首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   349篇
  免费   19篇
  国内免费   5篇
电工技术   50篇
综合类   27篇
化学工业   7篇
金属工艺   6篇
机械仪表   28篇
建筑科学   23篇
矿业工程   10篇
能源动力   3篇
轻工业   9篇
水利工程   7篇
石油天然气   10篇
武器工业   2篇
无线电   10篇
一般工业技术   15篇
冶金工业   94篇
自动化技术   72篇
  2023年   1篇
  2022年   2篇
  2021年   7篇
  2020年   6篇
  2019年   5篇
  2018年   5篇
  2017年   6篇
  2016年   9篇
  2015年   17篇
  2014年   25篇
  2013年   19篇
  2012年   22篇
  2011年   20篇
  2010年   18篇
  2009年   25篇
  2008年   17篇
  2007年   23篇
  2006年   20篇
  2005年   22篇
  2004年   19篇
  2003年   18篇
  2002年   11篇
  2001年   7篇
  2000年   8篇
  1999年   5篇
  1998年   2篇
  1997年   5篇
  1996年   3篇
  1994年   1篇
  1992年   3篇
  1990年   1篇
  1988年   3篇
  1985年   2篇
  1984年   1篇
  1983年   3篇
  1982年   2篇
  1980年   1篇
  1979年   1篇
  1975年   1篇
  1970年   1篇
  1969年   1篇
  1961年   1篇
  1959年   2篇
  1958年   1篇
  1957年   1篇
排序方式: 共有373条查询结果,搜索用时 296 毫秒
1.
Intrusion Detection Networks (IDN) are distributed cyberdefense systems composed of different nodes performing local detection and filtering functions, as well as sharing information with other nodes in the IDN. The security and resilience of such cyberdefense systems are paramount, since an attacker will try to evade them or render them unusable before attacking the end systems. In this paper, we introduce a system model for IDN nodes in terms of their logical components, functions, and communication channels. This allows us to model different IDN node roles (e.g., detectors, filters, aggregators, correlators, etc.) and architectures (e.g., hierarchical, centralized, fully distributed, etc.). We then introduce a threat model that considers adversarial actions executed against particular IDN nodes, and also the propagation of such actions throughout connected nodes. Based on such models, we finally introduce a countermeasure allocation model based on a multi-objective optimization algorithm to obtain optimal allocation strategies that minimize both risk and cost. Our experimental results obtained through simulation with different IDN architectures illustrate the benefit of our framework to design and reconfigure cyberdefense systems optimally.  相似文献   
2.
At some point in their careers, clinicians who work or consult in forensic and correctional settings will almost certainly encounter individuals who exhibit psychopathic personality features. Because of the widespread use of this disorder to inform legal and clinical decision making, psychologists should be exceedingly familiar with the relevant research literature on this topic before venturing into these settings. This article reviews the empirical bases of several clinically relevant claims and assertions regarding psychopathy and concludes that many areas of research are decidedly more equivocal in their findings than is commonly perceived. Although there is much to be gained by assessing psychopathy in various contexts, clinicians need to be cautious about drawing overzealous and empirically questionable conclusions about an important disorder that also has great potential for abuse. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
3.
The present empirical investigation had a 3-fold purpose: (a) to cross-validate L. R. Offermann, J. K. Kennedy, and P. W. Wirtz's (1994) scale of Implicit Leadership Theories (ILTs) in several organizational settings and to further provide a shorter scale of ILTs in organizations; (b) to assess the generalizability of ILTs across different employee groups, and (c) to evaluate ILTs' change over time. Two independent samples were used for the scale validation (N1 = 500 and N2 = 439). A 6-factor structure (Sensitivity, Intelligence, Dedication, Dynamism, Tyranny, and Masculinity) was found to most accurately represent ELTs in organizational settings. Regarding the generalizability of ILTs, although the 6-factor structure was consistent across different employee groups, there was only partial support for total factorial invariance. Finally, evaluation of gamma, beta, and alpha change provided support for ILTs' stability over time. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
4.
Whereas there exists a vast literature investigating consumer satisfaction ratings of various behavioral interventions, the majority of these studies have been limited to analogue conditions, which may compromise utility and generalization. Additionally, most research has failed to explore multiple-source, multiple-setting data in the investigation of treatment acceptability. This study investigated parent, teacher, and child treatment acceptability ratings derived from field-based conjoint behavioral consultation cases. Data indicate that overall, 67 parents (aged 23-54 yrs), 67 teachers (aged 22-57 yrs), and 67 children (aged 5-15 yrs) rated conjoint behavioral consultation-based behavioral interventions as very to highly acceptable. For parents, interventions with a reductive component were rated as more acceptable than interventions using both positive and negative components; no significant differences were found among teacher and child group ratings. For teachers, there was a positive relationship between (a) intervention complexity and treatment acceptability ratings and (b) problem severity ratings and treatment acceptability ratings... (PsycINFO Database Record (c) 2011 APA, all rights reserved)  相似文献   
5.
文章较系统地论述了车铣复合机床设计方案的形成过程,同时分析了该设计方案的持点,并简要介绍了该产品的主要技术参数和用途,简评了该产品的技术水平。  相似文献   
6.
