首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   135篇
  免费   1篇
电工技术   3篇
化学工业   9篇
机械仪表   1篇
能源动力   1篇
轻工业   4篇
无线电   22篇
一般工业技术   13篇
冶金工业   31篇
原子能技术   7篇
自动化技术   45篇
  2025年   1篇
  2022年   1篇
  2021年   1篇
  2020年   5篇
  2019年   1篇
  2018年   7篇
  2017年   2篇
  2016年   3篇
  2015年   3篇
  2014年   3篇
  2013年   5篇
  2012年   10篇
  2011年   3篇
  2010年   5篇
  2008年   4篇
  2007年   7篇
  2006年   4篇
  2005年   2篇
  2004年   2篇
  2003年   5篇
  2001年   4篇
  2000年   3篇
  1999年   3篇
  1998年   8篇
  1997年   2篇
  1996年   5篇
  1995年   5篇
  1994年   5篇
  1993年   4篇
  1990年   1篇
  1989年   4篇
  1988年   2篇
  1986年   1篇
  1985年   1篇
  1984年   2篇
  1983年   2篇
  1982年   1篇
  1981年   2篇
  1980年   3篇
  1979年   1篇
  1977年   1篇
  1966年   1篇
  1964年   1篇
排序方式: 共有136条查询结果,搜索用时 15 毫秒
91.
Outlines principles that guided the author in directing the school psychological service in a small community in Israel. Some guidelines are presented for new psychologists working in school or community settings. (12 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
92.
A new method for the evaluation of the center-of-mass to laboratory co-ordinates system transformation matrix is developed, by which each element of the matrix is represented as a finite sum of terms depending on the mass number of the scattering nucleus. At present, the elastic transformation matrices given in the ENDF/B files are evaluated by the Amster method, by which each element of the transformation matrix is represented as an infinite sum of terms. A comparison is made between the values of the elements of the elastic transformation matrix of 6Li obtained by the new method and those given in the ENDF/B-V file, and some discrepancies are revealed.  相似文献   
93.
Bellare, Boldyreva, and O’Neill (CRYPTO ’07) initiated the study of deterministic public-key encryption as an alternative in scenarios where randomized encryption has inherent drawbacks. The resulting line of research has so far guaranteed security only for adversarially chosen-plaintext distributions that are independent of the public key used by the scheme. In most scenarios, however, it is typically not realistic to assume that adversaries do not take the public key into account when attacking a scheme. We show that it is possible to guarantee meaningful security even for plaintext distributions that depend on the public key. We extend the previously proposed notions of security, allowing adversaries to adaptively choose plaintext distributions after seeing the public key, in an interactive manner. The only restrictions we make are that: (1) plaintext distributions are unpredictable (as is essential in deterministic public-key encryption), and (2) the number of plaintext distributions from which each adversary is allowed to adaptively choose is upper bounded by \(2^{p}\), where p can be any predetermined polynomial in the security parameter and plaintext length. For example, with \(p = 0\) we capture plaintext distributions that are independent of the public key, and with \(p = O(s \log s)\) we capture, in particular, all plaintext distributions that are samplable by circuits of size s. Within our framework we present both constructions in the random oracle model based on any public-key encryption scheme, and constructions in the standard model based on lossy trapdoor functions (thus, based on a variety of number-theoretic assumptions). Previously known constructions heavily relied on the independence between the plaintext distributions and the public key for the purposes of randomness extraction. In our setting, however, randomness extraction becomes significantly more challenging once the plaintext distributions and the public key are no longer independent. Our approach is inspired by research on randomness extraction from seed-dependent distributions. Underlying our approach is a new generalization of a method for such randomness extraction, originally introduced by Trevisan and Vadhan (FOCS ’00) and Dodis (Ph.D. Thesis, MIT, ’00).  相似文献   
94.
The foundations of mixture theory are formulated using a geometrical approach. In order to model diffusion, configurations of mixtures are allowed in which the various constituents may occupy different regions in space in addition to the usual relaxation of the impenetrability axiom. Forces on a mixture are defined as continuous linear functional on the space of virtual displacements of the mixture. This implies the existence of partial stresses without any further assumptions. The notions of the total force and the total stress are critically reviewed and introduced through the definition of a simple body model of a mixture. Some examples of such models are given.  相似文献   
95.
Preface     

Preface

Preface  相似文献   
96.
