全文获取类型
收费全文 | 16888篇 |
免费 | 1283篇 |
国内免费 | 133篇 |
专业分类
电工技术 | 374篇 |
综合类 | 210篇 |
化学工业 | 3630篇 |
金属工艺 | 626篇 |
机械仪表 | 748篇 |
建筑科学 | 582篇 |
矿业工程 | 63篇 |
能源动力 | 692篇 |
轻工业 | 1608篇 |
水利工程 | 133篇 |
石油天然气 | 197篇 |
武器工业 | 4篇 |
无线电 | 2226篇 |
一般工业技术 | 3155篇 |
冶金工业 | 1781篇 |
原子能技术 | 150篇 |
自动化技术 | 2125篇 |
出版年
2023年 | 189篇 |
2022年 | 336篇 |
2021年 | 498篇 |
2020年 | 378篇 |
2019年 | 434篇 |
2018年 | 514篇 |
2017年 | 543篇 |
2016年 | 634篇 |
2015年 | 564篇 |
2014年 | 727篇 |
2013年 | 1198篇 |
2012年 | 989篇 |
2011年 | 1233篇 |
2010年 | 929篇 |
2009年 | 895篇 |
2008年 | 832篇 |
2007年 | 667篇 |
2006年 | 577篇 |
2005年 | 512篇 |
2004年 | 441篇 |
2003年 | 448篇 |
2002年 | 454篇 |
2001年 | 353篇 |
2000年 | 298篇 |
1999年 | 275篇 |
1998年 | 561篇 |
1997年 | 407篇 |
1996年 | 268篇 |
1995年 | 218篇 |
1994年 | 215篇 |
1993年 | 205篇 |
1992年 | 133篇 |
1991年 | 102篇 |
1990年 | 106篇 |
1989年 | 99篇 |
1988年 | 74篇 |
1987年 | 66篇 |
1986年 | 66篇 |
1985年 | 84篇 |
1984年 | 90篇 |
1983年 | 54篇 |
1982年 | 55篇 |
1981年 | 53篇 |
1980年 | 47篇 |
1979年 | 47篇 |
1978年 | 42篇 |
1977年 | 60篇 |
1976年 | 91篇 |
1975年 | 46篇 |
1973年 | 36篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
131.
Throughout history, the development and widespread use of new technologies has impacted human cognition and social structures. By integrating a range of cognitive and socio-cultural theories we are better able to understand the impact of technological tools, such as the Internet, on children in the context of their local and global communities. An integrated theoretical approach enables us to more comprehensively ascertain the potential of the Internet to significantly impact children’s cognitive processes and the larger social implications of this global phenomenon. This paper presents a small-scale exploratory study that, through the development of an Internet-mediated learning model, examines the skills and characteristics of young, competent Internet-users engaged in informal Internet activities. At present, there is much conjecture on the ways in which the Internet may affect learning and this paper describes an approach to research that could inform future data collection procedures and analysis in empirical studies. 相似文献
132.
徐奔 《数字社区&智能家居》2009,5(5):3478-3480
该文将二值水印嵌入到宿主图像的小波变换域的低频分量中,利用BP神经网络很好的非线性映射和自学习、自适应学习特点实现水印信息的盲提取,仿真实验结果表明该算法既能抵抗常规的图像处理攻击,也能抵抗一定程度的几何攻击,如JPEG压缩、剪切、加噪和滤波等,具有较好的鲁棒性和不可见性。 相似文献
133.
针对当前形势下炼油企业蒸汽动力系统存在的巨大改造潜力,提出了蒸汽动力系统改造的优化方法;该方法首先通过运行优化方案分析和系统设备诊断找出系统存在问题,然后通过专家知识系统提出一系列解决的方案,建立系统改造方案的超结构和考虑柔性调节的优化改造混合整数线性规划(MILP)模型,求解模型并确定最优的改造方案;文章最后部分给出了详细的案例分析,结果表明应用本文提出的改造优化策略方法确定的最佳改造方案可以为案例背景炼油企业蒸汽动力系统节约大约6%的运行费用,投资回收期约0.38年;本文提出的优化改造方法为推动炼油企业蒸汽动力系统的节能降耗提供了定的理论指导和技术支持. 相似文献
134.
135.
136.
