首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   386篇
  免费   10篇
电工技术   4篇
化学工业   40篇
金属工艺   2篇
机械仪表   3篇
建筑科学   34篇
能源动力   2篇
轻工业   24篇
水利工程   4篇
石油天然气   1篇
无线电   32篇
一般工业技术   23篇
冶金工业   181篇
原子能技术   1篇
自动化技术   45篇
  2020年   8篇
  2018年   4篇
  2017年   3篇
  2016年   8篇
  2015年   4篇
  2014年   7篇
  2013年   8篇
  2012年   5篇
  2011年   14篇
  2010年   9篇
  2009年   9篇
  2008年   11篇
  2007年   15篇
  2006年   15篇
  2005年   15篇
  2004年   11篇
  2003年   14篇
  2002年   13篇
  2001年   8篇
  2000年   12篇
  1999年   14篇
  1998年   22篇
  1997年   16篇
  1996年   12篇
  1995年   8篇
  1994年   9篇
  1993年   7篇
  1989年   10篇
  1988年   6篇
  1987年   5篇
  1986年   4篇
  1985年   6篇
  1984年   4篇
  1983年   6篇
  1982年   4篇
  1981年   4篇
  1979年   6篇
  1978年   3篇
  1977年   8篇
  1976年   3篇
  1975年   4篇
  1973年   3篇
  1972年   3篇
  1970年   2篇
  1969年   3篇
  1966年   2篇
  1963年   2篇
  1957年   3篇
  1956年   3篇
  1955年   3篇
排序方式: 共有396条查询结果,搜索用时 53 毫秒
1.
From previous studies, chippers (very light, long-time cigarette smokers) seem not to be nicotine dependent, despite decades of smoking. The effect of tobacco deprivation on chippers' withdrawal reactions was examined. Matched groups of 26 chippers and 25 regular smokers were studied while abstaining or smoking for 2-day blocks, with assessments administered 5 times daily by palm-top computers. As hypothesized, chippers showed no changes as a result of nicotine deprivation. In contrast, regular smokers demonstrated distinct changes in craving, mood, arousal, and sleep disturbance. The computers also tested participants' cognitive performance. Unlike chippers, regular smokers' performance on complex tasks was slower under deprivation; the effect could not be explained by changes in motor performance or simple reaction time. Results suggest performance may have been improved by nicotine rather than worsened by withdrawal. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
2.
Schools often use peer-tutoring as a corrective program for students who are experiencing difficulties academically. Given appropriate behavioral structure, peer-tutoring can become a powerful classwide instructional intervention. An historical perspective on the use of students as teachers for their peers is given in this selective literature review. Also, information on the efficacy of considering behavioral function and structure and data addressing ecobehavioral variables to establish a productive learning environment are provided. The authors emphasize infusing peer-tutoring programs with applied behavior analysis techniques to increase the academic success of large numbers of students cost effectively. Peer-tutoring programs are considered to be a way for applied behavior analysts to gain greater access to American school learning environments. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
3.
This study, guided in part by G. A. Marlatt and J. R. Gordon's (1985) abstinence violation effect (AVE) model, examined whether variability in cognitive and emotional reactions to binges accounts for recurrence of binge eating. Attributional, cognitive, and affective reactions to 2 successive binges, as well as the latencies between each binge and a subsequent binge, were evaluated through a series of structured phone interviews with 50 nonpurging normal-weight female bingers. Reported mood after binging was unrelated to binge latency. However, when Ss made more intense internal, global, and uncontrollable causal attributions for a binge, a subsequent binge followed significantly sooner. Within-subject variations in AVEs across binges prospectively predicted within-subject variations in the speed with which another binge followed. Analyses suggested that cognitive states (e.g., AVE and guilt) evoked by particular events were better predictors of how quickly binging repeats than were stable differences in attributional style. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
4.
This paper considers the application of the method of boundary penalty terms (SAT) to the numerical solution of the wave equation on complex shapes with Dirichlet boundary conditions. A theory is developed, in a semi-discrete setting, that allows the use of a Cartesian grid on complex geometries, yet maintains the order of accuracy with only a linear temporal error-bound. A numerical example, involving the solution of Maxwell’s equations inside a 2-D circular wave-guide demonstrates the efficacy of this method in comparison to others (e.g., the staggered Yee scheme)—we achieve a decrease of two orders of magnitude in the level of the L2-error.  相似文献   
5.
Multidimensional security protocol engineering is effective for creating cryptographic protocols since it encompasses a variety of design, analysis, and deployment techniques, thereby providing a higher level of confidence than individual approaches offer. SPEAR II, the Security Protocol Engineering and Analysis Resource II, is a protocol engineering tool built on the foundation of previous experience garnered during the SPEAR I project in 1997. The goal of the SPEAR II tool is to facilitate cryptographic protocol engineering and to aid users in distilling the critical issues during an engineering session by presenting them with an appropriate level of detail and guiding them as much as possible during design, analysis and implementation. The SPEAR II tool currently consists of four components that have been integrated into one consistent and unified graphical interface: a protocol specification environment (GYPSIE), a GNY statement construction interface (visual GNY), a Prolog-based GNY analysis engine (GYNGER), and a message rounds calculator. The multidimensional approach realized by SPEAR II is combined with a graphical interface that focuses on making specification of a protocol and its associated conditions for formal analysis as straight forward and painless as possible. Experiments that we have conducted confirm that the analysis engine is able to generate accurate proofs for achievable GNY-based goals, while preliminary usability experiments have indicated that the interface utilized by SPEAR II is both expressive and simple to use for specifying cryptographic protocols and constructing logic statements pertaining to these protocols.  相似文献   
6.
