首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15251篇
  免费   947篇
  国内免费   596篇
电工技术   731篇
综合类   833篇
化学工业   3177篇
金属工艺   2303篇
机械仪表   924篇
建筑科学   342篇
矿业工程   531篇
能源动力   1192篇
轻工业   505篇
水利工程   92篇
石油天然气   2552篇
武器工业   65篇
无线电   675篇
一般工业技术   776篇
冶金工业   1180篇
原子能技术   235篇
自动化技术   681篇
  2024年   46篇
  2023年   170篇
  2022年   302篇
  2021年   449篇
  2020年   415篇
  2019年   321篇
  2018年   254篇
  2017年   373篇
  2016年   456篇
  2015年   423篇
  2014年   798篇
  2013年   871篇
  2012年   1085篇
  2011年   1133篇
  2010年   845篇
  2009年   863篇
  2008年   837篇
  2007年   1017篇
  2006年   991篇
  2005年   857篇
  2004年   721篇
  2003年   656篇
  2002年   571篇
  2001年   527篇
  2000年   380篇
  1999年   324篇
  1998年   238篇
  1997年   218篇
  1996年   198篇
  1995年   125篇
  1994年   103篇
  1993年   60篇
  1992年   40篇
  1991年   25篇
  1990年   30篇
  1989年   19篇
  1988年   18篇
  1987年   8篇
  1986年   7篇
  1985年   7篇
  1984年   2篇
  1983年   3篇
  1982年   1篇
  1981年   3篇
  1980年   2篇
  1975年   1篇
  1959年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
燃油供给系统是柴油机最重要的子系统之一,它的性能的好坏直接影响到混合气的形成过程和发动机的动力性、起动性、噪声及环境污染等性能。柴油机喷油正时与否直接决定供油系统能否正常工作,针对柴油机在不同喷油状态下的压力波动变化,采用外卡测量并对压力信号进行预处理和二次处理,从中提取诊断特征值,从而给出不同工况的诊断结果,由于油压波形信号重复性较好,各缸同一工作段的某些幅域参数变化不大,因此,幅域参数作为诊断供油系统喷油状态的方法是可行的、有效的。  相似文献   
72.
提出了一种基于依赖注入和控制反转提高移动终端应用移植性和重用性的解决方案,并在Spring框架上实现了手机拍照应用在不同平台间的移植.结果表明该方案取得了较好的效果,提高了移动终端应用软件的移植性和重用性.  相似文献   
73.
设计了一套用于分层注汽实验的智能化测控系统.主要介绍了该系统的结构组成、功能以及技术指标;系统以计算机技术、现代传感器技术、自动控制技术为基础,能够对实验过程中16路模拟信号(包括压力、温度、液位、流量等)、32路开关信号进实时采集监测,能够自动控制各设备的运行状态,实现实验流程的自动切换,能够满足分层注汽、井下工具密封性检测以及热采工具的高温高压性能检测等实验要求;在系统中建立实时数据库和历史数据库,对采集的数据、键人的命令等进行管理和相关分析,提供多方面的数据参考依据;另外,为保证系统运行稳定、可靠,采取了多项提高可靠性的措施,包括选用高可靠性工控机和专门设备,设计备用手动操作器和现场显示单元.  相似文献   
74.
针对注射过程具有重复运行和非线性的特性,在对预测控制与迭代学习控制进行综合应用并加以改进的基础上,给出一种模型预测迭代学习复合控制新算法,研究了控制器的设计方案.同时,将迭代学习思想引入到预测步长的在线调整,提出了预测步长的迭代学习方法.仿真结果表明,该方法是有效的,其控制性能优于PID迭代学习控制系统.  相似文献   
75.
Mutation testing has traditionally been used as a defect injection technique to assess the effectiveness of a test suite as represented by a “mutation score.” Recently, mutation testing tools have become more efficient, and industrial usage of mutation analysis is experiencing growth. Mutation analysis entails adding or modifying test cases until the test suite is sufficient to detect as many mutants as possible and the mutation score is satisfactory. The augmented test suite resulting from mutation analysis may reveal latent faults and provides a stronger test suite to detect future errors which might be injected. Software engineers often look for guidance on how to augment their test suite using information provided by line and/or branch coverage tools. As the use of mutation analysis grows, software engineers will want to know how the emerging technique compares with and/or complements coverage analysis for guiding the augmentation of an automated test suite. Additionally, software engineers can benefit from an enhanced understanding of efficient mutation analysis techniques. To address these needs for additional information about mutation analysis, we conducted an empirical study of the use of mutation analysis on two open source projects. Our results indicate that a focused effort on increasing mutation score leads to a corresponding increase in line and branch coverage to the point that line coverage, branch coverage and mutation score reach a maximum but leave some types of code structures uncovered. Mutation analysis guides the creation of additional “common programmer error” tests beyond those written to increase line and branch coverage. We also found that 74% of our chosen set of mutation operators is useful, on average, for producing new tests. The remaining 26% of mutation operators did not produce new test cases because their mutants were immediately detected by the initial test suite, indirectly detected by test suites we added to detect other mutants, or were not able to be detected by any test.
