全文获取类型
收费全文 | 4957篇 |
免费 | 286篇 |
国内免费 | 198篇 |
专业分类
系统科学 | 230篇 |
丛书文集 | 122篇 |
教育与普及 | 74篇 |
理论与方法论 | 18篇 |
现状及发展 | 25篇 |
研究方法 | 12篇 |
综合类 | 4959篇 |
自然研究 | 1篇 |
出版年
2024年 | 12篇 |
2023年 | 41篇 |
2022年 | 100篇 |
2021年 | 95篇 |
2020年 | 89篇 |
2019年 | 35篇 |
2018年 | 57篇 |
2017年 | 61篇 |
2016年 | 75篇 |
2015年 | 135篇 |
2014年 | 198篇 |
2013年 | 186篇 |
2012年 | 245篇 |
2011年 | 247篇 |
2010年 | 240篇 |
2009年 | 251篇 |
2008年 | 288篇 |
2007年 | 260篇 |
2006年 | 257篇 |
2005年 | 221篇 |
2004年 | 165篇 |
2003年 | 133篇 |
2002年 | 154篇 |
2001年 | 162篇 |
2000年 | 127篇 |
1999年 | 227篇 |
1998年 | 164篇 |
1997年 | 173篇 |
1996年 | 142篇 |
1995年 | 152篇 |
1994年 | 141篇 |
1993年 | 99篇 |
1992年 | 108篇 |
1991年 | 72篇 |
1990年 | 71篇 |
1989年 | 75篇 |
1988年 | 78篇 |
1987年 | 43篇 |
1986年 | 43篇 |
1985年 | 17篇 |
1983年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有5441条查询结果,搜索用时 15 毫秒
1.
省重点实验室是地方科技创新平台的重要组成部分,发挥着为地方集聚人才、提升基础研究和应用基础研究能力的重要作用,重点实验室评估政策的制定和实施应以推动实验室提质增效、发挥科技创新平台效用为基础.在阐述实验室体系、评估意义及重点实验室定位、作用的基础上,结合国内外考核评估相关政策、山西省现有实验室建设情况,提出了山西省重点实验室评估政策的建议. 相似文献
2.
De Casteljau algorithm and degree elevation of Bézier and NURBS curves/surfaces are two important techniques in computer aided geometric design. This paper presents the de Casteljau algorithm and degree elevation of toric surface patches, which include tensor product and triangular rational Bézier surfaces as special cases. Some representative examples of toric surface patches with common shapes are illustrated to verify these two algorithms. Moreover, the authors also apply the degree elevation of toric surface patches to isogeometric analysis. And two more examples show the effectiveness of proposed method. 相似文献
3.
With increasing demand diversification and short product lifecycles, industries now encounter challenges of demand uncertainty. The Japanese seru production system has received increased attention owing to its high efficiency and flexibility. In this paper, the problem of seru production system formation under uncertain demand is researched. A multi-objective optimization model for a seru production system formation problem is developed to minimize the cost and maximize the service level of the system. The purpose of this paper is to formulate a robust production system that can respond efficiently to the stochastic demand. Sample average approximation (SAA) is used to approximate the expected objective of the stochastic programming. The non-dominated sorting genetic algorithm II (NSGA-II) is improved to solve the multi-objective optimization model. Numerical experiments are conducted to test the tradeoff between cost and service level, and how the performance of the seru production system varies with the number of product types, mean and deviation of product volume, and skill-level-based cost. 相似文献
4.
