全文获取类型
收费全文 | 3524篇 |
免费 | 101篇 |
国内免费 | 118篇 |
学科分类
工业技术 | 3743篇 |
出版年
2024年 | 6篇 |
2023年 | 45篇 |
2022年 | 62篇 |
2021年 | 83篇 |
2020年 | 56篇 |
2019年 | 47篇 |
2018年 | 54篇 |
2017年 | 43篇 |
2016年 | 85篇 |
2015年 | 86篇 |
2014年 | 166篇 |
2013年 | 166篇 |
2012年 | 140篇 |
2011年 | 189篇 |
2010年 | 139篇 |
2009年 | 162篇 |
2008年 | 198篇 |
2007年 | 222篇 |
2006年 | 243篇 |
2005年 | 180篇 |
2004年 | 181篇 |
2003年 | 193篇 |
2002年 | 180篇 |
2001年 | 143篇 |
2000年 | 119篇 |
1999年 | 142篇 |
1998年 | 80篇 |
1997年 | 60篇 |
1996年 | 42篇 |
1995年 | 41篇 |
1994年 | 41篇 |
1993年 | 45篇 |
1992年 | 31篇 |
1991年 | 17篇 |
1990年 | 9篇 |
1989年 | 16篇 |
1988年 | 3篇 |
1987年 | 7篇 |
1986年 | 1篇 |
1985年 | 11篇 |
1984年 | 1篇 |
1983年 | 3篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1978年 | 1篇 |
1960年 | 1篇 |
1956年 | 1篇 |
排序方式: 共有3743条查询结果,搜索用时 78 毫秒
41.
《Expert systems with applications》2014,41(1):195-209
The processes of logistics service providers are considered as highly human-centric, flexible and complex. Deviations from the standard operating procedures as described in the designed process models, are not uncommon and may result in significant uncertainties. Acquiring insight in the dynamics of the actual logistics processes can effectively assist in mitigating the uncovered risks and creating strategic advantages, which are the result of uncertainties with respectively a negative and a positive impact on the organizational objectives.In this paper a comprehensive methodology for applying process mining in logistics is presented, covering the event log extraction and preprocessing as well as the execution of exploratory, performance and conformance analyses. The applicability of the presented methodology and roadmap is demonstrated with a case study at an important Chinese port that specializes in bulk cargo. 相似文献
42.
《Expert systems with applications》2014,41(1):105-125
Information systems (IS) facilitate organisations to increase responsiveness and reduce the costs of their supply chain. This paper seeks to make a contribution through exploring and visualising knowledge mapping from the perspective of IS investment evaluation. The evaluation of IS is regarded as a challenging and complex process, which becomes even more difficult with the increased complexity of IS. The intricacy of IS evaluation, however, is due to numerous interrelated factors (e.g. costs, benefits and risks) that have human or organisational dimensions. With this in mind, there appears to be an increasing need to assess investment decision-making processes, to better understand the often far-reaching implications associated with technology adoption and interrelated knowledge components (KC). Through the identification and extrapolation of key learning issues from the literature and empirical findings, organisations can better improve their business processes and thereby their effectiveness and efficiency, while preventing others from making costly oversights that may not necessarily be only financial. In seeking to enlighten the often obscure evaluation of IS investments, this paper attempts to inductively emphasise the dissemination of knowledge and learning through the application of a fuzzy Expert System (ES) based knowledge mapping technique (i.e. Fuzzy Cognitive Map [FCM]). The rationale for exploring knowledge and IS investment evaluation is that a knowledge map will materialise for others to exploit during their specific technology evaluation. This is realised through conceptualising the explicit and tacit investment drivers. Among the several findings drawn from this research, the key resulting knowledge mapping through FCM demonstrated the complex, multifaceted and emergent behaviour of causal relationships within the knowledge area. The principal relationships and knowledge within IS investment evaluation are illustrated as being determined by a blend of managerial and user perspectives. 相似文献
43.
