首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   953篇
  免费   61篇
  国内免费   1篇
工业技术   1015篇
  2024年   2篇
  2023年   12篇
  2022年   8篇
  2021年   62篇
  2020年   28篇
  2019年   24篇
  2018年   33篇
  2017年   23篇
  2016年   53篇
  2015年   32篇
  2014年   51篇
  2013年   76篇
  2012年   63篇
  2011年   82篇
  2010年   42篇
  2009年   52篇
  2008年   31篇
  2007年   47篇
  2006年   37篇
  2005年   29篇
  2004年   26篇
  2003年   19篇
  2002年   21篇
  2001年   15篇
  2000年   14篇
  1999年   8篇
  1998年   22篇
  1997年   9篇
  1996年   10篇
  1995年   7篇
  1994年   10篇
  1993年   7篇
  1992年   4篇
  1991年   3篇
  1990年   3篇
  1989年   4篇
  1988年   2篇
  1987年   5篇
  1985年   5篇
  1984年   4篇
  1983年   2篇
  1982年   4篇
  1981年   2篇
  1980年   4篇
  1979年   2篇
  1978年   5篇
  1977年   2篇
  1976年   2篇
  1965年   1篇
  1954年   1篇
排序方式: 共有1015条查询结果,搜索用时 578 毫秒
31.
32.
Structural code coverage criteria have been studied since the early seventies, and now they are well supported by commercial and open-source tools and are commonly embedded in several advanced industrial processes. Most industrial applications still refer to simple criteria, like statement and branch coverage, and consider complex criteria, like modified condition decision coverage, only rarely and often driven by the requirements of certification agencies. The industrial value of structural criteria is limited by the difficulty of achieving high coverage, due to both the complexity of deriving test cases that execute specific uncovered elements and the presence of many infeasible elements in the code. In this paper, we propose a technique that both generates test cases that execute yet uncovered branches and identifies infeasible branches that can be eliminated from the computation of the branch coverage. In this way, we can increase branch coverage to closely approximate full coverage, thus improving its industrial value. The algorithm combines symbolic analysis, abstraction refinement, and a novel technique named coarsening, to execute unexplored branches, identify infeasible ones, and mitigate the state space explosion problem. In the paper, we present the technique and illustrate its effectiveness through a set of experimental results obtained with a prototype implementation.  相似文献   
33.
The paper discusses the redesign of the second version of the Mantis hybrid leg-wheel mobile robot, conceived for surveillance and inspection tasks in unstructured indoor and outdoor environments. This small-scale ground mobile robot is characterized by a main body equipped with two front actuated wheels, a passive rear axle and two rotating legs. Motion on flat and even ground is purely wheeled in order to obtain high speed, high energetic efficiency and stable camera vision; only in case of obstacles or ground irregularities the front legs realize a mixed leg-wheel locomotion to increase the robot climbing ability; in particular, the outer profile of the legs, inspired by the praying mantis, is specially designed to climb square steps. The multibody simulations and the experimental tests on the first prototype have shown the effectiveness of the mixed leg-wheel locomotion not only for step climbing, but also on uneven and yielding terrains. Nevertheless, extensive experimental tests have shown that the front wheels may slip in the last phase of step climbing in case of contact with some materials. In order to overcome this problem, the leg design has been modified with the introduction of auxiliary passive wheels, which reduce friction between legs and step upper surface; these wheels are connected to the legs by one-way bearings, in order to rotate only when they are pulled by the front wheels, and remaining locked when they have to push forward the robot. The influence of the auxiliary wheels on the front wheels slippage is investigated by means of theoretical analysis and multibody simulations.  相似文献   
34.
Wireless technologies, under the “Anywhere, Anytime” paradigm, offer users the promise of being always attached to the network. Mobile devices enabled with multiple wireless technologies make possible to maintain seamless connectivity in highly dynamic scenarios such as vehicular networks (VNs), switching from one wireless network to another by using vertical handover techniques (VHO). In this paper we present an overview of VHO techniques, along with the main algorithms, protocols and tools proposed in the literature. In addition we suggest the most appropriate VHO techniques to efficiently communicate in VN environments considering the particular characteristics of this type of networks.  相似文献   
35.
Eye movement is the simplest and repetitive movement that enables humans to interact with the environment. The common daily activities, such as reading a book or watching television, involve this natural activity, which consists of rapidly shifting our gaze from one region to another. In clinical application, the identification of the main components of eye movement during visual exploration, such as fixations and saccades, is the objective of the analysis of eye movements: however, in patients affected by motor control disorder the identification of fixation is not banal. This work presents a new fixation identification algorithm based on the analysis of variance and covariance: the main idea was to use bivariate statistical analysis to compare variance over x and y to identify fixation. We describe the new algorithm, and we compare it with the common fixations algorithm based on dispersion. To demonstrate the performance of our approach, we tested the algorithm in a group of healthy subjects and patients affected by motor control disorder.  相似文献   
36.
