首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1879篇
  免费   93篇
电工技术   18篇
综合类   4篇
化学工业   559篇
金属工艺   21篇
机械仪表   37篇
建筑科学   76篇
矿业工程   2篇
能源动力   37篇
轻工业   221篇
水利工程   26篇
石油天然气   2篇
无线电   116篇
一般工业技术   305篇
冶金工业   365篇
原子能技术   1篇
自动化技术   182篇
  2023年   25篇
  2022年   74篇
  2021年   101篇
  2020年   48篇
  2019年   51篇
  2018年   46篇
  2017年   48篇
  2016年   47篇
  2015年   59篇
  2014年   48篇
  2013年   93篇
  2012年   106篇
  2011年   129篇
  2010年   105篇
  2009年   88篇
  2008年   116篇
  2007年   90篇
  2006年   68篇
  2005年   54篇
  2004年   51篇
  2003年   52篇
  2002年   39篇
  2001年   32篇
  2000年   32篇
  1999年   24篇
  1998年   62篇
  1997年   45篇
  1996年   23篇
  1995年   15篇
  1994年   12篇
  1993年   16篇
  1992年   7篇
  1991年   5篇
  1989年   7篇
  1988年   14篇
  1987年   7篇
  1986年   6篇
  1985年   8篇
  1984年   6篇
  1983年   6篇
  1982年   6篇
  1981年   8篇
  1980年   7篇
  1979年   7篇
  1977年   12篇
  1976年   20篇
  1975年   7篇
  1974年   8篇
  1970年   5篇
  1966年   4篇
排序方式: 共有1972条查询结果,搜索用时 0 毫秒
31.
Economic forces, competitive pressures and technological advances have created an environment within which firms have developed new ways of organizing (e.g. virtual work settings) and managing their resources (e.g. knowledge management) in order to maintain and improve firm performance. Extant research has highlighted the challenges associated with managing knowledge in virtual settings. However, researchers are still struggling to provide effective guidance to practitioners in this field. We believe that a better understanding of individual virtual competency is a potential avenue for managing the complexity of knowledge transfer in virtual settings. In particular, we suggest that optimal knowledge transfers can be achieved by individuals armed with the right personal capabilities and skills for virtual work, particularly when those knowledge transfers are emergent, bottom-up and cannot be specified a priori. The virtual competency exhibited by individuals can be the key to overcoming the constraints of knowledge transfers with such characteristics because underlying competency can facilitate effective action in unfamiliar and novel situations. In this conceptual research, we develop a theoretical model of individual virtual competence and describe its role in the communication process, which underpins effective knowledge transfer in virtual settings. Additionally, we consider the antecedent role that prior experience in virtual activity plays in aiding workers to develop virtual competence, which in turn engenders effective knowledge transfer. We conclude with implications for future research and for practicing managers.  相似文献   
32.
Journal of Intelligent Manufacturing - Remanufacturing includes disassembly and reassembly of used products to save natural resources and reduce emissions. While assembly is widely understood in...  相似文献   
33.
Bonded concrete overlays of asphalt pavements (BCOAs) are becoming a common rehabilitation technique used for distressed hot mix asphalt (HMA) roadways. The original design procedures were based primarily on data from instrumented pavements and finite element modelling. They were governed by the assumption that the failure mechanism was a function of the overlay thickness. However, field observations have indicated that the actual failure modes are dictated by slab size. The newly developed Bonded Concrete Overlay of Asphalt Mechanistic-Empirical design procedure (BCOA-ME) presented here is valid for overlays that are between 2.5 and 6.5 in (64–154 mm), and includes five primary enhancements to the Portland Cement Association and Colorado Department of Transportation procedures that have been traditionally used: 1.) the failure mode is dictated by the joint spacing; 2.) a new structural model for longitudinal cracking for 6-ft × 6-ft (1.8 m × 1.8 m) concrete overlays has been developed to better predict the critical stresses; 3.) the stress adjustment factors have been calibrated with performance data; 4.) the equivalent temperature gradients used as design input are defined based on the pavement structure and geographical location of the project; and 5.) the effect of temperature change on underlying HMA stiffness is considered. Finally, validation studies were completed on the new procedure and comparisons made between the revised procedure and actual performance data for five separate projects showed reasonable results. A sensitivity analysis also revealed that the predicted thickness obtained using the revised procedure was sensitive to HMA thickness, the modulus of rupture of the Portland cement concrete, and the level of traffic, as would be expected.  相似文献   
34.