Consistency of pupils' attributions regarding success and failure.   总被引:1,自引:0,他引:1  
191 6th graders attending schools in 3 socioeconomic areas were asked to attribute to causes their success or failure on examinations administered in 3 subjects in the course of a trimester. The extent of consistency was measured between attributional patterns obtained from 2 tests in the same subject and between two tests in different subjects. Results show consistency in Ss' attributional patterns. It was found that consistency of attributional patterns was significantly greater when Ss received the same outcomes on the 2 tests (success or failure) than when different outcomes were received (success–failure or failure–success). (17 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
97.
Algorithms for solving partial differential equations which extend previous applications of the nonconforming Taylor discretization method (NTDM) are presented. In one modification the number of interrelated grid points is variable, thus enabling additional geometric flexibility. Another modification is the approximation of the governing differential equation using the method of weighted residuals. A simple one-dimensional test case with a known analytic solution is solved using this code. The results demonstrate that precision is enhanced when using the method of weighted residuals with an increased number of interrelated points. The algorithm is applied as a general purpose two-dimensional code for nonlinear steady state heat-conduction. Two-dimensional examples with complex geometry and boundary conditions are then solved both by the NTDM and by the finite elements method (FEM). The results obtained by the two methods are compared.  相似文献   
98.
Among the common features of advanced LWR concepts are the tightness of lattices and the symbiotic setting of different fuels. Such symbioses often come in the form of multilattices, whose numerically-repeated unit is a configuration of several pins, typically with one pin type at the center and pins of a second type surrounding the center pin. If this extended-cell (EC) unit is cylindricized, then a simple transport calculation of the unit will be possible. If the lattice of such units is tight, there is further an a priori reason to expect the cylindrization to introduce only a small distortion of the true neutron fluxes in the lattice. A strict numerical validation of the EC cylindrization approximation is impractical, but similar validations can be carried out for regular lattices, viewed as being made up of multicell units whose centers are moderators and whose peripheries are fuel pins. In these comparisons the EC cylindrization approximation gives good results.  相似文献   
99.
Cultured in vitro neuronal networks are known to exhibit synchronized bursting events (SBE), during which most of the neurons in the system spike within a time window of approximately 100 msec. Such phenomena can be obtained in model networks based on Markram-Tsodyks frequency-dependent synapses. In order to account correctly for the detailed behavior of SBEs, several modifications have to be implemented in such models. Random input currents have to be introduced to account for the rising profile of SBEs. Dynamic thresholds and inhomogeneity in the distribution of neuronal resistances enable us to describe the profile of activity within the SBE and the heavy-tailed distributions of interspike intervals and interevent intervals. Thus, we can account for the interesting appearance of Levy distributions in the data.  相似文献   
100.
Small GTPases of the Ypt/Rab family are involved in the regulation of vesicular transport. Cycling between the GDP- and GTP-bound forms and the accessory proteins that regulate this cycling are thought to be crucial for Ypt/Rab function. Guanine nucleotide exchange factors (GEFs) stimulate both GDP loss and GTP uptake, and GTPase-activating proteins (GAPs) stimulate GTP hydrolysis. Little is known about GEFs and GAPs for Ypt/Rab proteins. In this article we report the identification and initial characterization of two factors that regulate nucleotide cycling by Ypt1p, which is essential for the first two steps of the yeast secretory pathway. The Ypt1p-GEF stimulates GDP release and GTP uptake at least 10-fold and is specific for Ypt1p. Partially purified Ypt1p-GEF can rescue the inhibition caused by the dominant-negative Ypt1p-D124N mutant of in vitro endoplasmic reticulum-to-Golgi transport. This mutant probably blocks transport by inhibiting the GEF, suggesting that we have identified the physiological GEF for Ypt1p. The Ypt1p-GAP stimulates GTP hydrolysis by Ypt1p up to 54-fold, has a higher affinity for the GTP-bound form of Ypt1p than for the GDP-bound form, and is specific to a subgroup of exocytic Ypt proteins. The Ypt1p-GAP activity is not affected by deletion of two genes that encode known Ypt GAPs, GYP7 and GYP1, nor is it influenced by mutations in SEC18, SEC17, or SEC22, genes whose products are involved in vesicle fusion. The GEF and GAP activities for Ypt1p localize to particulate cellular fractions. However, contrary to the predictions of current models, the GEF activity localizes to the fraction that functions as the acceptor in an endoplasmic reticulum-to-Golgi transport assay, whereas the GAP activity cofractionates with markers for the donor. On the basis of our current and previous results, we propose a new model for the role of Ypt/Rab nucleotide cycling and the factors that regulate this process.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号