首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   640篇
  免费   9篇
电工技术   3篇
化学工业   127篇
金属工艺   2篇
建筑科学   20篇
能源动力   8篇
轻工业   35篇
水利工程   5篇
石油天然气   1篇
无线电   56篇
一般工业技术   70篇
冶金工业   110篇
原子能技术   7篇
自动化技术   205篇
  2022年   7篇
  2019年   8篇
  2018年   4篇
  2017年   3篇
  2016年   4篇
  2015年   11篇
  2014年   14篇
  2013年   22篇
  2012年   25篇
  2011年   41篇
  2010年   28篇
  2009年   35篇
  2008年   36篇
  2007年   27篇
  2006年   27篇
  2005年   22篇
  2004年   29篇
  2003年   21篇
  2002年   18篇
  2001年   23篇
  2000年   12篇
  1999年   8篇
  1998年   16篇
  1997年   12篇
  1996年   13篇
  1995年   8篇
  1994年   6篇
  1993年   14篇
  1992年   8篇
  1991年   4篇
  1990年   9篇
  1989年   7篇
  1988年   7篇
  1987年   6篇
  1986年   10篇
  1985年   3篇
  1984年   10篇
  1983年   3篇
  1982年   13篇
  1981年   6篇
  1980年   5篇
  1979年   7篇
  1978年   8篇
  1977年   4篇
  1976年   6篇
  1975年   3篇
  1974年   4篇
  1973年   8篇
  1971年   3篇
  1967年   4篇
排序方式: 共有649条查询结果,搜索用时 15 毫秒
1.
Examined the psychological characteristics of the children of holocaust survivors. 38 males and females in their late 20's were interviewed; the parents of 19 Ss were holocaust survivors, and the parents of the other 19 Ss were in Israel during World War II and did not suffer directly. It was hypothesized that reactions of the children of the holocaust survivors would include guilt rather than external aggression and a tendency not to externalize aggressive impulses in reaction to frustrating events. The Ss' reactions to a projective test were analyzed, and the responses provide support for the major hypothesis. Results show that sons and daughters of holocaust survivors were less likely to externalize aggression than were those in a control group. This finding is supported by the content analysis of the structured interview conducted with the Ss in both groups. (20 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
2.
Many expert system researchers have reported in recent years that situation-action symbolic production rules frequently fail to provide adequate knowledge representation schemes without resorting to numeric computation. However, despite the need to integrate symbolic and quantitative computation into one coherent framework of knowledge, surprisingly few architectures have been proposed for achieving this goal. This paper explores the integration of qualitative and numeric processing in expert systems. We address the topic with respect to the construction of expert systems that perform the tasks of design and multiple fault troubleshooting. This paper shows that these tasks can be handled effectively when an appropriate interface is established between the heuristic and the numeric knowledge-based components. Specifically, we demonstrate how to interface heuristic knowledge with non-linear optimization models in order to allow an expert system greater expressiveness. An actual example is presented from the machining domain.  相似文献   
3.
The density functional theory (DFT/B3LYP) calculations were applied to investigate the interaction of a Pt6 particle with the ZSM-5 zeolite framework. The electronic structure of the metal particle is strongly affected by the interaction with basic framework oxygens and acid sites of the zeolite support. Adsorption on basic sites (Eads = 6 kcal/mol) favors the formation of the electron enriched metal cluster. Interaction of the platinum cluster with the acid site characterized by stabilization energy of 47 kcal/mol results in oxidation of the metal particle and suppression of Brønsted acidity of the support. The hypothesis is put forward that the oxidized platinum particle can function as an active site for the alkane isomerisation on platinum supported high silica zeolites.  相似文献   
4.
A meta-analysis by J. T. Jost, J. Glaser, A. W. Kruglanski, and F. J. Sulloway (2003) concluded that political conservatism is partially motivated by the management of uncertainty and threat. In this reply to J. Greenberg and E. Jonas (2003), conceptual issues are clarified, numerous political anomalies are explained, and alleged counterexamples are incorporated with a dynamic model that takes into account differences between "young" and "old" movements. Studies directly pitting the rigidity-of-the-right hypothesis against the ideological extremity hypothesis demonstrate strong support for the former. Medium to large effect sizes describe relations between political conservatism and dogmatism and intolerance of ambiguity; lack of openness to experience; uncertainty avoidance; personal needs for order, structure, and closure; fear of death; and system threat. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
5.
