首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   261篇
  免费   9篇
电工技术   6篇
化学工业   55篇
金属工艺   2篇
机械仪表   4篇
建筑科学   11篇
矿业工程   2篇
能源动力   8篇
轻工业   14篇
石油天然气   1篇
无线电   21篇
一般工业技术   41篇
冶金工业   46篇
原子能技术   4篇
自动化技术   55篇
  2022年   4篇
  2021年   2篇
  2020年   1篇
  2019年   3篇
  2018年   3篇
  2017年   1篇
  2016年   2篇
  2015年   3篇
  2014年   8篇
  2013年   8篇
  2012年   19篇
  2011年   15篇
  2010年   7篇
  2009年   6篇
  2008年   11篇
  2007年   9篇
  2006年   16篇
  2005年   9篇
  2004年   5篇
  2003年   15篇
  2002年   8篇
  2001年   8篇
  2000年   1篇
  1999年   5篇
  1998年   12篇
  1997年   4篇
  1996年   3篇
  1995年   3篇
  1994年   3篇
  1993年   4篇
  1992年   4篇
  1991年   2篇
  1990年   9篇
  1989年   8篇
  1988年   2篇
  1987年   4篇
  1985年   5篇
  1984年   5篇
  1983年   6篇
  1982年   4篇
  1981年   5篇
  1980年   3篇
  1979年   4篇
  1978年   5篇
  1976年   2篇
  1975年   1篇
  1974年   1篇
  1973年   1篇
  1970年   1篇
排序方式: 共有270条查询结果,搜索用时 718 毫秒
111.
The Facial Action Coding System (FACS) [23] is an objective method for quantifying facial movement in terms of component actions. This system is widely used in behavioral investigations of emotion, cognitive processes, and social interaction. The coding is presently performed by highly trained human experts. This paper explores and compares techniques for automatically recognizing facial actions in sequences of images. These techniques include analysis of facial motion through estimation of optical flow; holistic spatial analysis, such as principal component analysis, independent component analysis, local feature analysis, and linear discriminant analysis; and methods based on the outputs of local filters, such as Gabor wavelet representations and local principal components. Performance of these systems is compared to naive and expert human subjects. Best performances were obtained using the Gabor wavelet representation and the independent component representation, both of which achieved 96 percent accuracy for classifying 12 facial actions of the upper and lower face. The results provide converging evidence for the importance of using local filters, high spatial frequencies, and statistical independence for classifying facial actions.  相似文献   
112.
Antioxidant Potential of Pea Beans (Phaseolus vulgaris L.)   总被引:1,自引:0,他引:1  
ABSTRACT: Four bean varieties ( Phaseolus vulgaris L.) (white kidney, red pinto, Swedish brown, and black kidney) and their hull fractions were extracted with 80% acetone and evaluated for their phenolic contents and antiradical activities. Total phenolic content of bean hulls and whole seed extracts ranged from 6.7 to 270 and 4.9 to 93.6 mg/g extract as catechin equivalents, respectively. Trolox equivalent antioxidant capacity (TEAC) assay revealed that the antioxidant capacity of red, brown, and black whole seed extracts was in the same order of magnitude with little variation. TEAC values of red and brown whole seed extracts were superior to that of black whole seed extract. On the basis of the total phenolic content and TEAC values, it can be deduced that colored beans possess superior antioxidative activity compared with white beans. The hydrogen peroxide scavenging capacity of different bean extracts ranged from 58% to 67% at 50 ppm and 65% to 76% at 100 ppm. The corresponding superoxide radical scavenging capacity was 24% to 29% at 50 ppm and 53% to 60% at 100 ppm. The 2,2–diphenyl-1–picrylhydrazyl (DPPH) radical scavenging capacity of black bean whole seed extracts was 22% at 50 ppm, whereas the other extracts showed 100% scavenging of this radical at both 50 and 100 ppm levels. The hydroxyl radical scavenging capacities of the bean extracts at 50 and 100 ppm were 12% to 29% and 32% to 49%, respectively. All extracts used prevented human low-density lipoprotein (LDL) cholesterol oxidation by 61.4% to 99.9% at 2 to 50 ppm level as catechin equivalents.  相似文献   
113.
A method using reverse phase thin layer and high performance liquid chromatography was developed to determine the level of the bitter principle occasionally found in zucchini (Cucurbita pepo L.). The system gave excellent separation with recovery rates of about 90% from spiked fruit. The bitter principle was confirmed by C13 NMR and mass spectrometry as cucurbitacin E glycoside which was present in concentrations in the order of 600mg kg?1 in bitter fruits. Bitterness was detected by a taste panel at cucurbitacin E glycoside concentrations of 1 mg kg?1 in aqueous solutions and 2 mg kg?1 in zucchini pulp. The method described should assist the screening for bitterness in commercial and breeding populations of zucchini.  相似文献   
114.
The present study evaluated the accuracy of pH differential (PD) method and HPLC method expressed as cyanidin-3-glucoside equivalent (CGE) for measuring total anthocyanin (TA) contents of five berries. Major anthocyanins of blueberry, blackberry, black currant, raspberry, and cranberry were analyzed with quantitative HPLC (q-HPLC) method using individual anthocyanin standards and used as a standard reference of comparison. PD method and HPLC method showed similar trend, although absolute amounts of TA differed in blueberry and cranberry. However, data showed that the TA of black currant and raspberry expressed as CGE considerably deviated from those obtained by q-HPLC. This discrepancy was due to underestimating TA of these two berries which contain disaccharides as major glycones, when expressed as CGE. On the other hand, when expressed as their major anthocyanin equivalents, TA of these two berries showed better approximate values with those by q-HPLC method. In addition, this finding was confirmed by Bland–Altman analysis. Our findings demonstrated that the type of glycone in berries is a critical factor to cause discrepancy between TA as CGE and actual TA and should be considered for measuring TA contents.  相似文献   
115.
