全文获取类型
收费全文 | 5589篇 |
免费 | 438篇 |
国内免费 | 112篇 |
专业分类
电工技术 | 245篇 |
综合类 | 202篇 |
化学工业 | 957篇 |
金属工艺 | 197篇 |
机械仪表 | 182篇 |
建筑科学 | 345篇 |
矿业工程 | 53篇 |
能源动力 | 309篇 |
轻工业 | 452篇 |
水利工程 | 96篇 |
石油天然气 | 176篇 |
武器工业 | 4篇 |
无线电 | 642篇 |
一般工业技术 | 822篇 |
冶金工业 | 359篇 |
原子能技术 | 20篇 |
自动化技术 | 1078篇 |
出版年
2024年 | 18篇 |
2023年 | 93篇 |
2022年 | 167篇 |
2021年 | 219篇 |
2020年 | 175篇 |
2019年 | 172篇 |
2018年 | 220篇 |
2017年 | 205篇 |
2016年 | 239篇 |
2015年 | 215篇 |
2014年 | 231篇 |
2013年 | 427篇 |
2012年 | 330篇 |
2011年 | 419篇 |
2010年 | 342篇 |
2009年 | 339篇 |
2008年 | 284篇 |
2007年 | 237篇 |
2006年 | 237篇 |
2005年 | 188篇 |
2004年 | 130篇 |
2003年 | 145篇 |
2002年 | 193篇 |
2001年 | 140篇 |
2000年 | 105篇 |
1999年 | 63篇 |
1998年 | 90篇 |
1997年 | 69篇 |
1996年 | 55篇 |
1995年 | 61篇 |
1994年 | 50篇 |
1993年 | 40篇 |
1992年 | 21篇 |
1991年 | 8篇 |
1990年 | 17篇 |
1989年 | 9篇 |
1988年 | 14篇 |
1987年 | 14篇 |
1986年 | 12篇 |
1985年 | 9篇 |
1984年 | 22篇 |
1983年 | 10篇 |
1982年 | 13篇 |
1981年 | 11篇 |
1980年 | 6篇 |
1979年 | 9篇 |
1978年 | 10篇 |
1977年 | 9篇 |
1976年 | 13篇 |
1975年 | 7篇 |
排序方式: 共有6139条查询结果,搜索用时 15 毫秒
71.
Mutation testing has traditionally been used as a defect injection technique to assess the effectiveness of a test suite as
represented by a “mutation score.” Recently, mutation testing tools have become more efficient, and industrial usage of mutation
analysis is experiencing growth. Mutation analysis entails adding or modifying test cases until the test suite is sufficient
to detect as many mutants as possible and the mutation score is satisfactory. The augmented test suite resulting from mutation
analysis may reveal latent faults and provides a stronger test suite to detect future errors which might be injected. Software
engineers often look for guidance on how to augment their test suite using information provided by line and/or branch coverage
tools. As the use of mutation analysis grows, software engineers will want to know how the emerging technique compares with
and/or complements coverage analysis for guiding the augmentation of an automated test suite. Additionally, software engineers
can benefit from an enhanced understanding of efficient mutation analysis techniques. To address these needs for additional
information about mutation analysis, we conducted an empirical study of the use of mutation analysis on two open source projects.
Our results indicate that a focused effort on increasing mutation score leads to a corresponding increase in line and branch
coverage to the point that line coverage, branch coverage and mutation score reach a maximum but leave some types of code
structures uncovered. Mutation analysis guides the creation of additional “common programmer error” tests beyond those written
to increase line and branch coverage. We also found that 74% of our chosen set of mutation operators is useful, on average,
for producing new tests. The remaining 26% of mutation operators did not produce new test cases because their mutants were
immediately detected by the initial test suite, indirectly detected by test suites we added to detect other mutants, or were
not able to be detected by any test.
