首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8881篇
  免费   380篇
  国内免费   428篇
电工技术   238篇
综合类   1066篇
化学工业   208篇
金属工艺   103篇
机械仪表   723篇
建筑科学   1223篇
矿业工程   306篇
能源动力   144篇
轻工业   351篇
水利工程   237篇
石油天然气   204篇
武器工业   34篇
无线电   656篇
一般工业技术   311篇
冶金工业   327篇
原子能技术   111篇
自动化技术   3447篇
  2024年   2篇
  2023年   33篇
  2022年   67篇
  2021年   97篇
  2020年   120篇
  2019年   100篇
  2018年   92篇
  2017年   113篇
  2016年   149篇
  2015年   161篇
  2014年   474篇
  2013年   536篇
  2012年   623篇
  2011年   795篇
  2010年   601篇
  2009年   456篇
  2008年   516篇
  2007年   644篇
  2006年   616篇
  2005年   539篇
  2004年   511篇
  2003年   500篇
  2002年   429篇
  2001年   310篇
  2000年   274篇
  1999年   236篇
  1998年   183篇
  1997年   111篇
  1996年   84篇
  1995年   69篇
  1994年   50篇
  1993年   33篇
  1992年   20篇
  1991年   14篇
  1990年   9篇
  1989年   16篇
  1988年   14篇
  1987年   14篇
  1986年   7篇
  1985年   21篇
  1984年   15篇
  1983年   7篇
  1982年   7篇
  1981年   9篇
  1980年   2篇
  1978年   2篇
  1973年   1篇
  1972年   1篇
  1971年   1篇
  1964年   1篇
排序方式: 共有9689条查询结果,搜索用时 484 毫秒
91.
ContextSecurity in Process-Aware Information Systems (PAIS) has gained increased attention in current research and practice. However, a common understanding and agreement on security is still missing. In addition, the proliferation of literature makes it cumbersome to overlook and determine state of the art and further to identify research challenges and gaps. In summary, a comprehensive and systematic overview of state of the art in research and practice in the area of security in PAIS is missing.ObjectiveThis paper investigates research on security in PAIS and aims at establishing a common understanding of terminology in this context. Further it investigates which security controls are currently applied in PAIS.MethodA systematic literature review is conducted in order to classify and define security and security controls in PAIS. From initially 424 papers, we selected in total 275 publications that related to security and PAIS between 1993 and 2012. Furthermore, we analyzed and categorized the papers using a systematic mapping approach which resulted into 5 categories and 12 security controls.ResultsIn literature, security in PAIS often centers on specific (security) aspects such as security policies, security requirements, authorization and access control mechanisms, or inter-organizational scenarios. In addition, we identified 12 security controls in the area of security concepts, authorization and access control, applications, verification, and failure handling in PAIS. Based on the results, open research challenges and gaps are identified and discussed with respect to possible solutions.ConclusionThis survey provides a comprehensive review of current security practice in PAIS and shows that security in PAIS is a challenging interdisciplinary research field that assembles research methods and principles from security and PAIS. We show that state of the art provides a rich set of methods such as access control models but still several open research challenges remain.  相似文献   
92.
The aim of this study is to identify and prioritize the solutions of Knowledge Management (KM) adoption in Supply Chain (SC) to overcome its barriers. It helps organizations to concentrate on high rank solutions and develop strategies to implement them on priority. This paper proposes a framework based on fuzzy analytical hierarchy process (AHP) and fuzzy technique for order performance by similarity to ideal solution (TOPSIS) to identify and rank the solutions of KM adoption in SC and overcome its barriers. The AHP is used to determine weights of the barriers as criteria, and fuzzy TOPSIS method is used to obtain final ranking of the solutions of KM adoption in SC. The empirical case study analysis of an Indian hydraulic valve manufacturing organization is conducted to illustrate the use of the proposed framework for ranking the solutions of KM adoption in SC to overcome its barriers. This proposed framework provides a more accurate, effective and systematic decision support tool for stepwise implementation of the solutions of KM adoption in SC to increase its success rate.  相似文献   
93.
