首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15357篇
  免费   1038篇
  国内免费   601篇
电工技术   729篇
综合类   831篇
化学工业   3194篇
金属工艺   2085篇
机械仪表   807篇
建筑科学   332篇
矿业工程   528篇
能源动力   1188篇
轻工业   1191篇
水利工程   93篇
石油天然气   2564篇
武器工业   65篇
无线电   668篇
一般工业技术   779篇
冶金工业   1051篇
原子能技术   234篇
自动化技术   657篇
  2024年   57篇
  2023年   205篇
  2022年   339篇
  2021年   492篇
  2020年   450篇
  2019年   365篇
  2018年   281篇
  2017年   407篇
  2016年   507篇
  2015年   459篇
  2014年   840篇
  2013年   878篇
  2012年   1118篇
  2011年   1139篇
  2010年   849篇
  2009年   874篇
  2008年   832篇
  2007年   971篇
  2006年   955篇
  2005年   842篇
  2004年   692篇
  2003年   612篇
  2002年   551篇
  2001年   512篇
  2000年   368篇
  1999年   316篇
  1998年   221篇
  1997年   202篇
  1996年   181篇
  1995年   123篇
  1994年   101篇
  1993年   64篇
  1992年   48篇
  1991年   29篇
  1990年   30篇
  1989年   23篇
  1988年   17篇
  1987年   8篇
  1986年   9篇
  1985年   8篇
  1984年   2篇
  1983年   3篇
  1982年   1篇
  1981年   6篇
  1980年   4篇
  1978年   2篇
  1977年   1篇
  1975年   1篇
  1959年   1篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
191.
针对注射过程具有重复运行和非线性的特性,在对预测控制与迭代学习控制进行综合应用并加以改进的基础上,给出一种模型预测迭代学习复合控制新算法,研究了控制器的设计方案.同时,将迭代学习思想引入到预测步长的在线调整,提出了预测步长的迭代学习方法.仿真结果表明,该方法是有效的,其控制性能优于PID迭代学习控制系统.  相似文献   
192.
Mutation testing has traditionally been used as a defect injection technique to assess the effectiveness of a test suite as represented by a “mutation score.” Recently, mutation testing tools have become more efficient, and industrial usage of mutation analysis is experiencing growth. Mutation analysis entails adding or modifying test cases until the test suite is sufficient to detect as many mutants as possible and the mutation score is satisfactory. The augmented test suite resulting from mutation analysis may reveal latent faults and provides a stronger test suite to detect future errors which might be injected. Software engineers often look for guidance on how to augment their test suite using information provided by line and/or branch coverage tools. As the use of mutation analysis grows, software engineers will want to know how the emerging technique compares with and/or complements coverage analysis for guiding the augmentation of an automated test suite. Additionally, software engineers can benefit from an enhanced understanding of efficient mutation analysis techniques. To address these needs for additional information about mutation analysis, we conducted an empirical study of the use of mutation analysis on two open source projects. Our results indicate that a focused effort on increasing mutation score leads to a corresponding increase in line and branch coverage to the point that line coverage, branch coverage and mutation score reach a maximum but leave some types of code structures uncovered. Mutation analysis guides the creation of additional “common programmer error” tests beyond those written to increase line and branch coverage. We also found that 74% of our chosen set of mutation operators is useful, on average, for producing new tests. The remaining 26% of mutation operators did not produce new test cases because their mutants were immediately detected by the initial test suite, indirectly detected by test suites we added to detect other mutants, or were not able to be detected by any test.
Laurie WilliamsEmail:

Ben Smith   is a second year Ph.D. student in Computer Science at North Carolina State University working as an RA under Dr. Laurie Williams. He received his Bachelor’s degree in Computer Science in May of 2007 and he hopes to receive his doctorate in 2012. He has begun work on developing SQL Coverage Metrics as a predictive measure of the security of a web application. This fall, he will be beginning the doctoral preliminary exam and working as a Testing Manager for the NCSU CSC Senior Design Center: North Carolina State’s capstone course for Computer Science. Finally, he has designed and maintained the websites for the Center for Open Software Engineering and ESEM 2009. Laurie Williams   is an Associate Professor in the Computer Science Department of the College of Engineering at North Carolina State University. She leads the Software Engineering Reasearch group and is also the Director of the North Carolina State University Laboratory for Collaborative System Development and the Center for Open Software Engineering. She is also technical co-director of the Center for Open Software Engineering (COSE) and the area technical director of the Secure Open Systems Initiative (SOSI) at North Carolina State University. Laurie received her Ph.D. in Computer Science from the University of Utah, her MBA from Duke University, and her BS in Industrial Engineering from Lehigh University. She worked for IBM for nine years in Raleigh, NC before returning to academia. Laurie’s research interests include agile software development methodologies and practices, collaborative/pair programming, software reliability and testing, and software engineering for secure systems development.   相似文献   
193.