Ben Smith is a second year Ph.D. student in Computer Science at North Carolina State University working as an RA under Dr. Laurie Williams. He received his Bachelor’s degree in Computer Science in May of 2007 and he hopes to receive his doctorate in 2012. He has begun work on developing SQL Coverage Metrics as a predictive measure of the security of a web application. This fall, he will be beginning the doctoral preliminary exam and working as a Testing Manager for the NCSU CSC Senior Design Center: North Carolina State’s capstone course for Computer Science. Finally, he has designed and maintained the websites for the Center for Open Software Engineering and ESEM 2009. Laurie Williams is an Associate Professor in the Computer Science Department of the College of Engineering at North Carolina State University. She leads the Software Engineering Reasearch group and is also the Director of the North Carolina State University Laboratory for Collaborative System Development and the Center for Open Software Engineering. She is also technical co-director of the Center for Open Software Engineering (COSE) and the area technical director of the Secure Open Systems Initiative (SOSI) at North Carolina State University. Laurie received her Ph.D. in Computer Science from the University of Utah, her MBA from Duke University, and her BS in Industrial Engineering from Lehigh University. She worked for IBM for nine years in Raleigh, NC before returning to academia. Laurie’s research interests include agile software development methodologies and practices, collaborative/pair programming, software reliability and testing, and software engineering for secure systems development. 相似文献
Laurie WilliamsEmail: |
Ben Smith is a second year Ph.D. student in Computer Science at North Carolina State University working as an RA under Dr. Laurie Williams. He received his Bachelor’s degree in Computer Science in May of 2007 and he hopes to receive his doctorate in 2012. He has begun work on developing SQL Coverage Metrics as a predictive measure of the security of a web application. This fall, he will be beginning the doctoral preliminary exam and working as a Testing Manager for the NCSU CSC Senior Design Center: North Carolina State’s capstone course for Computer Science. Finally, he has designed and maintained the websites for the Center for Open Software Engineering and ESEM 2009. Laurie Williams is an Associate Professor in the Computer Science Department of the College of Engineering at North Carolina State University. She leads the Software Engineering Reasearch group and is also the Director of the North Carolina State University Laboratory for Collaborative System Development and the Center for Open Software Engineering. She is also technical co-director of the Center for Open Software Engineering (COSE) and the area technical director of the Secure Open Systems Initiative (SOSI) at North Carolina State University. Laurie received her Ph.D. in Computer Science from the University of Utah, her MBA from Duke University, and her BS in Industrial Engineering from Lehigh University. She worked for IBM for nine years in Raleigh, NC before returning to academia. Laurie’s research interests include agile software development methodologies and practices, collaborative/pair programming, software reliability and testing, and software engineering for secure systems development. 相似文献
72.
This paper is concerned with the problem of boosting social annotations using propagation, which is also called social propagation. In particular, we focus on propagating social annotations of web pages (e.g., annotations in Del.icio.us). Social annotations
are novel resources and valuable in many web applications, including web search and browsing. Although they are developing
fast, social annotations of web pages cover only a small proportion (<0.1%) of the World Wide Web. To alleviate the low coverage
of annotations, a general propagation model based on Random Surfer is proposed. Specifically, four steps are included, namely
basic propagation, multiple-annotation propagation, multiple-link-type propagation, and constraint-guided propagation. The
model is evaluated on a dataset of 40,422 web pages randomly sampled from 100 most popular English sites and ten famous academic
sites. Each page’s annotations are obtained by querying the history interface of Del.icio.us. Experimental results show that
the proposed model is very effective in increasing the coverage of annotations while still preserving novel properties of
social annotations. Applications of propagated annotations on web search and classification further verify the effectiveness
of the model. 相似文献
73.
Lydie du Bousquet Masahide Nakamura Ben Yan Hiroshi Igaki 《Innovations in Systems and Software Engineering》2009,5(3):181-196
A home network system consists of multiple networked appliances, intended to provide more convenient and comfortable living
for home users. Before being deployed, one has to guarantee the correctness, the safety, and the security of the system. Here,
we present the approach chosen to validate the Java implementation of a home network system. We rely on the Java Modelling
Language to formally specify and validate an abstraction of the system.
This is a substantially revised version of our paper that appeared in the proceedings of the Workshop On Leveraging Applications
of Formal Methods, Verification and Validation (ISoLA), Poitiers-Futuroscope, France, December 2007. 相似文献
74.
J. J. Ben⩼ez M. A. Centeno J. A. Odriozola R. Conanec R. Marchand Y. Laurent 《Catalysis Letters》1995,34(3-4):379-388
XPS and DRIFTS (diffuse reflectance infrared spectroscopy) spectra of AlPO systems, formally AlPO4-Al2O3, obtained by the sol-gel method have been studied in order to understand their geometric and electronic structure. Both DRIFTS and XPS demonstrate that the acidbase character of these samples depends on a structural modification. For low phosphorus content an amorphous spinel-like solid is proposed. This geometric arrangement alters the electronic density of oxide ions and phosphorus cations and hence their Lewis acid-base properties with respect to the amorphous solid having aluminium and phosphorus only in tetrahedral arrangement. 相似文献
75.
Xiaohui Chen Niu Niu Dan Li Zicong Zhang Zeyan Zhuang Dingyuan Yan Jiangao Li Zujin Zhao Dong Wang Ben Zhong Tang 《Advanced functional materials》2023,33(8):2211571
Photoactivatable agent is a powerful tool in biomedicine studies due to high-precision spatiotemporal control of light. However, those previously reported agents generally suffer from short wavelength, fluorescence self-quenching effect, and the lack of photosensitizing property, which severely restrict their practical applications. To address these issues, molecular engineering of 1,4-dihydropyridine derivatives is conducted to obtain an optimized agent, namely TPA-DHPy-Py, which exhibits low oxidation potential, high photoactivation efficiency, and excellent type I/II combined photodynamic activity. Concurrently, its photoactivated counterpart is featured by aggregation-induced near-infrared emission and remarkable reactive oxygen species (ROS) production efficiency. Upon photoactivation, TPA-DHPy-Py is capable of precisely identifying cancer cells from co-culturing cancer cells and normal cells without the assistance of any extra targeting units, and in situ monitoring lipid droplets and endoplasmic reticulum alteration under ROS stress, as well as achieving fluorescent visualization of tumor in vivo with supremely high imaging contrast. Furthermore, the unprecedented performance on photodynamic cancer therapy is demonstrated by the significant inhibition of tumor growth. Therefore, the photoactivatable TPA-DHPy-Py with dual-organelle-targeted and excellent photodynamic activity associated with self-monitoring ability is highly promising for cancer theranostics in clinical trials. 相似文献
76.
