首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5535篇
  免费   456篇
  国内免费   110篇
电工技术   244篇
综合类   203篇
化学工业   955篇
金属工艺   194篇
机械仪表   181篇
建筑科学   347篇
矿业工程   49篇
能源动力   301篇
轻工业   457篇
水利工程   95篇
石油天然气   177篇
武器工业   4篇
无线电   633篇
一般工业技术   825篇
冶金工业   360篇
原子能技术   20篇
自动化技术   1056篇
  2024年   11篇
  2023年   89篇
  2022年   164篇
  2021年   214篇
  2020年   171篇
  2019年   172篇
  2018年   209篇
  2017年   198篇
  2016年   233篇
  2015年   213篇
  2014年   232篇
  2013年   427篇
  2012年   335篇
  2011年   420篇
  2010年   342篇
  2009年   341篇
  2008年   280篇
  2007年   236篇
  2006年   234篇
  2005年   186篇
  2004年   127篇
  2003年   147篇
  2002年   194篇
  2001年   142篇
  2000年   103篇
  1999年   59篇
  1998年   96篇
  1997年   69篇
  1996年   55篇
  1995年   58篇
  1994年   51篇
  1993年   38篇
  1992年   23篇
  1991年   9篇
  1990年   16篇
  1989年   11篇
  1988年   14篇
  1987年   15篇
  1986年   13篇
  1985年   10篇
  1984年   23篇
  1983年   11篇
  1982年   14篇
  1981年   11篇
  1980年   6篇
  1979年   9篇
  1978年   11篇
  1977年   10篇
  1976年   15篇
  1975年   7篇
排序方式: 共有6101条查询结果,搜索用时 15 毫秒
121.
该文将二值水印嵌入到宿主图像的小波变换域的低频分量中,利用BP神经网络很好的非线性映射和自学习、自适应学习特点实现水印信息的盲提取,仿真实验结果表明该算法既能抵抗常规的图像处理攻击,也能抵抗一定程度的几何攻击,如JPEG压缩、剪切、加噪和滤波等,具有较好的鲁棒性和不可见性。  相似文献   
122.
针对当前形势下炼油企业蒸汽动力系统存在的巨大改造潜力,提出了蒸汽动力系统改造的优化方法;该方法首先通过运行优化方案分析和系统设备诊断找出系统存在问题,然后通过专家知识系统提出一系列解决的方案,建立系统改造方案的超结构和考虑柔性调节的优化改造混合整数线性规划(MILP)模型,求解模型并确定最优的改造方案;文章最后部分给出了详细的案例分析,结果表明应用本文提出的改造优化策略方法确定的最佳改造方案可以为案例背景炼油企业蒸汽动力系统节约大约6%的运行费用,投资回收期约0.38年;本文提出的优化改造方法为推动炼油企业蒸汽动力系统的节能降耗提供了定的理论指导和技术支持.  相似文献   
123.
Ben 《微型计算机》2009,(10):23-23
近期,《微型计算机》策划的“电脑城的明天在哪儿?”专题报道可谓鞭辟入里,说中了目前国内电脑城的症结所在,而电脑城几乎也有了思变的意识。从2009年3月6日至2009年5月1日,重庆泰兴电脑城向消费者发放IT消费券,凭消费券即可在泰兴网上商城购物时抵扣相应的金额。泰兴电脑城对此举的解释是响应“刺激消费,拉动内需“的号召。其实这事儿没那么复杂,不过是泰兴电脑城换了个花样搞促销罢了。  相似文献   
124.
针对传统ZVT-PWM变换器的辅助开关硬关断的不足,提出了一种新型PWM控制的软开关Buck变换器方案,详细介绍了该新型软开关Buck变换器的拓扑结构及工作原理,并给出了具体的设计过程。新型软开关Buck变换器的辅助电路使主开关工作在零电压状态,所有的半导体器件均工作在软开关条件下,从而减小了开关损耗。仿真结果证明了该新型软开关Buck变换器方案的有效性。  相似文献   
125.
Interest in the Web services (WS) composition (WSC) paradigm is increasing tremendously. A real shift in distributed computing history is expected to occur when the dream of implementing Service-Oriented Architecture (SOA) is realized. However, there is a long way to go to achieve such an ambitious goal. In this paper, we support the idea that, when challenging the WSC issue, the earlier that the inevitability of failures is recognized and proper failure-handling mechanisms are defined, from the very early stage of the composite WS (CWS) specification, the greater are the chances of achieving a significant gain in dependability. To formalize this vision, we present the FENECIA (Failure Endurable Nested-transaction based Execution of Composite Web services with Incorporated state Analysis) framework. Our framework approaches the WSC issue from different points of view to guarantee a high level of dependability. In particular, it aims at being simultaneously a failure-handling-devoted CWS specification, execution, and quality of service (QoS) assessment approach. In the first section of our framework, we focus on answering the need for a specification model tailored for the WS architecture. To this end, we introduce WS-SAGAS, a new transaction model. WS-SAGAS introduces key concepts that are not part of the WS architecture pillars, namely, arbitrary nesting, state, vitality degree, and compensation, to specify failure-endurable CWS as a hierarchy of recursively nested transactions. In addition, to define the CWS execution semantics, without suffering from the hindrance of an XML-based notation, we describe a textual notation that describes a WSC in terms of definition rules, composability rules, and ordering rules, and we introduce graphical and formal notations. These rules provide the solid foundation needed to formulate the execution semantics of a CWS in terms of execution correctness verification dependencies. To ensure dependable execution of the CWS, we present in the second section of FENECIA our architecture THROWS, in which the execution control of the resulting CWS is distributed among engines, discovered dynamically, that communicate in a peer-to-peer fashion. A dependable execution is guaranteed in THROWS by keeping track of the execution progress of a CWS and by enforcing forward and backward recovery. We concentrate in the third section of our approach on showing how the failure consideration is trivial in acquiring more accurate CWS QoS estimations. We propose a model that assesses several QoS properties of CWS, which are specified as WS-SAGAS transactions and executed in THROWS. We validate our proposal and show its feasibility and broad applicability by describing an implemented prototype and a case study.  相似文献   
126.
