全文获取类型
收费全文 | 20161篇 |
免费 | 1237篇 |
国内免费 | 888篇 |
专业分类
系统科学 | 1825篇 |
丛书文集 | 427篇 |
教育与普及 | 303篇 |
理论与方法论 | 342篇 |
现状及发展 | 922篇 |
研究方法 | 41篇 |
综合类 | 18424篇 |
自然研究 | 2篇 |
出版年
2024年 | 67篇 |
2023年 | 173篇 |
2022年 | 324篇 |
2021年 | 354篇 |
2020年 | 249篇 |
2019年 | 130篇 |
2018年 | 877篇 |
2017年 | 941篇 |
2016年 | 634篇 |
2015年 | 451篇 |
2014年 | 578篇 |
2013年 | 629篇 |
2012年 | 895篇 |
2011年 | 1602篇 |
2010年 | 1455篇 |
2009年 | 1102篇 |
2008年 | 1250篇 |
2007年 | 1464篇 |
2006年 | 683篇 |
2005年 | 705篇 |
2004年 | 654篇 |
2003年 | 665篇 |
2002年 | 652篇 |
2001年 | 593篇 |
2000年 | 543篇 |
1999年 | 633篇 |
1998年 | 532篇 |
1997年 | 549篇 |
1996年 | 473篇 |
1995年 | 376篇 |
1994年 | 350篇 |
1993年 | 330篇 |
1992年 | 308篇 |
1991年 | 241篇 |
1990年 | 232篇 |
1989年 | 202篇 |
1988年 | 174篇 |
1987年 | 113篇 |
1986年 | 54篇 |
1985年 | 24篇 |
1984年 | 7篇 |
1983年 | 9篇 |
1982年 | 2篇 |
1981年 | 3篇 |
1968年 | 2篇 |
1967年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
991.
滑坡是一种重要的地质灾害,一旦发生,就会带来严重的后果,本文研究了滑坡变形阶段的划分问题,并在此基础上提出了每个阶段应该进行的相应工作及目的。当滑坡进入加速变形阶段后期,出于防灾减灾的需要,此时准确预报滑坡发生时间显得尤为重要,结合实际工程本文研究了滑坡进入加速变形阶段的短期预报问题,并取得了较好的效果。 相似文献
992.
A rapid process of hybridisation of man and technology, organisation and technology and society and technology is currently
sweeping the world. This process requires a way of (scientific) thinking that takes hybrid systems as the starting point.
Such an approach makes it increasingly important for hybrid systems to be interlinked, enabling them to exchange and share
information through these links. This linking of (hybrid) systems to enable them to exchange and share information can also
be denoted as the realisation of interoperability between (hybrid) systems. Five principles from Luhmann’s systems theory
can help us understand interoperability. Interoperability enables (hybrid) systems to join random coalitions and networks.
The network centric warfare concept is currently the basis for international efforts aimed at the development and application
of interoperability that would enable armed forces to act effectively and efficiently. This paper demonstrates what we can
learn from Luhmann’s system’s theory. 相似文献
993.
Vegetation effects on mean daily maximum and minimum surface air temperatures over China 总被引:5,自引:0,他引:5
Changes in the daily maximum (Tmax) and minimum (Tmin) surface air temperatures and the associated temperature extremes have severe consequences on human society and the natural environment. In this study, we assess vegetation effects on mean Tmax and Tmin over China by computing a vegetation feedback parameter using the satellite-sensed Normalized Difference Vegetation Index (NDVI) and observed temperatures for the period 1982–2002. In all seasons, vegetation exerts a much stronger forcing on Tmax than on Tmin, and thus has a substantial effect on the diurnal temperature range (DTR) over China. Significant positive feedbacks on Tmax and the DTR occupy many areas of China with the feedback parameters exceeding 1°C (0.1 NDVI)–1, while significant negative effects only appear over the summertime climatic and ecological transition zone of northern China and some other isolated areas. Also, the vegetation feedbacks are found to vary with season. In areas where significant feedbacks occur, vegetation contributes to typically 10%–30% of the total variances in Tmax, Tmin, and the DTR. These findings suggest that vegetation memory offers the potential for improving monthly-to-seasonal forecasting of Tmax and Tmin, and the associated temperature extremes over China. Meanwhile, the limitations and uncertainties of the study should be recognized. 相似文献
994.
