首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   371篇
  免费   14篇
化学工业   67篇
金属工艺   1篇
机械仪表   5篇
建筑科学   15篇
能源动力   5篇
轻工业   29篇
水利工程   1篇
石油天然气   14篇
无线电   25篇
一般工业技术   62篇
冶金工业   108篇
自动化技术   53篇
  2023年   3篇
  2022年   2篇
  2021年   10篇
  2020年   5篇
  2019年   5篇
  2018年   10篇
  2017年   9篇
  2016年   12篇
  2015年   5篇
  2014年   13篇
  2013年   21篇
  2012年   22篇
  2011年   29篇
  2010年   26篇
  2009年   23篇
  2008年   25篇
  2007年   16篇
  2006年   13篇
  2005年   17篇
  2004年   14篇
  2003年   17篇
  2002年   9篇
  2001年   6篇
  2000年   4篇
  1999年   13篇
  1998年   17篇
  1997年   9篇
  1996年   4篇
  1995年   2篇
  1994年   3篇
  1993年   4篇
  1992年   3篇
  1991年   2篇
  1990年   1篇
  1988年   2篇
  1987年   2篇
  1985年   1篇
  1984年   1篇
  1981年   3篇
  1980年   1篇
  1976年   1篇
排序方式: 共有385条查询结果,搜索用时 803 毫秒
1.
2.
The present studies demonstrated the moderation of self-construal orientation on mimicry. Recent research has indicated that an interdependent self-construal is associated with assimilation of the other to the self whereas an independent self-construal is associated with minimizing the influence of others on the self (H. R. Markus & S. Kitayama, 1991; D. Stapel & W. Koomen, 2001). Therefore, the authors hypothesized that an interdependent self-construal would be associated with more mimicry than an independent self-construal. When self-construal orientations were experimentally primed. as in Studies 1 and 2, independent self-construals produced less nonconscious mimicry than interdependent self-construals. When self-construals were examined as cultural differences with either a chronically dominant independent (Americans) or interdependent (Japanese) construal of the self, these results were replicated. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
3.
The study of resilient children has overturned many deficit-focused models concerning the ontogenesis of children raised in adversity. This study explored the relationship between risk and protective factors, resilience, and youth gambling behavior. More specifically, this study examined the relative contribution of various risk and protective domains in relation to problem gambling behavior and examined whether youth identified as resilient (high risk exposure- high internalized protection) were as likely as those identified as vulnerable (high risk exposure-low internalized protection) to engage in excessive gambling behavior. The sample consisted of 1,273 students ages 12 to 19. The findings demonstrated that risk and protective factors each provide a unique contribution to the prediction model of gambling problems. Resilient and vulnerable youth differed significantly in their self-reported gambling severity. As well, resilient youth were not statistically distinguishable from low-risk exposure groups in terms of their gambling severity. Findings are interpreted with respect to resilience and prevention research. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
4.
Human immunodeficiency virus (HIV) infection of the thymus could have profound effects on development of the immune response, particularly in children. We and others have established that in addition to infecting and depleting CD4-bearing thymocytes, functional HIV proviruses are found in thymocytes lacking surface CD4 expression. Using in vitro thymocyte cultures, we show that neither HIV-mediated down regulation of CD4 nor CD4-independent infection contributes to the localization of HIV in cells lacking the primary virus receptor. Rather, infection of a CD4-positive precursor cell (CD4 positive/CD8 positive) with subsequent differentiation into a mature CD4-negative phenotype results in productively infected CD4-negative cells. This novel mechanism may contribute to pathogenesis by distributing viral sequences into functional subsets of T cells typically refractory to HIV infection and could account for the presence of viral DNA in CD8-positive lymphocytes recently observed in patients.  相似文献   
5.
A national survey of school psychologists' acceptability of psychological assessment techniques in the area of externalizing problem behaviors was examined. School psychologists' ratings of 2 procedures, Behavioral Assessment (BA) and Traditional Assessment (TA), were compared using an analog case study methodology. Using a random sample of 500 National Association of School Psychologists members from the 1991–1992 membership directory, 339 Ss completed the Assessment Rating Profile after reading a hypothetical case summary describing a student with suspected externalizing problem behaviors. Results indicated statistically significant differences between assessment methods and ratings of acceptability. BA procedures were found to be more acceptable than TA procedures. Implications related to the acceptability of psychological assessment techniques, as well as implications for school psychology practitioners are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
6.
Discusses the generalization effects of 7 commercially available student social-skills training (SST) curricula. A table listing strategy, curricula, S characteristics, and results is given. Maintenance of improved behavior was seen as least successful when the "train and hope" strategy was used. The combination of SST and alteration of consequences in the classroom led to the most significant maintenance of results. The most effective programs were those that combined a variety of techniques. Improvement of behavior was obtained more often with withdrawn students than with aggressive students. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
7.
过去几年,PCI Express(以下简称PCIe)总线逐渐成为一种适用于网络应用、具有高效率和成本效益的平台。PCIe的发展是为了克服过去并行计算机总线架构在性能、可扩展性以及配置等方面的限制,这种通用的串行I/O互连技术已被企业型、桌上型、移动、通信及嵌入式等各种应用广泛采用。尽管普及度已相当广泛,业界却普遍认为:PCIe总线的功能还是无法满足高性能存储和网络独特的I/O需求。  相似文献   
8.
The paper considers the properties of feasible and optimal scheduling of jobs on one machine under constraints on the terms of the beginning and completion of jobs and on partial sequences of job performance. The established properties and the lower-bound estimates of the length of the optimal schedule are used to develop methods for the exact and approximate solutions of the formulated problem by sequential optimization algorithms. The proposed algorithms are illustrated by numerical examples and can be successfully applied to solve these problems in the absence of constraints.  相似文献   
9.
Summary The surface reactivity of poly(methylphenylphosphazene), PMPP, and its derivatives containing silane, PMPP-SiH, and alcohol, PMPP-OH, substituents was investigated. These polymers were fabricated into films by casting from THF solutions and reactions were carried out at the interface between solid film samples and solutions. The surface of PMPP was successfully modified by deprotonation under dilute conditions followed by reactions with RMe2SiCl [where R = CH=CH2, and H]. While surfaces of PMPP-OH were not readily modified, those containing Si-H groups reacted with oxygen when heated and with carbon tetrachloride. The polymer surfaces were examined by contact angle measurements, attenuated total reflectance infrared spectroscopy (ATR-IR), and scanning electron microscopy (SEM). We dedicate the paper to Christopher W. Allen in recognition of his outstanding contributions to inorganic ring and polymer chemistry.  相似文献   
10.

Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for such modern-day systems. An intrusion detection system (IDS) is a solution that has recently gained the researcher’s attention with the application of deep learning techniques in IDS. In this paper, we propose an IDS model that uses a deep learning algorithm, conditional generative adversarial network (CGAN), enabling unsupervised learning in the model and adding an eXtreme gradient boosting (XGBoost) classifier for faster comparison and visualization of results. The proposed method can reduce the need to deploy extra sensors to generate fake data to fool the intruder 1.2–2.6%, as the proposed system generates this fake data. The parameters were selected to give optimal results to our model without significant alterations and complications. The model learns from its dataset samples with the multiple-layer network for a refined training process. We aimed that the proposed model could improve the accuracy and thus, decrease the false detection rate and obtain good precision in the cases of both the datasets, NSL-KDD and the CICIDS2017, which can be used as a detector for cyber intrusions. The false alarm rate of the proposed model decreases by about 1.827%.

  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号