Mutation testing has traditionally been used as a defect injection technique to assess the effectiveness of a test suite as represented by a “mutation score.” Recently, mutation testing tools have become more efficient, and industrial usage of mutation analysis is experiencing growth. Mutation analysis entails adding or modifying test cases until the test suite is sufficient to detect as many mutants as possible and the mutation score is satisfactory. The augmented test suite resulting from mutation analysis may reveal latent faults and provides a stronger test suite to detect future errors which might be injected. Software engineers often look for guidance on how to augment their test suite using information provided by line and/or branch coverage tools. As the use of mutation analysis grows, software engineers will want to know how the emerging technique compares with and/or complements coverage analysis for guiding the augmentation of an automated test suite. Additionally, software engineers can benefit from an enhanced understanding of efficient mutation analysis techniques. To address these needs for additional information about mutation analysis, we conducted an empirical study of the use of mutation analysis on two open source projects. Our results indicate that a focused effort on increasing mutation score leads to a corresponding increase in line and branch coverage to the point that line coverage, branch coverage and mutation score reach a maximum but leave some types of code structures uncovered. Mutation analysis guides the creation of additional “common programmer error” tests beyond those written to increase line and branch coverage. We also found that 74% of our chosen set of mutation operators is useful, on average, for producing new tests. The remaining 26% of mutation operators did not produce new test cases because their mutants were immediately detected by the initial test suite, indirectly detected by test suites we added to detect other mutants, or were not able to be detected by any test.
Laurie WilliamsEmail:

Ben Smith   is a second year Ph.D. student in Computer Science at North Carolina State University working as an RA under Dr. Laurie Williams. He received his Bachelor’s degree in Computer Science in May of 2007 and he hopes to receive his doctorate in 2012. He has begun work on developing SQL Coverage Metrics as a predictive measure of the security of a web application. This fall, he will be beginning the doctoral preliminary exam and working as a Testing Manager for the NCSU CSC Senior Design Center: North Carolina State’s capstone course for Computer Science. Finally, he has designed and maintained the websites for the Center for Open Software Engineering and ESEM 2009. Laurie Williams   is an Associate Professor in the Computer Science Department of the College of Engineering at North Carolina State University. She leads the Software Engineering Reasearch group and is also the Director of the North Carolina State University Laboratory for Collaborative System Development and the Center for Open Software Engineering. She is also technical co-director of the Center for Open Software Engineering (COSE) and the area technical director of the Secure Open Systems Initiative (SOSI) at North Carolina State University. Laurie received her Ph.D. in Computer Science from the University of Utah, her MBA from Duke University, and her BS in Industrial Engineering from Lehigh University. She worked for IBM for nine years in Raleigh, NC before returning to academia. Laurie’s research interests include agile software development methodologies and practices, collaborative/pair programming, software reliability and testing, and software engineering for secure systems development.   相似文献   
127.
This paper is concerned with the problem of boosting social annotations using propagation, which is also called social propagation. In particular, we focus on propagating social annotations of web pages (e.g., annotations in Del.icio.us). Social annotations are novel resources and valuable in many web applications, including web search and browsing. Although they are developing fast, social annotations of web pages cover only a small proportion (<0.1%) of the World Wide Web. To alleviate the low coverage of annotations, a general propagation model based on Random Surfer is proposed. Specifically, four steps are included, namely basic propagation, multiple-annotation propagation, multiple-link-type propagation, and constraint-guided propagation. The model is evaluated on a dataset of 40,422 web pages randomly sampled from 100 most popular English sites and ten famous academic sites. Each page’s annotations are obtained by querying the history interface of Del.icio.us. Experimental results show that the proposed model is very effective in increasing the coverage of annotations while still preserving novel properties of social annotations. Applications of propagated annotations on web search and classification further verify the effectiveness of the model.  相似文献   
128.
A home network system consists of multiple networked appliances, intended to provide more convenient and comfortable living for home users. Before being deployed, one has to guarantee the correctness, the safety, and the security of the system. Here, we present the approach chosen to validate the Java implementation of a home network system. We rely on the Java Modelling Language to formally specify and validate an abstraction of the system. This is a substantially revised version of our paper that appeared in the proceedings of the Workshop On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA), Poitiers-Futuroscope, France, December 2007.  相似文献   
129.
文章从环境心理学的角度出发,重点分析了当今人工环境的概念及其影响下的环境电器产品现状和前景。随着人们对生活环境质量越来越重视,环境电器产品必在人和环境互动关系中扮演重要角色。  相似文献   
130.
XPS and DRIFTS (diffuse reflectance infrared spectroscopy) spectra of AlPO systems, formally AlPO4-Al2O3, obtained by the sol-gel method have been studied in order to understand their geometric and electronic structure. Both DRIFTS and XPS demonstrate that the acidbase character of these samples depends on a structural modification. For low phosphorus content an amorphous spinel-like solid is proposed. This geometric arrangement alters the electronic density of oxide ions and phosphorus cations and hence their Lewis acid-base properties with respect to the amorphous solid having aluminium and phosphorus only in tetrahedral arrangement.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号