全文获取类型
收费全文 | 5446篇 |
免费 | 247篇 |
国内免费 | 9篇 |
专业分类
电工技术 | 38篇 |
综合类 | 7篇 |
化学工业 | 1110篇 |
金属工艺 | 87篇 |
机械仪表 | 122篇 |
建筑科学 | 211篇 |
矿业工程 | 15篇 |
能源动力 | 81篇 |
轻工业 | 532篇 |
水利工程 | 31篇 |
石油天然气 | 2篇 |
武器工业 | 1篇 |
无线电 | 326篇 |
一般工业技术 | 915篇 |
冶金工业 | 1505篇 |
原子能技术 | 21篇 |
自动化技术 | 698篇 |
出版年
2023年 | 45篇 |
2022年 | 81篇 |
2021年 | 125篇 |
2020年 | 93篇 |
2019年 | 66篇 |
2018年 | 170篇 |
2017年 | 171篇 |
2016年 | 173篇 |
2015年 | 144篇 |
2014年 | 154篇 |
2013年 | 361篇 |
2012年 | 298篇 |
2011年 | 295篇 |
2010年 | 221篇 |
2009年 | 192篇 |
2008年 | 246篇 |
2007年 | 196篇 |
2006年 | 175篇 |
2005年 | 154篇 |
2004年 | 109篇 |
2003年 | 106篇 |
2002年 | 90篇 |
2001年 | 76篇 |
2000年 | 89篇 |
1999年 | 84篇 |
1998年 | 482篇 |
1997年 | 276篇 |
1996年 | 178篇 |
1995年 | 108篇 |
1994年 | 91篇 |
1993年 | 97篇 |
1992年 | 22篇 |
1991年 | 37篇 |
1990年 | 20篇 |
1989年 | 30篇 |
1988年 | 27篇 |
1987年 | 25篇 |
1986年 | 19篇 |
1985年 | 31篇 |
1984年 | 20篇 |
1983年 | 21篇 |
1982年 | 29篇 |
1981年 | 34篇 |
1980年 | 21篇 |
1979年 | 19篇 |
1978年 | 23篇 |
1977年 | 43篇 |
1976年 | 40篇 |
1975年 | 16篇 |
1972年 | 13篇 |
排序方式: 共有5702条查询结果,搜索用时 0 毫秒
91.
Mauro Baluda Pietro Braione Giovanni Denaro Mauro Pezzè 《Software Quality Journal》2011,19(4):725-751
Structural code coverage criteria have been studied since the early seventies, and now they are well supported by commercial
and open-source tools and are commonly embedded in several advanced industrial processes. Most industrial applications still
refer to simple criteria, like statement and branch coverage, and consider complex criteria, like modified condition decision
coverage, only rarely and often driven by the requirements of certification agencies. The industrial value of structural criteria
is limited by the difficulty of achieving high coverage, due to both the complexity of deriving test cases that execute specific
uncovered elements and the presence of many infeasible elements in the code. In this paper, we propose a technique that both
generates test cases that execute yet uncovered branches and identifies infeasible branches that can be eliminated from the
computation of the branch coverage. In this way, we can increase branch coverage to closely approximate full coverage, thus
improving its industrial value. The algorithm combines symbolic analysis, abstraction refinement, and a novel technique named
coarsening, to execute unexplored branches, identify infeasible ones, and mitigate the state space explosion problem. In the paper,
we present the technique and illustrate its effectiveness through a set of experimental results obtained with a prototype
implementation. 相似文献
92.
We explore one aspect of the structure of a codified legal system at the national level using a new type of representation
to understand the strong or weak dependencies between the various fields of law. In Part I of this study, we analyze the graph
associated with the network in which each French legal code is a vertex and an edge is produced between two vertices when
a code cites another code at least one time. We show that this network distinguishes from many other real networks from a
high density, giving it a particular structure that we call concentrated world and that differentiates a national legal system (as considered with a resolution at the code level) from small-world graphs identified in many social networks. Our analysis then shows that a few communities (groups of highly wired vertices)
of codes covering large domains of regulation are structuring the whole system. Indeed we mainly find a central group of influent
codes, a group of codes related to social issues and a group of codes dealing with territories and natural resources. The
study of this codified legal system is also of interest in the field of the analysis of real networks. In particular we examine
the impact of the high density on the structural characteristics of the graph and on the ways communities are searched for.
Finally we provide an original visualization of this graph on an hemicyle-like plot, this representation being based on a
statistical reduction of dissimilarity measures between vertices. In Part II (a following paper) we show how the consideration
of the weights attributed to each edge in the network in proportion to the number of citations between two vertices (codes)
allows deepening the analysis of the French legal system. 相似文献
93.
Tegawendé F. Bissyandé Laurent Réveillère Julia L. Lawall Gilles Muller 《Automated Software Engineering》2016,23(1):3-41
The Linux kernel does not export a stable, well-defined kernel interface, complicating the development of kernel-level services, such as device drivers and file systems. While there does exist a set of functions that are exported to external modules, this set of functions frequently changes, and the functions have implicit, ill-documented preconditions. No specific debugging support is provided. We present Diagnosys, an approach to automatically constructing a debugging interface for the Linux kernel. First, a designated kernel maintainer uses Diagnosys to identify constraints on the use of the exported functions. Based on this information, developers of kernel services can then use Diagnosys to generate a debugging interface specialized to their code. When a service including this interface is tested, it records information about potential problems. This information is preserved following a kernel crash or hang. Our experiments show that the generated debugging interface provides useful log information and incurs a low performance penalty. 相似文献
94.
