全文获取类型
收费全文 | 212篇 |
免费 | 8篇 |
专业分类
电工技术 | 5篇 |
化学工业 | 29篇 |
机械仪表 | 5篇 |
建筑科学 | 22篇 |
能源动力 | 5篇 |
轻工业 | 15篇 |
水利工程 | 1篇 |
石油天然气 | 1篇 |
无线电 | 15篇 |
一般工业技术 | 34篇 |
冶金工业 | 36篇 |
自动化技术 | 52篇 |
出版年
2023年 | 2篇 |
2022年 | 2篇 |
2021年 | 2篇 |
2020年 | 3篇 |
2019年 | 7篇 |
2018年 | 11篇 |
2017年 | 8篇 |
2016年 | 1篇 |
2015年 | 3篇 |
2014年 | 6篇 |
2013年 | 15篇 |
2012年 | 8篇 |
2011年 | 18篇 |
2010年 | 5篇 |
2009年 | 7篇 |
2008年 | 15篇 |
2007年 | 13篇 |
2006年 | 3篇 |
2005年 | 7篇 |
2004年 | 3篇 |
2003年 | 4篇 |
2002年 | 4篇 |
2001年 | 5篇 |
2000年 | 4篇 |
1999年 | 5篇 |
1998年 | 5篇 |
1997年 | 6篇 |
1996年 | 9篇 |
1995年 | 4篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1992年 | 5篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 3篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1985年 | 1篇 |
1984年 | 3篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1978年 | 1篇 |
1976年 | 3篇 |
1975年 | 2篇 |
1974年 | 1篇 |
1967年 | 2篇 |
排序方式: 共有220条查询结果,搜索用时 15 毫秒
1.
This article introduces the notion of genetic essentialist biases: cognitive biases associated with essentialist thinking that are elicited when people encounter arguments that genes are relevant for a behavior, condition, or social group. Learning about genetic attributions for various human conditions leads to a particular set of thoughts regarding those conditions: they are more likely to be perceived as (a) immutable and determined, (b) having a specific etiology, (c) homogeneous and discrete, and (d) natural, which can lead to the naturalistic fallacy. There are rare cases of “strong genetic explanation” when such responses to genetic attributions may be appropriate; however, people tend to overweigh genetic attributions compared with competing attributions even in cases of “weak genetic explanation,” which are far more common. The authors reviewed research on people's understanding of race, gender, sexual orientation, criminality, mental illness, and obesity through a genetic essentialism lens, highlighting attitudinal, cognitive, and behavioral changes that stem from consideration of genetic attributions as bases of these categories. Scientific and media portrayals of genetic discoveries are discussed with respect to genetic essentialism, as is the role that genetic essentialism has played (and continues to play) in various public policies, legislation, scientific endeavors, and ideological movements in recent history. Last, moderating factors and interventions to reduce the magnitude of genetic essentialism, which identify promising directions to explore in order to reduce these biases, are discussed. (PsycINFO Database Record (c) 2011 APA, all rights reserved) 相似文献
2.
3.
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a “qualified” subset of parties can efficiently reconstruct the secret while any “unqualified” subset of parties cannot efficiently learn anything about the secret. The collection of “qualified” subsets is defined by a monotone Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing scheme. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in \({\mathsf {P}}\)). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in \({\mathsf {NP}}\): in order to reconstruct the secret a set of parties must be “qualified” and provide a witness attesting to this fact. Recently, Garg et al. (Symposium on theory of computing conference, STOC, pp 467–476, 2013) put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement \(x\in L\) for a language \(L\in {\mathsf {NP}}\) such that anyone holding a witness to the statement can decrypt the message; however, if \(x\notin L\), then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in \({\mathsf {NP}}\) assuming witness encryption for \({\mathsf {NP}}\) and one-way functions. As a consequence we get a completeness theorem for secret-sharing: computational secret-sharing scheme for any single monotone \({\mathsf {NP}}\)-complete function implies a computational secret-sharing scheme for every monotone function in \({\mathsf {NP}}\). 相似文献
4.
We have used the pulse radiolysis technique to reduce with solvated electrons (see article) a single Fe(III) site in methemoglobin and metmyoglobin. The reduction process was followed spectrophotometrically and the reactions rate constants were measured: (see article) =6.5 +/- 1-10(10) M-1-S-1. (see article)=2.5 +/- 0.3-10(10) M-1-S-1. Approx. 60% of the (see article) have reacted with the hemin group, and the rest of the (see article) have probably reacted with the globin moiety. We followed the reaction of the reduced proteins to yield the oxyderivatives and measured the rate constants of the oxygenation process k reduced methemoglobin + O2 = 2.6 +/- 0.6-10(7) M-1-S-1 and k myoglobin + O2 = 1.8 +/- 0.2-10(7) M-1-S-1, all the rate constants were measured at pH = 6.8, I = 0.004, T = 22 +/- 2 degrees C. The high rate constant for reduced methemoglobin indicates that one-site-reduced methemoglobin is probably in the R state, as predicted for methemoglobin from X-ray analysis. The spectra of the reduced and oxygenated species were measured under similar conditions at gamma = 450-650 nm. We were able to follow slight changes in the micro-second time scale, these changes were attributed to conformational changes. We were not able to detect any reaction between the radical (see article) and the hemin group (which would result in a complex such as heme O-2). This may be due to kinetic reasons. 相似文献
5.
