全文获取类型
收费全文 | 305篇 |
免费 | 5篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 9篇 |
综合类 | 1篇 |
化学工业 | 31篇 |
金属工艺 | 5篇 |
机械仪表 | 11篇 |
建筑科学 | 15篇 |
矿业工程 | 3篇 |
能源动力 | 4篇 |
轻工业 | 26篇 |
水利工程 | 1篇 |
石油天然气 | 2篇 |
无线电 | 12篇 |
一般工业技术 | 35篇 |
冶金工业 | 105篇 |
原子能技术 | 1篇 |
自动化技术 | 51篇 |
出版年
2022年 | 2篇 |
2021年 | 6篇 |
2020年 | 1篇 |
2019年 | 4篇 |
2018年 | 1篇 |
2017年 | 3篇 |
2016年 | 2篇 |
2015年 | 2篇 |
2014年 | 6篇 |
2013年 | 16篇 |
2012年 | 7篇 |
2011年 | 8篇 |
2010年 | 11篇 |
2009年 | 7篇 |
2008年 | 13篇 |
2007年 | 17篇 |
2006年 | 15篇 |
2005年 | 16篇 |
2004年 | 13篇 |
2003年 | 9篇 |
2002年 | 16篇 |
2001年 | 6篇 |
2000年 | 3篇 |
1999年 | 6篇 |
1998年 | 14篇 |
1997年 | 19篇 |
1996年 | 8篇 |
1995年 | 8篇 |
1994年 | 5篇 |
1993年 | 5篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 6篇 |
1987年 | 3篇 |
1986年 | 4篇 |
1985年 | 6篇 |
1984年 | 8篇 |
1983年 | 5篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1980年 | 2篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1976年 | 4篇 |
1974年 | 3篇 |
1973年 | 1篇 |
排序方式: 共有312条查询结果,搜索用时 15 毫秒
1.
Regression analyses of counts and rates: Poisson, overdispersed Poisson, and negative binomial models. 总被引:1,自引:0,他引:1
The regression models appropriate for counted data have seen little use in psychology. This article describes problems that occur when ordinary linear regression is used to analyze count data and presents 3 alternative regression models. The simplest, the Poisson regression model, is likely to be misleading unless restrictive assumptions are met because individual counts are usually more variable ("overdispersed") than is implied by the model. This model can be modified in 2 ways to accommodate this problem. In the overdispersed model, a factor can be estimated that corrects the regression model's inferential statistics. In the second alternative, the negative binomial regression model, a random term reflecting unexplained between-subject differences is included in the regression model. The authors compare the advantages of these approaches. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
2.
3.
Despite extensive research and practitioner literature on inter-organizational information systems (IOIS), our understanding of non-adoption still has some under-explored issues. This paper offers an explanation of non-adoption that focuses on the potential structural changes that IOIS adoption entails; in particular, we contend that the contradictions between the initial social structure and the structure enacted in the use of an IOIS can be a cause of non-adoption. This paper analyses adoption from a logic of opposition where non-adoption occurs because forces of transformation are offset by forces of persistence. Relying on the concepts of social structure, duality of structure, and structural contradiction from Structuration theory, we develop a framework that categorizes the underlying social structure where an IOIS is to be adopted, and formulate some theoretical propositions. From a practitioner perspective, this paper contends that the fact that IOIS management uncovers the contradictions in the social structure that result from IOIS adoption can help avoid dead ends. Accordingly, this framework, which can be used as a coarse-grained picture for anticipating adoption problems, can inform managers when devising an IOIS implementation strategy. 相似文献
4.
This paper is devoted to estimation and numerical approximation of basins of attraction for a class of uncertain systems. We consider systems described by a differential equation depending of a disturbance known by its bounds. By using viability theory tools, we derive basins of attraction lower and upper estimates. We present numerical simulation results of the viability kernel algorithm to basin of attraction approximation problems. 相似文献
5.
This guide is for authors who are preparing papers forFormal Aspects of Computing using the \(LaT_E X\) document preparation system and the FAC style file. 相似文献
6.
Rod Morris 《Computer Fraud & Security》2003,2003(1):11-13
Uncovering a computer user’s past activities is one of the most common tasks for a computer forensics investigator. Often, this task is straightforward and can be accomplished primarily through a detailed analysis of the relevant data and application files present on a system. However, a tremendous amount of information can also be discovered which might otherwise be thought lost or hidden. By discovering data on a computer which a suspect has tried to hide or destroy, or by uncovering information in the depths of the operating system (or even in areas no longer used by the operating system) an investigator may be able to gain vital evidence. This article describes some of the methods used by investigators to uncover these types of data on Windows systems. 相似文献
7.
Onnik Yaglioglu Anyuan Cao A. John Hart Rod Martens A. H. Slocum 《Advanced functional materials》2012,22(23):5028-5037
Vertically aligned carbon nanotube (CNT) forests may be used as miniature springs, compliant thermal interfaces, and shock absorbers, and for these and other applications it is vital to understand how to engineer their mechanical properties. Herein is investigated how the diameter and packing density within CNT forests govern their deformation behavior, structural stiffness, and elastic energy absorption properties. The mechanical behavior of low‐density CNT forests grown by fixed catalyst CVD methods and high‐density CNT forests grown by a floating catalyst CVD method are studied by in situ SEM compression testing and tribometer measurements of force‐displacement relationships. Low‐density and small‐diameter CNT columns (fixed catalyst) exhibit large plastic deformation and can be pre‐deformed to act as springs within a specified elastic range, whereas high‐density and large‐diameter CNT columns (floating catalyst) exhibit significant elastic recovery after deformation. In this work the energy absorption capacity of CNT forests is tuned over three orders of magnitude and it is shown that CNT forest density can be tuned over a range of conventional foam materials, but corresponding stiffness is ~10× higher. It is proposed that the elastic behavior of CNT forests is analogous to open‐cell foams and a simple model is presented. It is also shown that this model can be useful as a first‐order design tool to establish design guidelines for the mechanical properties of CNT forests and selection of the appropriate synthesis method. 相似文献
8.
9.
Lloyd Rod Win 《Journal of the American Planning Association. American Planning Association》2013,79(4):175-180
The land use model recasts an unsuccessful urban form of the past. Concentric rings of declining land value begin at the intense, historic center and grade down through concentric rings to become the city plan. Little planning remains after such a model is accepted. The new freedom of the auto-age city is lost to the principle of a falling body. Further, the land use model plan restricts mobility of resident and employer by type, each to his ring Urban land value patterns are sustained by public action or inaction. A true city plan musters this power to form the best possible city. 相似文献
10.
对于是否能找到达标的部件来满足WEEE和RoHS指令的要求,我们早已经被灌输得很多了,以至于我们忽视了一个更加重要的问题。这些指令的最终目的并不是要确保产品达标,或者开发出有效的回收计划,而是要避免使用有害物质,进而也就不需要回收计划了。 相似文献