首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18774篇
  免费   1203篇
  国内免费   577篇
系统科学   1523篇
丛书文集   505篇
教育与普及   358篇
理论与方法论   364篇
现状及发展   909篇
研究方法   41篇
综合类   16851篇
自然研究   3篇
  2024年   29篇
  2023年   163篇
  2022年   245篇
  2021年   243篇
  2020年   184篇
  2019年   72篇
  2018年   811篇
  2017年   833篇
  2016年   536篇
  2015年   347篇
  2014年   388篇
  2013年   379篇
  2012年   645篇
  2011年   1379篇
  2010年   1197篇
  2009年   956篇
  2008年   1060篇
  2007年   1338篇
  2006年   517篇
  2005年   519篇
  2004年   472篇
  2003年   482篇
  2002年   386篇
  2001年   387篇
  2000年   399篇
  1999年   831篇
  1998年   664篇
  1997年   769篇
  1996年   671篇
  1995年   633篇
  1994年   526篇
  1993年   470篇
  1992年   426篇
  1991年   376篇
  1990年   342篇
  1989年   297篇
  1988年   255篇
  1987年   195篇
  1986年   92篇
  1985年   31篇
  1984年   3篇
  1983年   2篇
  1982年   1篇
  1967年   1篇
  1955年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
戴维奇  王铱  周丹 《创新科技》2021,21(8):8-24
公司创业投资是公司创业、创业投资、战略管理和创新等多个领域的关键话题.文章在概括1980—2020年Web of Science数据库收录的公司创业投资文献特征的基础上,追溯公司创业投资内涵与定义的发展,梳理和提炼该领域研究的主题内容.文章将公司创业投资研究划分为初始萌芽、平稳发展和深化发展三个阶段,系统归纳分析了公司创业投资的目标与动机、影响因素、绩效效应以及其与其他公司创业方式的关系四个主题的研究内容.最后,在评述现有研究进展和不足的基础上,展望公司创业投资研究的未来方向.  相似文献   
2.
在市场需求不确定的情况下,利用条件风险估值(CVaR)准则描述零售商的风险规避度对供应链收益的影响,并建立信息共享模型,研究零售商的风险规避度与信息共享价值之间的关系.结果表明,市场需求不确定的情况下,信息共享价值与零售商的风险规避度以及获取得市场信息量有关.数值分析显示,零售商的风险规避度越大,信息共享价值越高;市场需求越不确定,信息共享带来的价值越高.  相似文献   
3.
利用均匀带电圆环在直角坐标系中的电势和电场强度的2个分量的公式,推导了均匀带电圆形薄板的电势和电场强度的2个分量的积分公式.将积分公式无量纲化,采用数值积分法计算电势和场强的值,绘制曲面、二维等势线和电场线.  相似文献   
4.
The TET enzymes     
During the past decade, we have learnt that the most common DNA modification, 5-methylcytosine (5mC), playing crucial roles in development and disease, is not stable but can be actively reversed to its unmodified form via enzymatic catalysis involving the TET enzymes. These ground-breaking discoveries have been achieved thanks to technological advances in the detection of the oxidized forms of 5mC and to the boldness of individual scientists. The TET enzymes require molecular oxygen for their catalysis, making them important targets for hypoxia research. They also require special cofactors which enable additional levels of regulation. Moreover, mutations and other genetic alterations in TETs are found, especially in myeloid malignances. This review focuses on the kinetic and inhibitory properties of the TET enzymes and the role of TETs in cellular differentiation and transformation and in cancer.  相似文献   
5.
Current knowledge on exosome biogenesis and release   总被引:1,自引:1,他引:0  
Exosomes are nanosized membrane vesicles released by fusion of an organelle of the endocytic pathway, the multivesicular body, with the plasma membrane. This process was discovered more than 30 years ago, and during these years, exosomes have gone from being considered as cellular waste disposal to mediate a novel mechanism of cell-to-cell communication. The exponential interest in exosomes experienced during recent years is due to their important roles in health and disease and to their potential clinical application in therapy and diagnosis. However, important aspects of the biology of exosomes remain unknown. To explore the use of exosomes in the clinic, it is essential that the basic molecular mechanisms behind the transport and function of these vesicles are better understood. We have here summarized what is presently known about how exosomes are formed and released by cells. Moreover, other cellular processes related to exosome biogenesis and release, such as autophagy and lysosomal exocytosis are presented. Finally, methodological aspects related to exosome release studies are discussed.  相似文献   
6.
7.
8.
By far, the researches on how to distribute blood products among different departments in hospital have not been further studied, though the problem of blood shortage and wastage that caused by improper blood allocation is severe, which may endanger patient’s lives and impose considerable costs on hospitals. In order to solve this problem, this paper mainly studies on how to distribute the blood items among different departments within a hospital and investigates the allocation approach with the novel management method by centralizing the inventory of several different departments. By integrating the blood inventory requirements of some departments, the hospital could reduce the rate of blood shortage and wastage effectively, release the pressure of the occupancy of resources and reduce the bullwhip effect of blood products. This paper illustrates the centralization principle in hospital and formulates the mixed integer programming model to work out the optimal allocation network scheme and the optimal inventory setting for every department. And the results of the numerical example demonstrate that this centralization method could considerably reduce blood shortage and wastage in hospital by about 72% and 90% respectively. Furthermore, it could decrease the total cost by about 108,540 RMB a month on blood supply chain management in the hospital and improve the effect of some certain surgeries by transfusing the fresh blood to patients.  相似文献   
9.
In this paper, views of investor are described in fuzzy sets, and two fuzzy Black-Litterman models are constructed with fuzzy views and fuzzy random views respectively. In the models, expected returns and uncertainty matrix of views are redefined and the views are formulated by fuzzy approaches suitably. Then the models are tested with data from Chinese financial markets. Empirical results show that the fuzzy random views model performs the best, and both the fuzzy models are better than the traditional ones, demonstrating that the fuzzy approaches can contain more information in the views and measure the uncertainty more correctly.  相似文献   
10.
Existing Side-Channel Attacks(SCAs) have several limitations and, rather than to be real attack methods,can only be considered to be security evaluation methods. Their limitations are mainly related to the sampling conditions, such as the trigger signal embedded in the source code of the encryption device, and the acquisition device that serves as the encryption-device controller. Apart from it being very difficult for an attacker to add a trigger into the original design before making an attack or to control the encryption device, there is a big gap in the capacity of existing SCAs to pose real threats to cipher devices. In this paper, we propose a new method, the sliding window SCA(SW-SCA), which can be applied in scenarios in which the acquisition device is independent of the encryption device and for which the encryption source code requires no trigger signal or modification. First,we describe the main issues in existing SCAs, then we theoretically analyze the effectiveness and complexity of our proposed SW-SCA —a method that can incorporate a sliding-window mechanism into almost all of the existing non-profiled SCAs. The experimental results for both simulated and physical traces verify the effectiveness of the SW-SCA and the appropriateness of its theoretical complexity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号