首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   113篇
  免费   2篇
电工技术   1篇
综合类   1篇
化学工业   6篇
金属工艺   6篇
机械仪表   3篇
建筑科学   3篇
矿业工程   6篇
能源动力   4篇
轻工业   6篇
石油天然气   6篇
无线电   4篇
一般工业技术   12篇
冶金工业   36篇
自动化技术   21篇
  2023年   1篇
  2021年   1篇
  2020年   1篇
  2019年   1篇
  2018年   9篇
  2017年   3篇
  2016年   9篇
  2015年   3篇
  2014年   4篇
  2013年   7篇
  2012年   3篇
  2011年   7篇
  2010年   9篇
  2009年   7篇
  2008年   7篇
  2007年   3篇
  2006年   4篇
  2005年   6篇
  2004年   1篇
  2003年   2篇
  2002年   1篇
  2001年   7篇
  2000年   3篇
  1999年   3篇
  1998年   5篇
  1997年   2篇
  1995年   1篇
  1992年   1篇
  1988年   1篇
  1985年   1篇
  1973年   1篇
  1964年   1篇
排序方式: 共有115条查询结果,搜索用时 15 毫秒
1.
The philosophy behind quality, environmental, and safety (QES) management systems is a concept that has been accepted by various contractors. Furthermore, a process has been developed insuring that the output produced conforms to customer satisfaction without violating any environmental, health, and safety rules and regulations. An effective QES program not only assures a quality product but also reduces costs, and enhances productivity. It is a top down process, i.e., top management together with line management and other employees develop the program and motivate all personnel to accept the process. Important functions to take under consideration are (1) explain and clarify the quality, environmental, and safety performance expected; (2) involve employees in decision-making and problem solving; (3) describe the consequences of poor quality and unsafe/unhealthy work conditions; (4) establish QES goals and provide feedback on performance; (5) provide a self-monitoring system; and (6) recognize and reinforce good performance and develop a reward system. This paper presents a discussion of the development of a portion of a QES management system which has been employed by a medium to large size construction company. In particular, Items 1–4, listed above, are described in detail.  相似文献   
2.
Since the use of network-based storage as a cloud computing service [Storage as a Service (StaaS)] becomes ubiquitous, users who store data in the cloud are exposed to risk and potentially severe consequences. Therefore, individuals should carefully consider security and privacy issues when using StaaS. Drawing upon the principle of self-preservation and the theory of protection motivation, this study develops a research model explaining the mechanisms leading to the development of a protection strategy for individuals’ safe use of StaaS and empirically tests the proposed model. The results show that the natural propensity to trust, an individual trait, influences an individual’s need for privacy. This, in turn, along with perception of privacy risk, significantly affects individuals’ perception of the need to protect themselves. Three coping appraisal factors, preventive measures, self-efficacy, and willingness to incur cost of prevention, together with the individual perceived need to protect self, directly and positively affect users’ need to develop a protection strategy in a cloud computing environment. Theoretical and practical implications are discussed.  相似文献   
3.
Recently, there have been a lot of research efforts on peer-to-peer (P2P) live streaming services. P2P systems can be easily deployed since a participating peer’s resources (i.e., upload link bandwidth) can be exploited to distribute contents. However, how to adapt to leaving peers and how to encourage peers to contribute resources voluntarily are still challenging issues. In this paper, we propose Climber, an adaptive P2P live streaming system with incentives for resilience. Climber is based on the hybrid structure of a tree and a mesh, so as to achieve self-improvement and adaptation to users’ dynamic joining and leaving. Moreover, Climber substantiates an incentive mechanism that provides better resilience for peers with more upload bandwidth allocated. Simulation results reveal that Climber significantly reduces the topology maintenance cost compared to SplitStream and NICE-PRM. Also, simulation and analytical results verify that Climber can bound the level of disruption by dynamically adapting to the user churning rate.  相似文献   
4.
In the paper, we study a problem of control with a predictive model for discrete systems with Markovian jumps and multiplicative noises. A strategy to control with regard for explicit constraints on control variables is defined. The results are applied to control an investment portfolio under constraints on investment amounts.  相似文献   
5.
The way in which a new road bridge made of steel corrugated plates Super Cor type was tested during the three stages of its construction is described and the test results are presented. Backfill in construction Stage I and two ballasting vehicles in Stages II and III constituted the loads. The box bridge spans the Bystrzyca Dusznicka River in Polanica Zdroj, Poland. The span’s effective length is 12.27?m and its vertical inside diameter is 3.85?m. The steel span is founded on two reinforced concrete strip foundations. The average values of the displacements and strains (normal stresses) measured in selected points and on selected elements of the steel shell structure were much smaller than the ones computed for the same load. The conclusions drawn from this research can be helpful in determining the interaction between the steel shell and the backfill. Since this type of steel–soil structure is increasingly used in Poland and in the world, the conclusions can be generalized to a whole class of similar bridge designs.  相似文献   
6.
The Accreditation Board for Engineering and Technology (ABET) has adopted a revised set of criteria for accrediting engineering programs. Nevertheless, as in the past, civil engineering departments will be required to demonstrate proficiency in specific subject areas which are included in the ABET program criteria. This paper investigates how civil engineering students at Lamar University improved their understanding of various subject areas required by ABET and listed in the Program Criteria for Civil and Similarly Named Engineering Programs and the General Criteria (professional component) by being involved with cooperative, part-time, and summer work experiences. In particular, the findings suggest that both undergraduate and graduate students believe that three areas have been greatly enhanced with engineering work. They include structural engineering, project management/scheduling and estimating, and teamwork. In addition, undergraduates perceive that their understanding of health and safety issues and ethical considerations has also increased. In contrast, graduate students believe that their knowledge of hydraulics, hydrology, and water resources, constructability, and economic factors has been enhanced by civil engineering work experiences.  相似文献   
7.
8.
This article uses the protection motivation theory to study the impact of information security awareness on desktop security behavior. It contributes to the literature by examining the roles played by awareness, an important antecedent to the cognitive processes in the protection motivation theory. The findings indicate that security awareness significantly affects perceived severity, response efficacy, self-efficacy, and response cost. Constructs in the coping appraisal process (except response cost), in turn, significantly impact recommended security behavior.  相似文献   
9.
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号