首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   313篇
  免费   12篇
化学工业   61篇
机械仪表   2篇
建筑科学   13篇
能源动力   3篇
轻工业   28篇
水利工程   1篇
石油天然气   17篇
无线电   17篇
一般工业技术   58篇
冶金工业   78篇
自动化技术   47篇
  2024年   1篇
  2023年   3篇
  2022年   2篇
  2021年   10篇
  2020年   4篇
  2019年   5篇
  2018年   9篇
  2017年   10篇
  2016年   8篇
  2015年   4篇
  2014年   12篇
  2013年   18篇
  2012年   17篇
  2011年   27篇
  2010年   22篇
  2009年   21篇
  2008年   21篇
  2007年   14篇
  2006年   12篇
  2005年   16篇
  2004年   13篇
  2003年   13篇
  2002年   7篇
  2001年   6篇
  2000年   3篇
  1999年   7篇
  1998年   8篇
  1997年   7篇
  1996年   4篇
  1994年   2篇
  1993年   3篇
  1992年   3篇
  1991年   1篇
  1990年   2篇
  1988年   3篇
  1987年   2篇
  1985年   1篇
  1984年   1篇
  1982年   1篇
  1981年   1篇
  1973年   1篇
排序方式: 共有325条查询结果,搜索用时 15 毫秒
1.
2.
The present studies demonstrated the moderation of self-construal orientation on mimicry. Recent research has indicated that an interdependent self-construal is associated with assimilation of the other to the self whereas an independent self-construal is associated with minimizing the influence of others on the self (H. R. Markus & S. Kitayama, 1991; D. Stapel & W. Koomen, 2001). Therefore, the authors hypothesized that an interdependent self-construal would be associated with more mimicry than an independent self-construal. When self-construal orientations were experimentally primed. as in Studies 1 and 2, independent self-construals produced less nonconscious mimicry than interdependent self-construals. When self-construals were examined as cultural differences with either a chronically dominant independent (Americans) or interdependent (Japanese) construal of the self, these results were replicated. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
3.
The study of resilient children has overturned many deficit-focused models concerning the ontogenesis of children raised in adversity. This study explored the relationship between risk and protective factors, resilience, and youth gambling behavior. More specifically, this study examined the relative contribution of various risk and protective domains in relation to problem gambling behavior and examined whether youth identified as resilient (high risk exposure- high internalized protection) were as likely as those identified as vulnerable (high risk exposure-low internalized protection) to engage in excessive gambling behavior. The sample consisted of 1,273 students ages 12 to 19. The findings demonstrated that risk and protective factors each provide a unique contribution to the prediction model of gambling problems. Resilient and vulnerable youth differed significantly in their self-reported gambling severity. As well, resilient youth were not statistically distinguishable from low-risk exposure groups in terms of their gambling severity. Findings are interpreted with respect to resilience and prevention research. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
4.
A national survey of school psychologists' acceptability of psychological assessment techniques in the area of externalizing problem behaviors was examined. School psychologists' ratings of 2 procedures, Behavioral Assessment (BA) and Traditional Assessment (TA), were compared using an analog case study methodology. Using a random sample of 500 National Association of School Psychologists members from the 1991–1992 membership directory, 339 Ss completed the Assessment Rating Profile after reading a hypothetical case summary describing a student with suspected externalizing problem behaviors. Results indicated statistically significant differences between assessment methods and ratings of acceptability. BA procedures were found to be more acceptable than TA procedures. Implications related to the acceptability of psychological assessment techniques, as well as implications for school psychology practitioners are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
5.
Discusses the generalization effects of 7 commercially available student social-skills training (SST) curricula. A table listing strategy, curricula, S characteristics, and results is given. Maintenance of improved behavior was seen as least successful when the "train and hope" strategy was used. The combination of SST and alteration of consequences in the classroom led to the most significant maintenance of results. The most effective programs were those that combined a variety of techniques. Improvement of behavior was obtained more often with withdrawn students than with aggressive students. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
6.
