首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   434篇
  免费   17篇
电工技术   2篇
化学工业   80篇
金属工艺   1篇
机械仪表   2篇
建筑科学   21篇
能源动力   4篇
轻工业   43篇
水利工程   1篇
石油天然气   14篇
无线电   25篇
一般工业技术   77篇
冶金工业   130篇
自动化技术   51篇
  2024年   1篇
  2023年   3篇
  2022年   4篇
  2021年   11篇
  2020年   4篇
  2019年   5篇
  2018年   11篇
  2017年   11篇
  2016年   10篇
  2015年   10篇
  2014年   14篇
  2013年   24篇
  2012年   18篇
  2011年   33篇
  2010年   25篇
  2009年   27篇
  2008年   27篇
  2007年   18篇
  2006年   15篇
  2005年   20篇
  2004年   15篇
  2003年   18篇
  2002年   9篇
  2001年   7篇
  2000年   6篇
  1999年   14篇
  1998年   26篇
  1997年   10篇
  1996年   11篇
  1995年   3篇
  1994年   7篇
  1993年   3篇
  1992年   3篇
  1991年   2篇
  1990年   1篇
  1988年   4篇
  1987年   2篇
  1985年   2篇
  1984年   2篇
  1983年   1篇
  1982年   1篇
  1981年   3篇
  1979年   1篇
  1978年   1篇
  1977年   2篇
  1975年   1篇
  1973年   1篇
  1971年   2篇
  1970年   1篇
  1967年   1篇
排序方式: 共有451条查询结果,搜索用时 797 毫秒
1.
2.
The present studies demonstrated the moderation of self-construal orientation on mimicry. Recent research has indicated that an interdependent self-construal is associated with assimilation of the other to the self whereas an independent self-construal is associated with minimizing the influence of others on the self (H. R. Markus & S. Kitayama, 1991; D. Stapel & W. Koomen, 2001). Therefore, the authors hypothesized that an interdependent self-construal would be associated with more mimicry than an independent self-construal. When self-construal orientations were experimentally primed. as in Studies 1 and 2, independent self-construals produced less nonconscious mimicry than interdependent self-construals. When self-construals were examined as cultural differences with either a chronically dominant independent (Americans) or interdependent (Japanese) construal of the self, these results were replicated. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
3.
The study of resilient children has overturned many deficit-focused models concerning the ontogenesis of children raised in adversity. This study explored the relationship between risk and protective factors, resilience, and youth gambling behavior. More specifically, this study examined the relative contribution of various risk and protective domains in relation to problem gambling behavior and examined whether youth identified as resilient (high risk exposure- high internalized protection) were as likely as those identified as vulnerable (high risk exposure-low internalized protection) to engage in excessive gambling behavior. The sample consisted of 1,273 students ages 12 to 19. The findings demonstrated that risk and protective factors each provide a unique contribution to the prediction model of gambling problems. Resilient and vulnerable youth differed significantly in their self-reported gambling severity. As well, resilient youth were not statistically distinguishable from low-risk exposure groups in terms of their gambling severity. Findings are interpreted with respect to resilience and prevention research. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
4.
A national survey of school psychologists' acceptability of psychological assessment techniques in the area of externalizing problem behaviors was examined. School psychologists' ratings of 2 procedures, Behavioral Assessment (BA) and Traditional Assessment (TA), were compared using an analog case study methodology. Using a random sample of 500 National Association of School Psychologists members from the 1991–1992 membership directory, 339 Ss completed the Assessment Rating Profile after reading a hypothetical case summary describing a student with suspected externalizing problem behaviors. Results indicated statistically significant differences between assessment methods and ratings of acceptability. BA procedures were found to be more acceptable than TA procedures. Implications related to the acceptability of psychological assessment techniques, as well as implications for school psychology practitioners are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
5.
Discusses the generalization effects of 7 commercially available student social-skills training (SST) curricula. A table listing strategy, curricula, S characteristics, and results is given. Maintenance of improved behavior was seen as least successful when the "train and hope" strategy was used. The combination of SST and alteration of consequences in the classroom led to the most significant maintenance of results. The most effective programs were those that combined a variety of techniques. Improvement of behavior was obtained more often with withdrawn students than with aggressive students. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
6.
