首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   54779篇
  免费   5033篇
  国内免费   2528篇
电工技术   3495篇
技术理论   4篇
综合类   6325篇
化学工业   4407篇
金属工艺   1152篇
机械仪表   2490篇
建筑科学   6229篇
矿业工程   2266篇
能源动力   1386篇
轻工业   5841篇
水利工程   2313篇
石油天然气   4466篇
武器工业   918篇
无线电   3166篇
一般工业技术   5136篇
冶金工业   2043篇
原子能技术   409篇
自动化技术   10294篇
  2024年   287篇
  2023年   776篇
  2022年   1363篇
  2021年   1667篇
  2020年   1818篇
  2019年   1559篇
  2018年   1512篇
  2017年   1690篇
  2016年   2055篇
  2015年   2123篇
  2014年   3627篇
  2013年   3336篇
  2012年   4165篇
  2011年   4473篇
  2010年   3283篇
  2009年   3378篇
  2008年   2966篇
  2007年   3575篇
  2006年   3085篇
  2005年   2686篇
  2004年   2216篇
  2003年   1885篇
  2002年   1447篇
  2001年   1212篇
  2000年   956篇
  1999年   857篇
  1998年   668篇
  1997年   606篇
  1996年   475篇
  1995年   433篇
  1994年   320篇
  1993年   263篇
  1992年   181篇
  1991年   157篇
  1990年   126篇
  1989年   151篇
  1988年   109篇
  1987年   74篇
  1986年   70篇
  1985年   79篇
  1984年   99篇
  1983年   116篇
  1982年   105篇
  1981年   42篇
  1980年   34篇
  1979年   31篇
  1978年   28篇
  1977年   25篇
  1959年   12篇
  1955年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
张丽霞  梁华坤  傅熠  宋鸿陟 《计算机教育》2010,(14):136-140,158
文章综述用户模型法、用户调查法、专家评审法和观察法4类可用性测试方法,根据可用性测试的经验,总结出一套合理实用的可用性测试过程,使得可用性测试的效率高、代价低,尽可能发现更多的可用性问题;提出在程序设计类课程的教学中,应适当向学生介绍可用性测试的方法和过程,以培养学生对自己开发的软件系统进行可用性测试的能力。  相似文献   
72.
以微型计算机原理及应用课程网络教学改革为例,详细介绍一种基于网络资源利用的主题协作学习的模式,并提出网络环境下学生学习态度、网络教学环境、教师指导和自我评价表质量等建议。  相似文献   
73.
工业设计是科学和艺术的综合体,创新思维在工业设计中具有十分重要的作用。它不仅决定了产品的外观,甚至还影响着产品的制造和使用过程。我国著名教育家陶行知先生认为,"处处是创造之地""天天是创造之时""人人是创造之人"。中国是制造大国,却不是设计大国。中国设计的原创性产品很少,中国的创新能力也亟待加强。但是随着科技的进步,中国的设计能力也在突飞猛进地发展。可以相信,未来的中国一定会成为一个设计大国。  相似文献   
74.
A simple mathematical model of laser drilling is proposed. Assuming axi-symmetry of the process around the axis of the laser beam, a one-dimensional formulation is obtained after cross-sectional averaging. The novelty of the approach relies on the fact that even after dimension reduction, the shape of the hole can still be described. The model is derived, implemented and validated for drilling using lasers with intensities in the GW/cm2 range and microsecond pulses.  相似文献   
75.
76.
Yang et al. [J.P. Yang, S.H. Cheng, Q. Wu, Recursive equations for compound distribution with the severity distribution of the mixed type, Science in China Series A 48 (2005) 594-609] investigated a recursive procedure for a kind of compound distributions with the number of claims belonging to (a,b)-family and the severity distribution of the mixed type. In this paper, we extend their results by assuming that the claim number belongs to a larger class. As applications, the excess-of-loss reinsurance treaty is discussed and concrete examples are considered in some detail.  相似文献   
77.

