全文获取类型
收费全文 | 81927篇 |
免费 | 8326篇 |
国内免费 | 3355篇 |
专业分类
电工技术 | 6305篇 |
综合类 | 6596篇 |
化学工业 | 12261篇 |
金属工艺 | 6656篇 |
机械仪表 | 5760篇 |
建筑科学 | 8625篇 |
矿业工程 | 2306篇 |
能源动力 | 9928篇 |
轻工业 | 3297篇 |
水利工程 | 2198篇 |
石油天然气 | 6840篇 |
武器工业 | 522篇 |
无线电 | 4539篇 |
一般工业技术 | 7589篇 |
冶金工业 | 4338篇 |
原子能技术 | 2256篇 |
自动化技术 | 3592篇 |
出版年
2024年 | 306篇 |
2023年 | 954篇 |
2022年 | 2062篇 |
2021年 | 2381篇 |
2020年 | 2525篇 |
2019年 | 1987篇 |
2018年 | 1836篇 |
2017年 | 2310篇 |
2016年 | 2726篇 |
2015年 | 2886篇 |
2014年 | 5040篇 |
2013年 | 4877篇 |
2012年 | 5960篇 |
2011年 | 6430篇 |
2010年 | 4715篇 |
2009年 | 4813篇 |
2008年 | 4037篇 |
2007年 | 5436篇 |
2006年 | 4981篇 |
2005年 | 4236篇 |
2004年 | 3694篇 |
2003年 | 3315篇 |
2002年 | 2957篇 |
2001年 | 2394篇 |
2000年 | 1997篇 |
1999年 | 1571篇 |
1998年 | 1264篇 |
1997年 | 1112篇 |
1996年 | 955篇 |
1995年 | 800篇 |
1994年 | 636篇 |
1993年 | 494篇 |
1992年 | 390篇 |
1991年 | 290篇 |
1990年 | 223篇 |
1989年 | 247篇 |
1988年 | 152篇 |
1987年 | 109篇 |
1986年 | 90篇 |
1985年 | 71篇 |
1984年 | 83篇 |
1983年 | 64篇 |
1982年 | 63篇 |
1981年 | 19篇 |
1980年 | 18篇 |
1979年 | 8篇 |
1978年 | 6篇 |
1977年 | 6篇 |
1959年 | 40篇 |
1951年 | 23篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
931.
Raed Shatnawi Author Vitae Wei Li Author Vitae 《Journal of Systems and Software》2008,81(11):1868-1882
Many empirical studies have found that software metrics can predict class error proneness and the prediction can be used to accurately group error-prone classes. Recent empirical studies have used open source systems. These studies, however, focused on the relationship between software metrics and class error proneness during the development phase of software projects. Whether software metrics can still predict class error proneness in a system’s post-release evolution is still a question to be answered. This study examined three releases of the Eclipse project and found that although some metrics can still predict class error proneness in three error-severity categories, the accuracy of the prediction decreased from release to release. Furthermore, we found that the prediction cannot be used to build a metrics model to identify error-prone classes with acceptable accuracy. These findings suggest that as a system evolves, the use of some commonly used metrics to identify which classes are more prone to errors becomes increasingly difficult and we should seek alternative methods (to the metric-prediction models) to locate error-prone classes if we want high accuracy. 相似文献
932.
In an organization operating in the bancassurance sector we identified a low-risk IT subportfolio of 84 IT projects comprising together 16,500 function points, each project varying in size and duration, for which we were able to quantify its requirements volatility. This representative portfolio stems from a much larger portfolio of IT projects. We calculated the volatility from the function point countings that were available to us. These figures were aggregated into a requirements volatility benchmark. We found that maximum requirements volatility rates depend on size and duration, which refutes currently known industrial averages. For instance, a monthly growth rate of 5% is considered a critical failure factor, but in our low-risk portfolio we found more than 21% of successful projects with a volatility larger than 5%. We proposed a mathematical model taking size and duration into account that provides a maximum healthy volatility rate that is more in line with the reality of low-risk IT portfolios. Based on the model, we proposed a tolerance factor expressing the maximal volatility tolerance for a project or portfolio. For a low-risk portfolio its empirically found tolerance is apparently acceptable, and values exceeding this tolerance are used to trigger IT decision makers. We derived two volatility ratios from this model, the π-ratio and the ρ-ratio. These ratios express how close the volatility of a project has approached the danger zone when requirements volatility reaches a critical failure rate. The volatility data of a governmental IT portfolio were juxtaposed to our bancassurance benchmark, immediately exposing a problematic project, which was corroborated by its actual failure. When function points are less common, e.g. in the embedded industry, we used daily source code size measures and illustrated how to govern the volatility of a software product line of a hardware manufacturer. With the three real-world portfolios we illustrated that our results serve the purpose of an early warning system for projects that are bound to fail due to excessive volatility. Moreover, we developed essential requirements volatility metrics that belong on an IT governance dashboard and presented such a volatility dashboard. 相似文献
933.
