首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   183篇
  免费   4篇
化学工业   32篇
机械仪表   1篇
建筑科学   15篇
能源动力   7篇
轻工业   9篇
石油天然气   2篇
无线电   34篇
一般工业技术   24篇
冶金工业   25篇
原子能技术   1篇
自动化技术   37篇
  2022年   1篇
  2021年   3篇
  2020年   2篇
  2019年   2篇
  2018年   4篇
  2017年   4篇
  2016年   6篇
  2015年   3篇
  2014年   2篇
  2013年   10篇
  2012年   8篇
  2011年   8篇
  2010年   7篇
  2009年   7篇
  2008年   6篇
  2007年   7篇
  2006年   6篇
  2005年   5篇
  2004年   9篇
  2003年   3篇
  2002年   5篇
  2001年   5篇
  2000年   1篇
  1998年   11篇
  1997年   9篇
  1996年   2篇
  1995年   3篇
  1994年   2篇
  1993年   3篇
  1992年   1篇
  1990年   1篇
  1989年   2篇
  1985年   1篇
  1984年   2篇
  1983年   5篇
  1982年   6篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1976年   1篇
  1975年   2篇
  1974年   3篇
  1973年   2篇
  1972年   5篇
  1971年   1篇
  1970年   4篇
  1969年   2篇
  1965年   1篇
排序方式: 共有187条查询结果,搜索用时 15 毫秒
81.
Existing information-visualization techniques that target small screens are usually limited to exploring a few hundred items. In this article we present a scatterplot tool for personal digital assistants that allows the handling of many thousands of items. The application's scalability is achieved by incorporating two alternative interaction techniques: a geometric-semantic zoom that provides smooth transition between overview and detail, and a fisheye distortion that displays the focus and context regions of the scatterplot in a single view. A user study with 24 participants was conducted to compare the usability and efficiency of both techniques when searching a book database containing 7500 items. The study was run on a pen-driven Wacom board simulating a PDA interface. While the results showed no significant difference in task-completion times, a clear majority of 20 users preferred the fisheye view over the zoom interaction. In addition, other dependent variables such as user satisfaction and subjective rating of orientation and navigation support revealed a preference for the fisheye distortion. These findings partly contradict related research and indicate that, when using a small screen, users place higher value on the ability to preserve navigational context than they do on the ease of use of a simplistic, metaphor-based interaction style  相似文献   
82.
Matrix Factorization Techniques for Recommender Systems   总被引:14,自引:0,他引:14  
As the Netflix Prize competition has demonstrated, matrix factorization models are superior to classic nearest-neighbor techniques for producing product recommendations, allowing the incorporation of additional information such as implicit feedback, temporal effects, and confidence levels.  相似文献   
83.
Eight milligrams per litre chlorine applied to oxidation pond effluents caused no algal kill within the first 2 h of contact. The available chlorine attacks bacteria causing coliform count to drop from 105 100 ml−1 to a few tens. Enterovirus counts dropped from about 80 100 ml−1 before chlorination to 37 100 ml−1 (after chlorination). Vibrio cholerae (El-Tor) were killed under these adverse conditions, and MPN dropped from 103 100 ml−1 in the influent wastes to 2 100 ml−1 in the effluents. A 5 mg l−1 dose of chlorine at 1 h contact time killed these sensitive bacteria decreasing MPN to less than 2 100 ml−1.Differences between the efficiency of chlorination experiments under laboratory and field conditions would necessitate the application of 15 mg l−1 chlorine for 2 h of contact.  相似文献   
84.
