首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   212篇
  免费   8篇
电工技术   5篇
化学工业   29篇
机械仪表   5篇
建筑科学   22篇
能源动力   5篇
轻工业   15篇
水利工程   1篇
石油天然气   1篇
无线电   15篇
一般工业技术   34篇
冶金工业   36篇
自动化技术   52篇
  2023年   2篇
  2022年   2篇
  2021年   2篇
  2020年   3篇
  2019年   7篇
  2018年   11篇
  2017年   8篇
  2016年   1篇
  2015年   3篇
  2014年   6篇
  2013年   15篇
  2012年   8篇
  2011年   18篇
  2010年   5篇
  2009年   7篇
  2008年   15篇
  2007年   13篇
  2006年   3篇
  2005年   7篇
  2004年   3篇
  2003年   4篇
  2002年   4篇
  2001年   5篇
  2000年   4篇
  1999年   5篇
  1998年   5篇
  1997年   6篇
  1996年   9篇
  1995年   4篇
  1994年   4篇
  1993年   2篇
  1992年   5篇
  1991年   1篇
  1990年   2篇
  1989年   3篇
  1988年   2篇
  1987年   1篇
  1985年   1篇
  1984年   3篇
  1982年   1篇
  1981年   1篇
  1978年   1篇
  1976年   3篇
  1975年   2篇
  1974年   1篇
  1967年   2篇
排序方式: 共有220条查询结果,搜索用时 15 毫秒
1.
This article introduces the notion of genetic essentialist biases: cognitive biases associated with essentialist thinking that are elicited when people encounter arguments that genes are relevant for a behavior, condition, or social group. Learning about genetic attributions for various human conditions leads to a particular set of thoughts regarding those conditions: they are more likely to be perceived as (a) immutable and determined, (b) having a specific etiology, (c) homogeneous and discrete, and (d) natural, which can lead to the naturalistic fallacy. There are rare cases of “strong genetic explanation” when such responses to genetic attributions may be appropriate; however, people tend to overweigh genetic attributions compared with competing attributions even in cases of “weak genetic explanation,” which are far more common. The authors reviewed research on people's understanding of race, gender, sexual orientation, criminality, mental illness, and obesity through a genetic essentialism lens, highlighting attitudinal, cognitive, and behavioral changes that stem from consideration of genetic attributions as bases of these categories. Scientific and media portrayals of genetic discoveries are discussed with respect to genetic essentialism, as is the role that genetic essentialism has played (and continues to play) in various public policies, legislation, scientific endeavors, and ideological movements in recent history. Last, moderating factors and interventions to reduce the magnitude of genetic essentialism, which identify promising directions to explore in order to reduce these biases, are discussed. (PsycINFO Database Record (c) 2011 APA, all rights reserved)  相似文献   
2.
3.
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a “qualified” subset of parties can efficiently reconstruct the secret while any “unqualified” subset of parties cannot efficiently learn anything about the secret. The collection of “qualified” subsets is defined by a monotone Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing scheme. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in \({\mathsf {P}}\)). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in \({\mathsf {NP}}\): in order to reconstruct the secret a set of parties must be “qualified” and provide a witness attesting to this fact. Recently, Garg et al. (Symposium on theory of computing conference, STOC, pp 467–476, 2013) put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement \(x\in L\) for a language \(L\in {\mathsf {NP}}\) such that anyone holding a witness to the statement can decrypt the message; however, if \(x\notin L\), then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in \({\mathsf {NP}}\) assuming witness encryption for \({\mathsf {NP}}\) and one-way functions. As a consequence we get a completeness theorem for secret-sharing: computational secret-sharing scheme for any single monotone \({\mathsf {NP}}\)-complete function implies a computational secret-sharing scheme for every monotone function in \({\mathsf {NP}}\).  相似文献   
4.
We have used the pulse radiolysis technique to reduce with solvated electrons (see article) a single Fe(III) site in methemoglobin and metmyoglobin. The reduction process was followed spectrophotometrically and the reactions rate constants were measured: (see article) =6.5 +/- 1-10(10) M-1-S-1. (see article)=2.5 +/- 0.3-10(10) M-1-S-1. Approx. 60% of the (see article) have reacted with the hemin group, and the rest of the (see article) have probably reacted with the globin moiety. We followed the reaction of the reduced proteins to yield the oxyderivatives and measured the rate constants of the oxygenation process k reduced methemoglobin + O2 = 2.6 +/- 0.6-10(7) M-1-S-1 and k myoglobin + O2 = 1.8 +/- 0.2-10(7) M-1-S-1, all the rate constants were measured at pH = 6.8, I = 0.004, T = 22 +/- 2 degrees C. The high rate constant for reduced methemoglobin indicates that one-site-reduced methemoglobin is probably in the R state, as predicted for methemoglobin from X-ray analysis. The spectra of the reduced and oxygenated species were measured under similar conditions at gamma = 450-650 nm. We were able to follow slight changes in the micro-second time scale, these changes were attributed to conformational changes. We were not able to detect any reaction between the radical (see article) and the hemin group (which would result in a complex such as heme O-2). This may be due to kinetic reasons.  相似文献   
5.