FENECIA: failure endurable nested-transaction based execution of composite Web services with incorporated state analysis 总被引:1,自引:0,他引:1
Neila Ben Lakhal Takashi Kobayashi Haruo Yokota 《The VLDB Journal The International Journal on Very Large Data Bases》2009,18(1):1-56
Interest in the Web services (WS) composition (WSC) paradigm is increasing tremendously. A real shift in distributed computing
history is expected to occur when the dream of implementing Service-Oriented Architecture (SOA) is realized. However, there
is a long way to go to achieve such an ambitious goal. In this paper, we support the idea that, when challenging the WSC issue,
the earlier that the inevitability of failures is recognized and proper failure-handling mechanisms are defined, from the
very early stage of the composite WS (CWS) specification, the greater are the chances of achieving a significant gain in dependability.
To formalize this vision, we present the FENECIA (Failure Endurable Nested-transaction based Execution of Composite Web services with Incorporated state Analysis) framework. Our framework approaches the WSC issue from different points of view to guarantee a high level of dependability.
In particular, it aims at being simultaneously a failure-handling-devoted CWS specification, execution, and quality of service
(QoS) assessment approach. In the first section of our framework, we focus on answering the need for a specification model
tailored for the WS architecture. To this end, we introduce WS-SAGAS, a new transaction model. WS-SAGAS introduces key concepts that are not part of the WS architecture pillars, namely, arbitrary nesting, state, vitality degree, and compensation, to specify failure-endurable CWS as a hierarchy of recursively nested transactions. In addition, to define the CWS execution
semantics, without suffering from the hindrance of an XML-based notation, we describe a textual notation that describes a
WSC in terms of definition rules, composability rules, and ordering rules, and we introduce graphical and formal notations. These rules provide the solid foundation needed to formulate the execution
semantics of a CWS in terms of execution correctness verification dependencies. To ensure dependable execution of the CWS, we present in the second section of FENECIA our architecture THROWS, in which the execution control of the resulting CWS is distributed among engines, discovered dynamically, that communicate
in a peer-to-peer fashion. A dependable execution is guaranteed in THROWS by keeping track of the execution progress of a
CWS and by enforcing forward and backward recovery. We concentrate in the third section of our approach on showing how the
failure consideration is trivial in acquiring more accurate CWS QoS estimations. We propose a model that assesses several
QoS properties of CWS, which are specified as WS-SAGAS transactions and executed in THROWS. We validate our proposal and show
its feasibility and broad applicability by describing an implemented prototype and a case study. 相似文献
137.
Ho Nyeon Lee Hyung Jung Kim Young Min Yoon 《Journal of the Society for Information Display》2009,17(9):739-744
Abstract— This study covers thin‐film barriers using inorganic barriers of transparent conducting oxides (TCOs) such as zinc oxide (ZnO) and indium tin oxide (ITO). The TCOs were fabricated using a sputtering method with a process gas of pure argon at room temperature. ITO showed better properties as a barrier than the ZnO and exhibited the electronic performance necessary to perform additional functions. The ITO has superior barrier performance because it has a lower crack density due to its partial amorphous phase. For organic/inorganic multilayer barriers, the organic underlayer decreased the water‐vapor transmission rate (WVTR) more than the organic upper layer, indicating that the planarization effect was important in reducing the WVTRs. The results of this organic/ITO multilayer barrier study are expected to be useful in finding a practical solution to OLED encapsulation. 相似文献
138.
Mutation testing has traditionally been used as a defect injection technique to assess the effectiveness of a test suite as
represented by a “mutation score.” Recently, mutation testing tools have become more efficient, and industrial usage of mutation
analysis is experiencing growth. Mutation analysis entails adding or modifying test cases until the test suite is sufficient
to detect as many mutants as possible and the mutation score is satisfactory. The augmented test suite resulting from mutation
analysis may reveal latent faults and provides a stronger test suite to detect future errors which might be injected. Software
engineers often look for guidance on how to augment their test suite using information provided by line and/or branch coverage
tools. As the use of mutation analysis grows, software engineers will want to know how the emerging technique compares with
and/or complements coverage analysis for guiding the augmentation of an automated test suite. Additionally, software engineers
can benefit from an enhanced understanding of efficient mutation analysis techniques. To address these needs for additional
information about mutation analysis, we conducted an empirical study of the use of mutation analysis on two open source projects.
Our results indicate that a focused effort on increasing mutation score leads to a corresponding increase in line and branch
coverage to the point that line coverage, branch coverage and mutation score reach a maximum but leave some types of code
structures uncovered. Mutation analysis guides the creation of additional “common programmer error” tests beyond those written
to increase line and branch coverage. We also found that 74% of our chosen set of mutation operators is useful, on average,
for producing new tests. The remaining 26% of mutation operators did not produce new test cases because their mutants were
immediately detected by the initial test suite, indirectly detected by test suites we added to detect other mutants, or were
not able to be detected by any test.
