首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   111篇
  免费   3篇
  国内免费   1篇
化学工业   14篇
建筑科学   2篇
矿业工程   1篇
轻工业   1篇
石油天然气   3篇
无线电   8篇
一般工业技术   9篇
冶金工业   50篇
自动化技术   27篇
  2022年   2篇
  2020年   2篇
  2018年   1篇
  2017年   2篇
  2016年   2篇
  2015年   1篇
  2014年   4篇
  2013年   2篇
  2012年   3篇
  2011年   6篇
  2010年   7篇
  2009年   10篇
  2008年   7篇
  2007年   3篇
  2006年   2篇
  2005年   3篇
  2004年   6篇
  2003年   4篇
  2002年   6篇
  2001年   4篇
  2000年   2篇
  1999年   4篇
  1998年   3篇
  1997年   3篇
  1996年   3篇
  1995年   1篇
  1994年   3篇
  1993年   1篇
  1992年   1篇
  1990年   2篇
  1989年   3篇
  1988年   4篇
  1987年   1篇
  1985年   1篇
  1984年   3篇
  1983年   2篇
  1981年   1篇
排序方式: 共有115条查询结果,搜索用时 31 毫秒
1.
This column goes beyond previous insider analyses to identify a framework for a taxonomy of insider threats including both malicious and inadvertent actions by insiders that put organizations or their resources at some risk. The framework includes factors reflecting the organization, the individual, the information technology system, and the environment.  相似文献   
2.
This book warns readers about the proliferation of data capture and the degree to which we're tracked and traced on the Web. In ten heavily illustrated chapters, the author explains how our data are captured, retained, and shared (often for a price) with third parties. The author dedicates a chapter to ways of addressing the threat. He suggests methods for controlling cookies, diffusing or eliminating disclosures, encrypting important data, protecting a network address, and using policy as well as technical devices to minimize data capture and retention.  相似文献   
3.
This work‐in‐process literature review gives an overview of recent insight in the incorporation of social media in risk and crisis communication. By marrying literature and examples of social media use with best practices in risk and crisis communication, this study demonstrates how communicators can embrace social media tools to better manage a risk or crisis. Best practices in risk and crisis communication are summarized, examples of social media tools used to manage risks and crises are expounded, and recommendations for practitioners are provided to incorporate social media tools in risk and crisis communication.  相似文献   
4.
V2, a technical committee of the International Committee for information technology standards is developing standards for information technology access interfaces. As part of this endeavor, V2 is to issue the Universal Remote Console architecture, a set of draft standards for public review and comment. The five standards specify communications between a Target - a device or service the user wishes to access and a universal remote console-software that is typically hosted on a user's personal device. The standards specify mechanisms for the discovery, selection, configuration, and operation of user interfaces and its options.  相似文献   
5.
Abstract

Context: Aerosol delivery to animals in preclinical settings has historically been very challenging, requiring the use of techniques, such as intratracheal instillation and dry powder insufflation, that are somewhat invasive, inefficient and not representative of clinical inhalation.

Objective: The objective of this work is to develop a system to deliver dry powder to dogs in an efficient and effective manner for the study of new anti-migraine compounds in development.

Materials and methods: The new device uses a metered aliquot of a dry gas to force dry powder drug from a pre-filled HPMC capsule into an AeroChamber® spacer for subsequent inhalation by the animal.

Results: The delivery of two invesigational migraine drugs via the new device was assessed in vitro using abbreviated Andersen cascade impaction and showed the device is capable of generating a reproducible delivered dose of up to ~68% with more than 50% of the dose in the respirable range. In vivo studies have also been performed showing that this device effectively delivered the migraine drugs to spontaneously breathing dogs using a proprietary validated dog inhalation model.

Discussion: Results confirmed that the air pressurized capsule device (APCD) was effective in delivering the APIs to lungs of the animals. The in vivo data verified the advantages of inhaled delivery over oral delivery for this class of drugs and were used to establish the cardiopulmonary and respiratory side effect liability profile for these compounds.

Conclusions: This work has demonstrated the utility of this device for quick and accurate screening of prospective drug candidates, representing a significant improvement in ease of use and reprodicibility over current delivery methods.  相似文献   
6.
7.
8.
This paper focuses on the benefits that organizations may achieve from their investment in enterprise systems (ES). It proposes an ES benefit framework for summarizing benefits in the years after ES implementation. Based on an analysis of the features of enterprise systems, on the literature on information technology (IT) value, on data from 233 enterprise systems vendor‐reported stories published on the Web and on interviews with managers of 34 organizations using ES, the framework provides a detailed list of benefits that have reportedly been acquired through ES implementation. This list of benefits is consolidated into five benefits dimensions: operational, managerial, strategic, IT infrastructure and organizational, and illustrated using perceived net benefit flow (PNBF) graphs. In a detailed example, the paper shows how the framework has been applied to the identification of benefits in a longitudinal case study of four organizations.  相似文献   
9.
In October 2005, the IBM Human Ability and Accessibility Center and T.J. Watson Research Center hosted a symposium on “cognitive and learning difficulties and how they affect access to IT systems”. The central premise of the symposium was the recognition that cognitive and learning difficulties have a profound impact on a person’s ability to interact with information technology (IT) systems, but that little support is currently being offered by those systems. By bringing together internationally renowned experts from a variety of different, but complementary, research fields, the symposium aimed to provide a complete overview of the issues related to this topic. This paper summarises the discussions and findings of the symposium.  相似文献   
10.
Objective: To understand how traumatic brain injury (TBI) affects parent-child interactions acutely following injury. Participants: Young children hospitalized for TBI (n = 80) and orthopedic injuries (OI; n = 113). Method: Raters coded videotaped interactions during free play and structured tasks for parental warmth/responsiveness and negativity and child warmth, behavior regulation, and cooperation. Raters also counted parental directives, critical/restricting statements, and scaffolds. Results: Parents of children with TBI exhibited less warm responsiveness and made more directive statements during a structured task than parents in the OI group. Children with TBI displayed less behavior regulation than children with OI. Parental warm responsiveness was more strongly related to child cooperativeness in the OI group than in the TBI group. Child behavior also mediated group differences in parental responsiveness and directiveness. TBI accounted for as much variance in parental behaviors as or more than did sociodemographic factors. Conclusion: TBI-related changes in child behavior may negatively influence parent-child interactions and disrupt the reciprocity between parent and child. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号