首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7520篇
  免费   120篇
  国内免费   6篇
电工技术   73篇
综合类   5篇
化学工业   1093篇
金属工艺   113篇
机械仪表   207篇
建筑科学   235篇
矿业工程   33篇
能源动力   188篇
轻工业   530篇
水利工程   47篇
石油天然气   13篇
武器工业   2篇
无线电   640篇
一般工业技术   1174篇
冶金工业   2535篇
原子能技术   118篇
自动化技术   640篇
  2021年   64篇
  2020年   49篇
  2019年   53篇
  2018年   59篇
  2017年   69篇
  2016年   71篇
  2015年   59篇
  2014年   106篇
  2013年   236篇
  2012年   160篇
  2011年   256篇
  2010年   184篇
  2009年   187篇
  2008年   216篇
  2007年   208篇
  2006年   220篇
  2005年   153篇
  2004年   167篇
  2003年   156篇
  2002年   144篇
  2001年   146篇
  2000年   136篇
  1999年   176篇
  1998年   731篇
  1997年   401篇
  1996年   339篇
  1995年   199篇
  1994年   188篇
  1993年   217篇
  1992年   115篇
  1991年   112篇
  1990年   108篇
  1989年   112篇
  1988年   88篇
  1987年   95篇
  1986年   101篇
  1985年   103篇
  1984年   104篇
  1983年   85篇
  1982年   82篇
  1981年   114篇
  1980年   101篇
  1979年   93篇
  1978年   82篇
  1977年   110篇
  1976年   183篇
  1975年   76篇
  1974年   47篇
  1973年   68篇
  1972年   46篇
排序方式: 共有7646条查询结果,搜索用时 15 毫秒
111.
Room temperature mechanical properties, such as flexural strength and impact resistance, of epoxies and graphite/epoxy composites go through a maximum as a function of epoxy conversion. For tetraglycidyl 4,4′-diaminodiphenylmethane (TGDDM)-4,4′-diamlnodiphenylsulfone (DDS) formulations, the recommended cure cycle prescribes a maximum temperature close to 177°C. The maximum extent of reaction that may be obtained at this temperature is determined from the vitrification curve. At this maximum conversion, balanced mechanical and physical properties are attained in the partially cured specimen. However, if the standard cycle is used to cure thick parts, the maximum temperature inside the sample increases beyond 177°C. This leads to a complete conversion in most of the part and a consequent impairment of resulting physical and mechanical properties. It is shown how numerical solutions of differential energy and mass balances may be used to propose alternative cure cycles such that the maximum conversion at every point remains bounded by the vitrification curve. An illustration for a particular thickness is provided.  相似文献   
112.
A model of the manufacture of rigid polyurethane foams by free rising is presented. The extent of cream and rise periods as well as the amount of blowing agent necessary to give the desired foam density are theoretically predicted. The rate of blowing agent evaporation is calculated from an experimental boiling temperature vs. composition curve. Experimental runs were carried out with a formulation consisting of a polymeric isocyanate, a polyether polyol based on sorbitol, a silicone-polyol block-copolymer as surfactant, dibutyltin dilaurate as catalyst, and trichlorofluoromethane as blowing agent. Mixing was performed in situ in the mold using a commercial foaming machine. Experimental results gave a satisfactory agreement with model predictions. A diagram containing all the relevant information may be theoretically built and used for the selection of adequate operating parameters for a given formulation.  相似文献   
113.
The potential hazard of a carbonate-based, phosphate-free detergent was compared with that of a variety of granular and liquid phosphate detergents. Evaluations were made using methods prescribed by the Federal Hazardous Substances Act (FHSA) and others designed to more closely approximate exposure in actual use. Some phosphate products produced esophageal and gastric mucosal irritation similar to that produced by the nonphosphate detergent, while others caused varying, lesser degrees of injury. The nonphosphate detergent, as well as several phosphate products, was seriously irritating to the unwashed eye at required FHSA test levels. Under more realistic conditions, eye irritation was reduced significantly. Skin irritation by the nonphosphate product was comparable to that by phosphate detergents, and in some cases was lower. In skin irritation tests with human subjects, results with the carbonate detergent were equal to or lower than those obtained with phosphate detergents. The carbonate detergent was found not to be phototoxic, nor a contact- nor photo-sensitizer. Total alkalinity was shown not to correlate with the severity of tissue injury in either test animals or in man. Presented at the AOCS Short Course, “Update on Detergents and Raw Materials,” Lake Placid, New York, June 1971.  相似文献   
114.
