首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   81927篇
  免费   8326篇
  国内免费   3355篇
电工技术   6305篇
综合类   6596篇
化学工业   12261篇
金属工艺   6656篇
机械仪表   5760篇
建筑科学   8625篇
矿业工程   2306篇
能源动力   9928篇
轻工业   3297篇
水利工程   2198篇
石油天然气   6840篇
武器工业   522篇
无线电   4539篇
一般工业技术   7589篇
冶金工业   4338篇
原子能技术   2256篇
自动化技术   3592篇
  2024年   306篇
  2023年   954篇
  2022年   2062篇
  2021年   2381篇
  2020年   2525篇
  2019年   1987篇
  2018年   1836篇
  2017年   2310篇
  2016年   2726篇
  2015年   2886篇
  2014年   5040篇
  2013年   4877篇
  2012年   5960篇
  2011年   6430篇
  2010年   4715篇
  2009年   4813篇
  2008年   4037篇
  2007年   5436篇
  2006年   4981篇
  2005年   4236篇
  2004年   3694篇
  2003年   3315篇
  2002年   2957篇
  2001年   2394篇
  2000年   1997篇
  1999年   1571篇
  1998年   1264篇
  1997年   1112篇
  1996年   955篇
  1995年   800篇
  1994年   636篇
  1993年   494篇
  1992年   390篇
  1991年   290篇
  1990年   223篇
  1989年   247篇
  1988年   152篇
  1987年   109篇
  1986年   90篇
  1985年   71篇
  1984年   83篇
  1983年   64篇
  1982年   63篇
  1981年   19篇
  1980年   18篇
  1979年   8篇
  1978年   6篇
  1977年   6篇
  1959年   40篇
  1951年   23篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
931.
Many empirical studies have found that software metrics can predict class error proneness and the prediction can be used to accurately group error-prone classes. Recent empirical studies have used open source systems. These studies, however, focused on the relationship between software metrics and class error proneness during the development phase of software projects. Whether software metrics can still predict class error proneness in a system’s post-release evolution is still a question to be answered. This study examined three releases of the Eclipse project and found that although some metrics can still predict class error proneness in three error-severity categories, the accuracy of the prediction decreased from release to release. Furthermore, we found that the prediction cannot be used to build a metrics model to identify error-prone classes with acceptable accuracy. These findings suggest that as a system evolves, the use of some commonly used metrics to identify which classes are more prone to errors becomes increasingly difficult and we should seek alternative methods (to the metric-prediction models) to locate error-prone classes if we want high accuracy.  相似文献   
932.
In an organization operating in the bancassurance sector we identified a low-risk IT subportfolio of 84 IT projects comprising together 16,500 function points, each project varying in size and duration, for which we were able to quantify its requirements volatility. This representative portfolio stems from a much larger portfolio of IT projects. We calculated the volatility from the function point countings that were available to us. These figures were aggregated into a requirements volatility benchmark. We found that maximum requirements volatility rates depend on size and duration, which refutes currently known industrial averages. For instance, a monthly growth rate of 5% is considered a critical failure factor, but in our low-risk portfolio we found more than 21% of successful projects with a volatility larger than 5%. We proposed a mathematical model taking size and duration into account that provides a maximum healthy volatility rate that is more in line with the reality of low-risk IT portfolios. Based on the model, we proposed a tolerance factor expressing the maximal volatility tolerance for a project or portfolio. For a low-risk portfolio its empirically found tolerance is apparently acceptable, and values exceeding this tolerance are used to trigger IT decision makers. We derived two volatility ratios from this model, the π-ratio and the ρ-ratio. These ratios express how close the volatility of a project has approached the danger zone when requirements volatility reaches a critical failure rate. The volatility data of a governmental IT portfolio were juxtaposed to our bancassurance benchmark, immediately exposing a problematic project, which was corroborated by its actual failure. When function points are less common, e.g. in the embedded industry, we used daily source code size measures and illustrated how to govern the volatility of a software product line of a hardware manufacturer. With the three real-world portfolios we illustrated that our results serve the purpose of an early warning system for projects that are bound to fail due to excessive volatility. Moreover, we developed essential requirements volatility metrics that belong on an IT governance dashboard and presented such a volatility dashboard.  相似文献   
933.
