首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   89篇
  免费   11篇
电工技术   1篇
化学工业   14篇
金属工艺   1篇
建筑科学   2篇
轻工业   2篇
无线电   11篇
一般工业技术   34篇
冶金工业   13篇
自动化技术   22篇
  2022年   3篇
  2021年   2篇
  2020年   4篇
  2019年   7篇
  2018年   5篇
  2017年   3篇
  2016年   3篇
  2015年   5篇
  2014年   2篇
  2012年   2篇
  2011年   5篇
  2010年   5篇
  2008年   1篇
  2007年   3篇
  2006年   2篇
  2005年   1篇
  2004年   1篇
  2003年   1篇
  2001年   1篇
  1999年   2篇
  1998年   3篇
  1997年   1篇
  1996年   2篇
  1994年   1篇
  1993年   2篇
  1992年   1篇
  1988年   2篇
  1987年   1篇
  1986年   4篇
  1985年   2篇
  1983年   1篇
  1981年   4篇
  1976年   3篇
  1975年   3篇
  1974年   1篇
  1973年   1篇
  1972年   2篇
  1971年   3篇
  1970年   1篇
  1969年   3篇
  1967年   1篇
排序方式: 共有100条查询结果,搜索用时 31 毫秒
1.
Persistence has been identified as a crucial quality of learning. However, it is hard to attain in online game-based environments as the drive to progress in the game may influence the ability to achieve the learning goals. This study aimed to examine the associations between micro-persistence, that is, the tendency to complete an individual task successfully, and task difficulty while acquiring computational thinking (CT). We further explored whether contextual or personal attributes better explain micro-persistence. We analysed data of 111 school students who used the CodeMonkey platform. We took a learning analytics approach for analysing the platform's log files. We found that micro-persistence is associated with task difficulty and that students who demonstrated an aptitude to learn new material are motivated to achieve the best solution. We also found that contextual variables better-explained micro-persistence than personal attributes. Encouraging micro-persistence can improve CT acquisition and the learning processes involved.  相似文献   
2.
Conventional access methods cannot be effectively used in large Scientific/Statistical Database (SSDB) applications. A file structure (called bit transposed file (BTF)) is proposed which offers several attractive features that are better suited for the special characteristics that SSDBs exhibit. This file structure is an extreme version of the (attribute) transposed file. The data are stored by vertical bit partitions. The bit patterns of attributes are assigned using one of several data encoding methods. Each of these encoding methods is appropriate for different query types. The bit partitions can also be compressed using a version of the run length encoding scheme. Efficient operators on compressed bit vectors have been developed and form the basis of a query language. Because of the simplicity of the file structure and query language, optimization problems for database design, query evaluation, and common subexpression removal can be formalized and efficient exact solution or near optimal solution can be achieved. In addition to selective power with low overheads for SSDBs, the BTF is also amenable to special parallel hardware. Results from experiments with the file structure suggest that this approach may be a reasonable alternative file structure for large SSDBs.  相似文献   
3.
4.
R.Rotem  罗勇 《国际纺织导报》2007,35(7):16-16,26
今天,人们对休闲活动的热情与日俱增.随之而来的是对用功能性强的高性能织物制作的服装的需求的增长,这种服装使穿着者在肘部、肩部、胯部、股部和膝部(在服装的长度或宽度方向上)都能伸展自如.这种服装耐用、轻便、时尚,穿用者能够移动、赛跑、骑车、跳跃、行走和攀爬.  相似文献   
5.
Severe splenomegaly and anemia developed in a 5-year-old girl with diffuse lymphangiomatosis of the upper part of the body. Radioisotope scanning and celiac angiography demonstrated lymphangiomatosis of the spleen, a rare but diagnosable condition. Intractable infection in areas of ulcerated skin led to her death from overwhelming sepsis.  相似文献   
6.
The first ply failure in composite laminates are studied by 3-D fracture mechanic approach. The fracture model is based on a crack embedded in one of the inner layers. Numerical results for the case of “angle ply” laminates are based on a general 3-D finite difference program.Stress intensity factors and fracture energy are evaluated by the J-integral 2-D and 3-D methods as well as by the stresses and energy balance. It was found that the J(2-D) method can be applied to 3-D problems while the J(3-D) method is not suitable for the numerical computation.The influence of geometrical properties of the crack and the layers on the various stress intensity factors is presented and discussed. Change in failure mechanism of the weakest ply was proved by experiments to fit with numerical results. It was found that the weakest layer is strengthened by the others, a fact which has been verified experimentally and hasn't been explained by other approaches.  相似文献   
7.
A new and more detailed analysis of the unidirectional algorithm of Chang and Roberts for distributed extrema finding on a ring is presented. This analysis shows that this simple algorithm, which is known to be average case optimal, compares very favorably with all the other known algorithms as it requires O(n log n) messages with probability tending to one. A bidirectional version of this algorithm is presented and is shown to dominate the unidirectional one in its average message complexity. Finally, both the unidirectional and the bidirectional algorithms are generalized to perform k selection in the ring, i.e., find the k largest labeled processors.  相似文献   
8.
In 1994-1996 at the Surgical Department in Trebisov a total of 203 diagnostic and therapeutic operations of the papila of Vater were performed. The rate of successful operations was 91.3% in 1996. The authors emphasise the necessity to introduce endoscopic methods into the common practice of surgical departments. They consider EPS the therapeutic method of choice in choledocholithiasis with very good results.  相似文献   
9.

