首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11946篇
  免费   468篇
  国内免费   532篇
电工技术   257篇
综合类   1158篇
化学工业   242篇
金属工艺   175篇
机械仪表   1036篇
建筑科学   1358篇
矿业工程   340篇
能源动力   166篇
轻工业   310篇
水利工程   245篇
石油天然气   244篇
武器工业   55篇
无线电   782篇
一般工业技术   434篇
冶金工业   357篇
原子能技术   119篇
自动化技术   5668篇
  2024年   7篇
  2023年   77篇
  2022年   130篇
  2021年   169篇
  2020年   168篇
  2019年   142篇
  2018年   142篇
  2017年   148篇
  2016年   210篇
  2015年   236篇
  2014年   609篇
  2013年   675篇
  2012年   724篇
  2011年   951篇
  2010年   711篇
  2009年   598篇
  2008年   690篇
  2007年   838篇
  2006年   833篇
  2005年   694篇
  2004年   667篇
  2003年   656篇
  2002年   585篇
  2001年   433篇
  2000年   389篇
  1999年   367篇
  1998年   262篇
  1997年   169篇
  1996年   125篇
  1995年   108篇
  1994年   91篇
  1993年   78篇
  1992年   51篇
  1991年   31篇
  1990年   17篇
  1989年   32篇
  1988年   17篇
  1987年   19篇
  1986年   8篇
  1985年   30篇
  1984年   16篇
  1983年   10篇
  1982年   7篇
  1981年   10篇
  1980年   3篇
  1978年   3篇
  1971年   1篇
  1964年   1篇
  1960年   1篇
  1956年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
121.
浦市化工总厂15年多种经营的体会有三条:由于中小矿山规模小、交通不便,从事多种经营既是自身生存发展的必由之路,又要着眼于填补市场空白,不断优化产品结构,开发新产品的同时必须狠抓经营管理;不断完善规章制度。面对变化、竞争的市场,缺乏足够的产品开发资金和快速反应的机制,还有一些其他不利因素,必须由国家采取调控手段才能加以解决。  相似文献   
122.
回顾了中国石油所属乙烯装置2004年的生产情况,总结生产管理、技术进步及改造发展工作。介绍了2005年的工作目标和任务。  相似文献   
123.
杨辉 《塑料工业》2007,35(B06):36-38,50
分析了以ISO9000为基础平台对质量经营的核心要素进行整合与再造,使塑料企业的质量经营体系卓越有效;以达到增强塑料企业核心竞争力的。  相似文献   
124.
ContextSecurity in Process-Aware Information Systems (PAIS) has gained increased attention in current research and practice. However, a common understanding and agreement on security is still missing. In addition, the proliferation of literature makes it cumbersome to overlook and determine state of the art and further to identify research challenges and gaps. In summary, a comprehensive and systematic overview of state of the art in research and practice in the area of security in PAIS is missing.ObjectiveThis paper investigates research on security in PAIS and aims at establishing a common understanding of terminology in this context. Further it investigates which security controls are currently applied in PAIS.MethodA systematic literature review is conducted in order to classify and define security and security controls in PAIS. From initially 424 papers, we selected in total 275 publications that related to security and PAIS between 1993 and 2012. Furthermore, we analyzed and categorized the papers using a systematic mapping approach which resulted into 5 categories and 12 security controls.ResultsIn literature, security in PAIS often centers on specific (security) aspects such as security policies, security requirements, authorization and access control mechanisms, or inter-organizational scenarios. In addition, we identified 12 security controls in the area of security concepts, authorization and access control, applications, verification, and failure handling in PAIS. Based on the results, open research challenges and gaps are identified and discussed with respect to possible solutions.ConclusionThis survey provides a comprehensive review of current security practice in PAIS and shows that security in PAIS is a challenging interdisciplinary research field that assembles research methods and principles from security and PAIS. We show that state of the art provides a rich set of methods such as access control models but still several open research challenges remain.  相似文献   
125.
A goal of this study is to develop a Composite Knowledge Manipulation Tool (CKMT). Some of traditional medical activities are rely heavily on the oral transfer of knowledge, with the risk of losing important knowledge. Moreover, the activities differ according to the regions, traditions, experts’ experiences, etc. Therefore, it is necessary to develop an integrated and consistent knowledge manipulation tool. By using the tool, it will be possible to extract the tacit knowledge consistently, transform different types of knowledge into a composite knowledge base (KB), integrate disseminated and complex knowledge, and complement the lack of knowledge. For the reason above, I have developed the CKMT called as K-Expert and it has four advanced functionalities as follows. Firstly, it can extract/import logical rules from data mining (DM) with the minimum of effort. I expect that the function can complement the oral transfer of traditional knowledge. Secondly, it transforms the various types of logical rules into database (DB) tables after the syntax checking and/or transformation. In this situation, knowledge managers can refine, evaluate, and manage the huge-sized composite KB consistently with the support of the DB management systems (DBMS). Thirdly, it visualizes the transformed knowledge in the shape of decision tree (DT). With the function, the knowledge workers can evaluate the completeness of the KB and complement the lack of knowledge. Finally, it gives SQL-based backward chaining function to the knowledge users. It could reduce the inference time effectively since it is based on SQL query and searching not the sentence-by-sentence translation used in the traditional inference systems. The function will give the young researchers and their fellows in the field of knowledge management (KM) and expert systems (ES) more opportunities to follow up and validate their knowledge. Finally, I expect that the approach can present the advantages of mitigating knowledge loss and the burdens of knowledge transformation and complementation.  相似文献   
126.