《Information & Management》2014,51(8):1031-1042
Customer relationship management (CRM) has become one of the most influential technologies in the world, and companies are increasingly implementing it to create value. However, despite significant investment in CRM technology infrastructure, empirical research offers inconsistent support for its positive impact on performance. This study develops and tests a research model analyzing the process through which CRM technology infrastructure translates into organizational performance, drawing on the resource-based view (RBV) and the knowledge-based view (KBV) of the firm. Based on an international sample of 125 hotels, the results suggest that organizational commitment and knowledge management fully mediate this process. 相似文献
44.
《Information & Management》2014,51(8):939-951
The degree to which individuals leverage knowledge resources influences their effectiveness and may shape their organizations’ competitive advantage. We examine the ways in which tasks with different characteristics affect individuals’ use of internal and external knowledge and the outcomes of such behaviors. Our analysis reveals that interdependent and non-routine tasks drive internal knowledge sourcing, while complex tasks motivate external knowledge sourcing. Internal and external knowledge sourcing activities contribute to individuals’ cognitive adaptation and innovation, with a negative interaction between them, while cognitive replication benefits only from internal knowledge sourcing. These findings can help managers better satisfy individuals’ knowledge needs and achieve intended organizational outcomes. 相似文献
45.
《Expert systems with applications》2014,41(14):6291-6304
Multi-Agent Systems (MASs) have long been modeled through knowledge and social commitments independently. In this paper, we present a new method that merges the two concepts to model and verify MASs in the presence of uncertainty. To express knowledge and social commitments simultaneously in uncertain settings, we define a new multi-modal logic called Probabilistic Computation Tree Logic of Knowledge and Commitments (PCTLkc in short) which combines two existing probabilistic logics namely, probabilistic logic of knowledge PCTLK and probabilistic logic of commitments PCTLC. To model stochastic MASs, we present a new version of interpreted systems that captures the probabilistic behavior and accounts for the communication between interacting components. Then, we introduce a new probabilistic model checking procedure to check the compliance of target systems against some desirable properties written in PCTLkc and report the obtained verification results. Our proposed model checking technique is reduction-based and consists in transforming the problem of model checking PCTLkc into the problem of model checking a well established logic, namely PCTL. So doing provides us with the privilege of re-using the PRISM model checker to implement the proposed model checking approach. Finally, we demonstrate the effectiveness of our approach by presenting a real case study. This framework can be considered as a step forward towards closing the gap of capturing interactions between knowledge and social commitments in stochastic agent-based systems. 相似文献
46.
47.
48.
《Advanced Engineering Informatics》2014,28(4):381-394
The dangers of the construction industry due to the risk of fatal hazards, such as falling from extreme heights, being struck by heavy equipment or materials, and the possibility of electrocution, are well known. The concept of Job Hazard Analysis is commonly used to mitigate and control these occupational hazards. This technique analyzes the major tasks in a construction activity, identifies all potential task-related hazards, and suggests safe approaches to reduce or avoid each of these hazards. In this paper, the authors explore the possibility of leveraging existing construction safety resources to assist JHA, aiming to reduce the level of human effort required. Specifically, the authors apply ontology-based text classification (TC) to match safe approaches identified in existing resources with unsafe scenarios. These safe approaches can serve as initial references and enrich the solution space when performing JHA. Various document modification strategies are applied to existing resources in order to achieve superior TC effectiveness. The end result of this research is a construction safety domain ontology and its underlying knowledge base. A user scenario is also discussed to demonstrate how the ontology supports JHA in practice. 相似文献
49.
50.
在分析入侵检测方法的基础上,将粗糙集理论引入入侵检测方法,提出一种改进的基于粗糙集的自适应网络入侵检测方法。通过对入侵数据权值离散化预处理,属性知识约简,规则提取与过滤,提高网络入侵数据的检测率。与基于BP-神经网络的方法,基于专家系统的(ES)的方法,以及普通的基础粗糙集的入侵检测方法进行实验对比,通过实验数据,证明该方法的有效性。 相似文献