Objectives

The goal of this study was to quantify CEST related parameters such as chemical exchange rate and fractional concentration of exchanging protons at a clinical 3T scanner. For this purpose, two CEST quantification approaches—the AREX metric (for ‘apparent exchange dependent relaxation’), and the AREX-based Ω-plot method were used. In addition, two different pulsed RF irradiation schemes, using Gaussian-shaped and spin-lock pulses, were compared.

Materials and methods

Numerical simulations as well as MRI measurements in phantoms were performed. For simulations, the Bloch–McConnell equations were solved using a two-pool exchange model. MR experiments were performed on a clinical 3T MRI scanner using a cylindrical phantom filled with creatine solution at different pH values and different concentrations.

Results

The validity of the Ω-plot method and the AREX approach using spin-lock preparation for determination of the quantitative CEST parameters was demonstrated. Especially promising results were achieved for the Ω-plot method when the spin-lock preparation was employed.

Conclusion

Pulsed CEST at 3T could be used to quantify parameters such as exchange rate constants and concentrations of protons exchanging with free water. In the future this technique might be used to estimate the exchange rates and concentrations of biochemical substances in human tissues in vivo.
  相似文献   
10.
In recent years, the within-host viral dynamics of dengue infections have been increasingly characterized, and the relationship between aspects of these dynamics and the manifestation of severe disease has been increasingly probed. Despite this progress, there are few mathematical models of within-host dengue dynamics, and the ones that exist focus primarily on the general role of immune cells in the clearance of infected cells, while neglecting other components of the immune response in limiting viraemia. Here, by considering a suite of mathematical within-host dengue models of increasing complexity, we aim to isolate the critical components of the innate and the adaptive immune response that suffice in the reproduction of several well-characterized features of primary and secondary dengue infections. By building up from a simple target cell limited model, we show that only the innate immune response is needed to recover the characteristic features of a primary symptomatic dengue infection, while a higher rate of viral infectivity (indicative of antibody-dependent enhancement) and infected cell clearance by T cells are further needed to recover the characteristic features of a secondary dengue infection. We show that these minimal models can reproduce the increased risk of disease associated with secondary heterologous infections that arises as a result of a cytokine storm, and, further, that they are consistent with virological indicators that predict the onset of severe disease, such as the magnitude of peak viraemia, time to peak viral load, and viral clearance rate. Finally, we show that the effectiveness of these virological indicators to predict the onset of severe disease depends on the contribution of T cells in fuelling the cytokine storm.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号