The viability of networked communities depends on the creation and disclosure of user-generated content and the frequency of user visitation (Facebook 10-K Annual Report, 2012). However, little is known about how to align the interests of user and social networking sites. In this study, we draw upon the principal-agent perspective to extend Pavlou et al.’s uncertainty mitigation model of online exchange relationships (2007) and propose an empirically tested model for aligning the incentives of the principal (user) and the agent (service provider). As suggested by Pavlou et al., we incorporated a multi-dimensional measure of trust: trust of provider and trust of members. The proposed model is empirically tested with survey data from 305 adults aged 20-55. The results support our model, delineating how real individuals with bounded rationality actually make decision about information disclosure under uncertainty in the social networking site context. There is show little to no relationship between online privacy concerns and information disclosure on online social network sites. Perceived benefits provide the linkage between the incentives of principal (user) and agent (provider) while usage intensity demonstrated the most significant impact on information disclosure. We argue that the phenomenon may be explained through Communication Privacy Management Theory. The present study enhances our understanding of agency theory and human judgment theory in the context of social media. Practical implications for understanding and facilitating online social exchange relationships are also discussed.  相似文献   
94.
Globalization is a reality resulting in many changes in the refractory industry. In this paper some of the threats and opportunities, which are influencing the future prosperity of the refractory industry on a worldwide basis, are being evoked. Some key technical and management issues are underlined, in terms of adjusting the productivity-quality-cost to the customers requirements ; producing unshapes versus shapes; innovations supported by research; international profile for the import-export game; training and education. Consequences for China, who does play a dominant role due to the size of its internal market ( customers demand) and the magnitude of its production capability (including raw materials availability), are being drawn.  相似文献   
95.
针对当前城市清洁工出现无效劳动且管理不便的问题,提出并开发了一套基于无线射频识别技术和超声波传感器技术的垃圾桶智能化管理系统。该系统通过超声波传感器自动检测垃圾桶,实现对每个垃圾桶的监控与管理。并通过RFID技术以及3G通信技术,对存储清洁工信息的电子标签进行识别,及时通知清洁工处理。由于本系统实现了城市环境智能检测、及时处理垃圾、方便工作监督的效果,因而具有较高的应用价值。  相似文献   
96.
移动系统平台多样化以及各移动系统开发平台互不兼容,使移动应用开发周期长移植性差。为解决移动应用能够实现一次开发多处运行的问题,提出基于HTML5的移动应用跨平台解决方案。基于HTML5的跨移动平台特性,结合JavaScript、CSS等Web应用开发技术,实现iOS、Android两主流移动系统的跨平台开发,在移动管理驾驶舱系统中验证方案的可行性和实用性。该方案节省开发资源同时又满足移动应用的开发与销售模式。  相似文献   
97.
随着服务器虚拟化技术的推广与发展,深圳供电局开始引入虚拟化应用来提高硬件资源使用率,虚拟化技术在给深圳供电局带来便利的同时也暴露一些安全问题,例如出现针对虚拟化操作系统的新型攻击,在虚拟环境下无法有效实现访问控制、流量检测及安全审计等隐患。通过对虚拟化环境基础架构及虚拟化环境信息安全整体防护的探讨,提出一套适用于深圳供电局的虚拟化安全服务器解决方案。  相似文献   
98.
针对经济管理类院校学科专业的特殊性,给出经济管理类院校《微积分》教学应该培养学生的学习兴趣,明确学习《微积分》的重要性和必要性,重视《微积分》在经济中的应用,灵活的应用多媒体教学,巧妙设计课后作业等几点建议。  相似文献   
99.
针对高校和科研等单位实验室仪器设备管理的需要,在充分论证和调研的基础上,采用成熟的B/S体系结构和ASP+Access技术,研究和设计了一套开放、交互、易用的基于WEB的实验室信息管理系统。从而实现了实验室的管理、实验室人员的管理、仪器设备的管理、耗材的管理以及设备借用的管理,对提高高校和科研等单位实验室信息管理的管理水平和工作效率具有重要的现实作用和意义。  相似文献   
100.
介绍了国内外纯碱市场的状况、碱厂在海盐供应上存在的问题和淮安地区盐矿资源的情况 ,阐述了尽快实施卤水制碱项目的意义 ,简要说明了卤水除硝的技术方案 ,同时提出了推进项目实施进度的建议。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号