全文获取类型
收费全文 | 9262篇 |
免费 | 119篇 |
国内免费 | 145篇 |
专业分类
电工技术 | 38篇 |
综合类 | 5篇 |
化学工业 | 807篇 |
金属工艺 | 464篇 |
机械仪表 | 91篇 |
建筑科学 | 84篇 |
矿业工程 | 7篇 |
能源动力 | 80篇 |
轻工业 | 123篇 |
水利工程 | 31篇 |
石油天然气 | 63篇 |
武器工业 | 1篇 |
无线电 | 383篇 |
一般工业技术 | 779篇 |
冶金工业 | 177篇 |
原子能技术 | 132篇 |
自动化技术 | 6261篇 |
出版年
2023年 | 24篇 |
2022年 | 82篇 |
2021年 | 109篇 |
2020年 | 77篇 |
2019年 | 81篇 |
2018年 | 87篇 |
2017年 | 75篇 |
2016年 | 80篇 |
2015年 | 57篇 |
2014年 | 139篇 |
2013年 | 201篇 |
2012年 | 331篇 |
2011年 | 1573篇 |
2010年 | 1127篇 |
2009年 | 1075篇 |
2008年 | 728篇 |
2007年 | 673篇 |
2006年 | 528篇 |
2005年 | 641篇 |
2004年 | 599篇 |
2003年 | 404篇 |
2002年 | 138篇 |
2001年 | 29篇 |
2000年 | 29篇 |
1999年 | 49篇 |
1998年 | 119篇 |
1997年 | 50篇 |
1996年 | 27篇 |
1995年 | 16篇 |
1994年 | 20篇 |
1993年 | 22篇 |
1992年 | 23篇 |
1991年 | 23篇 |
1990年 | 19篇 |
1989年 | 20篇 |
1988年 | 14篇 |
1987年 | 19篇 |
1986年 | 19篇 |
1985年 | 17篇 |
1984年 | 30篇 |
1983年 | 22篇 |
1982年 | 13篇 |
1981年 | 16篇 |
1980年 | 7篇 |
1979年 | 8篇 |
1977年 | 12篇 |
1976年 | 10篇 |
1975年 | 7篇 |
1974年 | 7篇 |
1972年 | 10篇 |
排序方式: 共有9526条查询结果,搜索用时 15 毫秒
51.
Vidroha Debroy Author VitaeW. Eric WongAuthor Vitae 《Journal of Systems and Software》2011,84(4):587-602
Test set size in terms of the number of test cases is an important consideration when testing software systems. Using too few test cases might result in poor fault detection and using too many might be very expensive and suffer from redundancy. We define the failure rate of a program as the fraction of test cases in an available test pool that result in execution failure on that program. This paper investigates the relationship between failure rates and the number of test cases required to detect the faults. Our experiments based on 11 sets of C programs suggest that an accurate estimation of failure rates of potential fault(s) in a program can provide a reliable estimate of adequate test set size with respect to fault detection and should therefore be one of the factors kept in mind during test set construction. Furthermore, the model proposed herein is fairly robust to incorrect estimations in failure rates and can still provide good predictive quality. Experiments are also performed to observe the relationship between multiple faults present in the same program using the concept of a failure rate. When predicting the effectiveness against a program with multiple faults, results indicate that not knowing the number of faults in the program is not a significant concern, as the predictive quality is typically not affected adversely. 相似文献
52.
Ralf Steinmetz Author VitaeAndré KönigAuthor Vitae 《Performance Evaluation》2011,68(9):750-767
Recent developments in the area of decentralized and infrastructureless systems opened avenues for novel applications. Along with these new technologies, new questions regarding their operational bounds in terms of e.g. scalability and security arose. Due to the sparse presence of real-world decentralized and infrastructureless systems, new protocols and applications have to be scrutinized by means of simulation, in (small-scale) testbeds, and by analytical models. In this paper, we discuss challenges of evaluating security mechanisms for mobile ad hoc networks and peer-to-peer systems. We focus on harmonizing predictions of analytical models and results obtained from simulation studies and testbed experiments. 相似文献
53.
Recent research has shown that multilayer feedforward networks with sigmoidal activation functions are universal approximators, and that this holds for more general activations as well. The mathematical underpinning for these results has been various: Kolmogorov's resolution of Hilbert's thirteenth problem; the Stone-Weierstrass theorem; approximation of Fourier and Radon integral representations; and convergence of probability measures. This paper
The second result extends and simplifies some of the recent results of Stinchcombe and White, at least for the special cases ofL
1 andL
2 functions. 相似文献
Rigorously establishes the robustness of feedforward network realizations. | |
Uses a theorem of Wiener and ideas of translation invariant subspaces to provide conditions for universal approximations toL 1 andL 2 functions by networks, for quite general activation functions. |
54.
