首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   763篇
  免费   34篇
  国内免费   8篇
电工技术   9篇
化学工业   189篇
金属工艺   6篇
机械仪表   18篇
建筑科学   9篇
矿业工程   5篇
能源动力   46篇
轻工业   101篇
水利工程   6篇
石油天然气   6篇
无线电   79篇
一般工业技术   185篇
冶金工业   51篇
原子能技术   3篇
自动化技术   92篇
  2024年   9篇
  2023年   20篇
  2022年   53篇
  2021年   57篇
  2020年   41篇
  2019年   39篇
  2018年   69篇
  2017年   35篇
  2016年   41篇
  2015年   14篇
  2014年   31篇
  2013年   34篇
  2012年   32篇
  2011年   45篇
  2010年   24篇
  2009年   28篇
  2008年   36篇
  2007年   23篇
  2006年   10篇
  2005年   9篇
  2004年   12篇
  2003年   9篇
  2002年   10篇
  2001年   4篇
  2000年   2篇
  1999年   6篇
  1998年   7篇
  1997年   10篇
  1996年   7篇
  1995年   11篇
  1994年   8篇
  1993年   9篇
  1992年   6篇
  1991年   5篇
  1990年   4篇
  1989年   10篇
  1988年   2篇
  1987年   1篇
  1986年   2篇
  1985年   3篇
  1984年   6篇
  1983年   2篇
  1982年   3篇
  1981年   3篇
  1980年   4篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
  1976年   3篇
  1975年   2篇
排序方式: 共有805条查询结果,搜索用时 15 毫秒
21.
Dynamic slicing is a promising trace based technique that helps programmers in the process of debugging. In order to debug a failed run, dynamic slicing requires the dynamic dependence graph (DDG) information for that particular run. The two major challenges involved in utilizing dynamic slicing as a debugging technique are the efficient computation of the DDG and the efficient computation of the dynamic slice, given the DDG. In this paper, we present an efficient debugger, which first computes the DDG efficiently while the program is executing; dynamic slicing is later performed efficiently on the computed DDG, on demand. To minimize program slowdown during the online computation of DDG, we make the design decision of not outputting the computed dependencies to a file, instead, storing them in memory in a specially allocated fixed size circular buffer. The size of the buffer limits the length of the execution history that can be stored. To maximize the execution history that can be maintained, we introduce optimizations to eliminate the storage of most of the generated dependencies, at the same time ensuring that those that are stored are sufficient to capture the bug. Experiments conducted on CPU‐intensive programs show that our optimizations are able to reduce the trace rate from 16 to 0.8 bytes per executed instruction. This enables us to store the dependence trace history for a window of 20 million executed instructions in a 16‐MB buffer. Our debugger is also very efficient, yielding slicing times of around a second, and only slowing down the execution of the program by a factor of 19 during the online tracing step. Using recently proposed architectural support for monitoring, we are also able to handle multithreaded programs running on multicore processors. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
22.
Sexually dimorphic cognitive performance in men (n=42) and women (n=42) was related to testosterone, estradiol, progesterone, luteinizing hormone, follicle-stimulating hormone, and sex hormone binding globulin, measured in 10-ml blood samples collected between 0900 and 1030 and, among women, during the follicular phase of the menstrual cycle. Significant sex differences favored men on spatial tasks (Mental Rotation and Judgment of Line Orientation) and on an inhibition task and favored women on a verbal task (category fluency). However, there were no significant relationships between any of the hormones and cognitive performance, suggesting that there are few, if any, consistent, substantial relationships between endogenous, nonfluctuating levels of gonadal hormones or gonadotropins and these cognitive abilities in men or women. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
23.
Design patterns are used extensively in the design of software systems. Patterns codify effective solutions for recurring design problems and allow software engineers to reuse these solutions, tailoring them appropriately to their particular applications, rather than reinventing them from scratch. In this paper, we consider the following question: How can system designers and implementers test whether their systems, as implemented, are faithful to the requirements of the patterns used in their design? A key consideration underlying our work is that the testing approach should enable us, in testing whether a particular pattern P has been correctly implemented in different systems designed using P, to reuse the common parts of this effort rather than having to do it from scratch for each system. Thus in the approach we present, corresponding to each pattern P, there is a set of pattern test case templates (PTCTs). A PTCT codifies a reusable test case structure designed to identify defects associated with applications of P in all systems designed using P. Next we present a process using which, given a system designed using P, the system tester can generate a test suite from the PTCTs for P that can be used to test the particular system for bugs in the implementation of P in that system. This allows the tester to tailor the PTCTs for P to the needs of the particular system by specifying a set of specialization rules that are designed to reflect the scenarios in which the defects codified in this set of PTCTs are likely to manifest themselves in the particular system. We illustrate the approach using the Observer pattern.  相似文献   
24.
