首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1982篇
  免费   133篇
  国内免费   17篇
电工技术   51篇
综合类   10篇
化学工业   540篇
金属工艺   51篇
机械仪表   85篇
建筑科学   62篇
矿业工程   5篇
能源动力   111篇
轻工业   173篇
水利工程   42篇
石油天然气   31篇
武器工业   2篇
无线电   146篇
一般工业技术   383篇
冶金工业   85篇
原子能技术   20篇
自动化技术   335篇
  2024年   4篇
  2023年   62篇
  2022年   87篇
  2021年   146篇
  2020年   132篇
  2019年   143篇
  2018年   155篇
  2017年   132篇
  2016年   129篇
  2015年   91篇
  2014年   105篇
  2013年   187篇
  2012年   137篇
  2011年   119篇
  2010年   89篇
  2009年   85篇
  2008年   52篇
  2007年   50篇
  2006年   32篇
  2005年   16篇
  2004年   13篇
  2003年   17篇
  2002年   18篇
  2001年   9篇
  2000年   9篇
  1999年   9篇
  1998年   21篇
  1997年   12篇
  1996年   10篇
  1995年   9篇
  1994年   11篇
  1993年   4篇
  1992年   6篇
  1991年   7篇
  1990年   3篇
  1989年   1篇
  1988年   1篇
  1987年   4篇
  1986年   1篇
  1984年   5篇
  1983年   1篇
  1982年   1篇
  1981年   3篇
  1980年   1篇
  1979年   1篇
  1975年   1篇
  1968年   1篇
排序方式: 共有2132条查询结果,搜索用时 31 毫秒
21.
Considering the fact that faults may be revealed as undesired mutual effect of program predicates on each other, a new approach for localizing latent bugs, namely Hierarchy-Debug, is presented in this paper. To analyze the vertical effect of predicates on each other and on program termination status, the predicates are fitted into a logistic lasso model. To support scalability, a hierarchical clustering algorithm is applied to cluster the predicates according to their presence in different executions. Considering each cluster as a pseudo-predicate, a distinct lasso model is built for intermediate levels of the hierarchy. Then, we apply a majority voting technique to score the predicates according to their lasso coefficients at different levels of the hierarchy. The predicates with relatively higher scores are ranked as fault relevant predicates. To provide the context of failure, faulty sub-paths are identified as sequences of fault relevant predicates. The grouping effect of Hierarchy-Debug helps programmers to detect multiple bugs. Four case studies have been designed to evaluate the proposed approach on three well-known test suites, SpaceSiemens, and Bash. The evaluations show that Hierarchy-Debug produces more precise results compared with prior fault localization techniques on the subject programs.  相似文献   
22.
23.
Multimedia Tools and Applications - In traditional biometric verification systems, personal computer stores biometric database and performs verification process. Because of limited storage,...  相似文献   
24.
Multimedia Tools and Applications - This study presents an unsupervised novel algorithm for color image segmentation, object detection and tracking based on unsupervised learning step followed with...  相似文献   
25.
Innovations in Systems and Software Engineering - One of the most important modules of computer systems is the one that is responsible for user safety. It was proven that simple passwords and...  相似文献   
26.
Several new isoxazolidines having varying degree of steric environment and hydrophobic chain length, prepared efficiently using single-step nitrone cycloaddition reactions, are tested for corrosion inhibition of mild steel in 1 M and 5 M HCl at 50-70 °C range by gravimetric and electrochemical methods. All compounds have shown very good corrosion inhibition efficiency (IE%) in acidic solution. Steric crowding around the nitrogen centres and hydrophobic chain lengths as well as increase in temperature (in the presence of the inhibitor in the higher concentration range 100-400 ppm) are found to increase the inhibition efficiency of the isoxazolidines. Thermodynamic parameters (ΔG°ads, ΔH°ads, ΔS°ads) for the adsorption process and kinetic parameters for the metal dissolution (or hydrogen evolution) reaction in the presence of one of the isoxazolidines were determined. Experimental results agree with the Temkin adsorption isotherm. The inhibition of corrosion in 1 M HCl, influenced by both physi- and chemi-sorption, was found to be under mixed control, but predominantly under cathodic control.  相似文献   
27.
This article proposes a novel algorithm to improve the lifetime of a wireless sensor network. This algorithm employs swarm intelligence algorithms in conjunction with compressive sensing theory to build up the routing trees and to decrease the communication rate. The main contribution of this article is to extend swarm intelligence algorithms to build a routing tree in such a way that it can be utilized to maximize efficiency, thereby rectifying the delay problem of compressive sensing theory and improving the network lifetime. In addition, our approach offers accurate data recovery from small amounts of compressed data. Simulation results show that our approach can effectively extend the network lifetime of a large‐scale wireless sensor network.  相似文献   
28.
29.
In Information Technology Service Management (ITSM), network management teams typically use an Incident Ticket System (ITS) as a tool to track, troubleshoot, and coordinate the resolution of network incidents that occur during the daily operation of the network. A well organized ITS may positively impact on the efficiency of the incident management process. Nevertheless, in many cases the handling of tickets by the management team is not completely systematic and may be incoherent and inefficient. This way, irrelevant or redundant tickets for the same incident may be issued, thus creating a redundancy in the system that leads to inefficiencies. In this paper, we suggest a model aimed to correlate redundant tickets in order to reduce the information to a single ticket per incident. We validate the proposed correlation model by evaluating it with two datasets taken from a real ticketing system of a telecommunications network company. Using this model as a basis, we also develop and evaluate a methodology that assesses the efficiency of the management team during the process of tickets creation and management. Based on it, we also get some insights on the performance of the different management groups involved in the ticket creation process. These analyses can be leveraged for improving both the management groups functioning and the policies for the tickets’ creation.  相似文献   
30.
This paper proposes a new method for determining the stability margin of uncertain linear discrete‐time systems with uncertainty described by fuzzy convex sets. Nonsymmetrical triangular membership functions describing the uncertainty of characteristic polynomial coefficients are considered. This method is based on transformation of the uncertain discrete systems to the continuous time area and generalization of Kharitonov theorem for determining the uncommon minimum confidence level that guarantees stability of the system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号