针对视觉检测设备在复杂的生产环境下存在图像处理参数设置问题,设计了一套B/S架构的通用的专家在线平台,通过在原有的视觉检测平台上增加一个普通的USB摄像头及相应的应用软件,并通过网络将出现的新问题的图像实时传输给生产厂家或外部专家,由专家通过浏览器设置合理的图像处理参数,平台综合了数据协同、远程培训等功能,达到了远程解决问题的目的。  相似文献   
7.
近些年来,随着互联网的迅速发展,用户在各种在线平台上接收到海量的信息,信息爆炸成为一个关键性问题。在此背景下,推荐系统逐步渗透到人们工作生活的各个场景,已成为不可或缺的一环。它不仅可以帮助用户快速获得想要的信息和服务,还可以提高资源利用效率,从而给企业带来更多效益。因此,个性化推荐算法不仅获得了工业界广泛的关注,也是科研领域的研究热点之一。在个性化推荐的研究中,受限于平台与效率等因素,研究者大多无法将算法部署到在线系统上进行评价,因此离线评价成为推荐领域研究的主要方式。然而个性化推荐涉及到的场景复杂,可获得的数据信息多种多样,用户行为多为隐式反馈且存在许多噪声,这使得推荐系统离线评价的实验设定复杂多变,存在大量易被忽视却十分重要的细节。比如在训练采样负例时,既可以仅从用户没有交互过的商品中采样,也可以将验证测试集的商品视作未知交互加入采样池。同样,从训练到测试在很多其他环节也涉及这样的实现细节(如数据集处理、已知负样本的使用、Top-N排序候选集范围等)。这些实验细节通常不会在学术论文中被显式提及,却潜在影响了模型效果的对比,还决定着实验的科学性,甚至会导致相反或错误的分析结论。本文从数据集处理、模型训练、验证与测试、效果评价等多个角度,系统地讨论与反思了推荐系统实验中的细节设定。对于每个环节,我们枚举了若干常见设定,并在真实数据集上验证了其中某些设定的实际影响。实验结果表明一些细节确实会导致关于模型优劣的不同结论。最终我们形成了关于推荐系统实验细节的指导性总结,包括可选、建议、必须的三类设定,希望帮助推荐算法研究者规避实现细节上的陷阱,更科学合理地设计实验。  相似文献   
8.
为提高准双曲面齿轮的啮合性能,对刀倾全展成(HGT)准双曲面齿轮进行切齿设计研究.以局部综合法(Local Synthesis)为基础,并依据格里森准双曲面齿轮的加工原理,得到满足一定啮合性能的加工参数,并采用该参数对齿轮副进行轮齿接触分析(TCA).从齿面印痕和传动误差曲线可以看出,齿轮副重合度大,传动平稳,可通过调整局部控制参数来改变齿轮的啮合性能,验证了切齿设计的正确性.该方法可通过对设计参考点及其领域内的啮合条件进行预控,达到对齿面啮合质量的控制.  相似文献   
9.
新一代DCS中智能温度监控系统设计与实现   总被引:1,自引:0,他引:1  
传统的分布式温度监控方法存在费时费力、不便应用在特殊环境、不便用于多点融合监控等弊端,因此设计并实现了新一代DCS智能温度监控系统,通过核心为ARM7LPC2292芯片的下位机及时调整全部温控点的温度,自主设置温度、显示实际温度与报警;采用核心为89C51微处理器模块,将上、下位机的信息互相传递,确保上位机随时查询温度信息;通过CC2530终端节点实时采集测温终端的温度数据,将温度数据无线发送给CC2530协调器节点,不再采用传统的中转服务器方式,而是采用协调器节点通过串口与上位机进行通信,并在上位机中进行温度数据的处理和存储;软件设计过程中,对系统监控过程中上位机和下位机间的主从通信方式进行详细分析,并给出了系统温度监控数据通信传输的流程图,分析了系统实现温度监控的数据库访问代码以及温控曲线显示代码的设计;实验结果说明,所设计系统性能好、操作简单、控制准确率高.  相似文献   
10.
The rising prevalence of Social Networking Sites (SNS) and their usage in multiple contexts poses new privacy challenges and increasingly prompts users to manage their online identity. To address privacy threats stemming from interacting with other users on SNS, effective Social Identity Management (SIdM) is a key requirement. It refers to the deliberate and targeted disclosure of personal attribute values to a subset of one's contacts or other users on the SNS. Protection against other entities such as the site operator itself or advertisers and application programmers is not covered by SIdM, but could be incorporated in further refinement steps. Features and settings to perform SIdM have been proposed and subsequently implemented partly by some SNS. Yet, these are often isolated solutions that lack integration into a reference framework that states the requirements for successfully managing one's identity. In this article, such a reference framework of existing and desired SIdM settings is derived from identity theory, literature analysis, and existing SNS. Based thereupon, we examine the SIdM capabilities of prevalent SNS and highlight possible improvements. Lastly, we reason about developing a metric to objectively compare the capability of SNS in regards to their support for SIdM.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号