Summary The surface reactivity of poly(methylphenylphosphazene), PMPP, and its derivatives containing silane, PMPP-SiH, and alcohol, PMPP-OH, substituents was investigated. These polymers were fabricated into films by casting from THF solutions and reactions were carried out at the interface between solid film samples and solutions. The surface of PMPP was successfully modified by deprotonation under dilute conditions followed by reactions with RMe2SiCl [where R = CH=CH2, and H]. While surfaces of PMPP-OH were not readily modified, those containing Si-H groups reacted with oxygen when heated and with carbon tetrachloride. The polymer surfaces were examined by contact angle measurements, attenuated total reflectance infrared spectroscopy (ATR-IR), and scanning electron microscopy (SEM). We dedicate the paper to Christopher W. Allen in recognition of his outstanding contributions to inorganic ring and polymer chemistry.  相似文献   
7.
Dendroctonus jeffreyi andD. ponderosae are morphologically similar sympatric species of pine bark beetles over portions of their geographic ranges; however,D. jeffreyi is monophagous onP. jeffreyi whileD. ponderosae is highly polyphagous. Both species carry a species of mycangial fungi that are also very similar in appearance. Growth of the two mycangial fungi and of the fungusLeptographium terebrantis (associated with the polyphagous and non-tree-killingDendroctonus valens) in the presence of oleoresin constituents of host and nonhost conifers was tested by placing individual chemicals on agar growth medium and by growing the cultures in saturated atmospheres of the chemicals. The fungus associated withD. jeffreyi showed greater tolerance for chemical constituents placed on the growth medium than the other two fungi, and growth after three days was enhanced by heptane, the dominant constituent ofP. jeffreyi oleoresin. Growth of all three species of fungi was reduced by the resin constituents when the chemicals were presented as saturated atmospheres. The results suggest that the influence of the tree on growth of the symbiotic fungi of the bark beetles during the initial attack process may be different than after colonization by the beetles is complete. The difference in the responses of the apparently related species of mycangial fungi may provide some new insight into the evolutionary history of these beetle/mycangial fungus/host tree systems.  相似文献   
8.

Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for such modern-day systems. An intrusion detection system (IDS) is a solution that has recently gained the researcher’s attention with the application of deep learning techniques in IDS. In this paper, we propose an IDS model that uses a deep learning algorithm, conditional generative adversarial network (CGAN), enabling unsupervised learning in the model and adding an eXtreme gradient boosting (XGBoost) classifier for faster comparison and visualization of results. The proposed method can reduce the need to deploy extra sensors to generate fake data to fool the intruder 1.2–2.6%, as the proposed system generates this fake data. The parameters were selected to give optimal results to our model without significant alterations and complications. The model learns from its dataset samples with the multiple-layer network for a refined training process. We aimed that the proposed model could improve the accuracy and thus, decrease the false detection rate and obtain good precision in the cases of both the datasets, NSL-KDD and the CICIDS2017, which can be used as a detector for cyber intrusions. The false alarm rate of the proposed model decreases by about 1.827%.

  相似文献   
9.
This paper is about the influence of group inter-action processes known as group learning on the implementation of information technologies (IT). Aiming at a conceptualisation of the role of user interactions in IT implementation, a theoretical framework based on the experiential learning cycle is developed that includes five processes: collective acting, group reflecting, knowledge disseminating, sharing understanding and mutual adjustment. This theoretical framework is illustrated by the findings from three case studies. Analysis of 87 interviews revealed a unique function of group learning in IT implementation. It showed that group learning emerges immediately after a new IT is introduced to the targeted users and that it can take different standpoints (for or against adoption of the technology); it can also develop during the IT implementation and either progress or take a turn for the worse. The overall conclusion is that group learning is a ‘hidden’ mechanism that may speed up, slow down or even terminate an IT implementation project; and that therefore it is essential to appreciate its importance during IT projects and to steer it in a constructive direction.  相似文献   
10.
This paper focuses on Web accessibility. Relevant legislation and judicial decisions are reviewed, and prior empirical research is presented. This study presents the results from the Web accessibility analysis of the home pages of the 50 states and the District of Columbia. It found that twenty-nine percent of the home pages do not meet the requirements for Conformance Level A Web accessibility. Only one state meets Conformance Level AA standards, which are the minimum standards recommended for Web accessibility, and no state meets Conformance Level AAA standards. This paper also discusses how to address common accessibility problems.
Tanya GoetteEmail: Phone: +1-478-4455721
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号