Using solid materials prepared by melting or sintering allows inert metal electrodes to be embedded inside the solid. The I–V relations for four linear electrodes embedded inside a rectangular sample are evaluated. Two cases are considered: (a) a sample with uniform electronic (electron/hole) conductivity and (b) the electron/hole partial current in a sample that is a mixed ionic-electronic conductor with a nonuniform electron/hole distribution. Equations are derived which allow the determination of the conductivity from four-electrode measurements if a pure electronic conductor is considered or if a mixed ionic-electronic conductor is considered with the ionic current being blocked.  相似文献   
6.
Thermally stable thermoplastic elastomer nanocomposites based on polyamide 6 (PA6), acrylonitrile butadiene rubber (NBR), and halloysite nanotubes (HNTs) were dynamically vulcanized, and their nonisothermal decomposition kinetics were examined. The Friedman, Kissinger–Akahira–Sunose (KAS), Ozawa–Wall–Flynn (FWO), and modified Coats–Redfern (m-CR) isoconversional models were used to obtain information about the kinetics of the thermal decomposition of PA6–NBR–HNTs in terms of the activation energy per partial mass loss monitored through thermogravimetric analyses performed at different heating rates. An erratic trend was due to the Friedman model, especially for systems having higher HNT loadings, whereas the KAS, FWO, and m-CR models revealed very similar meaningful thermal decomposition kinetics. A relatively high activation energy corroborating a reliable thermal stability was obtained by the addition of HNTs to PA6–NBR, and the resistance against decomposition was higher for systems containing more HNT. This signified the role of the HNTs as thermal stability modifiers. © 2019 Wiley Periodicals, Inc. J. Appl. Polym. Sci. 2019 , 136, 47483.  相似文献   
7.
8.
9.
Abstract

Power scheduling of distributed storage devices and renewable energy resources in microgrids is crucial for their reliable and optimal operation. Conventionally, the power scheduling problem is solved with a centralized energy management control, which has access to all the information from the overall system. This type of control has limitations related to computational burden, communication latencies, and missing information. Therefore, the primary objective of this paper is to propose a distributed energy management strategy, to reduce the operational cost of microgrids, and to enhance the computation time. The strategy is formulated based on the model predictive control method since it allows the control action in the current time-step to be optimized while taking into account the future time-steps. Outputs of the energy management system are the optimal power references generated for all energy resources based on the system’s demand, constraints, and objective functions. To illustrate the effectiveness of the distributed model predictive control, the proposed algorithm is validated through simulation, on a microgrid candidate via MATLAB/Simulink, and controller hardware-in-the-loop experiment on a LabVIEW platform using National Instruments control devices (myRIO). The results will show the computation time in the distributed IEM method is improved compared to centralized IEM. Additionally, the results will show the robustness of the distributed IEM in the plug and play scenario.  相似文献   
10.
This paper explores the role of transactive memory in enabling knowledge transfer between globally distributed teams. While the information systems literature has recently acknowledged the role transactive memory plays in improving knowledge processes and performance in colocated teams, little is known about its contribution to distributed teams. To contribute to filling this gap, knowledge‐transfer challenges and processes between onsite and offshore teams were studied at TATA Consultancy Services. In particular, the paper describes the transfer of knowledge between onsite and offshore teams through encoding, storing and retrieving processes. An in‐depth case study of globally distributed software development projects was carried out, and a qualitative, interpretive approach was adopted. The analysis of the case suggests that in order to overcome differences derived from the local contexts of the onsite and offshore teams (e.g. different work routines, methodologies and skills), some specific mechanisms supporting the development of codified and personalized ‘directories’ were introduced. These include the standardization of templates and methodologies across the remote sites as well as frequent teleconferencing sessions and occasional short visits. These mechanisms contributed to the development of the notion of ‘who knows what’ across onsite and offshore teams despite the challenges associated with globally distributed teams, and supported the transfer of knowledge between onsite and offshore teams. The paper concludes by offering theoretical and practical implications.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号