The aim of this study is to identify and prioritize the solutions of Knowledge Management (KM) adoption in Supply Chain (SC) to overcome its barriers. It helps organizations to concentrate on high rank solutions and develop strategies to implement them on priority. This paper proposes a framework based on fuzzy analytical hierarchy process (AHP) and fuzzy technique for order performance by similarity to ideal solution (TOPSIS) to identify and rank the solutions of KM adoption in SC and overcome its barriers. The AHP is used to determine weights of the barriers as criteria, and fuzzy TOPSIS method is used to obtain final ranking of the solutions of KM adoption in SC. The empirical case study analysis of an Indian hydraulic valve manufacturing organization is conducted to illustrate the use of the proposed framework for ranking the solutions of KM adoption in SC to overcome its barriers. This proposed framework provides a more accurate, effective and systematic decision support tool for stepwise implementation of the solutions of KM adoption in SC to increase its success rate.  相似文献   
127.
The processes of logistics service providers are considered as highly human-centric, flexible and complex. Deviations from the standard operating procedures as described in the designed process models, are not uncommon and may result in significant uncertainties. Acquiring insight in the dynamics of the actual logistics processes can effectively assist in mitigating the uncovered risks and creating strategic advantages, which are the result of uncertainties with respectively a negative and a positive impact on the organizational objectives.In this paper a comprehensive methodology for applying process mining in logistics is presented, covering the event log extraction and preprocessing as well as the execution of exploratory, performance and conformance analyses. The applicability of the presented methodology and roadmap is demonstrated with a case study at an important Chinese port that specializes in bulk cargo.  相似文献   
128.
Information systems (IS) facilitate organisations to increase responsiveness and reduce the costs of their supply chain. This paper seeks to make a contribution through exploring and visualising knowledge mapping from the perspective of IS investment evaluation. The evaluation of IS is regarded as a challenging and complex process, which becomes even more difficult with the increased complexity of IS. The intricacy of IS evaluation, however, is due to numerous interrelated factors (e.g. costs, benefits and risks) that have human or organisational dimensions. With this in mind, there appears to be an increasing need to assess investment decision-making processes, to better understand the often far-reaching implications associated with technology adoption and interrelated knowledge components (KC). Through the identification and extrapolation of key learning issues from the literature and empirical findings, organisations can better improve their business processes and thereby their effectiveness and efficiency, while preventing others from making costly oversights that may not necessarily be only financial. In seeking to enlighten the often obscure evaluation of IS investments, this paper attempts to inductively emphasise the dissemination of knowledge and learning through the application of a fuzzy Expert System (ES) based knowledge mapping technique (i.e. Fuzzy Cognitive Map [FCM]). The rationale for exploring knowledge and IS investment evaluation is that a knowledge map will materialise for others to exploit during their specific technology evaluation. This is realised through conceptualising the explicit and tacit investment drivers. Among the several findings drawn from this research, the key resulting knowledge mapping through FCM demonstrated the complex, multifaceted and emergent behaviour of causal relationships within the knowledge area. The principal relationships and knowledge within IS investment evaluation are illustrated as being determined by a blend of managerial and user perspectives.  相似文献   
129.
The viability of networked communities depends on the creation and disclosure of user-generated content and the frequency of user visitation (Facebook 10-K Annual Report, 2012). However, little is known about how to align the interests of user and social networking sites. In this study, we draw upon the principal-agent perspective to extend Pavlou et al.’s uncertainty mitigation model of online exchange relationships (2007) and propose an empirically tested model for aligning the incentives of the principal (user) and the agent (service provider). As suggested by Pavlou et al., we incorporated a multi-dimensional measure of trust: trust of provider and trust of members. The proposed model is empirically tested with survey data from 305 adults aged 20-55. The results support our model, delineating how real individuals with bounded rationality actually make decision about information disclosure under uncertainty in the social networking site context. There is show little to no relationship between online privacy concerns and information disclosure on online social network sites. Perceived benefits provide the linkage between the incentives of principal (user) and agent (provider) while usage intensity demonstrated the most significant impact on information disclosure. We argue that the phenomenon may be explained through Communication Privacy Management Theory. The present study enhances our understanding of agency theory and human judgment theory in the context of social media. Practical implications for understanding and facilitating online social exchange relationships are also discussed.  相似文献   
130.
Globalization is a reality resulting in many changes in the refractory industry. In this paper some of the threats and opportunities, which are influencing the future prosperity of the refractory industry on a worldwide basis, are being evoked. Some key technical and management issues are underlined, in terms of adjusting the productivity-quality-cost to the customers requirements ; producing unshapes versus shapes; innovations supported by research; international profile for the import-export game; training and education. Consequences for China, who does play a dominant role due to the size of its internal market ( customers demand) and the magnitude of its production capability (including raw materials availability), are being drawn.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号