首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16764篇
  免费   0篇
财政金融   2648篇
工业经济   756篇
计划管理   2556篇
经济学   3865篇
综合类   482篇
运输经济   1篇
旅游经济   3篇
贸易经济   4484篇
经济概况   1353篇
信息产业经济   44篇
邮电经济   572篇
  2019年   3篇
  2018年   2302篇
  2017年   2052篇
  2016年   1208篇
  2015年   91篇
  2014年   85篇
  2013年   61篇
  2012年   433篇
  2011年   1941篇
  2010年   1825篇
  2009年   1518篇
  2008年   1511篇
  2007年   1868篇
  2006年   64篇
  2005年   386篇
  2004年   462篇
  2003年   550篇
  2002年   252篇
  2001年   61篇
  2000年   49篇
  1998年   16篇
  1996年   13篇
  1986年   13篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
61.
In manufacturing industries, product inspection is automated and the use of image data is increasingly being employed for defect detection. A manufacturing company in Japan produces an item and inspects the produced products using image data. Reducing the error rate is important in product inspection because poor inspection of products might lead to the delivery of defective products to consumers (consumer’s risk) and strict inspection increases production cost (producer’s risk). To reduce the error rate, we highlighted fault points using a two-dimensional moving range filter and discriminated defect production through a unanimous vote among Mahalanobis classifiers for each color component. For results, we achieved a lower error rate than the current system. This research is an empirical study of how to use image data in defect detection.  相似文献   
62.
An increase of broadband demand is forecasted by transitional methods that consider the effect of this increase through many factors, such as customer requirement diversification, and new service introduction and deployment under competition. Broadband demand forecasting has become important for closing the digital divide, promoting regional developments, and constructing networks economically; therefore, a demand forecast model that considers the mechanisms of market structure is necessary. In this paper, a demand analysis method for broadband access combining macro- and micro-data mining is proposed, and the service choice behaviour of customers is introduced as a customer model not only to express the macro trend of market structure, but also to consider area marketing. The proposed method can estimate the potential demand, determine the point at which broadband demand growth peaks in a specified area, and support a decision for ultra high-speed broadband access facility installation.  相似文献   
63.
64.
This study aimed to examine whether a causal relationship exists between perceived restorativeness and emotional healing, visitor satisfaction, and intention to revisit with respect to a visit to the Seooreung Shrine in South Korea. Attention restorativeness theory claims that four factors (being away, fascination, extent, and compatibility) induce a restorative environment. The results of the conducted survey support the four factors of attention restorativeness theory. Two distinct groups were identified and differences were discovered between the groups with respect to satisfaction and perceived restorativeness. Emotional healing exerted more influence on intention to revisit than visitor satisfaction. This study delivers a significant outcome as pioneer research on healing tourism by discovering emotional healing as a precedent variable to visitor satisfaction and intention to revisit in the area of cultural heritage tourism.  相似文献   
65.
66.
67.
68.
69.
Security of Big Data is a huge concern. In a broad sense, Big Data contains two types of data: structured and unstructured. Providing security to unstructured data is more difficult than providing security to structured data. In this paper, we have developed an approach to provide adequate security to unstructured data by considering types of data and their sensitivity levels. We have reviewed the different analytics methods of Big Data to build nodes of different types of data. Each type of data has been classified to provide adequate security and enhance the overhead of the security system. To provide security to a data node, and a security suite has been designed by incorporating different security algorithms. Those security algorithms collectively form a security suite which has been interfaced with the data node. Information on data sensitivity has been collected through a survey. We have shown through several experiments on multiple computer systems with varied configurations that data classification with respect to sensitivity levels enhances the performance of the system. The experimental results show how and in what amount the designed security suite reduces overhead and increases security simultaneously.  相似文献   
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号