Multiplicative speckle noise diminishes the radiometric resolution of the synthetic aperture radar (SAR) images and all the coherent images. Speckle removal adds an extra value to an automated SAR image interpretation and analysis. In this paper, dual-tree complex wavelet-transform-based Bayesian method is proposed for despeckling the SAR images. In each subband, the reflectance and noise of the logarithmically transformed wavelet coefficients are modeled using heavy-tailed Burr and zero-mean Gaussian distributions. The closed-form expression for the shape parameter of Burr distribution is derived by employing the Mellin transform. The resultant complex-free quadratic maximum a posteriori solution with suitable shrinkage function yields despeckled SAR images. Extensive experiments are carried out using real SAR images as well as simulated images. The proposed method performs well in terms of equivalent number of looks with 3.5751 dB improvement in homogeneous region1 of Pipe river SAR image, edge preservation with 0.6158 improvement, peak signal to noise ratio of 51.3305 dB, and mean structural similarity index measure of 0.9397 at 0.05 noise variance for synthetically speckled image in comparison to the existing methods and takes averagely 2.3461 times less computing time. The proposed method provides a computationally efficient better speckle reduction in homogeneous regions while still preserving the edge.  相似文献   
25.
Recently, Jiang et al. and He et al. independently found security problems in Chen et al.'s remote user authentication scheme for non‐tamper‐proof storage devices like Universal Serial Bus stick and proposed improvements. Nonetheless, we detect that the schemes proposed by Jiang et al. and He et al. overlook a user's privacy. We also observe that Jiang et al.'s scheme is vulnerable to insider attack and denial of service attacks and lacks forward secrecy. We point out that the password changing facility in He et al.'s scheme is equivalent to undergoing registration, whereas in Jiang et al.'s scheme, it is unsuitable. Moreover, the login phase of both the schemes is incapable to prevent the use of wrong password leading to the computation of an unworkable login request. Therefore, we design a new scheme with user anonymity to surmount the identified weaknesses. Without adding much in communication/computational cost, our scheme provides more security characteristics and keeps the merits of the original schemes. As compared with its predecessor schemes, the proposed scheme stands out as a more apt user authentication method for common storage devices. We have also presented a formal proof of security of the proposed scheme based on the logic proposed by Burrows, Abadi and Needham (BAN logic). Copyright © 2014 John Wiley & Sons, Ltd.  相似文献   
26.
An aim of current study is to analyze the contribution of reflected longitudinal waves to wave-induced fluid flow(WIFF)in the cracked porous solid.Initially,we ...  相似文献   
27.
28.
The effect of single-layer pyrocarbon (PyC) and multilayered (PyC/SiC)n=4 interphases on the flexural strength of un-coated and SiC seal-coated stitched 2D carbon fiber reinforced silicon carbide (Cf/SiC) composites was investigated. The composites were prepared by I-CVI process. Flexural strength of the composites was measured at 1200 °C in air atmosphere. It was observed that irrespective of the type of interphase, the seal coated samples showed a higher value of flexural strength as compared to the uncoated samples. The flexural strength of 470 ± 12 MPa was observed for the seal coated Cf/SiC composite samples with multilayered interphase. The seal coated samples with single layer PyC interphase showed flexural strength of 370 ± 20 MPa. The fractured surfaces of tested samples were analyzed in detail to study the fracture phenomena. Based on microstructure-property relations, a mechanism has been proposed for the increase of flexural properties of Cf/SiC composites having multilayered interphase.  相似文献   
29.
30.
Curcumin, a natural polyphenolic compound, has astounding therapeutic applications but lacks in bioavailability mainly due to its poor solubility in water. Polyvinyl pyrrolidone (PVP) which is a proven drug carrier has been used to facilitate the conjugation of curcumin with gold nanoparticles and to improve the solubility of curcumin in water. In this conjugate diaryl heptanoid chromophore group of curcumin which is a much needed group in biomedical applications remains intact as observed from FTIR and UV–vis spectroscopy analysis. The work shows good promise for such conjugates as therapeutic-cum-imaging materials in biomedical field.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号