首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10459篇
  免费   766篇
  国内免费   292篇
系统科学   1325篇
丛书文集   160篇
教育与普及   46篇
理论与方法论   303篇
现状及发展   900篇
研究方法   17篇
综合类   8766篇
  2024年   12篇
  2023年   47篇
  2022年   80篇
  2021年   88篇
  2020年   99篇
  2019年   44篇
  2018年   787篇
  2017年   805篇
  2016年   520篇
  2015年   196篇
  2014年   230篇
  2013年   211篇
  2012年   529篇
  2011年   1235篇
  2010年   1093篇
  2009年   757篇
  2008年   873篇
  2007年   1155篇
  2006年   322篇
  2005年   290篇
  2004年   335篇
  2003年   348篇
  2002年   294篇
  2001年   211篇
  2000年   158篇
  1999年   157篇
  1998年   95篇
  1997年   91篇
  1996年   90篇
  1995年   61篇
  1994年   53篇
  1993年   40篇
  1992年   39篇
  1991年   50篇
  1990年   29篇
  1989年   30篇
  1988年   24篇
  1987年   21篇
  1986年   9篇
  1985年   3篇
  1984年   2篇
  1971年   2篇
  1967年   1篇
  1955年   1篇
排序方式: 共有10000条查询结果,搜索用时 640 毫秒
11.
12.
基于ESI数据库,选取湖北省高校作为研究对象,分析各高校论文发表数量、被引情况、世界排名等,以期通过科技竞争力的研究,了解湖北省高校的整体实力,为决策者提供决策依据,提升湖北省高校的整体科研水平。  相似文献   
13.
The development of new technologically advanced products requires the contribution from a range of skills and disciplines, which are often difficult to find within a single company or organization. Requirements establishment practices in Systems Engineering (SE), while ensuring coordination of activities and tasks across the supply network, fall short when it comes to facilitate knowledge sharing and negotiation during early system design. Empirical observations show that when system-level requirements are not available or not mature enough, engineers dealing with the development of long lead-time sub-systems tend to target local optima, rather than opening up the design space. This phenomenon causes design teams to generate solutions that do not embody the best possible configuration for the overall system. The aim of this paper is to show how methodologies for value-driven design may address this issue, facilitating early stage design iterations and the resolution of early stage design trade-offs. The paper describes how such methodologies may help gathering and dispatching relevant knowledge about the ‘design intent’ of a system to the cross-functional engineering teams, so to facilitate a more concurrent process for requirement elicitation in SE. The paper also describes EVOKE (Early Value Oriented design exploration with KnowledgE maturity), a concept selection method that allows benchmarking design options at sub-system level on the base of value-related information communicated by the system integrators. The use of EVOKE is exemplified in an industrial case study related to the design of an aero-engine component. EVOKE’s ability to raise awareness on the value contribution of early stage design concepts in the SE process has been further verified with industrial practitioners in ad-hoc design episodes.  相似文献   
14.
G protein-coupled receptor (GPCR) signalling is mediated through transactivation-independent signalling pathways or the transactivation of protein tyrosine kinase receptors and the recently reported activation of the serine/threonine kinase receptors, most notably the transforming growth factor-β receptor family. Since the original observation of GPCR transactivation of protein tyrosine kinase receptors, there has been considerable work on the mechanism of transactivation and several pathways are prominent. These pathways include the “triple membrane bypass” pathway and the generation of reactive oxygen species. The recent recognition of GPCR transactivation of serine/threonine kinase receptors enormously broadens the GPCR signalling paradigm. It may be predicted that the transactivation of serine/threonine kinase receptors would have mechanistic similarities with transactivation of tyrosine kinase pathways; however, initial studies suggest that these two transactivation pathways are mechanistically distinct. Important questions are the relative importance of tyrosine and serine/threonine transactivation pathways, the contribution of transactivation to overall GPCR signalling, mechanisms of transactivation and the range of cell types in which this phenomenon occurs. The ultimate significance of transactivation-dependent signalling remains to be defined but it appears to be prominent and if so will represent a new cell signalling frontier.  相似文献   
15.
关于高速公路施工中的环保监理   总被引:1,自引:0,他引:1  
根据高速公路施工合同协议规定的环保监理的义务 ,结合施工实践 ,从路基施工、桥梁施工及取土场、弃土场等规范施工的要求 ,阐述环保监理的控制方法  相似文献   
16.
Reconsideration on Homogeneous Quadratic Riemann Boundary Value Problem   总被引:1,自引:0,他引:1  
The homogeneous quadratic Riemann boundary value problem (1) with Hoelder continuous coefficients for the normal case was considered by the author in 1997. But the solutions obtained there are incomplete. Here its general method of solution is obtained.  相似文献   
17.
Abrupt climate change:Debate or action   总被引:4,自引:1,他引:3  
Global abrupt climate changes have been documented by various climate records, including ice cores, ocean sediment cores, lake sediment cores, cave deposits, loess deposits and pollen records. The climate system prefers to be in one of two stable states, i.e. interstadial or stadial conditions, but not in between. The transition between two states has an abrupt character. Abrupt climate changes are, in general, synchronous in the northern hemisphere and tropical regions. The timescale for abrupt climate changes can be as short as a decade. As the impacts may be potentially serious, we need to take actions such as reducing CO2 emissions to the atmosphere.  相似文献   
18.
We prove that the model with physical and human capital adjustment costs has optimal solution when the production function is increasing return and the structure of vetor fields of the model changes substantially when the prodution function from decreasing return turns to increasing return. And it is shown that the economy is improved when the coefficients of adjustment costs become small.  相似文献   
19.
如何做好科技查新工作   总被引:4,自引:2,他引:2  
对当前科技查新工作中存在的一些问题进行了深入探讨,并根据实际情况提出了相应的解决方法。  相似文献   
20.
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号