首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9844篇
  免费   766篇
  国内免费   296篇
系统科学   1238篇
丛书文集   136篇
教育与普及   103篇
理论与方法论   294篇
现状及发展   887篇
研究方法   8篇
综合类   8239篇
自然研究   1篇
  2024年   18篇
  2023年   58篇
  2022年   106篇
  2021年   96篇
  2020年   72篇
  2019年   42篇
  2018年   777篇
  2017年   772篇
  2016年   487篇
  2015年   164篇
  2014年   155篇
  2013年   143篇
  2012年   395篇
  2011年   1137篇
  2010年   969篇
  2009年   641篇
  2008年   753篇
  2007年   974篇
  2006年   179篇
  2005年   210篇
  2004年   256篇
  2003年   338篇
  2002年   404篇
  2001年   322篇
  2000年   222篇
  1999年   232篇
  1998年   143篇
  1997年   133篇
  1996年   109篇
  1995年   102篇
  1994年   97篇
  1993年   92篇
  1992年   68篇
  1991年   61篇
  1990年   56篇
  1989年   45篇
  1988年   39篇
  1987年   20篇
  1986年   11篇
  1985年   3篇
  1984年   1篇
  1981年   1篇
  1980年   1篇
  1967年   1篇
  1960年   1篇
排序方式: 共有10000条查询结果,搜索用时 250 毫秒
991.
This paper further investigates cluster synchronization in a complex dynamical network with two-cluster. Each cluster contains a number of identical dynamical systems, however, the subsystems composing the two clusters can be different, i.e., the individual dynamical system in one cluster can differ from that in the other cluster. Complete synchronization within each cluster is possible only if each node from one cluster receives the same input from nodes in other cluster. In this case, the stability condition of one-cluster synchronization is known to contain two terms: the first accounts for the contribution of the inner-cluster coupling structure while the second is simply an extra linear term, which can be deduced by the "same-input" condition. Applying the connection graph stability method, the authors obtain an upper bound of input strength for one cluster if the first account is known, by which the synchronizability of cluster can be scaled. For different clusters, there are different upper bound of input strength by virtue of different dynamics and the corresponding cluster structure. Moreover, two illustrative examples are presented and the numerical simulations coincide with the theoretical analysis.  相似文献   
992.
We discuss the linear conjugate boundary value problems on the unit circle and the real axis. We obtain some Fredholm integral equations. Using thess equations we discuss the solvable conditions on these problems and we also give a direct method for the extension problems on the real axis.  相似文献   
993.
评述了DNA核苷酸关联的几种研究途径。重点研究了偏好模分析方法,讨论了它与信息参数的联系,发现了编码区偏好用S-W(强弱键)语言,而非编码区偏好用R-Y(嘌呤嘧啶)语言,解释了这种区分的意义,找到了编码区常用模(*WS)的规律性,指出这种偏好性可能与t-RNA丰度有关。研究了如何寻找读码框架及非编码区中是否存在隐蔽框架的问题。  相似文献   
994.
Public discourse in Western democracies, particularly in the United States, is far from the Habermasian ideal of citizens engaging in a rational discussion of public affairs. Rather than providing an arena for informed deliberation, the growing expertise of the media, lobbyists, and politicians has sub-optimized the current system of discourse to focus on emotional manipulation and the creation of polarized interests, each competing with each other for dominance. Avoiding a potentially disastrous outcome from this unbalancing of public discourse requires a revitalization of the public sphere and a return of the citizen voice in public decision making. To that end, systems thinkers have a tremendous opportunity and can play an important role. This article will explore the current challenges facing public discourse and outline that potential role.  相似文献   
995.
具有漏点弥补和漫游窗口的高速数字扫描变换算法   总被引:1,自引:0,他引:1  
为了显示现代雷达、超声检查、声纳的图象,比较了由极坐标到直角坐标的数字扫描变换器(DSC)的各种实现方案。提出了一种单元增量计数法实现的高速数字扫描变换方案,并讨论了用新方案消除moiré赝象的弥补算法及一种结合DSC结构的漫游开窗算法。该方案可以集成于一片现场可编程门阵列(FPGA)中,并已应用于多种雷达数字显示系统。结果证明应用该方案可以达到50MHz的点变换速度,并同时完成弥补漏点和放大漫游窗口。  相似文献   
996.
This paper presents a method to analyze and calculate the angular glint of targets. By parting the target to very small size cells, using high-frequency approximation, the near-field radar cross section (RCS) is calculated based on the scattering from complex targets and environments (SCTE) system, and the angular glint is calculated by the phase grads. The results show that the angular glint can be calculated exactly in the SCTE system, and this method is correct and efficient. In the near-zone, the far-field theory is not applicable and the angular glint should be calculated by the near-field theory.  相似文献   
997.
In this paper, we investigate the growth of meromorphic solutions of higher order linear differential equation f^(k) +Ak-1 (z)e^Pk-1^(z) f^(k-1) +…+A1 (z)e^P1(z) f′ +Ao(z)e^Po(z) f = 0 (k ≤ 2), where Pj(z) (j = 0, 1,..., k - 1) are nonconstant polynomials such that deg Pj = n (j = 0, 1,..., k - 1) and Aj(z)(≠ 0) (j = 0, 1,..., k - 1) are meromorphic functions with order p(Aj) 〈 n (j = 0, 1,..., k - 1).  相似文献   
998.
A group-oriented (t, n) threshold signature scheme employs the cryptographic techniques of secret share, allows any subset of t players out of n players to sign message on behalf of the group and disallows the creation of a valid signature if fewer than t players take part in the signature protocol. In this paper, we proposed a new group-oriented (t, n) threshold signature schemes with traceable signers based on Schnorr signature. The proposed scheme is proved traceable, robust and unforgeable against the "static" adversary with the discrete logarithm assumption in the random oracle model and existence of broadcast channel. The proofs of the strongest security (existential unforgeability against adaptively chosen message attacks under the discrete logarithm assumption) are provided in the random oracle model.  相似文献   
999.
Traditional approach of design by contract, due to mixing the contract code with application code, is difficult for the extensibility and reusability of software system. This paper presents a framework named JADBC for design by contract based on Aspect-Oriented Programming (AOP) to resolve these problems. By providing a new modularized element, aspect, the framework successfully separates the contracts in design by contract, from functional codes. The implementation of this framework is based on dynamic AOP which can have the contract changed at runtime, consequently, enhancing program flexibility. JADBC framework modularizes the contracts in a clear-cut fashion that is easier to design, implement, and maintain. Biography: WEN Jing (1982–), female, Ph.D. candidate, research directions: software engineer, aspect-oriented software development.  相似文献   
1000.
The singularly perturbed initial boundary value problems for the reaction diffusion system are raised. Firstly, under suitable conditions, using a iteration technique, the differential inequalities theorem is constructed and introducing two auxiliary functions the existence and uniqueness theorem of solution for the basic reaction diffusion system is proved. Using the singularly perturbed method the formal asymptotic expressions of the solution are constructed with power series theory. By using the comparison theorem the existence and its asymptotic behavior of solution for the original problem are studied. Finally, using method of estimate inequalities, the structure of solutions for the problem is discussed thoroughly in three cases and asymptotic solution of the original problem is given. The asymptotic behavior of solution in the three cases is proved.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号