Laser-induced chemical vapour deposition of silicon films on SiO2/Si (1 0 0) and Si (1 0 0) substrates was studied using ArF laser irradiation of silane/argon gas mixture in parallel to the substrate. The optimal deposition conditions were specified by examination of film morphology at a wide range of irradiation and process parameters. At optimal conditions, specular films were obtained with no powder formation. The effect of deposition parameters, such as laser energy and repetition rate, on the deposition rate and the related film quality, was investigated.  相似文献   
6.
7.
We present two proactive resource allocation algorithms, RBA*-FT and OBA-FT, for fault-tolerant asynchronous real-time distributed systems. The algorithms consider an application model where task timeliness is specified by Jensen's benefit functions and the anticipated application workload during future time intervals is described by adaptation functions. In addition, we assume that reliability functions of processors are available a priori. Given these models, our objective is to maximize aggregate task benefit and minimize aggregate missed deadline ratio in the presence of processor failures. Since determining the optimal solution is computationally intractable, the algorithms heuristically compute sub-optimal resource allocations, but in polynomial time. Experimental results reveal that RBA*-FT and OBA-FT outperform their non-fault-tolerant counterparts in the presence of processor failures. Furthermore, RBA*-FT performs better than OBA-FT, although OBA-FT incurs better worst-case and amortized computational costs. Finally, we observe that both algorithms robustly withstand errors in the estimation of anticipated failures.  相似文献   
8.
In this paper, we derive analytical expressions for finite gain, finite bandwidth laser frequency locking systems. The common case of Drever-Hall (FM sideband) locking to a Fabry-Perot cavity is discussed, using a proportional+integral (PI) controller as an example. The effects of nonnegligible loop time-delay on stability are discussed, and an optimal design procedure for a frequency locking system is given  相似文献   
9.
There are pragmatic benefits to trait-consistent mood states, especially when people are evaluating new objects within the environment (M. Tamir, M. D. Robinson, & G. L. Clore, 2002). The present studies, involving both naturally occurring (Studies 1 and 2) and manipulated (Study 3) mood states, demonstrated such trait-consistent interactions within the context of neuroticism and negative mood states. Individuals high in neuroticism were faster to make evaluations when in a negative mood state like sadness. By contrast, individuals low in neuroticism were faster to make evaluations when in a neutral mood state. The present studies demonstrate that although negative mood states are hedonically unpleasant, they can be beneficial in some ways for individuals high in neuroticism. (PsycINFO Database Record (c) 2011 APA, all rights reserved)  相似文献   
10.
k-Anonymity is a privacy preserving method for limiting disclosure of private information in data mining. The process of anonymizing a database table typically involves generalizing table entries and, consequently, it incurs loss of relevant information. This motivates the search for anonymization algorithms that achieve the required level of anonymization while incurring a minimal loss of information. The problem of k-anonymization with minimal loss of information is NP-hard. We present a practical approximation algorithm that enables solving the k-anonymization problem with an approximation guarantee of O(ln k). That algorithm improves an algorithm due to Aggarwal et al. (Proceedings of the international conference on database theory (ICDT), 2005) that offers an approximation guarantee of O(k), and generalizes that of Park and Shim (SIGMOD ’07: proceedings of the 2007 ACM SIGMOD international conference on management of data, 2007) that was limited to the case of generalization by suppression. Our algorithm uses techniques that we introduce herein for mining closed frequent generalized records. Our experiments show that the significance of our algorithm is not limited only to the theory of k-anonymization. The proposed algorithm achieves lower information losses than the leading approximation algorithm, as well as the leading heuristic algorithms. A modified version of our algorithm that issues -diverse k-anonymizations also achieves lower information losses than the corresponding modified versions of the leading algorithms.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号