Mutation testing has traditionally been used as a defect injection technique to assess the effectiveness of a test suite as represented by a “mutation score.” Recently, mutation testing tools have become more efficient, and industrial usage of mutation analysis is experiencing growth. Mutation analysis entails adding or modifying test cases until the test suite is sufficient to detect as many mutants as possible and the mutation score is satisfactory. The augmented test suite resulting from mutation analysis may reveal latent faults and provides a stronger test suite to detect future errors which might be injected. Software engineers often look for guidance on how to augment their test suite using information provided by line and/or branch coverage tools. As the use of mutation analysis grows, software engineers will want to know how the emerging technique compares with and/or complements coverage analysis for guiding the augmentation of an automated test suite. Additionally, software engineers can benefit from an enhanced understanding of efficient mutation analysis techniques. To address these needs for additional information about mutation analysis, we conducted an empirical study of the use of mutation analysis on two open source projects. Our results indicate that a focused effort on increasing mutation score leads to a corresponding increase in line and branch coverage to the point that line coverage, branch coverage and mutation score reach a maximum but leave some types of code structures uncovered. Mutation analysis guides the creation of additional “common programmer error” tests beyond those written to increase line and branch coverage. We also found that 74% of our chosen set of mutation operators is useful, on average, for producing new tests. The remaining 26% of mutation operators did not produce new test cases because their mutants were immediately detected by the initial test suite, indirectly detected by test suites we added to detect other mutants, or were not able to be detected by any test.
Laurie WilliamsEmail:

Ben Smith   is a second year Ph.D. student in Computer Science at North Carolina State University working as an RA under Dr. Laurie Williams. He received his Bachelor’s degree in Computer Science in May of 2007 and he hopes to receive his doctorate in 2012. He has begun work on developing SQL Coverage Metrics as a predictive measure of the security of a web application. This fall, he will be beginning the doctoral preliminary exam and working as a Testing Manager for the NCSU CSC Senior Design Center: North Carolina State’s capstone course for Computer Science. Finally, he has designed and maintained the websites for the Center for Open Software Engineering and ESEM 2009. Laurie Williams   is an Associate Professor in the Computer Science Department of the College of Engineering at North Carolina State University. She leads the Software Engineering Reasearch group and is also the Director of the North Carolina State University Laboratory for Collaborative System Development and the Center for Open Software Engineering. She is also technical co-director of the Center for Open Software Engineering (COSE) and the area technical director of the Secure Open Systems Initiative (SOSI) at North Carolina State University. Laurie received her Ph.D. in Computer Science from the University of Utah, her MBA from Duke University, and her BS in Industrial Engineering from Lehigh University. She worked for IBM for nine years in Raleigh, NC before returning to academia. Laurie’s research interests include agile software development methodologies and practices, collaborative/pair programming, software reliability and testing, and software engineering for secure systems development.   相似文献   
115.
A taxonomy of system attacker behavior reveals security vulnerabilities in RFID authorization and monitoring systems. RFID systems are classified by their informational goals-typically, authorization and monitoring. Authorization systems replace the more traditional approaches of granting an entity access to a particular zone, whereas monitoring systems establish an entity's location in that zone. Although their informational goals differ, the underlying hardware is identical for both types of systems; consequently, attacks at the hardware level are the same. However, because attacker behavior invalidates each subsystem's informational goals differently, RFID security requirements should consider these goals individually.  相似文献   
116.
To a child, pain and fear are inseparable. How to safely relieve both is a subject of growing debate and research. Only recently has a narcotic drug been approved specifically for children, and its use is controversial.  相似文献   
117.
118.
Williams TP  Webbers JP 《Applied optics》1995,34(25):5720-5724
We describe a photometer that measures light transmitted through excised eyes. The instrument, an ocular transmission photometer, employs sensitive single photon-counting techniques, and its usefulness has been tested by the study of the absorbance of rhodopsin in retinal rod cells in situ. We find that absorbances of rat rods agree well with those predicted by microspectrophotometry without making corrections for cellular mosaics. Additional tests of the ocular transmission photometer show that (a) the instrument is sensitive to subtle differences in rhodopsin absorbance, known to exist in specific locations in the rat retina, and (b) using the rate of rhodopsin bleaching as the measure of intensity, we can determine the intensity distribution at several locations across the rat retina.  相似文献   
119.
This study provides evidence that some adults who claim to have recovered memories of sexual abuse recall actual events that occurred in childhood. One hundred twenty-nine women with documented histories of sexual victimization in childhood were interviewed and asked about abuse history. Seventeen years following the initial report of the abuse, 80 of the women recalled the victimization. One in 10 women (16% of those who recalled the abuse) reported that at some time in the past they had forgotten about the abuse. Those with a prior period of forgetting--the women with "recovered memories"--were younger at the time of abuse and were less likely to have received support from their mothers than the women who reported that they had always remembered their victimization. The women who had recovered memories and those who had always remembered had the same number of discrepancies when their accounts of the abuse were compared to the reports from the early 1970s.  相似文献   
120.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号