Laurie WilliamsEmail:

Ben Smith   is a second year Ph.D. student in Computer Science at North Carolina State University working as an RA under Dr. Laurie Williams. He received his Bachelor’s degree in Computer Science in May of 2007 and he hopes to receive his doctorate in 2012. He has begun work on developing SQL Coverage Metrics as a predictive measure of the security of a web application. This fall, he will be beginning the doctoral preliminary exam and working as a Testing Manager for the NCSU CSC Senior Design Center: North Carolina State’s capstone course for Computer Science. Finally, he has designed and maintained the websites for the Center for Open Software Engineering and ESEM 2009. Laurie Williams   is an Associate Professor in the Computer Science Department of the College of Engineering at North Carolina State University. She leads the Software Engineering Reasearch group and is also the Director of the North Carolina State University Laboratory for Collaborative System Development and the Center for Open Software Engineering. She is also technical co-director of the Center for Open Software Engineering (COSE) and the area technical director of the Secure Open Systems Initiative (SOSI) at North Carolina State University. Laurie received her Ph.D. in Computer Science from the University of Utah, her MBA from Duke University, and her BS in Industrial Engineering from Lehigh University. She worked for IBM for nine years in Raleigh, NC before returning to academia. Laurie’s research interests include agile software development methodologies and practices, collaborative/pair programming, software reliability and testing, and software engineering for secure systems development.   相似文献   
76.
This paper is concerned with the reliable operation of cyber-physical systems under false data injection attacks. First of all, a robust adaptive sliding mode observer is designed to estimate the state of the power system; different from the traditional sliding mode observer, the observer we designed is not only robust to state errors but also can automatically adjust the parameter of attack identification. Secondly, a method of attack reconstruction has been given to estimate the actual attack signal. Finally, a reliable sliding mode control strategy is proposed to eliminate the impact of false data injection attacks; compared with the existing results, the designed defense strategy utilizes the reconstructed attack signal in the attack identification scheme and state error signal at the same time. Moreover, a power system with 3 generator buses and 6 load buses is taken as an simulation example to verify the availability of the proposed control strategy.  相似文献   
77.
基于Ⅳ-Ⅵ族化合物的胶体量子点具有易于合成、带隙可调等优点,被认为是一种非常有前途的窄带隙光伏材料。近年来,利用Ⅳ-Ⅵ族化合物制作的胶体量子点太阳电池最高转换效率已经突破10%。介绍了胶体量子点的合成方法、基本结构及其光电特性;着重分析了国内外关于肖特基和异质结胶体量子点太阳电池的研究现状,指出了目前该领域研究中存在的问题和发展趋势,并分析了未来需要重点解决的关键问题。  相似文献   
78.
为保证电镀塑料制品的质量,提出了符合电镀要求的塑料制品设计原则,并且指出在注塑成形时,对塑料经过充分干燥,采用较高的注塑温度,较低的注射压力和较慢的注射速度,是使镀层获得良好结合强度的先决条件。  相似文献   
79.
This paper addresses the problem of wide speed range sensorless control of induction motor.The proposed method is based on model reference adaptive system (MRAS),in which the current model serves as the adjustable model,and a novel hybrid model integrating the modified voltage model (MVM) and high-frequency signal injection method (HFSIM) are established to serve as the reference model.The HFSIM works together with MVM to improve the performance of the rotor speed and rotor flux position estimation at low speed,whereas at high speed,the MVM acts alone.In addition,a rotor resistance online estimation scheme is proposed to update the rotor resistance contained in the adjustable model and to ensure the estimation accuracy further.Experimental results show that the proposed MRAS method is very effective from low to high speed range,including zero speed.  相似文献   
80.
本文以政府部门计算机网络和网站在运行中碰到的安全问题,阐述了如何建设相对安全的网控中心,并对因特网上发布信息的网站所受到的各种攻击作出了说明,以及如何采用各种技术方法和措施填补漏洞、防范攻击,保障网站安全。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号