首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10368篇
  免费   384篇
  国内免费   185篇
财政金融   1361篇
工业经济   426篇
计划管理   3242篇
经济学   1378篇
综合类   1496篇
运输经济   96篇
旅游经济   131篇
贸易经济   1533篇
农业经济   442篇
经济概况   832篇
  2024年   54篇
  2023年   180篇
  2022年   133篇
  2021年   235篇
  2020年   261篇
  2019年   211篇
  2018年   192篇
  2017年   229篇
  2016年   221篇
  2015年   298篇
  2014年   650篇
  2013年   899篇
  2012年   734篇
  2011年   908篇
  2010年   744篇
  2009年   554篇
  2008年   734篇
  2007年   741篇
  2006年   683篇
  2005年   646篇
  2004年   460篇
  2003年   336篇
  2002年   230篇
  2001年   173篇
  2000年   143篇
  1999年   77篇
  1998年   56篇
  1997年   29篇
  1996年   27篇
  1995年   16篇
  1994年   16篇
  1993年   7篇
  1992年   7篇
  1991年   6篇
  1990年   6篇
  1989年   4篇
  1988年   1篇
  1987年   3篇
  1986年   6篇
  1985年   5篇
  1984年   8篇
  1983年   13篇
  1982年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
131.
东北石油大学电气信息工程学院经过多年的探索与实践,通过加强实践教学平台建设、实践教师队伍建设和实践教学管理与保障体系建设,构建了模块化实践教学体系,在学生实践能力培养中取得了很好的效果。实践教学体系由基本技能、专业技能和综合技能三个模块构成。基本技能模块训练学生对外语、计算机的应用和动手操作等基本技能;专业技能模块培养学生运用专业知识解决问题的能力,提高专业素养;综合技能模块重点培养学生的创新实践能力,提高学生综合素质。  相似文献   
132.
李嘉源 《价值工程》2013,(35):248-249
21世纪是一个信息技术高度发达的时代。信息的全球化,使得信息产品、信息服务成了每个国家,每个人必不可少的一部分。掌握信息技术,成了每个人生存的基础。小学作为个人成长的重要时期,信息技术教育应成为小学教育中重要的一部分。本文从小学信息技术对提高学生学习兴趣、快速掌握现代信息、开发小学生智力等方面作了探讨。  相似文献   
133.
马海凤  陈琦 《价值工程》2013,(36):243-244
二十一世纪是信息化的时代,加快信息化发展已成为当今社会不可缺少的方面。然而,科学技术是一把双刃剑,在引起人类社会生活及生产的历史性变革的同时也引发了一些信息安全问题。由于网络自身存在的缺陷,网络安全已成为社会关注的焦点,随着新的入侵攻击手段的出现,网络安全技术手段也不断涌现,这对于提高其安全性和可靠性非常重要。本论文就当前计算机信息安全教育方面所面临的问题,以及计算机网络本身所存在的问题进行了探讨,并对信息安全问题提出了安全解决策略。  相似文献   
134.
The impact of information technologies on manufacturing operations and performance is well established. However, scant research has been devoted to examining information technology (IT) investment among hospitals and how it influences patient care and financial performance. Using the lens of the Theory of Swift Even Flow (TSEF), we present an operations management-based perspective on the effect of IT in streamlining hospital operations. Specifically, we examined the role of IT on patient flow and its consequences for improved hospital efficiency and performance.  相似文献   
135.
In order to offer new services and gain competitive advantages, e-commerce has been widely adopted, particularly in the banking industry. Unfortunately, despite the growing adoption of e-commerce in the banking industry, the issue that web-based B2C e-commerce functionality adoption varies between banks or a bank's branches across nations has not received sufficient attention. Many factors affect e-commerce functionality adoption. However, two national environmental factors (information infrastructure and demographics) are particularly important because they relate to the availability of technologies in use and the characteristics of customers, respectively. This research conducts a cross-country case study of a global bank's Beijing (China), Chicago (USA), and Dubai (UAE) branches to investigate how the two national environmental factors affect e-commerce functionality adoption. The specific objectives are to discover how information infrastructure (measured by number of PCs per 1000 people and Internet access cost) and demographics (measured by population composition and income) affect e-commerce functionality adoption of the global bank's three branches. Secondary data were collected for information infrastructure and demographics; additionally, focused interviews with these three branches' IT and business managers provided sources for answering ‘how’. The key finding demonstrates that the differences in e-mail ordering and online shopping adoptions between these branches are mainly attributed to proposed factors of population composition and Internet access cost, and the new factor of individual credit reference system. This research contributes to theory development in this emerging important research subject.  相似文献   
136.