116.
Notes that despite a rapidly expanding literature on the A-B therapist-type variable, an adequate conceptual and empirical understanding has not been forthcoming. The present study endeavored to increase the limited understanding of the A-B dimension as well as to compare 3 different versions of the A-B scale. A battery of interest, personality, and aptitude tests (e.g., the SVIB) was completed by 231 undergraduate males. This battery was subjected to a 2-step principal components analysis in order to minimize the effects of method-specific sources of variance. Each of the 3 A-B scales was then regressed against component scores, followed by multiple discriminant-function analyses. Results indicate that 2 of the 3 A-B scales seem to be tapping a dimension tentatively labeled as a "social interpersonal orientation vs an impersonal cognitively complex orientation toward concepts and things." Explanations for some inconsistencies in the literature, for the nature of the Therapist * Patient Type interaction effect, and for possible strategies for future research are discussed. (42 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
117.
Semantic priming effects from newly learned vocabulary words are examined in a lexical decision task. At low levels of learning, those primes whose meanings are recognizable but not recallable can inhibit responses to well-known, semantically related target words, whereas those whose meaning are recallable produce either no effect or facilitation, depending on instructions concerning how to use the prime information. These results are consistent with the notion that semantic priming effects are determined at least in part by the nature of the retrieval operations performed on the prime and target, over and above influences due to spreading activation and confirmed or violated expectations. Specifically, they indicate a need to include mechanisms other than violated expectations that can produce inhibition of retrieval. Candidate mechanisms are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
118.
The entire 〈UO2 ± x★★ data base for the dependence of the nonstoichiometry, x, on temperature and chemical potential of oxygen (oxygen potential) was retrieved from the literature and represented. This data base was interpreted by least-squares analysis using equations derived from the classical thermodynamic theory for the solid solution of a solute in a solvent. For hyperstoichiometric oxide at oxygen potentials more positive than ?266700 + 16.5T J/mol, the data were best represented by a [UO2]-[U3O7] solution. For O/U ratios above 2 and oxygen potentials below this boundary, a [UO2]-[U2O4.5] solution represented the data. The 〈UO2?x data were represented by a [UO2]-[U13] solution. The resulting equations represent the experimental ln(PO2)?ln(x) behavior and can be used in thermodynamic calculations to predict phase boundary compositions consistent with the literature. Collectively, the present analysis permits, for the first time, a mathematical representation of the behavior of the total data base.  相似文献   
119.
Neurons in sensory systems convey information about physical stimuli in their spike trains. In vitro, single neurons respond precisely and reliably to the repeated injection of the same fluctuating current, producing regions of elevated firing rate, termed events. Analysis of these spike trains reveals that multiple distinct spike patterns can be identified as trial-to-trial correlations between spike times (Fellous, Tiesinga, Thomas, & Sejnowski, 2004 ). Finding events in data with realistic spiking statistics is challenging because events belonging to different spike patterns may overlap. We propose a method for finding spiking events that uses contextual information to disambiguate which pattern a trial belongs to. The procedure can be applied to spike trains of the same neuron across multiple trials to detect and separate responses obtained during different brain states. The procedure can also be applied to spike trains from multiple simultaneously recorded neurons in order to identify volleys of near-synchronous activity or to distinguish between excitatory and inhibitory neurons. The procedure was tested using artificial data as well as recordings in vitro in response to fluctuating current waveforms.  相似文献   
120.
Communication and Information Systems (CIS) now form the primary information store, exchange and data analysis for all modern military and are crucial to command and control. The ubiquitousness of CIS within the military not only means that there is a complete reliance on CIS, but also presents new avenues of attack by malicious insiders. Military sources say that the insider threat is their number one security concern. This paper presents a case study of the technical counter measures and processes used to deter, detect and mitigate malicious insider threats that the author has researched, using non-classified anonymous interview and the analysis of anonymised qualitative field data, within a specific military organisation. It is not the intention of the author that this paper be viewed as an analysis of the “current state of play” of threats and countermeasures that generically exist across all military and defence organisations – rather it presents the technological and organisational processes utilised and challenges encountered at one organisation. A short discussion of the Computer Security Incident Response Team (CSIRT) structure adopted to successfully manage insider and other CIS security threats is presented, followed by a more detailed overview of existing and emerging technical efforts to deter, detect and mitigate such malicious insider threats within the military environment under study. Emphasis will be on the emerging technologies such as anomaly detection using real-time e-discovery, enterprise forensics and profiling users “cyber” behaviour and how these integrate into CSIRT technologies and processes. The technical advantages and challenges that such technologies present within a military alliance will be discussed. The success of such technologies in combating current malicious insider threat environment will be briefly compared with those put forward as challenges in the “Research on mitigating the insider threat to information systems #2” workgroup which took place in 2000 (Anderson et al., 2000.). In closing the author introduce the concept of Stateful Object Use Consequence Analysis as a way of managing the insider threat.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号