首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   274篇
  免费   35篇
  国内免费   1篇
化学工业   71篇
金属工艺   1篇
机械仪表   7篇
建筑科学   20篇
矿业工程   1篇
能源动力   8篇
轻工业   13篇
水利工程   12篇
石油天然气   1篇
无线电   16篇
一般工业技术   63篇
冶金工业   53篇
原子能技术   1篇
自动化技术   43篇
  2024年   1篇
  2023年   7篇
  2022年   7篇
  2021年   9篇
  2020年   11篇
  2019年   16篇
  2018年   9篇
  2017年   19篇
  2016年   11篇
  2015年   10篇
  2014年   10篇
  2013年   20篇
  2012年   23篇
  2011年   28篇
  2010年   19篇
  2009年   13篇
  2008年   25篇
  2007年   19篇
  2006年   9篇
  2005年   6篇
  2004年   3篇
  2003年   6篇
  2002年   4篇
  2001年   5篇
  2000年   4篇
  1999年   3篇
  1998年   2篇
  1997年   2篇
  1995年   1篇
  1992年   1篇
  1990年   1篇
  1989年   1篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1978年   1篇
排序方式: 共有310条查询结果,搜索用时 15 毫秒
101.
There is growing evidence that the brain regions involved in encoding an episode are partially reactivated when that episode is later remembered. That is, the process of remembering an episode involves literally returning to the brain state that was present during that episode. This article reviews studies of episodic and associative memory that provide support for the assertion that encoding regions are reactivated during subsequent retrieval. In the first section, studies are reviewed in which neutral stimuli were associated with different modalities of sensory stimuli or different valences of emotional stimuli. When the neutral stimuli were later used as retrieval cues, relevant sensory and emotion processing regions were reactivated. In the second section, studies are reviewed in which participants used different strategies for encoding stimuli. When the stimuli were later retrieved, regions associated with the different encoding strategies were reactivated. Together, these studies demonstrate not only that the encoding experience determines which regions are activated during subsequent retrieval but also that the same regions are activated during encoding and retrieval. In the final section, relevant questions are posed and discussed regarding the reactivation of encoding regions during retrieval. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
102.
Objective: To relate lateralized impairments of visual perception in Parkinson's disease to asymmetries in the severity of motor symptoms. Method: Ten patients with worse left-sided motor symptoms (LPD), 15 with worse right-sided (RPD), and 13 healthy age-matched controls (all right-handed) viewed mirror-imaged pairs of emotional chimeric faces, (left side smiling, right neutral, and vice versa), of greyscales (strips whose luminance varied smoothly from black on the left to white on the right, and vice versa) and of gender chimeric faces (left side male, right female, and vice versa). Participants signaled which stimulus appeared happier, brighter, or more feminine, respectively, so showing which side received more attention. Results: For emotional chimeras, controls and LPD showed little bias, whereas RPD showed a strong bias to left hemispace (p = .018, r = .45). Across all patients, this bias was associated with severity of right-sided motor impairment (p = .018, r = .49). The bias was much weaker and insignificant for greyscales (p = .72, r = .14). For gender chimeras, RPD again showed a significantly greater left hemispace bias than did LPD (p = .037, r = .47), although neither patient group differed significantly from controls. Across all patients, this bias correlated with ratio of right-to-left symptom severity (p = .044, r = .48). Conclusions: The left hemispace bias in RPD is greater for facial than for luminance judgments, and is amplified for emotional judgments. Asymmetrical degeneration of the striatum, particularly involving the left side, appears to underlie this deficit in visual processing. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
103.
Patients who frequently miss or do not show for their scheduled psychotherapy appointments create administrative and clinical difficulties, and may not be receiving effective treatment. Prior research has predominately focused on either identifying demographic and administrative factors related to patient no-show rates or evaluating the effectiveness of administrative procedures for reducing no-shows. This paper attempts to identify rates of missed appointments in clinical practice and explore more specific clinical process factors related to patient no-shows. Psychotherapists (N = 24) and their patients (N = 542) in the outpatient department of a public safety-net hospital were surveyed to examine how frequently patients missed scheduled psychotherapy appointments and for what reasons. Findings indicate that the majority of missed appointments were accounted for by patients with occasional absences (approx. 1 per month), while only a small percentage of patients missed appointments with high frequency. Patients missed their psychotherapy appointments for a number of reasons, including clinical symptoms, practical matters, motivational concerns, and negative treatment reactions. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
104.
