首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4067篇
  免费   965篇
  国内免费   741篇
电工技术   124篇
综合类   502篇
化学工业   199篇
金属工艺   71篇
机械仪表   40篇
建筑科学   171篇
矿业工程   30篇
能源动力   37篇
轻工业   9篇
水利工程   29篇
石油天然气   12篇
武器工业   209篇
无线电   1098篇
一般工业技术   190篇
冶金工业   29篇
原子能技术   12篇
自动化技术   3011篇
  2024年   29篇
  2023年   121篇
  2022年   197篇
  2021年   216篇
  2020年   206篇
  2019年   171篇
  2018年   165篇
  2017年   202篇
  2016年   172篇
  2015年   229篇
  2014年   356篇
  2013年   339篇
  2012年   402篇
  2011年   463篇
  2010年   374篇
  2009年   335篇
  2008年   366篇
  2007年   365篇
  2006年   277篇
  2005年   233篇
  2004年   145篇
  2003年   129篇
  2002年   68篇
  2001年   55篇
  2000年   46篇
  1999年   28篇
  1998年   13篇
  1997年   13篇
  1996年   12篇
  1995年   10篇
  1994年   5篇
  1993年   7篇
  1992年   3篇
  1991年   4篇
  1990年   4篇
  1989年   2篇
  1988年   4篇
  1985年   1篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1977年   2篇
排序方式: 共有5773条查询结果,搜索用时 296 毫秒
991.
Effects of thaumasite on bond strength of reinforcement in concrete   总被引:1,自引:0,他引:1  
The conditions necessary for the formation of thaumasite are well known and much work is in progress to identify concrete mixes resistant to thaumasite form of sulfate attack (TSA). However, there have been no data to indicate how TSA affects the nature and strength of the bond between reinforcement steel and concrete and hence the load capacity of reinforced concrete elements.

During works to repair and strengthen the thaumasite-affected Tredington–Ashchurch Overbridge in Gloucestershire, sections of column were removed and placed in storage. These column sections presented an opportunity to perform pullout tests on full size TSA-affected structural elements and unaffected control specimens from the same structure. In total 63 pullout tests were performed on plain round reinforcement bars embedded in two unaffected and four TSA-affected reinforced concrete elements. The sections were also characterised in terms of estimated in situ cube strength and depth of softened zone.

A statistical analysis of the experimental results indicates that the bond of the plain round reinforcement bars in the unaffected concrete exceeded that of the plain round reinforcement bars in the TSA-affected concrete. TSA reduced the mean experimental bond coefficient by 24% for corner bars and 10% for other bars, representing an average reduction in mean experimental bond coefficient of 15% for all bars.  相似文献   

