首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5451篇
  免费   621篇
  国内免费   4篇
系统科学   1076篇
理论与方法论   275篇
现状及发展   873篇
研究方法   3篇
综合类   3849篇
  2023年   1篇
  2021年   1篇
  2020年   2篇
  2019年   1篇
  2018年   729篇
  2017年   733篇
  2016年   431篇
  2015年   31篇
  2014年   5篇
  2013年   4篇
  2012年   258篇
  2011年   953篇
  2010年   814篇
  2009年   456篇
  2008年   508篇
  2007年   764篇
  2006年   6篇
  2005年   42篇
  2004年   122篇
  2003年   150篇
  2002年   57篇
  2000年   1篇
  1994年   2篇
  1993年   1篇
  1991年   3篇
  1967年   1篇
排序方式: 共有6076条查询结果,搜索用时 31 毫秒
971.
Distribution characteristics of soil organic matter(SOM) and total nitrogen(TN) were studied in different plant communities of the Yajiageng vertical belt in Gongga Mountain around the Dadu River banks. The results show: (1) the contents of SOM and TN of the plant communities gradually decreased with the following order: subalpine coniferous forest (3 027 m), subalpine meadow (3 873 m), coniferous broadleaved mixed forest(2 737 m), subalpine shrub(3 565 m) and treeline(3 564 m). (2) With soil profile depth increasing, the contents of SOM and TN gradually decreased. For different vegetation types, the contents of SOM and TN in sub-alpine coniferous forest were higher than that of other vegetational types. (3)The ratio of the content of carbon to the content of total nitrogen (Cc/CTN)WaS 13.5-27.6, which was relatively lower than the appropriate Cc/CTN of 25-30, and indicated that the soil in favor of the organic matter decomposed and nutrients released. Cc/CTN in the soil had no correlation with sea level altitude. However, its distribution in the soil x, aried with different vegetation types. (4) Nitrogen in SOM existed mainly in the form of organic nitrogen, and Cc/CTN in the soil was not obvious correlated with SOM and TN.  相似文献   
972.
In Chinese question answering system, because there is more semantic relation in questions than that in query words, the precision can be improved by expanding query while using natural language questions to retrieve documents. This paper proposes a new approach to query expansion based on semantics and statistics Firstly automatic relevance feedback method is used to generate a candidate expansion word set. Then the expanded query words are selected from the set based on the semantic similarity and seman- tic relevancy between the candidate words and the original words. Experiments show the new approach is effective for Web retrieval and out-performs the conventional expansion approaches.  相似文献   
973.
In order to develop highly secure database systems to meet the requirements for class B2, the BLP (Bell-LaPudula) model is extended according to the features of database systems. A method for verifying security model for database systems is pro- posed. According to this method, an analysis by using Coq proof assistant to ensure the correctness and security of the extended model is introduced. Our formal security model has been verified secure. This work demonstrates that our verification method is effective and sufficient.  相似文献   
974.
This paper studies the existence, uniqueness, and stability of solutions for stochastic impulsive systems. By employing Lyapunov-like functions, some sufficient conditions of the global existence, uniqueness, and stability of solutions for stochastic impulsive systems are established. Furthermore, the results are specialized to the case of linear stochastic impulsive systems. Finally, some examples are given to illustrate the applications of our theory.  相似文献   
975.
A novel approach (HGO-EAC) for hybrid genetic op-timization (GO) with elite ant colony (EAC) is proposed for the automatic modulation recognition of communication signals,through which we improve the basic ant colony algorithms by referencing elite strategy and present a new fusion strategy for genetic optimization and elite ant colony. This approach is used to train the neural networks as the classifier for modulation. Simula-tion results indicate good performance on an additive white Gaus-sian noise (AWGN) channel,with recognition rate reaching to 70% especially for CW even at signal-to-noise ratios as low as 5 dB. This approach can achieve a high recognition rate for the typical modulations such as CW,4ASK,4FSK,BPSK,and QAM16. Test result shows that it has better performance than BP algorithm and basic ant colony algorithms by achieving faster training and stronger robustness.  相似文献   
976.
Workflow management systems are widely used in improving the efficiency of business processes.To develop a workflow management system is the key to workflow modeling.In this paper,the compositional time net is presented to model workflow processes on the basis of the analyzing methods of time Petri nets and workflows,and to describe the static relationships and the dynamic semantics of the task of multiple workflow composition.The paper puts more emphasis on checking the soundness of composed workflow,at the same time,combinational problems of non-conditional structure of the compositional time net are introduced and analyzed.A sufficient and necessary condition for determining the soundness of compositional nets is obtained.  相似文献   
977.
For the problem of the original direct anonymous attestation (DAA) scheme’s complexity and great time consumption, a new DAA scheme based on symmetric bilinear pairings is presented, which gives a practical solution to ECC-based TPM in protecting the privacy of the TPM. The scheme still includes five procedures or algorithms: Setup, Join, Sign, Verify and Rogue tagging, but gets rid of zero-knowledge proof and takes on a new process and framework, of which the main operations are addition, scalar multiplication and bilinear maps on supersingular elliptic curve systems. Moreover, the scheme adequately utilizes the properties of bilinear maps as well as the signature and verification of the ecliptic curve system itself. Compared with other schemes, the new DAA scheme not only satisfies the same properties, and shows better simplicity and high efficiency. This paper gives not only a detailed security proof of the proposed scheme, but also a careful performance analysis by comparing with the existing DAA schemes.  相似文献   
978.
Diethyl malonate being an initial raw material,processed with chlorination-replacement-desalination-vacuum rectification,is used to produce carbonyl diethyl malonate.An experiment for optimization determines that the best reaction condition was:① reaction for 7 h at 10 ℃ with mole-ratio being 2.4︰1 between chloride and raw material(diethyl malonate);② reaction for 4.5 h at 118 ℃ with mole-ratio being 1.2︰1 between the anhydrous sodium acetate and intermediate Ⅰ.The final product carbonyl diethyl malonate recovery ratio reaches up to as high as 79.12% with a purity of 96.4%,which meets the market requirement.This synthesis technique has the advantages of simple process,moderate reaction conditions,high yield and low cost,being suitable for industrial scale production.  相似文献   
979.
Under the foundation of Hermitean Clifford setting,we define the fundamental operators for complex Clifford algebra valued functions,obtain some properties of these operators,and discuss a representation of sl(2;C) on Clifford algebra of even dimension.  相似文献   
980.
Behavior requirement expression and its satisfiability verification for composite Web services is one of the ongoing issues in service computing.In this paper,the concept of behavior specifications based on activity sequence is proposed to express one kind of behavioral requirements for composite Web services.Its basic element is activity sequence.The method to express such behavioral requirements by behavioral modes is presented.Five behavioral modes used in this method are adopted.Through mapping modes to Labeled Transition Systems(LTSs),these modes are encoded with exact operation semantics.Then,the sufficient and necessary conditions as well as the checking algorithm for satisfiability of behavioral modes are given.Finally,an example analysis is presented.The result indicates that the behavioral requirements based on activity sequence are more suitable for the case of composite Web service than those based on activity or scenario.The behavioral modes expressions are concise and the satisfiability checking is effective by the given algorithm.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号