
1.
为了解决当前模糊测试技术中变异存在一定的盲目性以及变异生成的样本大多经过相同的高频路径的问题,提出并实现了一种基于轻量级程序分析技术的二进制程序模糊测试方法。首先对目标二进制程序进行静态分析来筛选在模糊测试过程中阻碍样本文件深入程序内部的比较指令;随后对目标文件进行插桩来获取比较指令中操作数的具体值,并根据该具体值为比较指令建立实时的比较进度信息,通过比较进度衡量样本的重要程度;然后基于模糊测试过程中实时的路径覆盖信息为经过稀有路径的样本增加其被挑选进行变异的概率;最后根据比较进度信息并结合启发式策略有针对性地对样本文件进行变异,通过变异引导提高模糊测试中生成能够绕过程序规约检查的有效样本的效率。实验结果表明,所提方法发现crash及发现新路径的能力均优于模糊测试工具AFL-Dyninst。  相似文献   
2.
Cyberattacks on the Industrial Control System (ICS) have recently been increasing, made more intelligent by advancing technologies. As such, cybersecurity for such systems is attracting attention. As a core element of control devices, the Programmable Logic Controller (PLC) in an ICS carries out on-site control over the ICS. A cyberattack on the PLC will cause damages on the overall ICS, with Stuxnet and Duqu as the most representative cases. Thus, cybersecurity for PLCs is considered essential, and many researchers carry out a variety of analyses on the vulnerabilities of PLCs as part of preemptive efforts against attacks. In this study, a vulnerability analysis was conducted on the XGB PLC. Security vulnerabilities were identified by analyzing the network protocols and memory structure of PLCs and were utilized to launch replay attack, memory modulation attack, and FTP/Web service account theft for the verification of the results. Based on the results, the attacks were proven to be able to cause the PLC to malfunction and disable it, and the identified vulnerabilities were defined.  相似文献   
3.
低易损性PBX炸药烤燃试验方法研究   总被引:2,自引:0,他引:2  
烤燃试验是评估和检验炸药易损性能的重要试验之一。通过分析炸药的安全可靠性及战场生存能力阐明了PBX炸药烤燃试验的意义和重要性,论述了PBX炸药烤燃试验国内外的发展现状,介绍了烤燃试验的方法,分析了影响烤燃试验结果的主要因素。  相似文献   
4.
Seismic fragility analysis is an efficient way to study the seismic behaviour and performance of structures under the excitation of earthquakes of varying intensity, and an essential part of the seismic risk assessment of structures. A recently developed dynamic reliability methodology, the probability density evolution method (PDEM), is proposed for the dynamic reliability and seismic fragility analysis of a retaining wall. The PDEM can obtain an instantaneous probability density function of the seismic responses and easily acquire the seismic reliability of the structural system. An important advantage of the PDEM is its high efficiency relative to that of the Monte Carlo simulation method, which is often used in the reliability and fragility analysis of structures. The present study uses a typical gravity retaining wall to illustrate stochastic seismic responses and fragility curves that can be obtained by the PDEM. The combined uncertainties of the seismic force and soil properties are explicitly and systematically modelled by stochastic ground motions and random variables respectively. The performance of the retaining wall is analysed for different acceptable levels of backfill settlement. Additionally, seismic fragility curves are constructed without assuming the distribution of the seismic response.  相似文献   
5.
以基础设施 PPP 项目为对象,借助网络模型,对其进行脆弱性影响因素的研究。基础设施 PPP 项目作为一个系统,其脆弱性往往由脆弱性影响因素诱发。将影响因素作为网络中的节点,因素间的关联关系及强度作为边和权重,在此基础上构建无向加权网络。通过对网络模型参数的计算,可以按照重要程度对脆弱性影响因素进行排序,从而为基础设施 PPP 项目的风险管理提供理论依据和实践指导。  相似文献   
6.