Amaël Borzée Zoljargal Purevdorj Ye Inn Kim Sungsik Kong Minjee Choe Yoonjung Yi 《Journal of Natural History》2019,53(43-44):2685-2698
ABSTRACTWhen a species occurs over a broad range of climates and landscapes, the breeding ecology of that species is expected to vary locally. Additionally, a basic knowledge of breeding ecology is required before other types of studies may be conducted, such as physiology or conservation. In North East Asia, Dryophytes japonicus is distributed from Japan to Mongolia, where its breeding ecology is unknown. The objectives of this study were to understand the breeding requirements of D. japonicus in this part of its range. We collected data for Dryophytes japonicus at 56 sites located within 23 independent localities in Northern Mongolia during the breeding season 2017. The data collected included habitat type and co-occurring amphibian, fishes and bird species. Our results show that the species prefers circa 70 m long oxbow lakes for breeding, while habitat characteristics, water quality and co-occurring species were not significantly associated with the occurrence of the species. We therefore conclude that D. japonicus is behaviourally plastic in Mongolia, as it is in other portions of its range, and that the species can use several types of environments and co-occur with different species at its breeding sites. Corvus dauuricus was the only bird species significant predicting the occurrence of D. japonicus, likely because of overlapping ecological preferences. 相似文献
5.
To investigate the attack and defense strategies in complex networks, the authors propose a two-player zero-sum static game model with complete information which considers attack and defense strategies simultaneously. The authors assume that both the attacker and defender have two typical strategies: Targeted strategy and random strategy. The authors explore the Nash equilibriums of the attacker-defender game and demonstrate that when the attacker's attack resources are not so significantly abundant as the defender's resources, there exists a pure-strategy Nash equilibrium in both model networks and real-world networks, in which the defender protects the hub targets with large degrees preferentially, while the attacker prefers selecting the targets randomly. When the attack resources are much higher than defense resources, both the attacker and the defender adopt the targeted strategy in equilibriums. This paper provides a new theoretical framework for the study of attack and defense strategies in complex networks. 相似文献
6.
融媒体改革是传统媒体应对传媒经济平台化和传媒平台智能化浪潮的一项重要措施.传统机构在融媒体环境中利用数据驱动的计算传播学方法“重新”认识受众、量化传播效果,既是时代的必然,又是时代的需要.本文论述融媒体环境中受众计算的“为什么”和“怎么做”问题,将受众分析分解为三个纵向数据维度(文本、网络和时空数据)和两个横向方法维度(统计分析和机器学习).最后,我们着重讨论融媒体受众计算所面临的困难和挑战,并提出可能的解决方案. 相似文献
7.
8.
9.
Extracting and analyzing network traffic feature is fundamental in the design and implementation of network behavior anomaly detection methods. The traditional network traffic feature method focuses on the statistical features of traffic volume. However, this approach is not sufficient to reflect the communication pattern features. A different approach is required to detect anomalous behaviors that do not exhibit traffic volume changes,such as low-intensity anomalous behaviors caused by Denial of Service/Distributed Denial of Service(Do S/DDo S)attacks, Internet worms and scanning, and Bot Nets. We propose an efficient traffic feature extraction architecture based on our proposed approach, which combines the benefit of traffic volume features and network communication pattern features. This method can detect low-intensity anomalous network behaviors and conventional traffic volume anomalies. We implemented our approach on Spark Streaming and validated our feature set using labelled real-world dataset collected from the Sichuan University campus network. Our results demonstrate that the traffic feature extraction approach is efficient in detecting both traffic variations and communication structure changes.Based on our evaluation of the MIT-DRAPA dataset, the same detection approach utilizes traffic volume features with detection precision of 82.3% and communication pattern features with detection precision of 89.9%. Our proposed feature set improves precision by 94%. 相似文献
10.
为了对边坡的合理设计提供严密的参考依据,采用原位孔内剪切试验测试了某路基边坡填土的抗剪强度,对不同工况下的边坡支护效果开展数值模拟分析.结果表明,该路基边坡填土压实质量欠佳,呈现轻微的应变硬化特征,其内摩擦角为24°,黏聚力为12 kPa.采用桩基托梁挡墙支护后,边坡最大横向位移可以降低76.5%~84.5%,且随着桩长的增加,边坡变形逐渐减小,但减小幅度呈下降趋势;边坡全局应变水平相比支护前也有所减小,局部最大剪应变明显降低,滑弧特征被削弱.因此,可采用原位孔内剪切试验较为准确地获取边坡填土的强度参数,使得边坡支护设计更合理. 相似文献