We address the problem of minimizing power consumption when broadcasting a message from one node to all the other nodes in a radio network. To enable power savings for such a problem, we introduce a compelling new data streaming problem which we call the Bad Santa problem. Our results on this problem apply for any situation where: (1) a node can listen to a set of n nodes, out of which at least half are non-faulty and know the correct message; and (2) each of these n nodes sends according to some predetermined schedule which assigns each of them its own unique time slot. In this situation, we show that in order to receive the correct message with probability 1, it is necessary and sufficient for the listening node to listen to a \(\Theta(\sqrt{n})\) expected number of time slots. Moreover, if we allow for repetitions of transmissions so that each sending node sends the message O(log?? n) times (i.e. in O(log?? n) rounds each consisting of the n time slots), then listening to O(log?? n) expected number of time slots suffices. We show that this is near optimal.We describe an application of our result to the popular grid model for a radio network. Each node in the network is located on a point in a two dimensional grid, and whenever a node sends a message m, all awake nodes within L distance r receive m. In this model, up to \(t<\frac{r}{2}(2r+1)\) nodes within any 2r+1 by 2r+1 square in the grid can suffer Byzantine faults. Moreover, we assume that the nodes that suffer Byzantine faults are chosen and controlled by an adversary that knows everything except for the random bits of each non-faulty node. This type of adversary models worst-case behavior due to malicious attacks on the network; mobile nodes moving around in the network; or static nodes losing power or ceasing to function. Let n=r(2r+1). We show how to solve the broadcast problem in this model with each node sending and receiving an expected \(O(n\log^{2}{|m|}+\sqrt{n}|m|)\) bits where |m| is the number of bits in m, and, after broadcasting a fingerprint of m, each node is awake only an expected \(O(\sqrt{n})\) time slots. Moreover, for t≤(1?ε)(r/2)(2r+1), for any constant ε>0, we can achieve an even better energy savings. In particular, if we allow each node to send O(log?? n) times, we achieve reliable broadcast with each node sending O(nlog?2|m|+(log?? n)|m|) bits and receiving an expected O(nlog?2|m|+(log?? n)|m|) bits and, after broadcasting a fingerprint of m, each node is awake for only an expected O(log?? n) time slots. Our results compare favorably with previous protocols that required each node to send Θ(|m|) bits, receive Θ(n|m|) bits and be awake for Θ(n) time slots.  相似文献   
105.
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues into account. Subsequent proposals used strong cryptographic methods to secure the routing information. In the process, however, these protocols created new avenues for denial of service (DoS). Consequently, the trade-off between security strength and DoS vulnerability has emerged as an area requiring further investigation. It is believed that different trust methods can be used to develop protocols at various levels in this trade-off. To gain a handle on this exchange, real world testing that evaluates the cost of existing proposals is necessary. Without this, future protocol design is mere speculation. In this paper, we give the first comparison of SAODV and TAODV, two MANET routing protocols, which address routing security through cryptographic and trust-based means respectively. We provide performance comparisons on actual resource-limited hardware. Finally, we discuss design decisions for future routing protocols.  相似文献   
106.
Among the many new opportunities that digital technologies are enabling are an increased capacity for viewers to interact not only with the program content, but with an increasingly wide array of other digital applications. Within this context this project has developed a new interaction device (incorporating gestural platform technology) and user interfaces to facilitate interactive access to digital media in a lounge room setting. This paper provides an overview of an interdisciplinary design process applied by Australasian CRC for Interaction Design (ACID) researchers—in order to develop the device and present in detail its unique features.  相似文献   
107.
Malware classification using machine learning algorithms is a difficult task, in part due to the absence of strong natural features in raw executable binary files. Byte n-grams previously have been used as features, but little work has been done to explain their performance or to understand what concepts are actually being learned. In contrast to other work using n-gram features, in this work we use orders of magnitude more data, and we perform feature selection during model building using Elastic-Net regularized Logistic Regression. We compute a regularization path and analyze novel multi-byte identifiers. Through this process, we discover significant previously unreported issues with byte n-gram features that cause their benefits and practicality to be overestimated. Three primary issues emerged from our work. First, we discovered a flaw in how previous corpora were created that leads to an over-estimation of classification accuracy. Second, we discovered that most of the information contained in n-grams stem from string features that could be obtained in simpler ways. Finally, we demonstrate that n-gram features promote overfitting, even with linear models and extreme regularization.  相似文献   
108.