This brief essay was sparked by a long overdue new book (Person, 2001) dealing with Freud's 1921 monograph on group psychology. This volume, regrettably, failed to relate Freud's promising, precursory ideas to his own behavior as a leader, as well as to subsequent seminal contributions to psychoanalytic and group theories and to group psychotherapy. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
7.
We examined situational antecedents of dieting relapse crises and dieters' attempts to cope with temptations to overeat. We analyzed postreatment interviews with 57 obese Ss with Type II diabetes, comparing situations in which Ss lapsed with those in which they overcame temptation to overeat. Cluster analysis yielded 3 categories of relapse crises: mealtime, low-arousal, and emotional upset situations. The cluster differed in outcome: Upset situations almost always resulted in overeating; situational factors, especially food-related cues, increased relapse risk; but performance of coping was the strongest correlate of outcome. Cognitive and behavioral coping responses were each equally associated with positive outcomes. When Ss reported combining both types of coping, they were less likely to report overeating. The dynamics of relapse crises among dieters resemble those that govern relapse crises in addictive behaviors. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
8.
The uptake of digital photos vs. print photos has altered the practice of photo-sharing. Print photos are easy to share within the home, but much harder to share outside of it. The opposite is true of digital photos. People easily share digital photos outside the home, e.g., to family and friends by e-mail gift-giving, and to social networks and the broader public by web publishing. Yet within the home, collocated digital photo-sharing is harder, primarily because digital photos are typically stored on personal accounts in desktop computers located in home offices. This leads to several consequences. (1) The invisibility of digital photos implies few opportunities for serendipitous photo-sharing. (2) Access control and navigation issues inhibit family members from retrieving photo collections. (3) Photo viewing is compromised as digital photos are displayed on small screens in an uncomfortable viewing setting.To mitigate some of these difficulties, we explore how physical memorabilia collected by family members can create opportunities that encourage social and collocated digital photo-sharing. First, we studied (via contextual interviews with 20 households) how families currently practice photo-sharing and how they keep memorabilia. We identified classes of memorabilia that can serve as memory triggers to family events, trips, and times when people took photos. Second, we designed Souvenirs, a photo-viewing system that exploits memorabilia as a social instrument. Using Souvenirs, a family member can meaningfully associate physical memorabilia with particular photo-sets. Later, any family member can begin their story-telling with others through the physical memento, and then enrich the story by displaying its associated photos simply by moving the memento close to the home's large-format television screen. Third, we re-examined our design premises by evoking household reactions to an early version of Souvenirs. Based on these interviews, we redesigned Souvenirs to better reflect the preferences and real practices of photo and memorabilia use in the home.  相似文献   
9.
Multiplicative updates for nonnegative quadratic programming   总被引:3,自引:0,他引:3  
Sha F  Lin Y  Saul LK  Lee DD 《Neural computation》2007,19(8):2004-2031
Many problems in neural computation and statistical learning involve optimizations with nonnegativity constraints. In this article, we study convex problems in quadratic programming where the optimization is confined to an axis-aligned region in the nonnegative orthant. For these problems, we derive multiplicative updates that improve the value of the objective function at each iteration and converge monotonically to the global minimum. The updates have a simple closed form and do not involve any heuristics or free parameters that must be tuned to ensure convergence. Despite their simplicity, they differ strikingly in form from other multiplicative updates used in machine learning. We provide complete proofs of convergence for these updates and describe their application to problems in signal processing and pattern recognition.  相似文献   
10.
An estimated 1,800 million people need improved water supplies in the fifteen years to the end of the century, if developing countries are to reach the target of full coverage. The first half of the International Drinking Water Supply and Sanitation Decade (1981–1990) has seen increases in the percentages of the rural population with access to safe water supplies, but only in Asia has the pace been quick enough to envisage a target of essentiahy full coverage by the end of the century (ten years later than the original Decade goals). In Africa, present progress rates would leave half of the rural population still without safe water in the year 2000, while in Latin America, it may be ten years into the next century before full coverage is achieved unless progress improves dramatically.

Accelerated progress is hampered by financial and technical resource constraints faced by many developing countries, and the problem is aggravated by the growing number of completed projects which are broken down and abandoned, or functioning much below capacity. Attempts to increase the pace of providing improved community water supplies have often been frustrated because the technology used has proved impossible to sustain in village conditions.

To make a lasting impact on the urgent needs, community water supply (CWS) strategies must be based on sustainable and replicable programs, and must take account of the pace at which resource constraints can be overcome. Human resource development programs take time to produce results, and institutional changes can only be accomplished gradually.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号