Haitao Hu Dan Li Wenbin Dai Qiao Jin Dong Wang Jian Ji Ben Zhong Tang Zhe Tang 《Advanced functional materials》2023,33(19):2213134
Compared to conventional photothermal therapy (PTT) which requires hyperthermia higher than 50 °C, mild-temperature PTT is a more promising antitumor strategy with much lower phototoxicity to neighboring normal tissues. However, the therapeutic efficacy of mild-temperature PTT is always restricted by the thermoresistance of cancer cells. To address this issue, a supramolecular drug nanocarrier is fabricated to co-deliver nitric oxide (NO) and photothermal agent DCTBT with NIR-II aggregation-induced emission (AIE) characteristic for mild-temperature PTT. NO can be effectively released from the nanocarriers in intracellular reductive environment and DCTBT is capable of simultaneously producing reactive oxygen species (ROS) and hyperthermia upon 808 nm laser irradiation. The generated ROS can further react with NO to produce peroxynitrite (ONOOˉ) bearing strong oxidization and nitration capability. ONOOˉ can inhibit the expression of heat shock proteins (HSP) to reduce the thermoresistance of cancer cells, which is necessary to achieve excellent therapeutic efficacy of DCTBT-based PTT at mild temperature (<50 °C). The antitumor performance of ONOOˉ-potentiated mild-temperature PTT is validated on subcutaneous and orthotopic hepatocellular carcinoma (HCC) models. This research puts forward an innovative strategy to overcome thermoresistance for mild-temperature PTT, which provides new inspirations to explore ONOOˉ-sensitized tumor therapy strategies. 相似文献
77.
Singh Karamjeet Chebaane Saleh Ben Khalifa Sana Benabdallah Feres Ren Xiaobing Khemakhem Hamadi Grover Amit Singh Mehtab 《Wireless Networks》2022,28(3):1003-1016
Wireless Networks - Inter-satellite data transmission links are very crucial for providing global inter-connectivity. We report designing and investigations on high date rate inter-satellite... 相似文献
78.
Clustering divides objects into groups based on similarity. However, traditional clustering approaches are plagued by their difficulty in dealing with data with complex structure and high dimensionality, as well as their inability in solving multi-objective data clustering problems. To address these issues, an evolutionary state-based novel multi-objective periodic bacterial foraging optimization algorithm (ES-NMPBFO) is proposed in this article. The algorithm is designed to alleviate the high-computing complexity of the standard bacterial foraging optimization (BFO) algorithm by introducing periodic BFO. Moreover, two learning strategies, global best individual (gbest) and personal historical best individual (pbest), are used in the chemotaxis operation to enhance the convergence speed and guide the bacteria to the optimum position. Two elimination-dispersal operations are also proposed to prevent falling into local optima and improve the diversity of solutions. The proposed algorithm is compared with five other algorithms on six validity indexes in two data clustering cases comprising nine general benchmark datasets and four credit risk assessment datasets. The experimental results suggest that the proposed algorithm significantly outperforms the competing approaches. To further examine the effectiveness of the proposed strategies, two variants of ES-NMPBFO were designed, and all three forms of ES-NMPBFO were tested. The experimental results show that all of the proposed strategies are conducive to the improvement of solution quality, diversity and convergence. 相似文献
79.
In this paper, we consider randomly failing equipment leased several times during their life cycle with a given warranty period. A mathematical model is developed to determine the optimal efficiency levels of preventive maintenance (PM) to be performed on the equipment between successive lease periods, maximising the expected total profit of the lessor over the equipment life cycle. The model considers the expected leasing revenue as well as the equipment acquisition cost and the average PM and repair costs. PM actions allow reducing the age of the equipment to a certain extent with a corresponding cost depending on the PM level adopted. The efficiency of the PM is determinant of the expected revenue during the next lease period. Given a set of K possible PM levels and the number of lease periods n over the equipment life cycle, Kn?1 PM strategies are possible. A genetic algorithm is proposed in order to obtain nearly optimal policies in situations where the number of possibilities Kn?1 is very high. Obtained numerical results are discussed. Small- and big-size instances of the problem are considered in the case of a service company in the oil and gas industry specialised in leasing specific equipment such as separators, to oil companies for production activities with a limited duration of several months like well testing or short production tests. 相似文献
80.