Nguyen Quoc Dinh Author VitaeDong-Sung KimAuthor Vitae 《Computer Standards & Interfaces》2012,34(1):117-123
The International Society of Automation recently released ISA100.11a as an open standard for reliable wireless networks for industrial automation. ISA100.11a uses the TDMA scheme in the medium access layer to provide deterministic services. However, ISA100.11a adopts the CSMA-CA mechanism with priorities for retransmission from failure on dedicated links, sporadic data, and network configuration.This paper evaluates ISA100.11a CSMA-CA by simulation, considering the effects of backoff procedures and priority settings to probability of collision and successful use of slots. It's demonstrated that a high number of priority classes enable better network utilization resulting in less number of packets exceeding their lifetime. 相似文献
55.
A new analytical approach for’ micromechanical modeling of the effective viscoelastic behavior of a’ composite material is
presented. Fractionexponential operators are. used to describe the viscoelastic properties of the constituents. To construct
the corresponding elastic solution, effective field method is used. Effective viscoelastic operators are obtained from the
Volter ra’s elasticity-viscoelasticity correspondence principle. Incompatible deformation that often occurs during the manufacturiig
process is taken intp account. All the formulas are obtained in explicit ready-to-use form. 相似文献
56.
We propose a method for automatically copying facial motion from one 3D face model to another, while preserving the compliance of the motion to the MPEG-4 Face and Body Animation (FBA) standard. Despite the enormous progress in the field of Facial Animation, producing a new animatable face from scratch is still a tremendous task for an artist. Although many methods exist to animate a face automatically based on procedural methods, these methods still need to be initialized by defining facial regions or similar, and they lack flexibility because the artist can only obtain the facial motion that a particular algorithm offers. Therefore a very common approach is interpolation between key facial expressions, usually called morph targets, containing either speech elements (visemes) or emotional expressions. Following the same approach, the MPEG-4 Facial Animation specification offers a method for interpolation of facial motion from key positions, called Facial Animation Tables, which are essentially morph targets corresponding to all possible motions specified in MPEG-4. The problem of this approach is that the artist needs to create a new set of morph targets for each new face model. In case of MPEG-4 there are 86 morph targets, which is a lot of work to create manually. Our method solves this problem by cloning the morph targets, i.e. by automatically copying the motion of vertices, as well as geometry transforms, from source face to target face while maintaining the regional correspondences and the correct scale of motion. It requires the user only to identify a subset of the MPEG-4 Feature Points in the source and target faces. The scale of the movement is normalized with respect to MPEG-4 normalization units (FAPUs), meaning that the MPEG-4 FBA compliance of the copied motion is preserved. Our method is therefore suitable not only for cloning of free facial expressions, but also of MPEG-4 compatible facial motion, in particular the Facial Animation Tables. We believe that Facial Motion Cloning offers dramatic time saving to artists producing morph targets for facial animation or MPEG-4 Facial Animation Tables. 相似文献
57.
The paper presents some results on global exponential stability of linear time invariant systems with different time scales. The full system is decomposed in two reduced ones by means of singular perturbations and a smooth approximation of a Variable Structure Control is synthesized for each of them using Reaching Law approach. The global closed loop stability is then proved for the whole system using Lyapunov methods and a particular state space decomposition. Moreover a literal form for ε∗ (a parameter which measures the minimum separation between time scales) is derived. 相似文献
58.
Based on the dynamic anti-windup strategy, an alternative control methodology for state constrained systems is presented. The proposed method is an a posteriori approach for state constrained systems, which is differentiated from the usual a priori approach. That is, first a linear controller is designed to show a desirable nominal performance by ignoring state constraints. Then, an additional compensator is introduced to account for state constraints. By minimizing a reasonable performance index, a dynamic compensator is derived explicitly, which is expressed in plant and controller parameters. The proposed method not only provides a graceful performance degradation, but it also guarantees the total stability of the resulting systems. An illustrative example is given to show the effectiveness of the proposed method. 相似文献
59.
We propose a numerical simulation technique to model the process of diffusional creep and stress relaxation that occurs in
Cu-damascene interconnects of integrated circuit devices in processing stage. The mass flow problem is coupled to the stress
analysis through vacancy flux and equilibrium vacancy concentration. The technique is implemented in a software package that
seamlessly integrates the problem-oriented code with commercially available finite element program MSC.Marc. It is utilized
to model the Coble creep phenomenon by introducing the nanoscale grain boundary region having the thickness on the order of
several layers of atoms. As an illustration, the two-dimensional problem of stress relaxation in a single grain subjected
to prescribed displacements and tractions is examined. 相似文献
60.
M. Carroll Author Vitae Author Vitae 《Computers & Electrical Engineering》2004,30(5):331-345
The paper reports on the experiments undertaken at the University of Wollongong to characterise fading profiles and delay parameters of an indoor wireless channels at 5 GHz U-NII bands. The measurements were undertaken at different locations around the campus with results recorded for a post-processing to calculate the Rician K-factor, the level crossing rate and the average fade duration as well as mean excess delay, rms delay spread, and the coherence bandwidth of the channel. The presented measurement results can be useful in developing a Markov chain based model of the transport channel for IEEE802.11a or HYPRLAN-2 networks. The results also indicate scenarios where the coherence bandwidth of the channel is smaller than the width of the sub-carrier OFDM channels in either of the mentioned systems. 相似文献