首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   411篇
  免费   12篇
电工技术   1篇
化学工业   84篇
金属工艺   12篇
机械仪表   3篇
建筑科学   13篇
能源动力   3篇
轻工业   28篇
水利工程   1篇
石油天然气   24篇
无线电   18篇
一般工业技术   99篇
冶金工业   81篇
原子能技术   13篇
自动化技术   43篇
  2023年   4篇
  2022年   7篇
  2021年   11篇
  2020年   4篇
  2019年   7篇
  2018年   9篇
  2017年   10篇
  2016年   8篇
  2015年   5篇
  2014年   14篇
  2013年   20篇
  2012年   21篇
  2011年   28篇
  2010年   22篇
  2009年   25篇
  2008年   23篇
  2007年   18篇
  2006年   13篇
  2005年   16篇
  2004年   17篇
  2003年   18篇
  2002年   12篇
  2001年   6篇
  2000年   3篇
  1999年   9篇
  1998年   9篇
  1997年   7篇
  1996年   6篇
  1994年   3篇
  1993年   2篇
  1992年   5篇
  1991年   4篇
  1990年   3篇
  1989年   2篇
  1988年   6篇
  1987年   4篇
  1986年   6篇
  1985年   2篇
  1983年   1篇
  1982年   2篇
  1981年   6篇
  1980年   6篇
  1978年   4篇
  1977年   4篇
  1976年   2篇
  1975年   1篇
  1974年   2篇
  1972年   1篇
  1971年   1篇
  1964年   1篇
排序方式: 共有423条查询结果,搜索用时 12 毫秒
1.
The present studies demonstrated the moderation of self-construal orientation on mimicry. Recent research has indicated that an interdependent self-construal is associated with assimilation of the other to the self whereas an independent self-construal is associated with minimizing the influence of others on the self (H. R. Markus & S. Kitayama, 1991; D. Stapel & W. Koomen, 2001). Therefore, the authors hypothesized that an interdependent self-construal would be associated with more mimicry than an independent self-construal. When self-construal orientations were experimentally primed. as in Studies 1 and 2, independent self-construals produced less nonconscious mimicry than interdependent self-construals. When self-construals were examined as cultural differences with either a chronically dominant independent (Americans) or interdependent (Japanese) construal of the self, these results were replicated. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
2.
The study of resilient children has overturned many deficit-focused models concerning the ontogenesis of children raised in adversity. This study explored the relationship between risk and protective factors, resilience, and youth gambling behavior. More specifically, this study examined the relative contribution of various risk and protective domains in relation to problem gambling behavior and examined whether youth identified as resilient (high risk exposure- high internalized protection) were as likely as those identified as vulnerable (high risk exposure-low internalized protection) to engage in excessive gambling behavior. The sample consisted of 1,273 students ages 12 to 19. The findings demonstrated that risk and protective factors each provide a unique contribution to the prediction model of gambling problems. Resilient and vulnerable youth differed significantly in their self-reported gambling severity. As well, resilient youth were not statistically distinguishable from low-risk exposure groups in terms of their gambling severity. Findings are interpreted with respect to resilience and prevention research. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
3.
A national survey of school psychologists' acceptability of psychological assessment techniques in the area of externalizing problem behaviors was examined. School psychologists' ratings of 2 procedures, Behavioral Assessment (BA) and Traditional Assessment (TA), were compared using an analog case study methodology. Using a random sample of 500 National Association of School Psychologists members from the 1991–1992 membership directory, 339 Ss completed the Assessment Rating Profile after reading a hypothetical case summary describing a student with suspected externalizing problem behaviors. Results indicated statistically significant differences between assessment methods and ratings of acceptability. BA procedures were found to be more acceptable than TA procedures. Implications related to the acceptability of psychological assessment techniques, as well as implications for school psychology practitioners are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
4.
5.
Discusses the generalization effects of 7 commercially available student social-skills training (SST) curricula. A table listing strategy, curricula, S characteristics, and results is given. Maintenance of improved behavior was seen as least successful when the "train and hope" strategy was used. The combination of SST and alteration of consequences in the classroom led to the most significant maintenance of results. The most effective programs were those that combined a variety of techniques. Improvement of behavior was obtained more often with withdrawn students than with aggressive students. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
6.
