全文获取类型
收费全文 | 640篇 |
免费 | 9篇 |
专业分类
电工技术 | 3篇 |
化学工业 | 127篇 |
金属工艺 | 2篇 |
建筑科学 | 20篇 |
能源动力 | 8篇 |
轻工业 | 35篇 |
水利工程 | 5篇 |
石油天然气 | 1篇 |
无线电 | 56篇 |
一般工业技术 | 70篇 |
冶金工业 | 110篇 |
原子能技术 | 7篇 |
自动化技术 | 205篇 |
出版年
2022年 | 7篇 |
2019年 | 8篇 |
2018年 | 4篇 |
2017年 | 3篇 |
2016年 | 4篇 |
2015年 | 11篇 |
2014年 | 14篇 |
2013年 | 22篇 |
2012年 | 25篇 |
2011年 | 41篇 |
2010年 | 28篇 |
2009年 | 35篇 |
2008年 | 36篇 |
2007年 | 27篇 |
2006年 | 27篇 |
2005年 | 22篇 |
2004年 | 29篇 |
2003年 | 21篇 |
2002年 | 18篇 |
2001年 | 23篇 |
2000年 | 12篇 |
1999年 | 8篇 |
1998年 | 16篇 |
1997年 | 12篇 |
1996年 | 13篇 |
1995年 | 8篇 |
1994年 | 6篇 |
1993年 | 14篇 |
1992年 | 8篇 |
1991年 | 4篇 |
1990年 | 9篇 |
1989年 | 7篇 |
1988年 | 7篇 |
1987年 | 6篇 |
1986年 | 10篇 |
1985年 | 3篇 |
1984年 | 10篇 |
1983年 | 3篇 |
1982年 | 13篇 |
1981年 | 6篇 |
1980年 | 5篇 |
1979年 | 7篇 |
1978年 | 8篇 |
1977年 | 4篇 |
1976年 | 6篇 |
1975年 | 3篇 |
1974年 | 4篇 |
1973年 | 8篇 |
1971年 | 3篇 |
1967年 | 4篇 |
排序方式: 共有649条查询结果,搜索用时 15 毫秒
1.
Examined the psychological characteristics of the children of holocaust survivors. 38 males and females in their late 20's were interviewed; the parents of 19 Ss were holocaust survivors, and the parents of the other 19 Ss were in Israel during World War II and did not suffer directly. It was hypothesized that reactions of the children of the holocaust survivors would include guilt rather than external aggression and a tendency not to externalize aggressive impulses in reaction to frustrating events. The Ss' reactions to a projective test were analyzed, and the responses provide support for the major hypothesis. Results show that sons and daughters of holocaust survivors were less likely to externalize aggression than were those in a control group. This finding is supported by the content analysis of the structured interview conducted with the Ss in both groups. (20 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
2.
Arie Ben-David 《Expert systems with applications》1991,2(4):353-359
Many expert system researchers have reported in recent years that situation-action symbolic production rules frequently fail to provide adequate knowledge representation schemes without resorting to numeric computation. However, despite the need to integrate symbolic and quantitative computation into one coherent framework of knowledge, surprisingly few architectures have been proposed for achieving this goal. This paper explores the integration of qualitative and numeric processing in expert systems. We address the topic with respect to the construction of expert systems that perform the tasks of design and multiple fault troubleshooting. This paper shows that these tasks can be handled effectively when an appropriate interface is established between the heuristic and the numeric knowledge-based components. Specifically, we demonstrate how to interface heuristic knowledge with non-linear optimization models in order to allow an expert system greater expressiveness. An actual example is presented from the machining domain. 相似文献
3.
Heidi Bernas Arie J. Plomp Johannes H. Bitter Dmitry Yu. Murzin 《Catalysis Letters》2008,120(1-2):8-13
The density functional theory (DFT/B3LYP) calculations were applied to investigate the interaction of a Pt6 particle with the ZSM-5 zeolite framework. The electronic structure of the metal particle is strongly affected by the interaction with basic framework oxygens and acid sites of the zeolite support. Adsorption on basic sites (Eads = 6 kcal/mol) favors the formation of the electron enriched metal cluster. Interaction of the platinum cluster with the acid site characterized by stabilization energy of 47 kcal/mol results in oxidation of the metal particle and suppression of Brønsted acidity of the support. The hypothesis is put forward that the oxidized platinum particle can function as an active site for the alkane isomerisation on platinum supported high silica zeolites. 相似文献
4.