Summary The surface reactivity of poly(methylphenylphosphazene), PMPP, and its derivatives containing silane, PMPP-SiH, and alcohol, PMPP-OH, substituents was investigated. These polymers were fabricated into films by casting from THF solutions and reactions were carried out at the interface between solid film samples and solutions. The surface of PMPP was successfully modified by deprotonation under dilute conditions followed by reactions with RMe2SiCl [where R = CH=CH2, and H]. While surfaces of PMPP-OH were not readily modified, those containing Si-H groups reacted with oxygen when heated and with carbon tetrachloride. The polymer surfaces were examined by contact angle measurements, attenuated total reflectance infrared spectroscopy (ATR-IR), and scanning electron microscopy (SEM). We dedicate the paper to Christopher W. Allen in recognition of his outstanding contributions to inorganic ring and polymer chemistry.  相似文献   
7.

Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for such modern-day systems. An intrusion detection system (IDS) is a solution that has recently gained the researcher’s attention with the application of deep learning techniques in IDS. In this paper, we propose an IDS model that uses a deep learning algorithm, conditional generative adversarial network (CGAN), enabling unsupervised learning in the model and adding an eXtreme gradient boosting (XGBoost) classifier for faster comparison and visualization of results. The proposed method can reduce the need to deploy extra sensors to generate fake data to fool the intruder 1.2–2.6%, as the proposed system generates this fake data. The parameters were selected to give optimal results to our model without significant alterations and complications. The model learns from its dataset samples with the multiple-layer network for a refined training process. We aimed that the proposed model could improve the accuracy and thus, decrease the false detection rate and obtain good precision in the cases of both the datasets, NSL-KDD and the CICIDS2017, which can be used as a detector for cyber intrusions. The false alarm rate of the proposed model decreases by about 1.827%.

  相似文献   
8.
Periodic subgraph mining in dynamic networks   总被引:2,自引:1,他引:1  
In systems of interacting entities such as social networks, interactions that occur regularly typically correspond to significant, yet often infrequent and hard to detect, interaction patterns. To identify such regular behavior in streams of dynamic interaction data, we propose a new mining problem of finding a minimal set of periodically recurring subgraphs to capture all periodic behavior in a dynamic network. We analyze the computational complexity of the problem and show that it is polynomial, unlike many related subgraph or itemset mining problems. We propose an efficient and scalable algorithm to mine all periodic subgraphs in a dynamic network. The algorithm makes a single pass over the data and is also capable of accommodating imperfect periodicity. We demonstrate the applicability of our approach on several real-world networks and extract interesting and insightful periodic interaction patterns. We also show that periodic subgraphs can be an effective way to uncover and characterize the natural periodicities in a system.  相似文献   
9.
This paper is about the influence of group inter-action processes known as group learning on the implementation of information technologies (IT). Aiming at a conceptualisation of the role of user interactions in IT implementation, a theoretical framework based on the experiential learning cycle is developed that includes five processes: collective acting, group reflecting, knowledge disseminating, sharing understanding and mutual adjustment. This theoretical framework is illustrated by the findings from three case studies. Analysis of 87 interviews revealed a unique function of group learning in IT implementation. It showed that group learning emerges immediately after a new IT is introduced to the targeted users and that it can take different standpoints (for or against adoption of the technology); it can also develop during the IT implementation and either progress or take a turn for the worse. The overall conclusion is that group learning is a ‘hidden’ mechanism that may speed up, slow down or even terminate an IT implementation project; and that therefore it is essential to appreciate its importance during IT projects and to steer it in a constructive direction.  相似文献   
10.
This paper focuses on Web accessibility. Relevant legislation and judicial decisions are reviewed, and prior empirical research is presented. This study presents the results from the Web accessibility analysis of the home pages of the 50 states and the District of Columbia. It found that twenty-nine percent of the home pages do not meet the requirements for Conformance Level A Web accessibility. Only one state meets Conformance Level AA standards, which are the minimum standards recommended for Web accessibility, and no state meets Conformance Level AAA standards. This paper also discusses how to address common accessibility problems.
Tanya GoetteEmail: Phone: +1-478-4455721
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号