Context

In recent years, many usability evaluation methods (UEMs) have been employed to evaluate Web applications. However, many of these applications still do not meet most customers’ usability expectations and many companies have folded as a result of not considering Web usability issues. No studies currently exist with regard to either the use of usability evaluation methods for the Web or the benefits they bring.

Objective

The objective of this paper is to summarize the current knowledge that is available as regards the usability evaluation methods (UEMs) that have been employed to evaluate Web applications over the last 14 years.

Method

A systematic mapping study was performed to assess the UEMs that have been used by researchers to evaluate Web applications and their relation to the Web development process. Systematic mapping studies are useful for categorizing and summarizing the existing information concerning a research question in an unbiased manner.

Results

The results show that around 39% of the papers reviewed reported the use of evaluation methods that had been specifically crafted for the Web. The results also show that the type of method most widely used was that of User Testing. The results identify several research gaps, such as the fact that around 90% of the studies applied evaluations during the implementation phase of the Web application development, which is the most costly phase in which to perform changes. A list of the UEMs that were found is also provided in order to guide novice usability practitioners.

Conclusions

From an initial set of 2703 papers, a total of 206 research papers were selected for the mapping study. The results obtained allowed us to reach conclusions concerning the state-of-the-art of UEMs for evaluating Web applications. This allowed us to identify several research gaps, which subsequently provided us with a framework in which new research activities can be more appropriately positioned, and from which useful information for novice usability practitioners can be extracted.  相似文献   
78.
We consider the XPath evaluation problem: Evaluate an XPath query Q on a streaming XML document D; i.e., determine the set Q(D) of document elements selected by Q. We mainly consider Conjunctive XPath queries that involve only the child and descendant axes. Previously known in-memory algorithms for this problem use O(|D|) space and O(|Q||D|) time. Several previously known algorithms for the streaming version use Ω(dn) space and Ω(dn|D|) time in the worst case; d denotes the depth of D, and n denotes the number of location steps in Q. Their exponential space requirement could well exceed the O(|D|) space used by the in-memory algorithms. We present an efficient algorithm that uses O(d|Q|+nc) space and O((|Q|+dn)|D|) time in the worst case; c denotes the maximum number of elements of D that can be candidates for output, at any one instant. For some worst case Q and D, the memory space used by our algorithm matches our lower bound proved in a different paper; so, our algorithm uses optimal memory space in the worst case.  相似文献   
79.
In this paper we present a word-level model checking method that attempts to speed up safety property checking of industrial netlists. Our aim is to construct an algorithm that allows us to check both bounded and unbounded properties using standard bit-level model checking methods as back-end decision procedures, while incurring minimum runtime penalties for designs that are unsuited to our analysis. We do this by combining modifications of several previously known techniques into a static abstraction algorithm which is guaranteed to produce bit-level netlists that are as small or smaller than the original bitblasted designs. We evaluate our algorithm on several challenging hardware components.  相似文献   
80.
Histogram equalization is an effective technique to boost image quality and contrast enhancement. However, in some cases the increase in image contrast by traditional histogram equalization exceeds the desired amount Which damages the image properties and wanes its natural look. Histogram division and performing a separate equalization for each sub-histogram is one of the presented solutions. The dividing method and determining the number of sub-histograms are the main problems directly affecting the output image quality. In this study, a method is introduced for automatic determination of the number of sub-histograms and density based histogram division leading to appropriate output with no need for parameter setting. Each main peak is in a separate section. Image contrast is increased with no loss of image specifications through determining the number of sub-histograms based on the number of main peaks. The introduced histogram equalization approach consists of three stages. The first stage, using histogram analysis, produces an automated estimate of number of clusters for image brightness levels. The second, clusters the image brightness levels, and using the provided transfer function, the final stage includes contrast enhancement for each individual cluster separately. The results of the proposed approach demonstrate not only clearer details along with a boost in contrast, but also noticeably more natural appearance in the images.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号