全文获取类型
收费全文 | 18745篇 |
免费 | 2324篇 |
国内免费 | 1354篇 |
专业分类
电工技术 | 2521篇 |
综合类 | 1673篇 |
化学工业 | 877篇 |
金属工艺 | 661篇 |
机械仪表 | 962篇 |
建筑科学 | 1992篇 |
矿业工程 | 574篇 |
能源动力 | 1034篇 |
轻工业 | 526篇 |
水利工程 | 992篇 |
石油天然气 | 2518篇 |
武器工业 | 145篇 |
无线电 | 2659篇 |
一般工业技术 | 1495篇 |
冶金工业 | 448篇 |
原子能技术 | 1047篇 |
自动化技术 | 2299篇 |
出版年
2024年 | 71篇 |
2023年 | 217篇 |
2022年 | 507篇 |
2021年 | 584篇 |
2020年 | 630篇 |
2019年 | 564篇 |
2018年 | 505篇 |
2017年 | 719篇 |
2016年 | 756篇 |
2015年 | 817篇 |
2014年 | 1251篇 |
2013年 | 1171篇 |
2012年 | 1473篇 |
2011年 | 1680篇 |
2010年 | 1197篇 |
2009年 | 1186篇 |
2008年 | 1184篇 |
2007年 | 1393篇 |
2006年 | 1179篇 |
2005年 | 973篇 |
2004年 | 773篇 |
2003年 | 693篇 |
2002年 | 570篇 |
2001年 | 460篇 |
2000年 | 321篇 |
1999年 | 262篇 |
1998年 | 191篇 |
1997年 | 195篇 |
1996年 | 176篇 |
1995年 | 134篇 |
1994年 | 133篇 |
1993年 | 97篇 |
1992年 | 68篇 |
1991年 | 63篇 |
1990年 | 41篇 |
1989年 | 57篇 |
1988年 | 36篇 |
1987年 | 18篇 |
1986年 | 16篇 |
1985年 | 17篇 |
1984年 | 4篇 |
1982年 | 3篇 |
1981年 | 4篇 |
1980年 | 7篇 |
1978年 | 2篇 |
1976年 | 2篇 |
1975年 | 2篇 |
1961年 | 3篇 |
1959年 | 11篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
72.
本文通过介绍Word邮件合并功能的操作步骤并掌握它学会进行知识的迁移,因不同工作岗位的需要,学会举一反三,在日常的生活工作当中,巧用Word邮件合并功能,从重复劳动中解脱。 相似文献
73.
本文以单片机为控制核心,利用相应的硬件滤波功能和软件滤波算法对红外遥控接收头的输出信号进行实时地动态处理,解析出真实的控制信号并输入到与BL9149相兼容的输出管脚。本红外遥控解码模块即滤除了干扰信号,提高了抗外界干扰光源的性能;同时实时操控性能达到了要求。 相似文献
74.
针对民办高校在数字化校园建设方面资金短缺问题,本文提出了通过用好开源软件、搞好校企合作和自行开发三种解决的办法。 相似文献
75.
76.
C语言源程序的自动评判系统 总被引:1,自引:0,他引:1
自动评判系统为通过编译C语言源程序生成的可执行程序创建进程,输入适当的测试数据,对输出结果与预设答案进行比较和评判。提出了通过匿名管道进行数据输入输出的实现方法,分析了自动评判机制中的主要问题及解决方法,重点对分级评判进行了探讨,进而提出了四级评判机制。 相似文献
77.
为了提高太阳能电池板的能量转换效率,提出了一种基于MSP430的太阳光源跟踪控制系统。系统设计原理采用光强比较法,硬件部分设计了光强信号采集电路、以MSP430为核心的主控制器、步进电机驱动电路等;软件部分采用模块化编程,加入数字滤波和控制算法。系统实现了刘信号采集与处理、电机驱动等模块的控制,能够快速准确跟踪太阳光源。运行实验结果表明,系统运行稳定,控制灵活,达到预期的设计目标。 相似文献
78.
Many existing systems are written in C and are not re‐entrant or thread safe. Sometimes these systems are required in a context for which they were not first designed, possibly meaning they now need to be re‐entrant. This article introduces a program that filters C source code, modifying shared resources (the global variables) to make the code re‐entrant: ‘virtualizing’ the code. The code is then compiled as normal. This approach allows programmatic virtualization with little cost at runtime. Copyright © 2007 John Wiley & Sons, Ltd. 相似文献
79.
Raed Shatnawi Author Vitae Wei Li Author Vitae 《Journal of Systems and Software》2008,81(11):1868-1882
Many empirical studies have found that software metrics can predict class error proneness and the prediction can be used to accurately group error-prone classes. Recent empirical studies have used open source systems. These studies, however, focused on the relationship between software metrics and class error proneness during the development phase of software projects. Whether software metrics can still predict class error proneness in a system’s post-release evolution is still a question to be answered. This study examined three releases of the Eclipse project and found that although some metrics can still predict class error proneness in three error-severity categories, the accuracy of the prediction decreased from release to release. Furthermore, we found that the prediction cannot be used to build a metrics model to identify error-prone classes with acceptable accuracy. These findings suggest that as a system evolves, the use of some commonly used metrics to identify which classes are more prone to errors becomes increasingly difficult and we should seek alternative methods (to the metric-prediction models) to locate error-prone classes if we want high accuracy. 相似文献
80.
In an organization operating in the bancassurance sector we identified a low-risk IT subportfolio of 84 IT projects comprising together 16,500 function points, each project varying in size and duration, for which we were able to quantify its requirements volatility. This representative portfolio stems from a much larger portfolio of IT projects. We calculated the volatility from the function point countings that were available to us. These figures were aggregated into a requirements volatility benchmark. We found that maximum requirements volatility rates depend on size and duration, which refutes currently known industrial averages. For instance, a monthly growth rate of 5% is considered a critical failure factor, but in our low-risk portfolio we found more than 21% of successful projects with a volatility larger than 5%. We proposed a mathematical model taking size and duration into account that provides a maximum healthy volatility rate that is more in line with the reality of low-risk IT portfolios. Based on the model, we proposed a tolerance factor expressing the maximal volatility tolerance for a project or portfolio. For a low-risk portfolio its empirically found tolerance is apparently acceptable, and values exceeding this tolerance are used to trigger IT decision makers. We derived two volatility ratios from this model, the π-ratio and the ρ-ratio. These ratios express how close the volatility of a project has approached the danger zone when requirements volatility reaches a critical failure rate. The volatility data of a governmental IT portfolio were juxtaposed to our bancassurance benchmark, immediately exposing a problematic project, which was corroborated by its actual failure. When function points are less common, e.g. in the embedded industry, we used daily source code size measures and illustrated how to govern the volatility of a software product line of a hardware manufacturer. With the three real-world portfolios we illustrated that our results serve the purpose of an early warning system for projects that are bound to fail due to excessive volatility. Moreover, we developed essential requirements volatility metrics that belong on an IT governance dashboard and presented such a volatility dashboard. 相似文献