首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2529篇
  免费   51篇
  国内免费   1篇
电工技术   28篇
综合类   6篇
化学工业   543篇
金属工艺   40篇
机械仪表   43篇
建筑科学   113篇
矿业工程   22篇
能源动力   48篇
轻工业   212篇
水利工程   24篇
石油天然气   12篇
无线电   213篇
一般工业技术   361篇
冶金工业   464篇
原子能技术   27篇
自动化技术   425篇
  2022年   26篇
  2021年   25篇
  2020年   38篇
  2019年   37篇
  2018年   30篇
  2017年   20篇
  2016年   31篇
  2015年   30篇
  2014年   41篇
  2013年   124篇
  2012年   62篇
  2011年   117篇
  2010年   77篇
  2009年   95篇
  2008年   101篇
  2007年   92篇
  2006年   87篇
  2005年   81篇
  2004年   72篇
  2003年   77篇
  2002年   72篇
  2001年   57篇
  2000年   49篇
  1999年   50篇
  1998年   61篇
  1997年   66篇
  1996年   56篇
  1995年   35篇
  1994年   57篇
  1993年   36篇
  1992年   40篇
  1991年   33篇
  1990年   30篇
  1989年   31篇
  1988年   29篇
  1987年   36篇
  1986年   25篇
  1985年   29篇
  1984年   44篇
  1983年   36篇
  1982年   31篇
  1981年   40篇
  1980年   22篇
  1979年   36篇
  1978年   22篇
  1977年   35篇
  1976年   31篇
  1975年   27篇
  1974年   19篇
  1973年   23篇
排序方式: 共有2581条查询结果,搜索用时 15 毫秒
41.
Most external software quality attributes are conceptually subjective. For example, maintainability is an external software quality attribute, and it is subjective because interpersonally agreed definitions for the attribute include the phrase ‘the ease with which maintenance tasks can be performed’. Subjectivity clearly makes measurement of the attributes and validation of prediction systems for the attributes problematic. In fact, in spite of the definitions, few statistically valid attempts at determining the predictive capability of prediction systems for external quality attributes have been published. When validations have been attempted, one approach used is to ask experts to indicate if the values provided by the prediction system informally agree with the experts’ intuition. These attempts are undertaken without determining, independently of the prediction system, whether the experts are capable of direct consistent measurement of the attribute. Hence, a statistically valid and unbiased estimate of the predictive capability of the prediction system cannot be obtained (because the experts’ measurement process is not independent of the prediction system’s values). In this paper, it is argued that the problem of subjective measurement of quality attributes should not be ignored if quality is to be introduced into software in a controlled way. Further, it is argued that direct measurement of quality attributes should be encouraged and that in fact such measurement can be quantified to establish consistency using an existing approach. However, the approach needs to be made more accessible to promote its use. In so doing, it would be possible to decide whether consistent independent estimates of the true values of software quality attributes can be assigned and prediction systems for quality attributes developed.
John MosesEmail:
  相似文献   
42.
43.
The comparison of functional performance between a soldier wearing a chemical and biological (CB) protective equipment and an ordinary battle dress (BD) was conducted at Protechnik's facilities and Jozini–South Africa. The basis of the comparison was that CB protective equipment causes compatibility problems such as mobility and clearance, and that these factors would affect the soldier when performing various activities. Sixteen obstacle courses were erected to simulate a range of functions normally performed by an infantry soldier. Time taken by each soldier to complete a variety of motions and obstacle clearance activities was recorded. It was found that the CB protective equipment interfered with the soldier's performance. The soldier's movements were observed to be restricted and abnormal. The time taken to complete similar activities was longer when wearing the CB protective equipment than ordinary BD.

Relevance to industry

To determine the effect of protective equipment on functional performance.  相似文献   

44.
Chipping     
Networks dominate today’s computing environment and commercial technical protection is lagging behind attack technology. As a result, protection programme success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.  相似文献   
45.
Fred Cohen 《Network Security》2000,2000(11):16-18
Networks dominate today's computing landscape and commercial technical protection is lagging behind attack technology. As a result, protection programme success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.  相似文献   
46.
In optimal topological design of structures one obtains the configuration of optimal structures when the design domain, the displacement boundary conditions and the applied loads are specified. In the optimal structure one often notices a marked difference between the main bearing structure and the load transfer zones. The latter are composed of relatively light elements the exact nature of which is not always very distinct. The main purpose of this paper is to allow the main bearing part of the structure to emerge. Moreover the actual location of the load along its line of action is not always a design requirement. In order to include this relaxed condition regarding the loading position the concept of transmissible or sliding forces is introduced in topological design of structures. A transmissible force is a force of given magnitude and direction which can be applied at any point along the line of action of the force. The optimization formulation is similar to standard topological design procedure in addition to the condition of transmissability of the forces. It is shown that this condition reduces to an equal displacement constraint along the line of action of the forces. The method is illustrated by typical structural examples. It is observed that this numerical method produces indeed crisp images of the main structural components, unblurred by the secondary load transfer elements. It is also indicated that many results are often replicas of Prager structures which were previously obtained by analytical methods. Received March 3, 1999  相似文献   
47.
The a.c. magnetostriction of conventional grain-oriented 3 1/4% silicon-iron and more highly oriented silicon-iron has been measured from room temperature up to the Curie point using high temperature strain gauges. Curves of magnetostriction plotted against flux density showed that a definite change in the magnetization process occurred at about 300° C extending to 400° C for both types of material. This was considered to be due to the onset of magnetic annealing, considerably modified by the effect of the coating on the materials. From the experimental results the magnetostriction constant 100 has been calculated using a predicted domain structure and was found to agree well with single crystal values apart from within the 300 to 400° C region.  相似文献   
48.
Macsyma: A personal history   总被引:1,自引:0,他引:1  
The Macsyma system arose out of research on mathematical software in the AI group at MIT in the 1960s. Algorithm development in symbolic integration and simplification arose out of the interest of people, such as the author, who were also mathematics students. The later development of algorithms for the GCD of sparse polynomials, for example, arose out of the needs of our user community. During various times in the 1970s the computer on which Macsyma ran was one of the most popular nodes on the ARPANET. We discuss the attempts in the late 70s and the 80s to develop Macsyma systems that ran on popular computer architectures. Finally, we discuss the impact of the fundamental ideas in Macsyma on the author’s current research on large scale engineering and socio-technical systems.  相似文献   
49.
The human visual system has the remarkable ability to largely recognize objects invariant of their position, rotation, and scale. A good interpretation of neurobiological findings involves a computational model that simulates signal processing of the visual cortex. In part, this is likely achieved step by step from early to late areas of visual perception. While several algorithms have been proposed for learning feature detectors, only few studies at hand cover the issue of biologically plausible learning of such invariance. In this study, a set of Hebbian learning rules based on calcium dynamics and homeostatic regulations of single neurons is proposed. Their performance is verified within a simple model of the primary visual cortex to learn so-called complex cells, based on a sequence of static images. As a result, the learned complex-cell responses are largely invariant to phase and position.  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号