全文获取类型
收费全文 | 3264篇 |
免费 | 97篇 |
国内免费 | 45篇 |
学科分类
工业技术 | 3406篇 |
出版年
2023年 | 27篇 |
2022年 | 56篇 |
2021年 | 43篇 |
2020年 | 71篇 |
2019年 | 62篇 |
2018年 | 70篇 |
2017年 | 91篇 |
2016年 | 128篇 |
2015年 | 124篇 |
2014年 | 204篇 |
2013年 | 241篇 |
2012年 | 200篇 |
2011年 | 346篇 |
2010年 | 204篇 |
2009年 | 224篇 |
2008年 | 197篇 |
2007年 | 182篇 |
2006年 | 206篇 |
2005年 | 171篇 |
2004年 | 110篇 |
2003年 | 113篇 |
2002年 | 67篇 |
2001年 | 69篇 |
2000年 | 36篇 |
1999年 | 40篇 |
1998年 | 26篇 |
1997年 | 20篇 |
1996年 | 14篇 |
1995年 | 13篇 |
1994年 | 5篇 |
1993年 | 6篇 |
1992年 | 6篇 |
1991年 | 7篇 |
1990年 | 3篇 |
1989年 | 5篇 |
1988年 | 5篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 3篇 |
1983年 | 6篇 |
1981年 | 1篇 |
排序方式: 共有3406条查询结果,搜索用时 15 毫秒
71.
Mehdi Ghatee S. Mehdi Hashemi Behnam Hashemi Mehdi Dehghan 《Computers & Mathematics with Applications》2008,55(12):2767-2790
Duality properties have been investigated by many researchers in the recent literature. They are introduced in this paper for a fully fuzzified version of the minimal cost flow problem, which is a basic model in network flow theory. This model illustrates the least cost of the shipment of a commodity through a capacitated network in terms of the imprecisely known available supplies at certain nodes which should be transmitted to fulfil uncertain demands at other nodes. First, we review on the most valuable results on fuzzy duality concepts to facilitate the discussion of this paper. By applying Hukuhara’s difference, approximated and exact multiplication and Wu’s scalar production, we exhibit the flow in network models. Then, we use combinatorial algorithms on a reduced problem which is derived from fully fuzzified MCFP to acquire fuzzy optimal flows. To give duality theorems, we utilize a total order on fuzzy numbers due to the level of risk and realize optimality conditions for providing some efficient combinatorial algorithms. Finally, we compare our results with the previous worthwhile works to demonstrate the efficiency and power of our scheme and the reasonability of our solutions in actual decision-making problems. 相似文献
72.
虞益诚 《计算机应用与软件》2008,25(12)
阐述上海世博会信息化运营架构、上海世博会信息化总体框架、世博会信息化运作模式,并分析世博会信息化运作存在的风险,以及上海世博会信息化运作风险的防范取向等内容。 相似文献
73.
普适计算环境下信任管理模型的研究 总被引:2,自引:1,他引:1
普适计算环境下,各种资源、设备、应用以及环境均是高度动态变化的,因此如何衡量实体间的信任关系成为了一个十分重要的问题.传统的安全和认证方法基于可信第三方,而在动态的普适计算环境下,可信第三方的设置是不现实的,也是不可行的.基于以上问题,提出了一个新的普适计算信任管理模型,该模型集成了信誉和风险分析机制,考虑了多种相关因素,可以有效建立和度量各实体间的信任关系.相关仿真结果证明,该模型是行之有效的. 相似文献
74.
Sunil Kumar Richard J. Pippy Erdem Acar Nam H. Kim Raphael T. Haftka 《Structural and Multidisciplinary Optimization》2009,38(6):613-626
Probabilistic structural design deals with uncertainties in response (e.g. stresses) and capacity (e.g. failure stresses).
The calculation of the structural response is typically expensive (e.g., finite element simulations), while the capacity is
usually available from tests. Furthermore, the random variables that influence response and capacity are often disjoint. In
previous work we have shown that this disjoint property can be used to reduce the cost of obtaining the probability of failure
via Monte Carlo simulations. In this paper we propose to use this property for an approximate probabilistic optimization based
on exact capacity and approximate response distributions (ECARD). In Approximate Probabilistic Optimization Using ECARD, the
change in response distribution is approximated as the structure is re-designed while the capacity distribution is kept exact,
thus significantly reducing the number of expensive response simulations. ECARD may be viewed as an extension of SORA (Sequential
Optimization and Reliability Assessment), which proceeds with deterministic optimization iterations. In contrast, ECARD has
probabilistic optimization iterations, but in each iteration, the response distribution is approximated so as not to require
additional response calculations. The use of inexpensive probabilistic optimization allows easy incorporation of system reliability
constraints and optimal allocation of risk between failure modes. The method is demonstrated using a beam problem and a ten-bar
truss problem. The former allocates risk between two different failure modes, while the latter allocates risk between members.
It is shown that ECARD provides most of the improvement from risk re-allocation that can be obtained from full probabilistic
optimization. 相似文献
75.
76.
