全文获取类型
收费全文 | 18774篇 |
免费 | 1203篇 |
国内免费 | 577篇 |
专业分类
系统科学 | 1523篇 |
丛书文集 | 505篇 |
教育与普及 | 358篇 |
理论与方法论 | 364篇 |
现状及发展 | 909篇 |
研究方法 | 41篇 |
综合类 | 16851篇 |
自然研究 | 3篇 |
出版年
2024年 | 29篇 |
2023年 | 163篇 |
2022年 | 245篇 |
2021年 | 243篇 |
2020年 | 184篇 |
2019年 | 72篇 |
2018年 | 811篇 |
2017年 | 833篇 |
2016年 | 536篇 |
2015年 | 347篇 |
2014年 | 388篇 |
2013年 | 379篇 |
2012年 | 645篇 |
2011年 | 1379篇 |
2010年 | 1197篇 |
2009年 | 956篇 |
2008年 | 1060篇 |
2007年 | 1338篇 |
2006年 | 517篇 |
2005年 | 519篇 |
2004年 | 472篇 |
2003年 | 482篇 |
2002年 | 386篇 |
2001年 | 387篇 |
2000年 | 399篇 |
1999年 | 831篇 |
1998年 | 664篇 |
1997年 | 769篇 |
1996年 | 671篇 |
1995年 | 633篇 |
1994年 | 526篇 |
1993年 | 470篇 |
1992年 | 426篇 |
1991年 | 376篇 |
1990年 | 342篇 |
1989年 | 297篇 |
1988年 | 255篇 |
1987年 | 195篇 |
1986年 | 92篇 |
1985年 | 31篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1967年 | 1篇 |
1955年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
公司创业投资是公司创业、创业投资、战略管理和创新等多个领域的关键话题.文章在概括1980—2020年Web of Science数据库收录的公司创业投资文献特征的基础上,追溯公司创业投资内涵与定义的发展,梳理和提炼该领域研究的主题内容.文章将公司创业投资研究划分为初始萌芽、平稳发展和深化发展三个阶段,系统归纳分析了公司创业投资的目标与动机、影响因素、绩效效应以及其与其他公司创业方式的关系四个主题的研究内容.最后,在评述现有研究进展和不足的基础上,展望公司创业投资研究的未来方向. 相似文献
2.
在市场需求不确定的情况下,利用条件风险估值(CVaR)准则描述零售商的风险规避度对供应链收益的影响,并建立信息共享模型,研究零售商的风险规避度与信息共享价值之间的关系.结果表明,市场需求不确定的情况下,信息共享价值与零售商的风险规避度以及获取得市场信息量有关.数值分析显示,零售商的风险规避度越大,信息共享价值越高;市场需求越不确定,信息共享带来的价值越高. 相似文献
3.
利用均匀带电圆环在直角坐标系中的电势和电场强度的2个分量的公式,推导了均匀带电圆形薄板的电势和电场强度的2个分量的积分公式.将积分公式无量纲化,采用数值积分法计算电势和场强的值,绘制曲面、二维等势线和电场线. 相似文献
4.
During the past decade, we have learnt that the most common DNA modification, 5-methylcytosine (5mC), playing crucial roles in development and disease, is not stable but can be actively reversed to its unmodified form via enzymatic catalysis involving the TET enzymes. These ground-breaking discoveries have been achieved thanks to technological advances in the detection of the oxidized forms of 5mC and to the boldness of individual scientists. The TET enzymes require molecular oxygen for their catalysis, making them important targets for hypoxia research. They also require special cofactors which enable additional levels of regulation. Moreover, mutations and other genetic alterations in TETs are found, especially in myeloid malignances. This review focuses on the kinetic and inhibitory properties of the TET enzymes and the role of TETs in cellular differentiation and transformation and in cancer. 相似文献
5.
Current knowledge on exosome biogenesis and release 总被引:1,自引:1,他引:0
Nina Pettersen Hessvik Alicia Llorente 《Cellular and molecular life sciences : CMLS》2018,75(2):193-208
Exosomes are nanosized membrane vesicles released by fusion of an organelle of the endocytic pathway, the multivesicular body, with the plasma membrane. This process was discovered more than 30 years ago, and during these years, exosomes have gone from being considered as cellular waste disposal to mediate a novel mechanism of cell-to-cell communication. The exponential interest in exosomes experienced during recent years is due to their important roles in health and disease and to their potential clinical application in therapy and diagnosis. However, important aspects of the biology of exosomes remain unknown. To explore the use of exosomes in the clinic, it is essential that the basic molecular mechanisms behind the transport and function of these vesicles are better understood. We have here summarized what is presently known about how exosomes are formed and released by cells. Moreover, other cellular processes related to exosome biogenesis and release, such as autophagy and lysosomal exocytosis are presented. Finally, methodological aspects related to exosome release studies are discussed. 相似文献
6.
7.
8.
Study on the Centralization Strategy of the Blood Allocation Among Different Departments within a Hospital 总被引:1,自引:1,他引:0
By far, the researches on how to distribute blood products among different departments in hospital have not been further studied, though the problem of blood shortage and wastage that caused by improper blood allocation is severe, which may endanger patient’s lives and impose considerable costs on hospitals. In order to solve this problem, this paper mainly studies on how to distribute the blood items among different departments within a hospital and investigates the allocation approach with the novel management method by centralizing the inventory of several different departments. By integrating the blood inventory requirements of some departments, the hospital could reduce the rate of blood shortage and wastage effectively, release the pressure of the occupancy of resources and reduce the bullwhip effect of blood products. This paper illustrates the centralization principle in hospital and formulates the mixed integer programming model to work out the optimal allocation network scheme and the optimal inventory setting for every department. And the results of the numerical example demonstrate that this centralization method could considerably reduce blood shortage and wastage in hospital by about 72% and 90% respectively. Furthermore, it could decrease the total cost by about 108,540 RMB a month on blood supply chain management in the hospital and improve the effect of some certain surgeries by transfusing the fresh blood to patients. 相似文献
9.
In this paper, views of investor are described in fuzzy sets, and two fuzzy Black-Litterman models are constructed with fuzzy views and fuzzy random views respectively. In the models, expected returns and uncertainty matrix of views are redefined and the views are formulated by fuzzy approaches suitably. Then the models are tested with data from Chinese financial markets. Empirical results show that the fuzzy random views model performs the best, and both the fuzzy models are better than the traditional ones, demonstrating that the fuzzy approaches can contain more information in the views and measure the uncertainty more correctly. 相似文献
10.
Existing Side-Channel Attacks(SCAs) have several limitations and, rather than to be real attack methods,can only be considered to be security evaluation methods. Their limitations are mainly related to the sampling conditions, such as the trigger signal embedded in the source code of the encryption device, and the acquisition device that serves as the encryption-device controller. Apart from it being very difficult for an attacker to add a trigger into the original design before making an attack or to control the encryption device, there is a big gap in the capacity of existing SCAs to pose real threats to cipher devices. In this paper, we propose a new method, the sliding window SCA(SW-SCA), which can be applied in scenarios in which the acquisition device is independent of the encryption device and for which the encryption source code requires no trigger signal or modification. First,we describe the main issues in existing SCAs, then we theoretically analyze the effectiveness and complexity of our proposed SW-SCA —a method that can incorporate a sliding-window mechanism into almost all of the existing non-profiled SCAs. The experimental results for both simulated and physical traces verify the effectiveness of the SW-SCA and the appropriateness of its theoretical complexity. 相似文献