Many of the enteric viruses which are transmitted from person to person by thefecal-oral route are found in raw and treated wastewater, and because of their persistence under adverse conditions may also be found in slightly polluted waters.There is no routine examination procedure of water and wastewater for entero-viruses,mainly because of the cumbersome isolation techniques, high cost and the need for highly skilled laboratory personnel.Phages are specific to single species of bacteria, are known for many entericbacteria, and are very often used for final identification of enteric pathogenic bacteria.Coliphages are provalent in raw and treated sewage as well as in polluted water, where enteric viruses may also be found.Coliphages were often mentioned as possible viral indicators in polluted water.To be a perfect indicator, they should comply with minimum criteria as follows: (a) they should be present wherever human enteric viruses are present: (b) the coliphage numbers recovered should be equal to or larger than those of enteric viruses recovered: (c) the coliphages should be at least as resistant as enteric viruses to adverse environmental conditions: (d) isolation and quantification of the coliphage should be faster and less expensive than isolation of the enteroviruses.Comparative studies show that the coliphage to enterovirus ratio in wastewater is about 103:1. Levels of poliovirus 1 (attenuated) to coliphage f2 remained stable for a few months in oxidation pond effluents.f2 coliphage exhibited higher resistance to chlorination than poliovirus 1 (attenuated). When the two strains were kept in water of different quality, f2 survived longer. In addition, all coliphage counts were completed within 24 h. while those of enteroviruses required about a week. Results indicate very strongly that coliphages can be used as viral indicators and this is already the practice in a few European and other countries.  相似文献   
85.
86.
Irradiation in the CT band of Eu3+ in aqueous solution, in the presence of scavengers for H atoms, gives rise to formation of Eu2+ and evolution of molecular hydrogen. The kinetics of these processes were studied as functions of the concentrations of Eu3+ and scavenger, of pH, and of light intensity. The results are interpreted by means of a complex scheme in which an excited Eu2+ donates an electron to a proton, the resulting H* initiating a series of dark reactions which lead to evolution of H2 and oxidation of the scavenger.  相似文献   
87.
The rapid development of IT has created a problematic situation in higher education by providing individuals with a greater opportunity to engage in academic dishonesty especially in online courses, in contrast to traditional classroom courses. There are various factors that were used in research to explain the phenomenon of academic dishonesty. Among them are personality traits that were found to be effective in explaining unethical behaviors. Therefore, this study explores students' personality traits as predictors of academic dishonesty in the context of traditional and distance-learning courses in higher education. Data from 1,365 students enrolled in academic institutes in the U.S.A and Israel were surveyed to assess their personality and their willingness to commit various acts of academic misconduct. The findings indicate that in both countries dishonest behaviors are greater in face-to-face than in online courses. In addition, both American and Israeli students identified with the personality trait of agreeableness showed a negative correlation with academic dishonesty, Furthermore, Israeli students identified with the personality traits of conscientiousness and emotional stability demonstrated a negative correlation with academic dishonesty. In contrast, the personality trait of extraversion among American students was positively correlated with academic misconduct. Implications for further research are discussed.  相似文献   
88.
Data on the flow pattern transition for gas liquid flow in pipes for downward 0–90° inclination was collected. Mathematical models were developed to predict the flow pattern in the whole range of downward inclination.  相似文献   
89.
Protocols for secure computation enable mutually distrustful parties to jointly compute on their private inputs without revealing anything, but the result. Over recent years, secure computation has become practical and considerable effort has been made to make it more and more efficient. A highly important tool in the design of two-party protocols is Yao’s garbled circuit construction (Yao 1986), and multiple optimizations on this primitive have led to performance improvements in orders of magnitude over the last years. However, many of these improvements come at the price of making very strong assumptions on the underlying cryptographic primitives being used (e.g., that AES is secure for related keys, that it is circular-secure, and even that it behaves like a random permutation when keyed with a public fixed key). The justification behind making these strong assumptions has been that otherwise it is not possible to achieve fast garbling and thus fast secure computation. In this paper, we take a step back and examine whether it is really the case that such strong assumptions are needed. We provide new methods for garbling that are secure solely under the assumption that the primitive used (e.g., AES) is a pseudorandom function. Our results show that in many cases, the penalty incurred is not significant, and so a more conservative approach to the assumptions being used can be adopted.  相似文献   
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号