芯片是现代信息技术的核心和基础,芯片的功能安全在确保电子技术的可靠性方面发挥着重要作用。本研究以CAN通信芯片为对象,提出了一种基于电压故障注入的芯片功能安全评估方法。通过基于原型系统的自动化硬件故障注入测试,并结合自动触发信号与控制模块的设计,完善了目前CAN芯片安全性测试技术和功能实现上的不足。另外,基于该CAN芯片测试结果,提出了芯片对故障因素敏感的功能安全评估依据。结果表明,该电路通信芯片的某些管脚对标准工作电压范围下输入电压的幅值、脉宽和延迟毛刺较敏感。测试电路系统能够自动实现1.5~5.5 V大范围工作电压下的随机错误注入,以及错误要素敏感度分析,为提高通信芯片安全性提供更高效的评估依据。  相似文献   
194.
This paper is concerned with the reliable operation of cyber-physical systems under false data injection attacks. First of all, a robust adaptive sliding mode observer is designed to estimate the state of the power system; different from the traditional sliding mode observer, the observer we designed is not only robust to state errors but also can automatically adjust the parameter of attack identification. Secondly, a method of attack reconstruction has been given to estimate the actual attack signal. Finally, a reliable sliding mode control strategy is proposed to eliminate the impact of false data injection attacks; compared with the existing results, the designed defense strategy utilizes the reconstructed attack signal in the attack identification scheme and state error signal at the same time. Moreover, a power system with 3 generator buses and 6 load buses is taken as an simulation example to verify the availability of the proposed control strategy.  相似文献   
195.
196.
基于Ⅳ-Ⅵ族化合物的胶体量子点具有易于合成、带隙可调等优点,被认为是一种非常有前途的窄带隙光伏材料。近年来,利用Ⅳ-Ⅵ族化合物制作的胶体量子点太阳电池最高转换效率已经突破10%。介绍了胶体量子点的合成方法、基本结构及其光电特性;着重分析了国内外关于肖特基和异质结胶体量子点太阳电池的研究现状,指出了目前该领域研究中存在的问题和发展趋势,并分析了未来需要重点解决的关键问题。  相似文献   
197.
为保证电镀塑料制品的质量,提出了符合电镀要求的塑料制品设计原则,并且指出在注塑成形时,对塑料经过充分干燥,采用较高的注塑温度,较低的注射压力和较慢的注射速度,是使镀层获得良好结合强度的先决条件。  相似文献   
198.
This paper addresses the problem of wide speed range sensorless control of induction motor.The proposed method is based on model reference adaptive system (MRAS),in which the current model serves as the adjustable model,and a novel hybrid model integrating the modified voltage model (MVM) and high-frequency signal injection method (HFSIM) are established to serve as the reference model.The HFSIM works together with MVM to improve the performance of the rotor speed and rotor flux position estimation at low speed,whereas at high speed,the MVM acts alone.In addition,a rotor resistance online estimation scheme is proposed to update the rotor resistance contained in the adjustable model and to ensure the estimation accuracy further.Experimental results show that the proposed MRAS method is very effective from low to high speed range,including zero speed.  相似文献   
199.
当前全球进入网络信息一体化时代,网络信息安全问题应运而生。从列举日趋高发的SQL注入攻击事件入手,阐述了SQL注入攻击概念、特点,然后通过一个实例讲解了攻击的一般过程,最后按照从程序开发到应用这个顺序,提出了We b应用程序防御SQL注入攻击的全过程安全策略。  相似文献   
200.
本文以政府部门计算机网络和网站在运行中碰到的安全问题,阐述了如何建设相对安全的网控中心,并对因特网上发布信息的网站所受到的各种攻击作出了说明,以及如何采用各种技术方法和措施填补漏洞、防范攻击,保障网站安全。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号