ABSTRACT

Research in UK and elsewhere has highlighted that older people are particularly vulnerable to negative health effects of overheating. This paper examines the magnitude, causes, preparedness and remedies for addressing the risk of summertime overheating in four case study residential care and extra-care settings across the UK, spanning different building types, construction and age. An interdisciplinary approach is adopted, drawing from building science and social science methods, including temperature monitoring, building surveys, and interviews with design and management teams. The findings suggest that overheating is a current and prevalent risk in the case study schemes, yet currently little awareness or preparedness exists to implement suitable and long-term adaptation strategies (e.g., external shading). There was a perception from designers to managers, that cold represents a bigger threat to older occupants’ health than excessive heat. A lack of effective heat management was found across the case studies that included unwanted heat gains from the heating system, confusion in terms of responsibilities to manage indoor temperatures, and conflicts between window opening and occupant safety. Given that care settings should provide protection against risks from cold and hot weather, design, management and care practices need to become better focused towards this goal.  相似文献   
7.
Groundwater vulnerability assessment has been an increasingly important environment management tool. The existing vulnerability assessment approaches are mostly index systems which have significant disadvantages. There need to be some quantitative studies on vulnerability indicators based on objective physical process study. In this study, we tried to do vulnerability assessment in Huangshuihe catchment in Shandong province of China using both contaminant transport simulations and index system approach. Transit time of 75% of hypothetical injected contaminant concentration was considered as the vulnerability indicator. First, we collected the field data of the Huangshuihe catchment and the catchment was divided into 34 sub areas that can each be treated as a transport sub model. Next, we constructed a Hydrus1D transport model of Huangshuihe catchment. Different sub areas had different input values. Thirdly, we used Monte-Carlo simulation to improve the collected data and did vulnerability assessment using the statistics of the contaminant transit time as a vulnerability indicator. Finally, to compare with the assessment result by transport simulation, we applied two index systems to Huangshuihe catchment. The first was DRASTIC system, and the other was a system we tentatively constructed examining the relationships between the transit time and the input parameters by simply changing the input values. The result of comparisons between the two index systems and transport simulation approach suggested partial validation to DRASTIC, and the construction of the new tentative index system was an attempt of building up index approaches based on physical process simulation.  相似文献   
8.
Abstract

The Serbian road network includes a large portion of bridges with shallow foundations vulnerable to local scour as tragically demonstrated during the extreme flooding in May 2014. Currently, the bridge management procedures in Serbia and worldwide do not comprehensively account for a risk of bridge failure due to flooding and fail to provide sufficient information for the decision-making. Thus, a novel methodology for quantitative vulnerability assessment is suggested as a tool to identify the most vulnerable bridges in a network. Herein, the essential task is evaluation of the conditional probability of a bridge failure due to local scour in a flooding event of a certain magnitude. To apply this approach on a network level, there is a dire need to establish precise practice-ready guidelines on an optimal set of information to be used and/or collected in situ, which is discussed on an example of the Serbian bridge database. The vulnerability of a bridge to local scour may be used as a comprehensive indicator of a bridge performance in a flooding event. For a network level, the vulnerability maps with respect to flooding of different magnitudes will give road operators crucial information to apply adequate quality control plans to vulnerable bridges.  相似文献   
9.
徐小东  虞刚 《新建筑》2004,(6):58-61
通过对“互通性与分类矩阵”理论的详细剖析,系统评述了杨经文的生物气候设计、生态设计思想,并介绍了其在实践中的“研究、设计和发展”的设计方法以及在摩天楼设计框架中的“垂直城市”的独特概念。  相似文献   
10.
突发事故中结构易损性的研究   总被引:2,自引:0,他引:2  
易损性是指系统容易受到伤害或损伤的程度,世贸大厦的倒塌,使得结构易损性问题在土木工程领域引起了广泛关注.本文用结构倒塌分析程序对天津第二毛纺厂中南楼结构中各构件的重要性进行了分析,并对国内外结构易损性研究进行了分析和展望.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号