Ilan Riess Jeremy Rutman Zvi Rosenstock 《Journal of the American Ceramic Society》2001,84(12):2895-2899
Using solid materials prepared by melting or sintering allows inert metal electrodes to be embedded inside the solid. The I–V relations for four linear electrodes embedded inside a rectangular sample are evaluated. Two cases are considered: (a) a sample with uniform electronic (electron/hole) conductivity and (b) the electron/hole partial current in a sample that is a mixed ionic-electronic conductor with a nonuniform electron/hole distribution. Equations are derived which allow the determination of the conductivity from four-electrode measurements if a pure electronic conductor is considered or if a mixed ionic-electronic conductor is considered with the ionic current being blocked. 相似文献
6.
Seyed Mohammad Reza Paran Henri Vahabi Maryam Jouyandeh Franck Ducos Krzysztof Formela Mohammad Reza Saeb 《应用聚合物科学杂志》2019,136(20):47483
Thermally stable thermoplastic elastomer nanocomposites based on polyamide 6 (PA6), acrylonitrile butadiene rubber (NBR), and halloysite nanotubes (HNTs) were dynamically vulcanized, and their nonisothermal decomposition kinetics were examined. The Friedman, Kissinger–Akahira–Sunose (KAS), Ozawa–Wall–Flynn (FWO), and modified Coats–Redfern (m-CR) isoconversional models were used to obtain information about the kinetics of the thermal decomposition of PA6–NBR–HNTs in terms of the activation energy per partial mass loss monitored through thermogravimetric analyses performed at different heating rates. An erratic trend was due to the Friedman model, especially for systems having higher HNT loadings, whereas the KAS, FWO, and m-CR models revealed very similar meaningful thermal decomposition kinetics. A relatively high activation energy corroborating a reliable thermal stability was obtained by the addition of HNTs to PA6–NBR, and the resistance against decomposition was higher for systems containing more HNT. This signified the role of the HNTs as thermal stability modifiers. © 2019 Wiley Periodicals, Inc. J. Appl. Polym. Sci. 2019 , 136, 47483. 相似文献
7.
8.
9.
Sanaz Paran Tuyen Vu Fernand Diaz Chris S. Edrington Touria El-Mezyani 《电力部件与系统》2019,47(16-17):1437-1449
AbstractPower scheduling of distributed storage devices and renewable energy resources in microgrids is crucial for their reliable and optimal operation. Conventionally, the power scheduling problem is solved with a centralized energy management control, which has access to all the information from the overall system. This type of control has limitations related to computational burden, communication latencies, and missing information. Therefore, the primary objective of this paper is to propose a distributed energy management strategy, to reduce the operational cost of microgrids, and to enhance the computation time. The strategy is formulated based on the model predictive control method since it allows the control action in the current time-step to be optimized while taking into account the future time-steps. Outputs of the energy management system are the optimal power references generated for all energy resources based on the system’s demand, constraints, and objective functions. To illustrate the effectiveness of the distributed model predictive control, the proposed algorithm is validated through simulation, on a microgrid candidate via MATLAB/Simulink, and controller hardware-in-the-loop experiment on a LabVIEW platform using National Instruments control devices (myRIO). The results will show the computation time in the distributed IEM method is improved compared to centralized IEM. Additionally, the results will show the robustness of the distributed IEM in the plug and play scenario. 相似文献
10.
This paper explores the role of transactive memory in enabling knowledge transfer between globally distributed teams. While the information systems literature has recently acknowledged the role transactive memory plays in improving knowledge processes and performance in colocated teams, little is known about its contribution to distributed teams. To contribute to filling this gap, knowledge‐transfer challenges and processes between onsite and offshore teams were studied at TATA Consultancy Services. In particular, the paper describes the transfer of knowledge between onsite and offshore teams through encoding, storing and retrieving processes. An in‐depth case study of globally distributed software development projects was carried out, and a qualitative, interpretive approach was adopted. The analysis of the case suggests that in order to overcome differences derived from the local contexts of the onsite and offshore teams (e.g. different work routines, methodologies and skills), some specific mechanisms supporting the development of codified and personalized ‘directories’ were introduced. These include the standardization of templates and methodologies across the remote sites as well as frequent teleconferencing sessions and occasional short visits. These mechanisms contributed to the development of the notion of ‘who knows what’ across onsite and offshore teams despite the challenges associated with globally distributed teams, and supported the transfer of knowledge between onsite and offshore teams. The paper concludes by offering theoretical and practical implications. 相似文献