992.
Thaumasite formation in concrete and mortars containing fly ash   总被引:7,自引:0,他引:7  
Due to recent reports on deterioration of concrete structures, the thaumasite form of sulfate attack has become a subject of study and close investigation. This paper investigates the formation of thaumasite in concrete and mortars containing fly ash. The results show that thaumasite formation can occur within 84 days of exposure to sulfate solutions. High volumes of fly ash can limit or promote thaumasite formation depending on the type of cement used. Thaumasite and ettringite were found among the deterioration products. However, the thaumasite formation in the specimen prepared from sulfate resisting Portland cement was not accompanied by deterioration, except by 50% fly ash addition. The mixtures of Portland limestone cement with 40% fly ash exhibited a very limited thaumasite formation while the mixtures with 50% had no thaumasite at all. It is concluded that thaumasite can also be formed in mixtures incorporating fly ash.  相似文献   
993.
The UK guidance for specification of concrete in aggressive ground has been revised following the discovery of the thaumasite form of sulfate attack in the foundations to highway bridges in England in 1998. Interim advice was issued in the Report of the Thaumasite Expert Group in January 1999. Following consultation with industry, a new BRE Special Digest 1 was published in September 2001 (to replace Digest 363) and parallel amendments to the current BS 5328 were drafted. New concepts are introduced for ground assessment and concrete specification. Allowance is now made for the oxidation of sulfides in the ground and there is a new classification for the aggressive chemical environment. Concrete specification additionally takes into account the required structural performance level, the carbonate content of aggregates, and the need for additional protective measures. Compatible guidance is being put in place for the UK Highways Agency and for BS 8500, the UK complementary standard to the European Standard BS EN 206-1, which will replace BS 5328 in December 2003.  相似文献   
994.
This paper presents a method for differential collision attack of reduced FOX block cipher based on 4-round distinguishing property. It can be used to attack 5, 6 and 7-round FOX64 and 5-round FOX128. Our attack has a precomputation phase, but it can be obtained before attack and computed once for all. This attack on the reduced to 4-round FOX64 requires only 7 chosen plaintexts, and performs 242 .84-round FOX64 encryptions. It could be extended to 5 (6, 7)-round FOX64 by a key exhaustive search behind the fourth round. The time complexities of 5, 6 and 7-round FOX64 are approximate to 2106 .8, 2170 .8and 2234 .8, respectively. The attack on reduced FOX128 demands 11 chosen plain-texts, requires 2192one round encryptions in precomputation, performs approximately 276 .5 one round encryptions on 4-round FOX128, and is 2204 .5against 5-round FOX128.  相似文献   
995.
机密过程模型:一种量化机密泄漏的方法   总被引:1,自引:1,他引:0       下载免费PDF全文
In this paper, we propose a theoretical-in-formation Confidential Procedure Model (CPM) to quantify confidentiality ( or information leakage ). The advantages of the CPM model include the fol-lowing: 1) confidentiality loss is formalized as a dy-namic procedure, instead of a static function, and described via the “waterfall” diagram; 2) confiden-tiality loss is quantified in a relative manner, i. e., taken as a quantitative metric, the ratio of the condi-tional entropy being reserved after observing the entropy of the original full confidential information; 3) the optimal attacks including exhaustive attacks as well as all possible attacks that have (or have not even) been discovered, are taken into account when defining the novel concept of the confidential de-gree. To elucidate the proposed model, we analyze the information leakage in side-channel attacks and the anonymity of DC-net in a quantitative manner.  相似文献   
996.
针对光网络攻击易被发现的问题,提出一种基于信号延迟插入的光网络攻击方式。该方法在不改变链路光学性能的基础上,利用信号延迟在系统中引起较高的串扰,极大的降低了系统的性能。仿真和实验结果表明攻击后目标光链路的误码性能大幅劣化而其光域内参数几乎没有变化,具有较好的隐蔽性和良好的攻击效果。  相似文献   
997.
美国国家标准与技术研究院(NIST)于2018年开始征集轻量级认证加密和哈希算法标准,其中Subterranean 2.0密码套件是晋级到第二轮的32个候选算法之一.Subterranean-SAE是Subterranean 2.0密码套件中的一种认证加密工作模式.2019年,刘富康等人对4轮空白轮(4 blank r...  相似文献   
998.
研究了混沌序列、提升小波在彩色图像盲水印中的应用,给出一种新的基于混沌序列和提升小波的抗剪切变换攻击的彩色图像盲水印算法。算法同时采用两种不同的混沌序列,提高了算法的安全性;根据HVS特性使中低频使用不同的算法自适应地嵌入水印,使算法有了很好的隐藏效果;使用提升小波变换提高了算法的效率;对受严重攻击后提取出的水印进行优化处理,使算法有了很好的鲁棒性。实验证明该算法具有较高的效率、较好的隐藏效果、很好的安全性和鲁棒性,尤其在抗剪切攻击方面格外显著。  相似文献   
999.
基于NetFlow流量分析的网络攻击行为发现   总被引:14,自引:0,他引:14  
杨嵘  张国清  韦卫  李仰耀 《计算机工程》2005,31(13):137-139,164
针对当前网络攻击的特点,利用基于NetFlow协议的高性能数据采集模式并结合分布分析、频度分析等流量分析手段,实现了一种通过NetFlow流量分析发现网络攻击行为的方法。  相似文献   
1000.
提出了一种基于求离散对数困难性的群签名方案,该方案可防止群管理员和群成员的联合伪造攻击,与现有组签名方案相比,该方案计算简单,而且要传输的数据量很小,方案比较有效.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号