<正> Carvalho,Lucchesi and Murty proved that any 1-extendable graph G different from K_2and C_(2n)has at least Δ(G)edge-disjoint removable ears,and any brick G distinct from K_4 and■hasat least Δ(G)-2 removable edges,where Δ(G)denotes the maximum degree of G.In this paper,weimprove the lower bounds for numbers of removable ears and removable edges of 1-extendable graphs.It is proved that any 1-extendable graph G different from K_2 and C_(2n)has at least χ′(G)edge-disjointremovable ears,and any brick G distinct from K_4 and■has at least χ′(G)-2 removable edges,whereχ′(G)denotes the edge-chromatic number of G. 相似文献
995.
Sara Lise Jeppesen 《Systemic Practice and Action Research》2011,24(2):133-146
The aim of this paper is to explore an explicit use of the concept of sustainability within transport planning. This paper
analyses the concept of sustainability based on a practical approach for a sustainable development of Nordhavn, an area of
Copenhagen, exemplifying a complex planning problem. An exploration of the application of the concept of sustainability is
carried out using elements of Soft Systems Methodology (SSM). This approach indicates a need to separate the use of sustainability
considerations regarding the transport planning ‘process’ from the transport planning ‘results’. The two approaches are related
to the planning levels presented by Ulrich (Syst Prac 1(4):415–428, 1988). It was chosen to focus on the understanding of a sustainable transport planning process. This focus is addressed by four
stakeholder groups interviewed based on the ‘ought to’ mode of Critical Systems Heuristics (CSH). Finally an outline of some
of the factors of a sustainable transport planning process is proposed. 相似文献
996.
The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated
key exchange (3PAKE) protocol. This CLC protocol provides a superior round efficiency (only three rounds), and its resources
required for computation are relatively few. However, we find that the leakage of values A
V
and B
V
in the CLC protocol will make a man-in-the-middle attack feasible in practice, where A
V
and B
V
are the authentication information chosen by the server for the participants A and B. In this paper, we describe our attack on the CLC protocol and further present a modified 3PAKE protocol, which is essentially
an improved CLC protocol. Our protocol can resist attacks available, including man-in-the-middle attack we mount on the initial
CLC protocol. Meanwhile, we allow that the participants choose their own passwords by themselves, thus avoiding the danger
that the server is controlled in the initialization phase. Also, the computational cost of our protocol is lower than that
of the CLC protocol. 相似文献
997.
In this paper,domain decomposition method(DDM) for numerical solutions of mathematical physics equations is improved into dynamic domain decomposition method(DDDM) . The main feature of the DDDM is that the number,shape and volume of the sub-domains are all flexibly changeable during the iterations,so it suits well to be implemented on a reconfigurable parallel computing system. Convergence analysis of the DDDM is given,while an application approach to a weak nonlinear elliptic boundary value problem and a ... 相似文献
998.
Within the framework of the regularization theory, a spectral regularization method is introduced and analyzed. The convergence estimate under an appropriate choice of regularization parameter is obtained. A numerical implementation is described. Numerical examples show that the proposed method is effective and stable. 相似文献
999.
High-speed all-optical logic circuits have attracted much attention because of their important roles in signal processing in next-generation optical networks.The digital encoder is widely used in binary calculation,multiplexing,demultiplexing,address recognition and data encryption.A priority encoder allows the existence of multiple valid inputs simultaneously,identifies the priority of the request signals and encodes the priority.We propose and experimentally demonstrate an all-optical 4-bit priority encoder for return-to-zero signals at 40 Gbit/s based on cross-gain modulation in semiconductor optical amplifiers.Detuning fil-ters after semiconductor optical amplifiers are employed to improve the output performance.Correct logic bit sequences and clear open eye patterns with extinction ratios exceeding 10 dB are achieved. 相似文献
1000.
The approach of available transfer capability (denoted as ATC) incorporating wind generation has been paid very high attention
since the development of wind generation. Based on the maximum function, this paper presents an ATC model. The characteristic
of the new model is twofold. First, it considers wind turbines connected to power system and static security of power system
simultaneously. Second, it is a system of semismooth equations and can be solved easily. By using the smoothing strategy,
a smoothing Newton method is adopted for solving the proposed new ATC model. Numerical simulation results of the IEEE 30-bus
and 118-bus system show that the new model and algorithm are feasible and effective. The impact of wind turbines connected
to power system on ATC is also analyzed. 相似文献