首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6634篇
  免费   271篇
  国内免费   390篇
电工技术   81篇
技术理论   8篇
综合类   831篇
化学工业   668篇
金属工艺   98篇
机械仪表   192篇
建筑科学   522篇
矿业工程   185篇
能源动力   127篇
轻工业   305篇
水利工程   103篇
石油天然气   66篇
武器工业   1025篇
无线电   633篇
一般工业技术   694篇
冶金工业   567篇
原子能技术   43篇
自动化技术   1147篇
  2024年   18篇
  2023年   60篇
  2022年   96篇
  2021年   124篇
  2020年   125篇
  2019年   100篇
  2018年   86篇
  2017年   332篇
  2016年   351篇
  2015年   341篇
  2014年   457篇
  2013年   359篇
  2012年   312篇
  2011年   521篇
  2010年   397篇
  2009年   448篇
  2008年   341篇
  2007年   435篇
  2006年   413篇
  2005年   316篇
  2004年   249篇
  2003年   255篇
  2002年   201篇
  2001年   175篇
  2000年   164篇
  1999年   126篇
  1998年   72篇
  1997年   60篇
  1996年   50篇
  1995年   33篇
  1994年   47篇
  1993年   23篇
  1992年   20篇
  1991年   14篇
  1990年   23篇
  1989年   21篇
  1988年   10篇
  1987年   5篇
  1986年   12篇
  1985年   6篇
  1984年   7篇
  1982年   5篇
  1970年   5篇
  1966年   6篇
  1965年   5篇
  1964年   9篇
  1963年   5篇
  1961年   5篇
  1960年   5篇
  1955年   6篇
排序方式: 共有7295条查询结果,搜索用时 0 毫秒
61.
现有的大多数本体都是通过手工构建的。本体的构建是一项费时费力的过程,特别在医学领域更是如此。对此,提出了基于中文分词和文本挖掘技术的自动领域本体构建方法,该方法能大大提高本体构建的效率,保证本体的构建质量。  相似文献   
62.
In an organization operating in the bancassurance sector we identified a low-risk IT subportfolio of 84 IT projects comprising together 16,500 function points, each project varying in size and duration, for which we were able to quantify its requirements volatility. This representative portfolio stems from a much larger portfolio of IT projects. We calculated the volatility from the function point countings that were available to us. These figures were aggregated into a requirements volatility benchmark. We found that maximum requirements volatility rates depend on size and duration, which refutes currently known industrial averages. For instance, a monthly growth rate of 5% is considered a critical failure factor, but in our low-risk portfolio we found more than 21% of successful projects with a volatility larger than 5%. We proposed a mathematical model taking size and duration into account that provides a maximum healthy volatility rate that is more in line with the reality of low-risk IT portfolios. Based on the model, we proposed a tolerance factor expressing the maximal volatility tolerance for a project or portfolio. For a low-risk portfolio its empirically found tolerance is apparently acceptable, and values exceeding this tolerance are used to trigger IT decision makers. We derived two volatility ratios from this model, the π-ratio and the ρ-ratio. These ratios express how close the volatility of a project has approached the danger zone when requirements volatility reaches a critical failure rate. The volatility data of a governmental IT portfolio were juxtaposed to our bancassurance benchmark, immediately exposing a problematic project, which was corroborated by its actual failure. When function points are less common, e.g. in the embedded industry, we used daily source code size measures and illustrated how to govern the volatility of a software product line of a hardware manufacturer. With the three real-world portfolios we illustrated that our results serve the purpose of an early warning system for projects that are bound to fail due to excessive volatility. Moreover, we developed essential requirements volatility metrics that belong on an IT governance dashboard and presented such a volatility dashboard.  相似文献   
63.
