全文获取类型
收费全文 | 11946篇 |
免费 | 468篇 |
国内免费 | 532篇 |
专业分类
电工技术 | 257篇 |
综合类 | 1158篇 |
化学工业 | 242篇 |
金属工艺 | 175篇 |
机械仪表 | 1036篇 |
建筑科学 | 1358篇 |
矿业工程 | 340篇 |
能源动力 | 166篇 |
轻工业 | 310篇 |
水利工程 | 245篇 |
石油天然气 | 244篇 |
武器工业 | 55篇 |
无线电 | 782篇 |
一般工业技术 | 434篇 |
冶金工业 | 357篇 |
原子能技术 | 119篇 |
自动化技术 | 5668篇 |
出版年
2024年 | 7篇 |
2023年 | 77篇 |
2022年 | 130篇 |
2021年 | 169篇 |
2020年 | 168篇 |
2019年 | 142篇 |
2018年 | 142篇 |
2017年 | 148篇 |
2016年 | 210篇 |
2015年 | 236篇 |
2014年 | 609篇 |
2013年 | 675篇 |
2012年 | 724篇 |
2011年 | 951篇 |
2010年 | 711篇 |
2009年 | 598篇 |
2008年 | 690篇 |
2007年 | 838篇 |
2006年 | 833篇 |
2005年 | 694篇 |
2004年 | 667篇 |
2003年 | 656篇 |
2002年 | 585篇 |
2001年 | 433篇 |
2000年 | 389篇 |
1999年 | 367篇 |
1998年 | 262篇 |
1997年 | 169篇 |
1996年 | 125篇 |
1995年 | 108篇 |
1994年 | 91篇 |
1993年 | 78篇 |
1992年 | 51篇 |
1991年 | 31篇 |
1990年 | 17篇 |
1989年 | 32篇 |
1988年 | 17篇 |
1987年 | 19篇 |
1986年 | 8篇 |
1985年 | 30篇 |
1984年 | 16篇 |
1983年 | 10篇 |
1982年 | 7篇 |
1981年 | 10篇 |
1980年 | 3篇 |
1978年 | 3篇 |
1971年 | 1篇 |
1964年 | 1篇 |
1960年 | 1篇 |
1956年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
121.
浦市化工总厂15年多种经营的体会有三条:由于中小矿山规模小、交通不便,从事多种经营既是自身生存发展的必由之路,又要着眼于填补市场空白,不断优化产品结构,开发新产品的同时必须狠抓经营管理;不断完善规章制度。面对变化、竞争的市场,缺乏足够的产品开发资金和快速反应的机制,还有一些其他不利因素,必须由国家采取调控手段才能加以解决。 相似文献
122.
123.
分析了以ISO9000为基础平台对质量经营的核心要素进行整合与再造,使塑料企业的质量经营体系卓越有效;以达到增强塑料企业核心竞争力的。 相似文献
124.
《Information and Software Technology》2014,56(3):273-293
ContextSecurity in Process-Aware Information Systems (PAIS) has gained increased attention in current research and practice. However, a common understanding and agreement on security is still missing. In addition, the proliferation of literature makes it cumbersome to overlook and determine state of the art and further to identify research challenges and gaps. In summary, a comprehensive and systematic overview of state of the art in research and practice in the area of security in PAIS is missing.ObjectiveThis paper investigates research on security in PAIS and aims at establishing a common understanding of terminology in this context. Further it investigates which security controls are currently applied in PAIS.MethodA systematic literature review is conducted in order to classify and define security and security controls in PAIS. From initially 424 papers, we selected in total 275 publications that related to security and PAIS between 1993 and 2012. Furthermore, we analyzed and categorized the papers using a systematic mapping approach which resulted into 5 categories and 12 security controls.ResultsIn literature, security in PAIS often centers on specific (security) aspects such as security policies, security requirements, authorization and access control mechanisms, or inter-organizational scenarios. In addition, we identified 12 security controls in the area of security concepts, authorization and access control, applications, verification, and failure handling in PAIS. Based on the results, open research challenges and gaps are identified and discussed with respect to possible solutions.ConclusionThis survey provides a comprehensive review of current security practice in PAIS and shows that security in PAIS is a challenging interdisciplinary research field that assembles research methods and principles from security and PAIS. We show that state of the art provides a rich set of methods such as access control models but still several open research challenges remain. 相似文献
125.
《Expert systems with applications》2014,41(9):4337-4348
A goal of this study is to develop a Composite Knowledge Manipulation Tool (CKMT). Some of traditional medical activities are rely heavily on the oral transfer of knowledge, with the risk of losing important knowledge. Moreover, the activities differ according to the regions, traditions, experts’ experiences, etc. Therefore, it is necessary to develop an integrated and consistent knowledge manipulation tool. By using the tool, it will be possible to extract the tacit knowledge consistently, transform different types of knowledge into a composite knowledge base (KB), integrate disseminated and complex knowledge, and complement the lack of knowledge. For the reason above, I have developed the CKMT called as K-Expert and it has four advanced functionalities as follows. Firstly, it can extract/import logical rules from data mining (DM) with the minimum of effort. I expect that the function can complement the oral transfer of traditional knowledge. Secondly, it transforms the various types of logical rules into database (DB) tables after the syntax checking and/or transformation. In this situation, knowledge managers can refine, evaluate, and manage the huge-sized composite KB consistently with the support of the DB management systems (DBMS). Thirdly, it visualizes the transformed knowledge in the shape of decision tree (DT). With the function, the knowledge workers can evaluate the completeness of the KB and complement the lack of knowledge. Finally, it gives SQL-based backward chaining function to the knowledge users. It could reduce the inference time effectively since it is based on SQL query and searching not the sentence-by-sentence translation used in the traditional inference systems. The function will give the young researchers and their fellows in the field of knowledge management (KM) and expert systems (ES) more opportunities to follow up and validate their knowledge. Finally, I expect that the approach can present the advantages of mitigating knowledge loss and the burdens of knowledge transformation and complementation. 相似文献
126.