A multi-objective controller synthesis problem is considered in which an output is to be regulated approximately by assuring a bound on the steady-state peak amplification in response to an infinite-energy disturbance, while also guaranteeing a desired level of performance measured in terms of the worst-case energy gain from a finite-energy input to a performance output. Relying on a characterization of the controllers with which almost asymptotic regulation is accomplished, the problem of guaranteeing the desired level of performance is reduced to solving a system of linear matrix inequalities subject to a set of linear equality constraints. Based on the solution of this system, a procedure is outlined for the construction of a suitable controller whose order is equal to the order of the plant plus the order of the exogenous system.  相似文献   
934.
control with limited communication and message losses   总被引:2,自引:0,他引:2  
We propose an H approach to a remote control problem where the communication is constrained due to the use of a shared channel. The controller employs a periodic time sequencing scheme for message transmissions from multiple sensors and to multiple actuators of the system. It further takes into account the information on the random message losses that occur in the channel. An exact characterization for controller synthesis is obtained and is stated in terms of linear matrix inequalities. Furthermore, an analysis on the loss probabilities of the messages to accomplish stabilization is carried out. The results are illustrated through a numerical example.  相似文献   
935.
In this paper we consider a numerical approximation of solution of nonhomogeneous backward heat conduction problem (BHCP) in bounded region based on Tikhonov regularization method. Error estimate at t=0t=0 for this method is provided. According to the error estimate, a selection of regularization parameter is given. Meanwhile, a numerical implementation is described and the numerical results show that our algorithm is effective.  相似文献   
936.
We address concerns about the sustainability of the open source content model by examining the effect of external appropriation, whereby the product of open source contributors’ efforts is monetized by a party that did not contribute to the project, on intended effort withdrawal (reduction in contribution level). We examine both the personality of contributors and their contextual motivations to contribute, using a scenario-based survey of Wikipedia contributors. The findings suggest that perceived justice of the open source license terms, and intrinsic motivations are both negatively related with effort withdrawal intentions. Moreover, we find that the effect of the fairness personality trait on effort withdrawal is stronger for individuals who are low in perceived justice and weaker for individuals high in justice. The findings of factors predicting effort withdrawal contribute to the open source literature, which tends to focus on contribution and motivations, but not on what impacts changes in individual contribution levels.  相似文献   
937.
In this paper, by using the concept of (A,η)-accretive mappings and the new resolvent operator technique associated with (A,η)-accretive mappings, we introduce and study a system of general mixed quasivariational inclusions involving (A,η)-accretive mappings in Banach spaces, and construct a new perturbed iterative algorithm with mixed errors for this system of nonlinear (A,η)-accretive variational inclusions in q-uniformly smooth Banach spaces. Our results improve and generalize the corresponding results of recent works.  相似文献   
938.
在工业发展过程中,环境保护已经变得越来越重要。该文在介绍Zigbee基本特点的基础上,把新一代的无线通信Zigbee技术应用在了工业污水监控领域中。  相似文献   
939.
在新军事变革中,军队的武器装备、作战方式等许多方面都发生了重大变化,在军事训练方面就要适应这种变化。将开源软件应用于军事训练是一种高效、节省的好方法。  相似文献   
940.
本文在分析5阶锁相环基本原理和线性化数学模型的基础上,给出了一种实用的4阶环路滤波器的设计方法,用Matlab编程计算锁相环的参数;用ADS工具对系统性能进行仿真,仿真结果与预期结果相吻合;比较了具有相同环路带宽和相位裕度下的高阶锁相环的杂散性能。这对5阶电荷泵锁相环的系统设计和仿真有一定的指导意义。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号