We define methods for generating execution sequences for time-critical systems based on their modularized formal specification. An execution sequence represents a behavior of a time critical system and can be used, before the final system is built, to validate the system specification against the user requirements (specification validation) and, after the final system is built, to verify whether the implementation satisfies the specification (functional testing). Our techniques generate execution sequences in the large, in that we focus on the connections among the abstract interfaces of the modules composing a modular specification. Execution sequences in the large are obtained by composing execution sequences in the small for the individual modules. We abstract from the specification languages used for the individual modules of the system, so our techniques can also be used when the modules composing the system are specified with different formalisms. We consider the cases in which connections give rise to either circular or noncircular dependencies among specification modules. We show that execution sequence generation can be carried out successfully under rather broad conditions and we define procedures for efficient construction of execution sequences. These procedures can be taken as the basis for the implementation of (semi)automated tools that provide substantial support to the activity of specification validation and functional testing for industrially-sized time critical systems  相似文献   
37.
An effective means for analyzing and reasoning on software systems is to use formal specifications to simulate their execution. The simulation traces can be used for specification testing and reused for functional testing of the system later in the development process. It is widely acknowledged that, to deal with the complexity of industrial-size systems, specifications must be structured into modules providing abstraction mechanisms and clear interfaces. In our past work, we defined and implemented a method for simulating specifications written in the TRIO temporal logic language, and applied it to functional testing of time-critical industrial systems. In the present paper, we report on a case study with a tool that analyzes TRIO specifications by taking advantage of their modular structure, so as to overcome the well-known state-explosion problem and make the proposed method really scalable. We discuss the fundamental operations and the algorithms on which the tool is based. Then, we illustrate its use in a realistic case study, inspired from an industrial application. Finally, we comment on the overall results in terms of usability of the tool and effectiveness of the approach, and we outline future improvements.  相似文献   
38.
The physical properties of pure and doped (Ni, Os, Pd and Pt) SnO2 thin films, prepared by using a chloride-based inorganic sol–gel route, have been reported. These properties were investigated by using differential scanning calorimetry and thermogravimetric (DSC/TG), FTIR, X-ray photoelectron spectroscopy (XPS), X-ray diffraction (XRD) and atomic force microscopy (AFM) techniques. Microsensors for gas detection were also fabricated and tested in various atmospheres (nitrogen oxide, carbon monoxide, ethanol, methanol and methane). The dopants affected the coating properties depending on the formation of nanoparticles. Furthermore the gas-sensing properties towards reducing and oxidising gases were found to be dependent on the nature of doping element. An array consisting of the manufactured sensors has been arranged and examples of applications for “electronic nose” are given.  相似文献   
39.
The correspondence between Mario Salvadori and Mauro Picone during the years 1934–1972 sheds light on the history of the Italian Institute for the Applications of Calculation. The IAC was a groundbreaking institution for mathematics in Italy, and great attention was given to the new means of mechanical calculation, first analogue, then electronic. It was in relationship to this that Mario Salvadori consulted with his former professor. The correspondence allows us to see also how that relationship changed from one of student-teacher to one of fellowship between professionals.
The books and individuals from whom I have learned what I know of numeric calculus are too numerous to list here, but I wish to express now my gratitude to Prof. Mauro Picone, director of the Istituto Nazionale per le Applicazioni del Calcolo (the Italian laboratory for applied mathematics which will house the International Center of Mechanical Calculus, recently founded), who was the first to teach me to love numbers while I was his student at the University of Rome some 20 years ago. M. Salvadori, Preface to Numerical Methods in Engineering, New York, Prentice-Hall, 1952
  相似文献   
40.
In this paper, various mechanisms suggested to cause autogenous shrinkage are presented. The mechanisms are evaluated from the point of view of their soundness and applicability to quantitative modeling of autogenous shrinkage. The capillary tension approach is advantageous, because it has a sound mechanical and thermodynamical basis. Furthermore, this mechanism is easily applicable in a numerical model when dealing with a continuously changing microstructure. In order to test the numerical model, autogenous deformation and internal relative humidity (RH) of a Portland cement paste were measured during the first week of hardening. The isothermal heat evolution was also recorded to monitor the progress of hydration and the elastic modulus in compression was measured. RH change, degree of hydration and elastic modulus were used as input data for the calculation of autogenous deformation based on the capillary tension approach. Because a part of the RH drop in the cement paste is due to dissolved salts in the pore solution, a method is suggested to separate this effect from self-desiccation and to calculate the actual stress in the pore fluid associated with menisci formation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号