Conclusions -- The supermolecular structure of spinning solutions from viscose manufacturing operations in the Balakovskii Khimvolokno PO has been studied by the turbidity spectrum method.-- Multiple and paired correlation equations have been obtained for the parameters of viscose supermolecular structure and the characteristics of the cellulose and the physicomechanical characteristics of hydrocellulose fibres and films.Translated from Khimicheskie Volokna, No. 5, pp. 42–45, September–October, 1991.  相似文献   
7.

Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for such modern-day systems. An intrusion detection system (IDS) is a solution that has recently gained the researcher’s attention with the application of deep learning techniques in IDS. In this paper, we propose an IDS model that uses a deep learning algorithm, conditional generative adversarial network (CGAN), enabling unsupervised learning in the model and adding an eXtreme gradient boosting (XGBoost) classifier for faster comparison and visualization of results. The proposed method can reduce the need to deploy extra sensors to generate fake data to fool the intruder 1.2–2.6%, as the proposed system generates this fake data. The parameters were selected to give optimal results to our model without significant alterations and complications. The model learns from its dataset samples with the multiple-layer network for a refined training process. We aimed that the proposed model could improve the accuracy and thus, decrease the false detection rate and obtain good precision in the cases of both the datasets, NSL-KDD and the CICIDS2017, which can be used as a detector for cyber intrusions. The false alarm rate of the proposed model decreases by about 1.827%.

  相似文献   
8.
This paper is about the influence of group inter-action processes known as group learning on the implementation of information technologies (IT). Aiming at a conceptualisation of the role of user interactions in IT implementation, a theoretical framework based on the experiential learning cycle is developed that includes five processes: collective acting, group reflecting, knowledge disseminating, sharing understanding and mutual adjustment. This theoretical framework is illustrated by the findings from three case studies. Analysis of 87 interviews revealed a unique function of group learning in IT implementation. It showed that group learning emerges immediately after a new IT is introduced to the targeted users and that it can take different standpoints (for or against adoption of the technology); it can also develop during the IT implementation and either progress or take a turn for the worse. The overall conclusion is that group learning is a ‘hidden’ mechanism that may speed up, slow down or even terminate an IT implementation project; and that therefore it is essential to appreciate its importance during IT projects and to steer it in a constructive direction.  相似文献   
9.
This paper focuses on Web accessibility. Relevant legislation and judicial decisions are reviewed, and prior empirical research is presented. This study presents the results from the Web accessibility analysis of the home pages of the 50 states and the District of Columbia. It found that twenty-nine percent of the home pages do not meet the requirements for Conformance Level A Web accessibility. Only one state meets Conformance Level AA standards, which are the minimum standards recommended for Web accessibility, and no state meets Conformance Level AAA standards. This paper also discusses how to address common accessibility problems.
Tanya GoetteEmail: Phone: +1-478-4455721
  相似文献   
10.
A theory of mass transfer in capillary-porous bodies is proposed which allows for thermogradient transfer of a bound substance in liquid form. The results obtained are used to calculate the process of drying of ceramic articles in a fluidized bed.Notation t, T temperature - am coefficient of moisture conductivity - , , density, viscosity, and surface tension of liquid - h thickness of liquid film - n disjoining pressure - A Hamaker constant - coefficient of external mass exchange - 1 coefficient of heat transfer - coefficient of thermal conductivity - Fo Fourier number - volumetric moisture content of porous body - Ws surface moisture content of body - n=n1+n2 porosity - r pore radius in the particles - F= F1+ F2 surface area of porous body - R1, R2 radii of wide and narrow capillaries - moisture content - xo, xoe coordinates of menisci in wide capillaries and at end of first stage, respectively - Po, Poe Pressures at surface of body and at end of first stage, respectively Translated from Inzhenerno-Fizicheskii Zhurnal, Vol. 39, No. 1, pp. 11–18, July, 1980.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号