A multi-objective controller synthesis problem is considered in which an output is to be regulated approximately by assuring a bound on the steady-state peak amplification in response to an infinite-energy disturbance, while also guaranteeing a desired level of performance measured in terms of the worst-case energy gain from a finite-energy input to a performance output. Relying on a characterization of the controllers with which almost asymptotic regulation is accomplished, the problem of guaranteeing the desired level of performance is reduced to solving a system of linear matrix inequalities subject to a set of linear equality constraints. Based on the solution of this system, a procedure is outlined for the construction of a suitable controller whose order is equal to the order of the plant plus the order of the exogenous system.  相似文献   
64.
control with limited communication and message losses   总被引:2,自引:0,他引:2  
We propose an H approach to a remote control problem where the communication is constrained due to the use of a shared channel. The controller employs a periodic time sequencing scheme for message transmissions from multiple sensors and to multiple actuators of the system. It further takes into account the information on the random message losses that occur in the channel. An exact characterization for controller synthesis is obtained and is stated in terms of linear matrix inequalities. Furthermore, an analysis on the loss probabilities of the messages to accomplish stabilization is carried out. The results are illustrated through a numerical example.  相似文献   
65.
探讨了在C语言程序设计教学过程中为学生建立相应的思维模式的方法问题。针对非计算机专业学生基础差、专业性不强的特点,结合当前DIY的潮流,分析了C语言的基本结构,分析了RPGMaker中提供的技术可行性,提出通过促进学生使用RPG-Maker软件来制作游戏以建立相应的程序设计思维模式的方法,并提出具体案例供参考。实践表明,学生的程序设计思维能较快速、熟练地建立起来。  相似文献   
66.
Strategic reasoning about business models is an integral part of service design. In fast moving markets, businesses must be able to recognize and respond strategically to disruptive change. They have to answer questions such as: what are the threats and opportunities in emerging technologies and innovations? How should they target customer groups? Who are their real competitors? How will competitive battles take shape? In this paper we define a strategic modeling framework to help understand and analyze the goals, intentions, roles, and the rationale behind the strategic actions in a business environment. This understanding is necessary in order to improve existing or design new services. The key component of the framework is a strategic business model ontology for representing and analyzing business models and strategies, using the i* agent and goal oriented methodology as a basis. The ontology introduces a strategy layer which reasons about alternative strategies that are realized in the operational layer. The framework is evaluated using a retroactive example of disruptive technology in the telecommunication services sector from the literature.  相似文献   
67.
浅析计算机专业少数民族班级的教学方法   总被引:1,自引:0,他引:1  
本文针对西部地区高校中,计算机专业的少数民族班学生学习的现状,分析了教学方法中存在的一些问题及其原因,提出了几点建议。以期对其他同类地方学校的教学起借鉴作用。  相似文献   
68.
信息与计算科学专业实践教学体系的探索与优化   总被引:1,自引:0,他引:1  
方贤文  殷志祥  李勇 《计算机教育》2009,(17):135-136,114
信息与计算科学专业是联系数学与信息科学的一门新兴专业,目前很多学校开设了这个专业,很多学校已具有较完善的理论课程,但实践教学体系尚不完善,对学生的创新能力培养非常不利。我们经过多年的积淀,并结合专业培养目标,对信息与计算科学专业的实践教学体系进行探索与优化。  相似文献   
69.
文章通过对信息与计算科学专业与计算机科学专业进行比较分析,提出了信息与计算科学专业的改革思想与培养方案,制定相应的理论教学课程体系和实践教学体系。本文的研究成果,将对一般高等院校信息与计算科学专业建设及其课程建设,具有一定的指导意义。  相似文献   
70.
李有行先生是我国著名的色彩教育家,国家二级教授,四川美术学院创办人,第一任校长。他开创的独特的色彩艺术教学体系在二十世纪六七八十年代中国各艺术院校中享有盛誉,被当时赞喻为"北有雷圭元,南当李有行"。他把早年留学法国学习绘画艺术的丰富经验与中国传统绘画艺术相融合,针对培养设计师为目标,创造了著名的李氏色彩教学体系。即从学习"图案艺术"到"绘画写生"再到"归纳色彩写生"完备的训练程序。在应用、设计学科内有效地制定了一整套以培养设计师为目标的"设计色彩"法,即作为艺术家和设计师双重身份的培养目标。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号