首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   106篇
  免费   2篇
  国内免费   1篇
化学工业   12篇
建筑科学   2篇
矿业工程   1篇
轻工业   1篇
石油天然气   3篇
无线电   7篇
一般工业技术   8篇
冶金工业   50篇
自动化技术   25篇
  2022年   1篇
  2020年   2篇
  2018年   1篇
  2017年   1篇
  2016年   2篇
  2015年   1篇
  2014年   4篇
  2013年   1篇
  2012年   3篇
  2011年   6篇
  2010年   7篇
  2009年   10篇
  2008年   6篇
  2007年   3篇
  2006年   2篇
  2005年   3篇
  2004年   5篇
  2003年   4篇
  2002年   5篇
  2001年   4篇
  2000年   2篇
  1999年   4篇
  1998年   3篇
  1997年   3篇
  1996年   3篇
  1995年   1篇
  1994年   3篇
  1993年   1篇
  1992年   1篇
  1990年   2篇
  1989年   3篇
  1988年   4篇
  1987年   1篇
  1985年   1篇
  1984年   3篇
  1983年   2篇
  1981年   1篇
排序方式: 共有109条查询结果,搜索用时 31 毫秒
1.
This column goes beyond previous insider analyses to identify a framework for a taxonomy of insider threats including both malicious and inadvertent actions by insiders that put organizations or their resources at some risk. The framework includes factors reflecting the organization, the individual, the information technology system, and the environment.  相似文献   
2.
This book warns readers about the proliferation of data capture and the degree to which we're tracked and traced on the Web. In ten heavily illustrated chapters, the author explains how our data are captured, retained, and shared (often for a price) with third parties. The author dedicates a chapter to ways of addressing the threat. He suggests methods for controlling cookies, diffusing or eliminating disclosures, encrypting important data, protecting a network address, and using policy as well as technical devices to minimize data capture and retention.  相似文献   
3.
This work‐in‐process literature review gives an overview of recent insight in the incorporation of social media in risk and crisis communication. By marrying literature and examples of social media use with best practices in risk and crisis communication, this study demonstrates how communicators can embrace social media tools to better manage a risk or crisis. Best practices in risk and crisis communication are summarized, examples of social media tools used to manage risks and crises are expounded, and recommendations for practitioners are provided to incorporate social media tools in risk and crisis communication.  相似文献   
4.
Abstract

Context: Aerosol delivery to animals in preclinical settings has historically been very challenging, requiring the use of techniques, such as intratracheal instillation and dry powder insufflation, that are somewhat invasive, inefficient and not representative of clinical inhalation.

Objective: The objective of this work is to develop a system to deliver dry powder to dogs in an efficient and effective manner for the study of new anti-migraine compounds in development.

Materials and methods: The new device uses a metered aliquot of a dry gas to force dry powder drug from a pre-filled HPMC capsule into an AeroChamber® spacer for subsequent inhalation by the animal.

Results: The delivery of two invesigational migraine drugs via the new device was assessed in vitro using abbreviated Andersen cascade impaction and showed the device is capable of generating a reproducible delivered dose of up to ~68% with more than 50% of the dose in the respirable range. In vivo studies have also been performed showing that this device effectively delivered the migraine drugs to spontaneously breathing dogs using a proprietary validated dog inhalation model.

Discussion: Results confirmed that the air pressurized capsule device (APCD) was effective in delivering the APIs to lungs of the animals. The in vivo data verified the advantages of inhaled delivery over oral delivery for this class of drugs and were used to establish the cardiopulmonary and respiratory side effect liability profile for these compounds.

Conclusions: This work has demonstrated the utility of this device for quick and accurate screening of prospective drug candidates, representing a significant improvement in ease of use and reprodicibility over current delivery methods.  相似文献   
5.
6.
7.
This paper focuses on the benefits that organizations may achieve from their investment in enterprise systems (ES). It proposes an ES benefit framework for summarizing benefits in the years after ES implementation. Based on an analysis of the features of enterprise systems, on the literature on information technology (IT) value, on data from 233 enterprise systems vendor‐reported stories published on the Web and on interviews with managers of 34 organizations using ES, the framework provides a detailed list of benefits that have reportedly been acquired through ES implementation. This list of benefits is consolidated into five benefits dimensions: operational, managerial, strategic, IT infrastructure and organizational, and illustrated using perceived net benefit flow (PNBF) graphs. In a detailed example, the paper shows how the framework has been applied to the identification of benefits in a longitudinal case study of four organizations.  相似文献   
8.
In October 2005, the IBM Human Ability and Accessibility Center and T.J. Watson Research Center hosted a symposium on “cognitive and learning difficulties and how they affect access to IT systems”. The central premise of the symposium was the recognition that cognitive and learning difficulties have a profound impact on a person’s ability to interact with information technology (IT) systems, but that little support is currently being offered by those systems. By bringing together internationally renowned experts from a variety of different, but complementary, research fields, the symposium aimed to provide a complete overview of the issues related to this topic. This paper summarises the discussions and findings of the symposium.  相似文献   
9.
Objective: To understand how traumatic brain injury (TBI) affects parent-child interactions acutely following injury. Participants: Young children hospitalized for TBI (n = 80) and orthopedic injuries (OI; n = 113). Method: Raters coded videotaped interactions during free play and structured tasks for parental warmth/responsiveness and negativity and child warmth, behavior regulation, and cooperation. Raters also counted parental directives, critical/restricting statements, and scaffolds. Results: Parents of children with TBI exhibited less warm responsiveness and made more directive statements during a structured task than parents in the OI group. Children with TBI displayed less behavior regulation than children with OI. Parental warm responsiveness was more strongly related to child cooperativeness in the OI group than in the TBI group. Child behavior also mediated group differences in parental responsiveness and directiveness. TBI accounted for as much variance in parental behaviors as or more than did sociodemographic factors. Conclusion: TBI-related changes in child behavior may negatively influence parent-child interactions and disrupt the reciprocity between parent and child. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
10.
Three experiments were conducted to test the hypothesis, derived from terror management theory, that reminding people of their mortality increases attraction to those who consensually validate their beliefs and decreases attraction to those who threaten their beliefs. In Study 1, subjects with a Christian religious background were asked to form impressions of Christian and Jewish target persons. Before doing so, mortality was made salient to half of the subjects. In support of predictions, mortality salience led to more positive evaluations of the in-group member (the Christian) and more negative evaluations of the out-group member (the Jew). In Study 2, mortality salience led to especially negative evaluations of an attitudinally dissimilar other, but only among subjects high in authoritarianism. In Study 3, mortality salience led to especially positive reactions to someone who directly praised subjects' cultural worldviews and especially negative reactions to someone who criticized them. The implications of these findings for understanding in-group favoritism, prejudice, and intolerance of deviance are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号