35.
36.
37.
Shiftwork involving early morning starts and night work can affect both sleep and fatigue. This study aimed to assess the impact of different rostering schedules at an Australian mine site on sleep and subjective sleep quality. Participants worked one of four rosters;
4 × 4 (n = 14) 4D4O4N4O
7 × 4 (n = 10) 7D4O7N40
10 × 5 (n = 17) 5D5N50
14 × 7 (n = 12) 7D7N70
Sleep (wrist actigraphy and sleep diaries) was monitored for a full roster cycle including days off. Total sleep time (TST) was longer on days off (7.0 ± 1.9) compared to sleep when on day (6.0 ± 1.0) and nightshifts (6.2 ± 1.6). Despite an increase in TST on days off, this may be insufficient to recover from the severe sleep restriction occurring during work times. Restricted sleep and quick shift-change periods may lead to long-term sleep loss and associated fatigue.  相似文献   
38.
The Internet Protocol (IP) has been proven very flexible, being able to accommodate all kinds of link technologies and supporting a broad range of applications. The basic principles of the original Internet architecture include end-to-end addressing, global routeability and a single namespace of IP addresses that unintentionally serves both as locators and host identifiers. The commercial success and widespread use of the Internet have lead to new requirements, which include Internetworking over business boundaries, mobility and multi-homing in an untrusted environment. Our approach to satisfy these new requirements is to introduce a new Internetworking layer, the node identity layer. Such a layer runs on top of the different versions of IP, but could also run directly on top of other kinds of network technologies, such as MPLS and 2G/3G PDP contexts. This approach enables connectivity across different communication technologies, supports mobility, multi-homing, and security from ground up. This paper describes the Node Identity Architecture in detail and discusses the experiences from implementing and running a prototype.  相似文献   
39.
The present study examined whether traditional gender role expectations (Eagly, 1987) influence behaviors in non-traditional contexts such as online virtual environments. Participants were 352 Second Life users who reported their activities and experiences in Second Life. Results indicated that men and women differed in the types of activities they engaged in a manner predicted by social role theory. Specifically, as compared to women, men were more likely to report building things (e.g. objects), to own and work on their own virtual property, and were less likely to change their avatar’s appearance. Women, as compared to men, were more likely to meet people, shop, regularly change their avatar’s appearance, and buy clothes/objects for their avatar. The present study adds to our understanding of how traditional gender role expectations may carry over to online virtual worlds and influence online behavior.  相似文献   
40.
We present the first fully dynamic algorithm for computing the characteristic polynomial of a matrix. In the generic symmetric case, our algorithm supports rank-one updates in O(n2logn) randomized time and queries in constant time, whereas in the general case the algorithm works in O(n2klogn) randomized time, where k is the number of invariant factors of the matrix. The algorithm is based on the first dynamic algorithm for computing normal forms of a matrix such as the Frobenius normal form or the tridiagonal symmetric form. The algorithm can be extended to solve the matrix eigenproblem with relative error 2b in additional O(nlog2nlogb) time. Furthermore, it can be used to dynamically maintain the singular value decomposition (SVD) of a generic matrix. Together with the algorithm, the hardness of the problem is studied. For the symmetric case, we present an Ω(n2) lower bound for rank-one updates and an Ω(n) lower bound for element updates.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号