首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3524篇
  免费   101篇
  国内免费   118篇
工业技术   3743篇
  2024年   6篇
  2023年   45篇
  2022年   62篇
  2021年   83篇
  2020年   56篇
  2019年   47篇
  2018年   54篇
  2017年   43篇
  2016年   85篇
  2015年   86篇
  2014年   166篇
  2013年   166篇
  2012年   140篇
  2011年   189篇
  2010年   139篇
  2009年   162篇
  2008年   198篇
  2007年   222篇
  2006年   243篇
  2005年   180篇
  2004年   181篇
  2003年   193篇
  2002年   180篇
  2001年   143篇
  2000年   119篇
  1999年   142篇
  1998年   80篇
  1997年   60篇
  1996年   42篇
  1995年   41篇
  1994年   41篇
  1993年   45篇
  1992年   31篇
  1991年   17篇
  1990年   9篇
  1989年   16篇
  1988年   3篇
  1987年   7篇
  1986年   1篇
  1985年   11篇
  1984年   1篇
  1983年   3篇
  1981年   1篇
  1980年   1篇
  1978年   1篇
  1960年   1篇
  1956年   1篇
排序方式: 共有3743条查询结果,搜索用时 78 毫秒
41.
The processes of logistics service providers are considered as highly human-centric, flexible and complex. Deviations from the standard operating procedures as described in the designed process models, are not uncommon and may result in significant uncertainties. Acquiring insight in the dynamics of the actual logistics processes can effectively assist in mitigating the uncovered risks and creating strategic advantages, which are the result of uncertainties with respectively a negative and a positive impact on the organizational objectives.In this paper a comprehensive methodology for applying process mining in logistics is presented, covering the event log extraction and preprocessing as well as the execution of exploratory, performance and conformance analyses. The applicability of the presented methodology and roadmap is demonstrated with a case study at an important Chinese port that specializes in bulk cargo.  相似文献   
42.
Information systems (IS) facilitate organisations to increase responsiveness and reduce the costs of their supply chain. This paper seeks to make a contribution through exploring and visualising knowledge mapping from the perspective of IS investment evaluation. The evaluation of IS is regarded as a challenging and complex process, which becomes even more difficult with the increased complexity of IS. The intricacy of IS evaluation, however, is due to numerous interrelated factors (e.g. costs, benefits and risks) that have human or organisational dimensions. With this in mind, there appears to be an increasing need to assess investment decision-making processes, to better understand the often far-reaching implications associated with technology adoption and interrelated knowledge components (KC). Through the identification and extrapolation of key learning issues from the literature and empirical findings, organisations can better improve their business processes and thereby their effectiveness and efficiency, while preventing others from making costly oversights that may not necessarily be only financial. In seeking to enlighten the often obscure evaluation of IS investments, this paper attempts to inductively emphasise the dissemination of knowledge and learning through the application of a fuzzy Expert System (ES) based knowledge mapping technique (i.e. Fuzzy Cognitive Map [FCM]). The rationale for exploring knowledge and IS investment evaluation is that a knowledge map will materialise for others to exploit during their specific technology evaluation. This is realised through conceptualising the explicit and tacit investment drivers. Among the several findings drawn from this research, the key resulting knowledge mapping through FCM demonstrated the complex, multifaceted and emergent behaviour of causal relationships within the knowledge area. The principal relationships and knowledge within IS investment evaluation are illustrated as being determined by a blend of managerial and user perspectives.  相似文献   
43.
《Information & Management》2014,51(8):1031-1042
Customer relationship management (CRM) has become one of the most influential technologies in the world, and companies are increasingly implementing it to create value. However, despite significant investment in CRM technology infrastructure, empirical research offers inconsistent support for its positive impact on performance. This study develops and tests a research model analyzing the process through which CRM technology infrastructure translates into organizational performance, drawing on the resource-based view (RBV) and the knowledge-based view (KBV) of the firm. Based on an international sample of 125 hotels, the results suggest that organizational commitment and knowledge management fully mediate this process.  相似文献   
44.
《Information & Management》2014,51(8):939-951
The degree to which individuals leverage knowledge resources influences their effectiveness and may shape their organizations’ competitive advantage. We examine the ways in which tasks with different characteristics affect individuals’ use of internal and external knowledge and the outcomes of such behaviors. Our analysis reveals that interdependent and non-routine tasks drive internal knowledge sourcing, while complex tasks motivate external knowledge sourcing. Internal and external knowledge sourcing activities contribute to individuals’ cognitive adaptation and innovation, with a negative interaction between them, while cognitive replication benefits only from internal knowledge sourcing. These findings can help managers better satisfy individuals’ knowledge needs and achieve intended organizational outcomes.  相似文献   
45.
Multi-Agent Systems (MASs) have long been modeled through knowledge and social commitments independently. In this paper, we present a new method that merges the two concepts to model and verify MASs in the presence of uncertainty. To express knowledge and social commitments simultaneously in uncertain settings, we define a new multi-modal logic called Probabilistic Computation Tree Logic of Knowledge and Commitments (PCTLkc in short) which combines two existing probabilistic logics namely, probabilistic logic of knowledge PCTLK and probabilistic logic of commitments PCTLC. To model stochastic MASs, we present a new version of interpreted systems that captures the probabilistic behavior and accounts for the communication between interacting components. Then, we introduce a new probabilistic model checking procedure to check the compliance of target systems against some desirable properties written in PCTLkc and report the obtained verification results. Our proposed model checking technique is reduction-based and consists in transforming the problem of model checking PCTLkc into the problem of model checking a well established logic, namely PCTL. So doing provides us with the privilege of re-using the PRISM model checker to implement the proposed model checking approach. Finally, we demonstrate the effectiveness of our approach by presenting a real case study. This framework can be considered as a step forward towards closing the gap of capturing interactions between knowledge and social commitments in stochastic agent-based systems.  相似文献   
46.
47.
48.
The dangers of the construction industry due to the risk of fatal hazards, such as falling from extreme heights, being struck by heavy equipment or materials, and the possibility of electrocution, are well known. The concept of Job Hazard Analysis is commonly used to mitigate and control these occupational hazards. This technique analyzes the major tasks in a construction activity, identifies all potential task-related hazards, and suggests safe approaches to reduce or avoid each of these hazards. In this paper, the authors explore the possibility of leveraging existing construction safety resources to assist JHA, aiming to reduce the level of human effort required. Specifically, the authors apply ontology-based text classification (TC) to match safe approaches identified in existing resources with unsafe scenarios. These safe approaches can serve as initial references and enrich the solution space when performing JHA. Various document modification strategies are applied to existing resources in order to achieve superior TC effectiveness. The end result of this research is a construction safety domain ontology and its underlying knowledge base. A user scenario is also discussed to demonstrate how the ontology supports JHA in practice.  相似文献   
49.
50.
在分析入侵检测方法的基础上,将粗糙集理论引入入侵检测方法,提出一种改进的基于粗糙集的自适应网络入侵检测方法。通过对入侵数据权值离散化预处理,属性知识约简,规则提取与过滤,提高网络入侵数据的检测率。与基于BP-神经网络的方法,基于专家系统的(ES)的方法,以及普通的基础粗糙集的入侵检测方法进行实验对比,通过实验数据,证明该方法的有效性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号