首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   85135篇
  免费   972篇
  国内免费   413篇
工业技术   86520篇
  2022年   26篇
  2021年   19篇
  2018年   14468篇
  2017年   13388篇
  2016年   9974篇
  2015年   619篇
  2014年   245篇
  2013年   265篇
  2012年   3163篇
  2011年   9446篇
  2010年   8316篇
  2009年   5610篇
  2008年   6811篇
  2007年   7820篇
  2006年   163篇
  2005年   1252篇
  2004年   1156篇
  2003年   1216篇
  2002年   581篇
  2001年   130篇
  2000年   211篇
  1999年   104篇
  1998年   202篇
  1997年   132篇
  1996年   112篇
  1995年   42篇
  1994年   49篇
  1993年   44篇
  1992年   34篇
  1991年   35篇
  1988年   22篇
  1987年   19篇
  1985年   18篇
  1982年   20篇
  1976年   24篇
  1969年   24篇
  1968年   45篇
  1967年   33篇
  1966年   42篇
  1965年   44篇
  1963年   28篇
  1962年   22篇
  1961年   18篇
  1960年   30篇
  1959年   35篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Mobile software applications have to cope with a particular environment that involves small size, limited resources, high autonomy requirements, competitive business models and many other challenges. To provide development guidelines that respond to these needs, several practices have been introduced; however, it is not clear how these guidelines may contribute to solve the issues present in the mobile domain. Furthermore, the rapid evolution of the mobile ecosystem challenges many of the premises upon which the proposed practices were designed. In this paper, we present a survey of the literature on software assurance practices for mobile applications, with the objective of describing them and assessing their contribution and success. We identified, organized and reviewed a body of research that spans in three levels: software development processes, software product assurance practices, and software implementation practices. By carrying out this literature survey, we reviewed the different approaches that researchers on Software Engineering have provided to address the needs that raise in the mobile software development arena. Moreover, we review the evolution of these practices, identifying how the constant changes and modernization of the mobile execution environment has impacted the methods proposed in the literature. Finally, we introduced discussion on the application of these practices in a real productive setting, opening an area for further research that may determine if practitioners have followed the proposed assurance paradigms.  相似文献   
2.
3.
4.
Variations of Incomplete Open Cubes is the major project by the twentieth-century conceptual artist Sol LeWitt. In this paper we interpret the enumerative component of the project as embeddings of graphs. This formulation permits use of an algorithm to check the completeness of the list of the structures produced by the artist. Our conclusion is that the artist found the correct number of structures (that is, 122), but that his list contains a mistake in the presentation of a pair of incomplete cubes, a discovery that appears not to have been noted before.  相似文献   
5.
Ferrite particles coated with biocompatible phases can be used for hyperthermia treatment of cancer. We have synthesized substituted calcium hexaferrite, which is not stable on its own but is stabilized with small substitution of La. Hexaferrite of chemical composition (CaO)0.75(La203)0.20(Fe2O3)6 was prepared using citrate gel method. Hydroxyapatite was prepared by precipitating it from aqueous solution of Ca(NO3)2 and (NH4)2HPO4 maintaining pH above 11. Four different methods were used for coating of hydroxyapatite on ferrite particles. SEM with EDX and X-ray diffraction analysis shows clear evidence of coating of hydroxyapatite on ferrite particles. These coated ferrite particles exhibited coercive field up to 2 kOe, which could be made useful for hysteresis heating in hyperthermia. Studies by culturing BHK-21 cells and WBC over the samples show evidence of biocompatibility. SEM micrographs and cell counts give clear indication of cell growth on the surface of the sample. Finally coated ferrite particle was implanted in Kasaulli mouse to test its biocompatibility. The magnetic properties and biocompatibility studies show that these hydroxyapatite coated ferrites could be useful for hyperthermia.  相似文献   
6.
Chloride doped polyaniline conducting polymer films have been prepared in a protic acid medium (HCl) by potentiodynamic method in an electrochemical cell and studied by cyclic voltammetry and FTIR techniques. The FTIR spectra confirmed Cl- ion doping in the polymers. The polymerization rate was found to increase with increasing concentration of aniline monomer. But the films obtained at high monomer concentration were rough having a nonuniform flaky polyaniline distribution. Results showed that the polymerization rate did not increase beyond a critical HCl concentration. Cyclic voltammetry suggested that, the oxidation-reduction current increased with an increase in scan rate and that the undoped polyaniline films were not hygroscopic whereas chloride doped polyaniline films were found to be highly hygroscopic.  相似文献   
7.
8.
The ITER magnet system consists of structurally linked sets of toroidal (TF) and poloidal (PF) field coils, central solenoid (CS), and various support structures. The coils are superconducting, force flow Helium cooled with a Kapton-Glass-Epoxy multilayer insulation system. The stored magnetic energy is about 100GJ in the TF system and 20GJ in the PF-CS. Coils and structure are maintained at 4 K by enclosing them in a vacuum cryostat. The cryostat, comprising an outer envelope to the magnets, forms most of the second radioactivity confinement barrier. The inner primary barrier is formed by the vacuum vessel, its ports and their extensions. To keep the machine size within acceptable bounds, it is essential that the magnets are in close proximity to both of the nuclear confinement barriers. The objective of the magnet design is that, although local damage to one of the barriers may occur in very exceptional circumstances, large scale magnet structural or thermal failure leading to simultaneous breaching of both barriers is not credible. Magnet accidents fall into three categories: thermal (which includes arcing arising from insulation failure and local overheating due to discharge failure in the event of a superconductor quench), structural (which includes component mechanical failure arising from material inadequacies, design errors and exceptional force patterns arising from coil shorts or control failures), and fluid (Helium release due to cooling line failure). After a preliminary survey to select initial faults conceivable within the present design, these faults are systematically analyzed to provide an assessment of the damage potential. The results of this damage assessment together with an assessment of the reliability of the monitoring and protective systems, shows that the magnets can operate with the required safety condition.  相似文献   
9.
The purpose of this paper is to evaluate two methods of assessing the productivity and quality impact of Computer Aided Software Engineering (CASE) and Fourth Generation Language (4GL) technologies: (1) by the retrospective method; and (2) the cross-sectional method. Both methods involve the use of questionnaire surveys. Developers' perceptions depend on the context in which they are expressed and this includes expectations about the effectiveness of a given software product. Consequently, it is generally not reliable to base inferences about the relative merits of CASE and 4GLs on a cross-sectional comparison of two separate samples of users. The retrospective method that requires each respondent to directly compare different products is shown to be more reliable. However, there may be scope to employ cross-sectional comparisons of the findings from different samples where both sets of respondents use the same reference point for their judgements, and where numerical rather than verbal rating scales are used to measure perceptions.  相似文献   
10.
Presuppositions of utterances are the pieces of information you convey with an utterance no matter whether your utterance is true or not. We first study presupposition in a very simple framework of updating propositional information, with examples of how presuppositions of complex propositional updates can be calculated. Next we move on to presuppositions and quantification, in the context of a dynamic version of predicate logic, suitably modified to allow for presupposition failure. In both the propositional and the quantificational case, presupposition failure can be viewed as error abortion of procedures. Thus, a dynamic assertion logic which describes the preconditions for error abortion is the suitable tool for analysing presupposition.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号