Humans respond adaptively to uncertainty by escaping or seeking additional information. To foster a comparative study of uncertainty processes, we asked whether humans and a bottlenosed dolphin (Tursiops truncatus) would use similarly a psychophysical uncertain response. Human observers and the dolphin were given 2 primary discrimination responses and a way to escape chosen trials into easier ones. Humans escaped sparingly from the most difficult trials near threshold that left them demonstrably uncertain of the stimulus. The dolphin performed nearly identically. The behavior of both species is considered from the perspectives of signal detection theory and optimality theory, and its appropriate interpretation is discussed. Human and dolphin uncertain responses seem to be interesting cognitive analogs and may depend on cognitive or controlled decisional mechanisms. The capacity to monitor ongoing cognition, and use uncertainty appropriately, would be a valuable adaptation for animal minds. This recommends uncertainty processes as an important but neglected area for future comparative research. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
109.
Aluminum is acutely toxic, and elevated concentrations of dissolved Al can have detrimental effects on both terrestrial and aquatic ecosystems. Robust analytical methods that can determine environmentally relevant Al fractions accurately and efficiently are required by the environmental monitoring community. A simple, robust passive sampling method, the diffusive gradients in thin films (DGT) technique, was evaluated for the measurement of dissolved Al species in freshwater and marine water using either Chelex-100 or Metsorb (a titanium dioxide-based binding agent) as the adsorbent. Mass vs time DGT deployments at pH 5.05 (Al(3+) and Al(OH)(2+) dominate) and 8.35 (Al(OH)(4)(-) dominates) demonstrated linear uptake of Al (R(2) = 0.989 and 0.988, respectively) for Metsorb. Similar deployments of Chelex-DGT showed linear uptake at pH 5.05 (R(2) = 0.994); however, at pH 8.35 the mass of Al accumulated was 40-70% lower than predicted, suggesting that Chelex-100 is not suitable for Al measurements at high pH. The Metsorb-DGT measurement was independent of pH (5.0-8.5) and ionic strength (0.001-0.7 mol L(-1) NaNO(3)), whereas the Chelex-DGT measurement was only independent of ionic strength at pH 5.0. At pH 8.4, increasing ionic strength led to considerable underestimation (up to 67%) of Al concentration. Deployments of Metsorb-DGT (up to 4 days) in synthetic freshwater (pH range 5.4-8.1) and synthetic seawater (pH 8.15) resulted in linear mass uptakes, and the concentration measured by DGT agreed well with solution concentrations. Conversely, deployment of Chelex-DGT in synthetic seawater and freshwater (pH ≥7.7 Al(OH)(4)(-) dominant species) resulted in a decrease in accumulated mass with increasing deployment time. In situ field evaluations in fresh, estuarine, and marine waters confirmed that Metsorb-DGT was more accurate than Chelex-DGT for the measurement of dissolved Al in typical environmental waters.  相似文献   
110.
A new diffusive gradients in a thin film (DGT) technique for measuring dissolved reactive phosphorus (DRP) in fresh and marine waters is reported. The new method, which uses a commercially available titanium dioxide based adsorbent (Metsorb), was evaluated and compared to the well-established ferrihydrite-DGT method (ferrihydrite cast within the polyacrylamide gel). DGT time-series experiments showed that the mass of DRP accumulated by Metsorb and ferrihydrite was linear with time when deployed in simple solutions. Both DGT methods showed predictable uptake across the pH (4.0-8.3) and ionic strength (0.0001-1 mol L(-1) NaNO(3)) ranges investigated, and the total capacity of the Metsorb binding phase (~40,000 ng P) was 2.5-5 times higher than the reported total capacity of the ferrihydrite binding phase. The measurement of DRP in synthetic freshwater and synthetic seawater by Metsorb-DGT over a 4 day deployment period showed excellent agreement with the concentration of DRP measured directly in solution, whereas the ferrihydrite-DGT method significantly underestimated (23-30%) the DRP concentration in synthetic seawater for deployment times of two days or more. Field deployments of Metsorb-DGT samplers with various diffusive layer thicknesses allowed accurate measurement of both the diffusive boundary layer thickness and DRP concentration in situ. The Metsorb-DGT method performs similarly to ferrihydrite-DGT for freshwater measurements but is shown to be more accurate than the ferrihydrite method for determining DRP in seawater.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号