首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15150篇
  免费   1715篇
  国内免费   768篇
工业技术   17633篇
  2024年   76篇
  2023年   233篇
  2022年   516篇
  2021年   650篇
  2020年   670篇
  2019年   516篇
  2018年   556篇
  2017年   520篇
  2016年   697篇
  2015年   608篇
  2014年   1143篇
  2013年   1197篇
  2012年   1217篇
  2011年   1191篇
  2010年   943篇
  2009年   969篇
  2008年   908篇
  2007年   994篇
  2006年   958篇
  2005年   662篇
  2004年   568篇
  2003年   468篇
  2002年   337篇
  2001年   261篇
  2000年   155篇
  1999年   102篇
  1998年   79篇
  1997年   56篇
  1996年   42篇
  1995年   30篇
  1994年   31篇
  1993年   17篇
  1992年   22篇
  1991年   17篇
  1990年   21篇
  1989年   23篇
  1988年   12篇
  1987年   7篇
  1986年   8篇
  1985年   13篇
  1984年   10篇
  1983年   8篇
  1982年   8篇
  1979年   8篇
  1966年   9篇
  1963年   14篇
  1961年   7篇
  1959年   7篇
  1957年   6篇
  1955年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
Children's perceived attachments with parents, and family cohesion and adaptability were examined as predictors, mediators, and moderators in the parental problem drinking-child outcomes link. A total of 216 6- to 12-year-olds (110 boys, 106 girls) participated. Data were obtained from children and their mothers, fathers, and teachers. A higher level of family cohesion and adaptability functioned as (a) a robust protective factor against adjustment and cognitive difficulties otherwise associated with problem drinking and (b) a mediator of adjustment problems. Children's perceptions of attachments to mothers and fathers were consistent predictors of behavioral, social, and cognitive problems and further moderated relations between problem drinking and child functioning. The results support that child-parent and family functioning variables act as either pathways and/or vulnerability and protective factors for children exposed to a high-risk environment. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
62.
Trust for Ubiquitous,Transparent Collaboration   总被引:1,自引:0,他引:1  
Shand  Brian  Dimmock  Nathan  Bacon  Jean 《Wireless Networks》2004,10(6):711-721
In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Recommendations are thus linked together to compute a considered, local trust assessment. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information.  相似文献   
63.
Performance on antisaccade trials requires the inhibition of a prepotent response (i.e., don't look at the flashing cue) and the generation and execution of a correct saccade in the opposite direction. The authors attempted to further specify the role of working memory (WM) span differences in the antisaccade task. They tested high- and low-span individuals on variants of prosaccade and antisaccade trials in which an eye movement is the sole requirement. In 3 experiments, they demonstrated the importance of WM span differences in both suppression of a reflexive saccade and generation of a volitional eye movement. The results support the contention that individual differences in WM span are not exclusively due to differences in inhibition but also reflect differences in directing the focus of attention. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
64.
65.
Drug users are particularly at risk for contracting the human immunodeficiency virus and serve as a major mechanism for spreading the virus to other sectors of the population. As a result drug abuse treatment and potential behavioral change strategies are primary public health issues. The purpose of this article is to review the contributions included in this special edition, which represent an effort to describe the most current thinking in the field with a blend of theoretical, review, and empirical articles. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
66.
Memorializes John Bissell (Jack) Carroll, an early leader in the development of psycholinguistics and a dominant contributor to psychometrics and the study of individual differences in cognitive abilities. His seminal work in evaluating foreign language proficiencies across multiple cultures combined his expertise in psycholinguistics with that in psychometrics and defined fundamental issues in the study of language acquisition. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
67.
The present study applied a semiparametric mixture model to a sample of 284 low-income boys to model developmental trajectories of overt conduct problems from ages 2 to 8. As in research on older children, 4 developmental trajectories were identified: a persistent problem trajectory, a high-level desister trajectory, a moderate-level desister trajectory, and a persistent low trajectory. Follow-up analyses indicated that initially high and low groups were differentiated in early childhood by high child fearlessness and elevated maternal depressive symptomatology. Persistent problem and high desister trajectories were differentiated by high child fearlessness and maternal rejecting parenting. The implications of the results for early intervention research are discussed, with an emphasis on the identification of at-risk parent-child dyads. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
68.
The authors hypothesize that depressed states evolved to minimize risk in social interactions in which individuals perceive that the ratio of their social value to others, and their social burden on others, is at a critically low level. When this ratio reaches a point where social value and social burden are approaching equivalence, the individual is in danger of exclusion from social contexts that, over the course of evolution, have been critical to fitness. Many features of depressed states can be understood in relation to mechanisms that reduce social risk in such circumstances, including (a) hyper-sensitivity to signals of social threat from others, (b) sending signals to others that reduce social risks, and (c) inhibiting risk-seeking (e.g., confident, acquisitive) behaviors. These features are discussed in terms of psychosocial and neurobiological research on depressive phenomena. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
69.
从f(n,t)曲线的研究出发,得到了求解油田单井平均日产油量经济极限值的数学方程式,介绍了用曲线交汇法求解的过程,分析了油田月递减余率和原油销售价是影响油田单井平均日产油量经济极限的主要因素。该方法在油田开发调整方案的编制和油田开发规划部署工作中将起到一定的作用。  相似文献   
70.
针对目前大多数科研单位在内部会计控制中存在的问题,根据财政部颁布的《内部会计控制规范一基本规范》,探讨了科研单位在转制过程中应如何建立和完善内部会计控制制度,以达到防范经营风险,保护资产安全、完整,确保经营管理目标和政策有效实施.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号