首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   321篇
  免费   13篇
电工技术   1篇
化学工业   64篇
机械仪表   2篇
建筑科学   13篇
能源动力   9篇
轻工业   29篇
水利工程   1篇
石油天然气   14篇
无线电   24篇
一般工业技术   56篇
冶金工业   78篇
自动化技术   43篇
  2024年   1篇
  2023年   3篇
  2022年   4篇
  2021年   10篇
  2020年   5篇
  2019年   5篇
  2018年   9篇
  2017年   9篇
  2016年   8篇
  2015年   5篇
  2014年   12篇
  2013年   19篇
  2012年   17篇
  2011年   27篇
  2010年   22篇
  2009年   21篇
  2008年   23篇
  2007年   15篇
  2006年   13篇
  2005年   17篇
  2004年   13篇
  2003年   14篇
  2002年   7篇
  2001年   6篇
  2000年   4篇
  1999年   7篇
  1998年   7篇
  1997年   8篇
  1996年   6篇
  1994年   3篇
  1993年   2篇
  1992年   3篇
  1991年   1篇
  1990年   2篇
  1988年   2篇
  1987年   1篇
  1985年   1篇
  1984年   1篇
  1981年   1篇
排序方式: 共有334条查询结果,搜索用时 327 毫秒
1.
2.
The present studies demonstrated the moderation of self-construal orientation on mimicry. Recent research has indicated that an interdependent self-construal is associated with assimilation of the other to the self whereas an independent self-construal is associated with minimizing the influence of others on the self (H. R. Markus & S. Kitayama, 1991; D. Stapel & W. Koomen, 2001). Therefore, the authors hypothesized that an interdependent self-construal would be associated with more mimicry than an independent self-construal. When self-construal orientations were experimentally primed. as in Studies 1 and 2, independent self-construals produced less nonconscious mimicry than interdependent self-construals. When self-construals were examined as cultural differences with either a chronically dominant independent (Americans) or interdependent (Japanese) construal of the self, these results were replicated. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
3.
The study of resilient children has overturned many deficit-focused models concerning the ontogenesis of children raised in adversity. This study explored the relationship between risk and protective factors, resilience, and youth gambling behavior. More specifically, this study examined the relative contribution of various risk and protective domains in relation to problem gambling behavior and examined whether youth identified as resilient (high risk exposure- high internalized protection) were as likely as those identified as vulnerable (high risk exposure-low internalized protection) to engage in excessive gambling behavior. The sample consisted of 1,273 students ages 12 to 19. The findings demonstrated that risk and protective factors each provide a unique contribution to the prediction model of gambling problems. Resilient and vulnerable youth differed significantly in their self-reported gambling severity. As well, resilient youth were not statistically distinguishable from low-risk exposure groups in terms of their gambling severity. Findings are interpreted with respect to resilience and prevention research. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
4.
A national survey of school psychologists' acceptability of psychological assessment techniques in the area of externalizing problem behaviors was examined. School psychologists' ratings of 2 procedures, Behavioral Assessment (BA) and Traditional Assessment (TA), were compared using an analog case study methodology. Using a random sample of 500 National Association of School Psychologists members from the 1991–1992 membership directory, 339 Ss completed the Assessment Rating Profile after reading a hypothetical case summary describing a student with suspected externalizing problem behaviors. Results indicated statistically significant differences between assessment methods and ratings of acceptability. BA procedures were found to be more acceptable than TA procedures. Implications related to the acceptability of psychological assessment techniques, as well as implications for school psychology practitioners are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
5.
A relationship between the collection efficiency and the normalized excess minority carrier distribution under forward bias in the dark, which was recently derived using the Green's function technique for a one-dimensional (1-D) quasi-neutral region of a solar cell, is generalized here to three dimensions. The link with other reciprocity theorems is also briefly discussed  相似文献   
6.
Discusses the generalization effects of 7 commercially available student social-skills training (SST) curricula. A table listing strategy, curricula, S characteristics, and results is given. Maintenance of improved behavior was seen as least successful when the "train and hope" strategy was used. The combination of SST and alteration of consequences in the classroom led to the most significant maintenance of results. The most effective programs were those that combined a variety of techniques. Improvement of behavior was obtained more often with withdrawn students than with aggressive students. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
7.
PV system sizing using observed time series of solar radiation   总被引:4,自引:0,他引:4  
Sizing represents an important part of photovoltaic system design. This paper describes a sizing procedure based on the observed time series of solar radiation. Using a simple geometrical construction, the sizing curve is determined as a superposition of contributions from individual climatic cycles of low daily solar radiation. Unlike the traditional methods based on loss-of-load probability, the reliability of supply enters in this method through the length of the time series of data used in the analysis. The method thus resembles techniques used in other branches of engineering where extreme values are considered as functions of certain recurrence intervals.  相似文献   
8.
Summary The surface reactivity of poly(methylphenylphosphazene), PMPP, and its derivatives containing silane, PMPP-SiH, and alcohol, PMPP-OH, substituents was investigated. These polymers were fabricated into films by casting from THF solutions and reactions were carried out at the interface between solid film samples and solutions. The surface of PMPP was successfully modified by deprotonation under dilute conditions followed by reactions with RMe2SiCl [where R = CH=CH2, and H]. While surfaces of PMPP-OH were not readily modified, those containing Si-H groups reacted with oxygen when heated and with carbon tetrachloride. The polymer surfaces were examined by contact angle measurements, attenuated total reflectance infrared spectroscopy (ATR-IR), and scanning electron microscopy (SEM). We dedicate the paper to Christopher W. Allen in recognition of his outstanding contributions to inorganic ring and polymer chemistry.  相似文献   
9.

Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for such modern-day systems. An intrusion detection system (IDS) is a solution that has recently gained the researcher’s attention with the application of deep learning techniques in IDS. In this paper, we propose an IDS model that uses a deep learning algorithm, conditional generative adversarial network (CGAN), enabling unsupervised learning in the model and adding an eXtreme gradient boosting (XGBoost) classifier for faster comparison and visualization of results. The proposed method can reduce the need to deploy extra sensors to generate fake data to fool the intruder 1.2–2.6%, as the proposed system generates this fake data. The parameters were selected to give optimal results to our model without significant alterations and complications. The model learns from its dataset samples with the multiple-layer network for a refined training process. We aimed that the proposed model could improve the accuracy and thus, decrease the false detection rate and obtain good precision in the cases of both the datasets, NSL-KDD and the CICIDS2017, which can be used as a detector for cyber intrusions. The false alarm rate of the proposed model decreases by about 1.827%.

  相似文献   
10.
This paper is about the influence of group inter-action processes known as group learning on the implementation of information technologies (IT). Aiming at a conceptualisation of the role of user interactions in IT implementation, a theoretical framework based on the experiential learning cycle is developed that includes five processes: collective acting, group reflecting, knowledge disseminating, sharing understanding and mutual adjustment. This theoretical framework is illustrated by the findings from three case studies. Analysis of 87 interviews revealed a unique function of group learning in IT implementation. It showed that group learning emerges immediately after a new IT is introduced to the targeted users and that it can take different standpoints (for or against adoption of the technology); it can also develop during the IT implementation and either progress or take a turn for the worse. The overall conclusion is that group learning is a ‘hidden’ mechanism that may speed up, slow down or even terminate an IT implementation project; and that therefore it is essential to appreciate its importance during IT projects and to steer it in a constructive direction.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号