In recent years, information systems in telecommunication enterprises have been characterised by boundary expansion and increase of departmental-level applications. These changes increase the complexity of security evaluation and pose new challenges to enterprises' information security. Taking into account the behaviour characters of system users, we put forward a system security evaluation approach based on access paths. This approach can help evaluators and users find out potential security risks without figuring out the boundary of systems explicitly. It has no special requirements for system scale and can be used in the evaluation of enterprise-level and departmental-level systems. This paper also presents the formal definition of access path and related evaluation rules.  相似文献   
137.
General purpose enterprise resource planning (ERP) systems have problems such as complex configuration processes, low adaptation to specific industries, and an extensive implementation time period. In order to alleviate these issues, this paper proposes the concept of industry-oriented ERP (IERP) and a component-based approach to IERP development. This paper also presents the framework of developing IERP in which business process modelling and software reuse are employed as primary methods to improve the operability of component-based IERP. The framework consists of five layers including server layer, team work supporting layer, IERP construction and customisation layer, reusable assets and toolset layer, and the IERP system instance layer. These layers as well as their relationship with each other are also discussed.  相似文献   
138.
Among distribution centre operations, order picking has been reported to be the most labour-intensive activity. Sophisticated storage assignment policies adopted to reduce the travel distance of order picking have been explored in the literature. Unfortunately, previous research has been devoted to locating entire products from scratch. Instead, this study intends to propose an adaptive approach, a Data Mining-based Storage Assignment approach (DMSA), to find the optimal storage assignment for newly delivered products that need to be put away when there is vacant shelf space in a distribution centre. In the DMSA, a new association index (AIX) is developed to evaluate the fitness between the put away products and the unassigned storage locations by applying association rule mining. With AIX, the storage location assignment problem (SLAP) can be formulated and solved as a binary integer programming. To evaluate the performance of DMSA, a real-world order database of a distribution centre is obtained and used to compare the results from DMSA with a random assignment approach. It turns out that DMSA outperforms random assignment as the number of put away products and the proportion of put away products with high turnover rates increase.  相似文献   
139.
Business process modelling (BPM) has become fundamental for modern enterprises due to the increasing rate of organisational change. As a consequence, business processes need to be continuously (re-)designed as well as subsequently aligned with the corresponding enterprise information systems. One major problem associated with the design of business processes is reusability. Reuse of business process models has the potential of increasing the efficiency and effectiveness of BPM. This article critically surveys the existing literature on the problem of BPM reusability and more specifically on that State-of-the-Art research that can provide or suggest the ‘elements’ required for the development of a methodology aimed at discovering reusable conceptual artefacts in the form of patterns. The article initially clarifies the definitions of business process and business process model; then, it sets out to explore the previous research conducted in areas that have an impact on reusability in BPM. The article concludes by distilling directions for future research towards the development of apatterns-based approach to BPM; an approach that brings together the contributions made by the research community in the areas of process mining and discovery, declarative approaches and ontologies.  相似文献   
140.
Information retrieval (IR) is essential to enterprise systems along with growing orders, customers and materials. In this article, an enhanced dynamic hash TRIE (eDH-TRIE) algorithm is proposed that can be used in a lexicon search in Chinese, Japanese and Korean (CJK) segmentation and in URL identification. In particular, the eDH-TRIE algorithm is suitable for Unicode retrieval. The Auto-Array algorithm and Hash-Array algorithm are proposed to handle the auxiliary memory allocation; the former changes its size on demand without redundant restructuring, and the latter replaces linked lists with arrays, saving the overhead of memory. Comparative experiments show that the Auto-Array algorithm and Hash-Array algorithm have better spatial performance; they can be used in a multitude of situations. The eDH-TRIE is evaluated for both speed and storage and compared with the naïve DH-TRIE algorithms. The experiments show that the eDH-TRIE algorithm performs better. These algorithms reduce memory overheads and speed up IR.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号