Ben Smith is a second year Ph.D. student in Computer Science at North Carolina State University working as an RA under Dr. Laurie Williams. He received his Bachelor’s degree in Computer Science in May of 2007 and he hopes to receive his doctorate in 2012. He has begun work on developing SQL Coverage Metrics as a predictive measure of the security of a web application. This fall, he will be beginning the doctoral preliminary exam and working as a Testing Manager for the NCSU CSC Senior Design Center: North Carolina State’s capstone course for Computer Science. Finally, he has designed and maintained the websites for the Center for Open Software Engineering and ESEM 2009. Laurie Williams is an Associate Professor in the Computer Science Department of the College of Engineering at North Carolina State University. She leads the Software Engineering Reasearch group and is also the Director of the North Carolina State University Laboratory for Collaborative System Development and the Center for Open Software Engineering. She is also technical co-director of the Center for Open Software Engineering (COSE) and the area technical director of the Secure Open Systems Initiative (SOSI) at North Carolina State University. Laurie received her Ph.D. in Computer Science from the University of Utah, her MBA from Duke University, and her BS in Industrial Engineering from Lehigh University. She worked for IBM for nine years in Raleigh, NC before returning to academia. Laurie’s research interests include agile software development methodologies and practices, collaborative/pair programming, software reliability and testing, and software engineering for secure systems development. 相似文献
Laurie WilliamsEmail: |
Ben Smith is a second year Ph.D. student in Computer Science at North Carolina State University working as an RA under Dr. Laurie Williams. He received his Bachelor’s degree in Computer Science in May of 2007 and he hopes to receive his doctorate in 2012. He has begun work on developing SQL Coverage Metrics as a predictive measure of the security of a web application. This fall, he will be beginning the doctoral preliminary exam and working as a Testing Manager for the NCSU CSC Senior Design Center: North Carolina State’s capstone course for Computer Science. Finally, he has designed and maintained the websites for the Center for Open Software Engineering and ESEM 2009. Laurie Williams is an Associate Professor in the Computer Science Department of the College of Engineering at North Carolina State University. She leads the Software Engineering Reasearch group and is also the Director of the North Carolina State University Laboratory for Collaborative System Development and the Center for Open Software Engineering. She is also technical co-director of the Center for Open Software Engineering (COSE) and the area technical director of the Secure Open Systems Initiative (SOSI) at North Carolina State University. Laurie received her Ph.D. in Computer Science from the University of Utah, her MBA from Duke University, and her BS in Industrial Engineering from Lehigh University. She worked for IBM for nine years in Raleigh, NC before returning to academia. Laurie’s research interests include agile software development methodologies and practices, collaborative/pair programming, software reliability and testing, and software engineering for secure systems development. 相似文献
139.
This paper is concerned with the problem of boosting social annotations using propagation, which is also called social propagation. In particular, we focus on propagating social annotations of web pages (e.g., annotations in Del.icio.us). Social annotations
are novel resources and valuable in many web applications, including web search and browsing. Although they are developing
fast, social annotations of web pages cover only a small proportion (<0.1%) of the World Wide Web. To alleviate the low coverage
of annotations, a general propagation model based on Random Surfer is proposed. Specifically, four steps are included, namely
basic propagation, multiple-annotation propagation, multiple-link-type propagation, and constraint-guided propagation. The
model is evaluated on a dataset of 40,422 web pages randomly sampled from 100 most popular English sites and ten famous academic
sites. Each page’s annotations are obtained by querying the history interface of Del.icio.us. Experimental results show that
the proposed model is very effective in increasing the coverage of annotations while still preserving novel properties of
social annotations. Applications of propagated annotations on web search and classification further verify the effectiveness
of the model. 相似文献
140.
Feng Feng Young Bae Jun 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2009,13(11):1113-1121
The notion of an inductive semimodule over an ordered *-semiring is introduced and some related properties are investigated.
Inductive semimodules are extensions of several important algebraic structures such as Kleene modules, Kleene algebras and
inductive *-semirings. We prove that an inductive semimodule over an ordered *-semiring K is a Kleene module if and only if K is a Kleene algebra. Moreover, we establish that the vector module of an inductive semimodule over an ordered Conway semiring
is again an inductive semimodule over the matrix semiring. Consequently, in an inductive semimodule over an ordered Conway
semiring, least solutions to linear inequation systems can be denoted by linear expressions, avoiding the least fixed point
operator. In addition, we also introduce a related notion called weak inductive semimodules, and propose several open problems
on them.
相似文献
Young Bae JunEmail: |