A multi-objective controller synthesis problem is considered in which an output is to be regulated approximately by assuring a bound on the steady-state peak amplification in response to an infinite-energy disturbance, while also guaranteeing a desired level of performance measured in terms of the worst-case energy gain from a finite-energy input to a performance output. Relying on a characterization of the controllers with which almost asymptotic regulation is accomplished, the problem of guaranteeing the desired level of performance is reduced to solving a system of linear matrix inequalities subject to a set of linear equality constraints. Based on the solution of this system, a procedure is outlined for the construction of a suitable controller whose order is equal to the order of the plant plus the order of the exogenous system. 相似文献
934.
control with limited communication and message losses 总被引:2,自引:0,他引:2
We propose an H∞ approach to a remote control problem where the communication is constrained due to the use of a shared channel. The controller employs a periodic time sequencing scheme for message transmissions from multiple sensors and to multiple actuators of the system. It further takes into account the information on the random message losses that occur in the channel. An exact characterization for controller synthesis is obtained and is stated in terms of linear matrix inequalities. Furthermore, an analysis on the loss probabilities of the messages to accomplish stabilization is carried out. The results are illustrated through a numerical example. 相似文献
935.
In this paper we consider a numerical approximation of solution of nonhomogeneous backward heat conduction problem (BHCP) in bounded region based on Tikhonov regularization method. Error estimate at t=0 for this method is provided. According to the error estimate, a selection of regularization parameter is given. Meanwhile, a numerical implementation is described and the numerical results show that our algorithm is effective. 相似文献
936.
We address concerns about the sustainability of the open source content model by examining the effect of external appropriation, whereby the product of open source contributors’ efforts is monetized by a party that did not contribute to the project, on intended effort withdrawal (reduction in contribution level). We examine both the personality of contributors and their contextual motivations to contribute, using a scenario-based survey of Wikipedia contributors. The findings suggest that perceived justice of the open source license terms, and intrinsic motivations are both negatively related with effort withdrawal intentions. Moreover, we find that the effect of the fairness personality trait on effort withdrawal is stronger for individuals who are low in perceived justice and weaker for individuals high in justice. The findings of factors predicting effort withdrawal contribute to the open source literature, which tends to focus on contribution and motivations, but not on what impacts changes in individual contribution levels. 相似文献
937.
In this paper, by using the concept of (A,η)-accretive mappings and the new resolvent operator technique associated with (A,η)-accretive mappings, we introduce and study a system of general mixed quasivariational inclusions involving (A,η)-accretive mappings in Banach spaces, and construct a new perturbed iterative algorithm with mixed errors for this system of nonlinear (A,η)-accretive variational inclusions in q-uniformly smooth Banach spaces. Our results improve and generalize the corresponding results of recent works. 相似文献
938.
在工业发展过程中,环境保护已经变得越来越重要。该文在介绍Zigbee基本特点的基础上,把新一代的无线通信Zigbee技术应用在了工业污水监控领域中。 相似文献
939.
杨晓婕 《数字社区&智能家居》2009,(32)
在新军事变革中,军队的武器装备、作战方式等许多方面都发生了重大变化,在军事训练方面就要适应这种变化。将开源软件应用于军事训练是一种高效、节省的好方法。 相似文献
940.
本文在分析5阶锁相环基本原理和线性化数学模型的基础上,给出了一种实用的4阶环路滤波器的设计方法,用Matlab编程计算锁相环的参数;用ADS工具对系统性能进行仿真,仿真结果与预期结果相吻合;比较了具有相同环路带宽和相位裕度下的高阶锁相环的杂散性能。这对5阶电荷泵锁相环的系统设计和仿真有一定的指导意义。 相似文献