Jost John T.; Glaser Jack; Kruglanski Arie W.; Sulloway Frank J. 《Canadian Metallurgical Quarterly》2003,129(3):383
A meta-analysis by J. T. Jost, J. Glaser, A. W. Kruglanski, and F. J. Sulloway (2003) concluded that political conservatism is partially motivated by the management of uncertainty and threat. In this reply to J. Greenberg and E. Jonas (2003), conceptual issues are clarified, numerous political anomalies are explained, and alleged counterexamples are incorporated with a dynamic model that takes into account differences between "young" and "old" movements. Studies directly pitting the rigidity-of-the-right hypothesis against the ideological extremity hypothesis demonstrate strong support for the former. Medium to large effect sizes describe relations between political conservatism and dogmatism and intolerance of ambiguity; lack of openness to experience; uncertainty avoidance; personal needs for order, structure, and closure; fear of death; and system threat. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
5.
Laser-induced chemical vapour deposition of silicon films on SiO2/Si (1 0 0) and Si (1 0 0) substrates was studied using ArF laser irradiation of silane/argon gas mixture in parallel to the substrate. The optimal deposition conditions were specified by examination of film morphology at a wide range of irradiation and process parameters. At optimal conditions, specular films were obtained with no powder formation. The effect of deposition parameters, such as laser energy and repetition rate, on the deposition rate and the related film quality, was investigated. 相似文献
6.
7.
Binoy Ravindran Peng Li Tamir Hegazy 《Journal of Parallel and Distributed Computing》2003,63(12):1219-1242
We present two proactive resource allocation algorithms, RBA*-FT and OBA-FT, for fault-tolerant asynchronous real-time distributed systems. The algorithms consider an application model where task timeliness is specified by Jensen's benefit functions and the anticipated application workload during future time intervals is described by adaptation functions. In addition, we assume that reliability functions of processors are available a priori. Given these models, our objective is to maximize aggregate task benefit and minimize aggregate missed deadline ratio in the presence of processor failures. Since determining the optimal solution is computationally intractable, the algorithms heuristically compute sub-optimal resource allocations, but in polynomial time. Experimental results reveal that RBA*-FT and OBA-FT outperform their non-fault-tolerant counterparts in the presence of processor failures. Furthermore, RBA*-FT performs better than OBA-FT, although OBA-FT incurs better worst-case and amortized computational costs. Finally, we observe that both algorithms robustly withstand errors in the estimation of anticipated failures. 相似文献
8.
Performance analysis of Drever-Hall laser frequency stabilizationusing a proportional+integral servo
In this paper, we derive analytical expressions for finite gain, finite bandwidth laser frequency locking systems. The common case of Drever-Hall (FM sideband) locking to a Fabry-Perot cavity is discussed, using a proportional+integral (PI) controller as an example. The effects of nonnegligible loop time-delay on stability are discussed, and an optimal design procedure for a frequency locking system is given 相似文献
9.
There are pragmatic benefits to trait-consistent mood states, especially when people are evaluating new objects within the environment (M. Tamir, M. D. Robinson, & G. L. Clore, 2002). The present studies, involving both naturally occurring (Studies 1 and 2) and manipulated (Study 3) mood states, demonstrated such trait-consistent interactions within the context of neuroticism and negative mood states. Individuals high in neuroticism were faster to make evaluations when in a negative mood state like sadness. By contrast, individuals low in neuroticism were faster to make evaluations when in a neutral mood state. The present studies demonstrate that although negative mood states are hedonically unpleasant, they can be beneficial in some ways for individuals high in neuroticism. (PsycINFO Database Record (c) 2011 APA, all rights reserved) 相似文献
10.
k-Anonymity is a privacy preserving method for limiting disclosure of private information in data mining. The process of anonymizing
a database table typically involves generalizing table entries and, consequently, it incurs loss of relevant information.
This motivates the search for anonymization algorithms that achieve the required level of anonymization while incurring a
minimal loss of information. The problem of k-anonymization with minimal loss of information is NP-hard. We present a practical approximation algorithm that enables solving
the k-anonymization problem with an approximation guarantee of O(ln k). That algorithm improves an algorithm due to Aggarwal et al. (Proceedings of the international conference on database theory
(ICDT), 2005) that offers an approximation guarantee of O(k), and generalizes that of Park and Shim (SIGMOD ’07: proceedings of the 2007 ACM SIGMOD international conference on management
of data, 2007) that was limited to the case of generalization by suppression. Our algorithm uses techniques that we introduce herein for
mining closed frequent generalized records. Our experiments show that the significance of our algorithm is not limited only
to the theory of k-anonymization. The proposed algorithm achieves lower information losses than the leading approximation algorithm, as well
as the leading heuristic algorithms. A modified version of our algorithm that issues ℓ-diverse k-anonymizations also achieves lower information losses than the corresponding modified versions of the leading algorithms. 相似文献