Ahmed Chamseddine Ben Abdallah Michèle Gouiffès Lionel Lacassagne 《Machine Vision and Applications》2016,27(4):463-481
This paper presents a modular system for both abnormal event detection and categorization in videos. Complementary normalcy models are built both globally at the image level and locally within pixels blocks. Three features are analyzed: (1) spatio-temporal evolution of binary motion where foreground pixels are detected using an enhanced background subtraction method that keeps track of temporarily static pixels; (2) optical flow, using a robust pyramidal KLT technique; and (3) motion temporal derivatives. At the local level, a normalcy MOG model is built for each block and for each flow feature and is made more compact using PCA. Then, the activity is analyzed qualitatively using a set of compact hybrid histograms embedding both optical flow orientation (or temporal gradient orientation) and foreground statistics. A compact binary signature of maximal size 13 bits is extracted from these different features for event characterization. The performance of the system is illustrated on different datasets of videos recorded on static cameras. The experiments show that the anomalies are well detected even if the method is not dedicated to one of the addressed scenarios. 相似文献
95.
Ahmed Samet Eric Lefèvre Sadok Ben Yahia 《Journal of Intelligent Information Systems》2016,47(1):135-163
Associative classification has been shown to provide interesting results whenever of use to classify data. With the increasing complexity of new databases, retrieving valuable information and classifying incoming data is becoming a thriving and compelling issue. The evidential database is a new type of database that represents imprecision and uncertainty. In this respect, extracting pertinent information such as frequent patterns and association rules is of paramount importance task. In this work, we tackle the problem of pertinent information extraction from an evidential database. A new data mining approach, denoted EDMA, is introduced that extracts frequent patterns overcoming the limits of pioneering works of the literature. A new classifier based on evidential association rules is thus introduced. The obtained association rules, as well as their respective confidence values, are studied and weighted with respect to their relevance. The proposed methods are thoroughly experimented on several synthetic evidential databases and showed performance improvement. 相似文献
96.
Virtual organizations (VOs) are formed by an alliance of organizations linked by a partnership for dealing with emerging challenges. Information and communication technologies play a fundamental role facilitating cooperation, communication and collaboration among the VO members. The formal identification and representation of Requirements Engineering (RE) for one organization have been researched to a large extent along with several elicitation techniques. However, these techniques are not adequate for covering the major challenges of RE for VO. We explore the work done in the management and RE fields to propose a model-based framework for eliciting VOs’ requirements. The goal is to analyze the VO from two points of view: border (intra-organizational, inter-organizational and extra-organizational) and abstract (intentional, organizational and operational). This article includes the framework validation with a case study and a transformation process to develop partial Business Process Diagram from the intentional models. 相似文献
97.
Command governor for constrained switched systems with scheduled model transition dwell times 下载免费PDF全文
In this paper, a switched control architecture for constrained control systems is presented. The strategy is based on command governor ideas that are here specialized to ‘optimally’ schedule switching events on the plant dynamics for improving control performance at the expense of low computational burdens. The significance of the method mainly lies in its capability to avoid constraints violation and loss of stability regardless of any configuration change occurrence in the plant/constraint structure. To this end, the concept of model transition dwell time is used within the proposed control framework to formally define the minimum time necessary to enable a switching event under guaranteed conditions on the overall stability and constraint fulfilment. Simulation results on a simple linear system and on a Cessna 182 aircraft model show the effectiveness of the proposed strategy. Copyright © 2017 John Wiley & Sons, Ltd. 相似文献
98.
99.
Multifidelity surrogate modeling based on radial basis functions 总被引:1,自引:0,他引:1
Cédric Durantin Justin Rouxel Jean-Antoine Désidéri Alain Glière 《Structural and Multidisciplinary Optimization》2017,56(5):1061-1075
Multiple models of a physical phenomenon are sometimes available with different levels of approximation. The high fidelity model is more computationally demanding than the coarse approximation. In this context, including information from the lower fidelity model to build a surrogate model is desirable. Here, the study focuses on the design of a miniaturized photoacoustic gas sensor which involves two numerical models. First, a multifidelity metamodeling method based on Radial Basis Function, the co-RBF, is proposed. This surrogate model is compared with the classical co-kriging method on two analytical benchmarks and on the photoacoustic gas sensor. Then an extension to the multifidelity framework of an already existing RBF-based optimization algorithm is applied to optimize the sensor efficiency. The co-RBF method does not bring better results than co-kriging but can be considered as an alternative for multifidelity metamodeling. 相似文献
100.
Agnès Front Dominique Rieu Marco Santorum Fatemeh Movahedian 《Software and Systems Modeling》2017,16(3):691-714
A business process can be characterized by multiple perspectives (intentional, organizational, operational, functional, interactional, informational, etc). Business process modeling must allow different stakeholders to analyze and represent process models according to these different perspectives. This representation is traditionally built using classical data acquisition methods together with a process representation language such as BPMN or UML. These techniques and specialized languages can easily become hard, complex and time consuming. In this paper, we propose ISEA, a participative end-user modeling approach that allows the stakeholders in a business process to collaborate together in a simple way to communicate and improve the business process elicitation in an accurate and understandable manner. Our approach covers the organizational perspective of business processes, exploits the information compiled during the elicitation of the organizational perspective and touches lightly an interactional perspective allowing users to create customized interface sketches to test the user interface navigability and the coherence within the processes. Thus, ISEA can be seen as a participative end-user modeling approach for business process elicitation and improvement. 相似文献