《Expert systems with applications》2014,41(2):679-693
The aim of this study is to identify and prioritize the solutions of Knowledge Management (KM) adoption in Supply Chain (SC) to overcome its barriers. It helps organizations to concentrate on high rank solutions and develop strategies to implement them on priority. This paper proposes a framework based on fuzzy analytical hierarchy process (AHP) and fuzzy technique for order performance by similarity to ideal solution (TOPSIS) to identify and rank the solutions of KM adoption in SC and overcome its barriers. The AHP is used to determine weights of the barriers as criteria, and fuzzy TOPSIS method is used to obtain final ranking of the solutions of KM adoption in SC. The empirical case study analysis of an Indian hydraulic valve manufacturing organization is conducted to illustrate the use of the proposed framework for ranking the solutions of KM adoption in SC to overcome its barriers. This proposed framework provides a more accurate, effective and systematic decision support tool for stepwise implementation of the solutions of KM adoption in SC to increase its success rate. 相似文献
127.
《Expert systems with applications》2014,41(1):195-209
The processes of logistics service providers are considered as highly human-centric, flexible and complex. Deviations from the standard operating procedures as described in the designed process models, are not uncommon and may result in significant uncertainties. Acquiring insight in the dynamics of the actual logistics processes can effectively assist in mitigating the uncovered risks and creating strategic advantages, which are the result of uncertainties with respectively a negative and a positive impact on the organizational objectives.In this paper a comprehensive methodology for applying process mining in logistics is presented, covering the event log extraction and preprocessing as well as the execution of exploratory, performance and conformance analyses. The applicability of the presented methodology and roadmap is demonstrated with a case study at an important Chinese port that specializes in bulk cargo. 相似文献
128.
《Expert systems with applications》2014,41(1):105-125
Information systems (IS) facilitate organisations to increase responsiveness and reduce the costs of their supply chain. This paper seeks to make a contribution through exploring and visualising knowledge mapping from the perspective of IS investment evaluation. The evaluation of IS is regarded as a challenging and complex process, which becomes even more difficult with the increased complexity of IS. The intricacy of IS evaluation, however, is due to numerous interrelated factors (e.g. costs, benefits and risks) that have human or organisational dimensions. With this in mind, there appears to be an increasing need to assess investment decision-making processes, to better understand the often far-reaching implications associated with technology adoption and interrelated knowledge components (KC). Through the identification and extrapolation of key learning issues from the literature and empirical findings, organisations can better improve their business processes and thereby their effectiveness and efficiency, while preventing others from making costly oversights that may not necessarily be only financial. In seeking to enlighten the often obscure evaluation of IS investments, this paper attempts to inductively emphasise the dissemination of knowledge and learning through the application of a fuzzy Expert System (ES) based knowledge mapping technique (i.e. Fuzzy Cognitive Map [FCM]). The rationale for exploring knowledge and IS investment evaluation is that a knowledge map will materialise for others to exploit during their specific technology evaluation. This is realised through conceptualising the explicit and tacit investment drivers. Among the several findings drawn from this research, the key resulting knowledge mapping through FCM demonstrated the complex, multifaceted and emergent behaviour of causal relationships within the knowledge area. The principal relationships and knowledge within IS investment evaluation are illustrated as being determined by a blend of managerial and user perspectives. 相似文献
129.
《Expert systems with applications》2014,41(6):3091-3104
The viability of networked communities depends on the creation and disclosure of user-generated content and the frequency of user visitation (Facebook 10-K Annual Report, 2012). However, little is known about how to align the interests of user and social networking sites. In this study, we draw upon the principal-agent perspective to extend Pavlou et al.’s uncertainty mitigation model of online exchange relationships (2007) and propose an empirically tested model for aligning the incentives of the principal (user) and the agent (service provider). As suggested by Pavlou et al., we incorporated a multi-dimensional measure of trust: trust of provider and trust of members. The proposed model is empirically tested with survey data from 305 adults aged 20-55. The results support our model, delineating how real individuals with bounded rationality actually make decision about information disclosure under uncertainty in the social networking site context. There is show little to no relationship between online privacy concerns and information disclosure on online social network sites. Perceived benefits provide the linkage between the incentives of principal (user) and agent (provider) while usage intensity demonstrated the most significant impact on information disclosure. We argue that the phenomenon may be explained through Communication Privacy Management Theory. The present study enhances our understanding of agency theory and human judgment theory in the context of social media. Practical implications for understanding and facilitating online social exchange relationships are also discussed. 相似文献
130.
Michel Rigaud ZHOU Ningsheng YE Fangbao 《中国耐火材料》2005,14(4):3-7
Globalization is a reality resulting in many changes in the refractory industry. In this paper some of the threats and opportunities, which are influencing the future prosperity of the refractory industry on a worldwide basis, are being evoked. Some key technical and management issues are underlined, in terms of adjusting the productivity-quality-cost to the customers requirements ; producing unshapes versus shapes; innovations supported by research; international profile for the import-export game; training and education. Consequences for China, who does play a dominant role due to the size of its internal market ( customers demand) and the magnitude of its production capability (including raw materials availability), are being drawn. 相似文献