跨国公司研发项目风险评估方法研究 总被引:2,自引:0,他引:2
日益众多的跨国企业越来越重视研发项目的风险评估。在分析跨国公司研发项目风险特点的基础上,提出了一套切实可行的跨国公司研发项目的风险评估指标体系。基于TOPSIS(Technique for Order Performance by Similarity to Ideal Solution)的定量评估方法,提出了一种跨国公司研发项目风险评估方法。数据实例表明,方法是可行的、正确的和有效的。在跨国公司研发项目风险管理过程中,可以运用该方法对其进行评估,根据评估结果对研发项目进行优选排序,为管理决策提供有效的科学依据。 相似文献
77.
基于BP模型的商业银行贷款风险预测 总被引:3,自引:1,他引:2
国有商业银行不良贷款严重束缚了商业银行的发展.防范金融风险,降低不良贷款,增强商业银行的风险识别能力,其关键是风险预测.商业银行贷款本身是一个复杂的非线性系统,用一般的线性理论难以客观反映其规律,为此,采用人工神经网络方法进行研究.在简述概念的基础上,通过反向传播网络(BP模型)对贷款企业的经营能力进行预测,从而对商业银行的贷款决策提供理论支持,使商业银行贷款风险能被控制在可控范围内.并对代表性的A股份有限公司进行预测,所得结果表明:建立的预测模型具有良好的风险预测能力. 相似文献
78.
We propose a simple and quick method for quantifying workers' anxiety and thermal comfort levels using physiological signals. Nine subjects enrolled in a series of controlled laboratory experiments involving varying temperature, relative humidity, and labor intensities. A total of 40 experiments were conducted, and 1592 groups of anxiety data and 1624 groups of thermal comfort data were obtained, respectively. During 2-h-working trials, Electroencephalogram (EEG), photoplethysmography (PPG), and pupil diameter of each subject were collected synchronously, and the State-Trait Anxiety Inventory (STAI) and thermal comfort vote (TCV) were completed in stages. Random Forest was adopted to screen out the appropriate sensitivity feature indicators of anxiety levels and thermal comfort levels from the 70 features of the 10 EEG channels. Finally, Random Forest, Gradient Boosting Decision Tree, K-nearest Neighbor Algorithm, and Support Vector Machine were used to determine relevant physiological data combinations and modeling algorithms. The Precision of the anxiety level and thermal comfort level quick identification model based on Random Forest Algorithm can reach 81.04% and 84.79%, respectively. This suggests that the proposed quick identification method for assessing workers' anxiety and thermal comfort levels holds promise. Physiological data need to be obtained by monitoring only PPG, pupil diameter, and 5 EEG channels. By processing these data, the workers' anxiety and thermal comfort level could be judged realistically to ensure their safety. It is suggested that PPG, pupil diameter, and EEG should be considered all together in the future study of anxiety and thermal comfort. 相似文献
79.
Molly K. Floyd Kash Barker Claudio M. Rocco Mackenzie G. Whitman 《Engineering Management Journal; EMJ》2017,29(3):165-178
Inherent in project management is the risk that a project fails to meet planned completion deadlines due to delays experienced in individual tasks. As such, certain critical tasks may be candidates for risk management (e.g., the allocation of additional resources such as labor, materials, and equipment) to prevent delays. A common means to identify such critical tasks is with the critical path method (CPM), which identifies a path of tasks in a project network that, when delayed, result in project delays. This work offers a complementary, stochastic approach to CPM that ranks tasks according to their effect on the project completion time distribution, when the distributions of task completion time are delayed. The new hybrid approach is based on the use of a Monte Carlo simulation and a multi-criteria decision analysis technique. Monte Carlo simulation allows for approximating the cumulative distribution function of the total duration of the project, while the multi-criteria decision analysis technique is used to compare and rank the tasks across percentiles of the resulting project completion time distributions. Doing so allows for different percentile weighting schemes to represent decision maker risk preferences. The suggested approach is applied to two project network examples. The examples illustrate that the proposed approach highlights some tasks as risky, which may not always lie on the critical path as identified by CPM. This is valuable for practicing managers as it allows them to properly consider their risk preferences when determining task criticality based on the distribution of project completion time (e.g., emphasizing median vs. upper tail completion time). 相似文献
80.
While workers’ safety risk tolerances have been regarded as a main reason for their unsafe behaviors, little is known about why different people have different risk tolerances even when confronting the same situation. The aim of this research is to identify the critical factors and paths that influence workers’ safety risk tolerance and to explore how they contribute to accident causal model from a system thinking perceptive. A number of methods were carried out to analyze the data collected through interviews and questionnaire surveys. In the first and second steps of the research, factor identification, factor ranking and factor analysis were carried out, and the results show that workers’ safety risk tolerance can be influenced by four groups of factors, namely: (1) personal subjective perception; (2) work knowledge and experiences; (3) work characteristics; and (4) safety management. In the third step of the research, hypothetical influencing path model was developed and tested by using structural equation modeling (SEM). It is found that the effects of external factors (safety management and work characteristics) on risk tolerance are larger than that of internal factors (personal subjective perception and work knowledge & experiences). Specifically, safety management contributes the most to workers’ safety risk tolerance through its direct effect and indirect effect; while personal subjective perception comes the second and can act as an intermedia for work characteristics. This research provides an in-depth insight of workers’ unsafe behaviors by depicting the contributing factors as shown in the accident causal model developed in this research. 相似文献