首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11412篇
  免费   782篇
  国内免费   305篇
系统科学   1295篇
丛书文集   172篇
教育与普及   200篇
理论与方法论   299篇
现状及发展   977篇
研究方法   64篇
综合类   9487篇
自然研究   5篇
  2024年   43篇
  2023年   61篇
  2022年   98篇
  2021年   129篇
  2020年   73篇
  2019年   33篇
  2018年   773篇
  2017年   788篇
  2016年   503篇
  2015年   169篇
  2014年   204篇
  2013年   211篇
  2012年   491篇
  2011年   1185篇
  2010年   1055篇
  2009年   704篇
  2008年   776篇
  2007年   994篇
  2006年   214篇
  2005年   264篇
  2004年   273篇
  2003年   380篇
  2002年   384篇
  2001年   331篇
  2000年   257篇
  1999年   299篇
  1998年   196篇
  1997年   213篇
  1996年   188篇
  1995年   174篇
  1994年   167篇
  1993年   126篇
  1992年   130篇
  1991年   133篇
  1990年   119篇
  1989年   105篇
  1988年   86篇
  1987年   50篇
  1986年   21篇
  1985年   11篇
  1984年   5篇
  1981年   5篇
  1979年   7篇
  1977年   6篇
  1975年   5篇
  1974年   7篇
  1973年   5篇
  1972年   7篇
  1971年   6篇
  1966年   5篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
141.
Company bankruptcies cost billions of dollars in losses to banks each year. Thus credit risk prediction is a critical part of a bank's loan approval decision process. Traditional financial models for credit risk prediction are no longer adequate for describing today's complex relationship between the financial health and potential bankruptcy of a company. In this work, a multiple classifier system (embedded in a multiple intelligent agent system) is proposed to predict the financial health of a company. In our model, each individual agent (classifier) makes a prediction on the likelihood of credit risk based on only partial information of the company. Each of the agents is an expert, but has limited knowledge (represented by features) about the company. The decisions of all agents are combined together to form a final credit risk prediction. Experiments show that our model out-performs other existing methods using the benchmarking Compustat American Corporations dataset.  相似文献   
142.
Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been proved yet, most cryptographic researchers believe that one-way functions exist. In addition, many candidates for one-way functions have been proposed. Therefore, the key step for developing real-valued cipher systems is to define real one-way functions and to propose candidates for them. In this paper, based on computational complexity theory over the real field, we give two definitions of real one-way functions; one is for digital one-way functions and the other is for general one-way functions. Candidates for these two classes of one-way functions are also proposed. Moreover, we present two examples to demonstrate that the candidates for both digital one-way functions and general one-way functions can be applied to construct secure real-valued cipher systems.  相似文献   
143.
In this paper, we investigate the global controllability of a class of n-dimensional affine nonlinear systems with n- 1 controls and constant control matrix. A necessary and sufficient condition for its global controllability has been obtained by using the methods recently developed. Furthermore, we generalize the above result to a class of affine nonlinear systems with a block-triangular-like structure. Finally, we will give three examples to show the applications of our results.  相似文献   
144.
Public discourse in Western democracies, particularly in the United States, is far from the Habermasian ideal of citizens engaging in a rational discussion of public affairs. Rather than providing an arena for informed deliberation, the growing expertise of the media, lobbyists, and politicians has sub-optimized the current system of discourse to focus on emotional manipulation and the creation of polarized interests, each competing with each other for dominance. Avoiding a potentially disastrous outcome from this unbalancing of public discourse requires a revitalization of the public sphere and a return of the citizen voice in public decision making. To that end, systems thinkers have a tremendous opportunity and can play an important role. This article will explore the current challenges facing public discourse and outline that potential role.  相似文献   
145.
146.
Increasingly knowledge has become a determining factor in achieving life’s potential and is the currency of the age. Without access to Information an individuals’ knowledge base cannot be enriched and without knowledge the individual becomes increasingly powerless. Advances in technology have provided opportunities for some to add to their stock of knowledge but access to sources of information is uneven and can lead to social unrest. The availability of information is an important factor in managing change and empowering citizens. The question about information and power then becomes one of ownership or sovereignty of the information. If we are to create an open society then we need to ensure that there is open access to knowledge through flexible and intelligent information systems that are available for all. In this paper we consider if we are truly entering the knowledge age or the age of ignorance.  相似文献   
147.
This paper describes the change in a researcher's practices from one of studying regional industrial development at a distance to one of working closely with a network of agri-food managers. This is accompanied by a discussion of the methodological and theoretical possibilities for an action research inspired economic geography. Some of the core characteristics of a pragmatic conceptualization of action research are revised. It is argued that theoretical developments within economic geography make possible a dialogue between researchers and local actors and that economic geography is challenged to accept that knowledge is generated through such a dialogue. Attempts to create a dialogue between action research and economic geography in a specific Norwegian industrial and geographical context are described. These attempts indicate that the researcher's methodological approach has been transformed from a narrow one relying solely on conventional social science methods to a broader one including participatory action research.  相似文献   
148.
This study started with problems that my colleagues (and I) were experiencing with interaction and intercultural communication among students in our diverse classrooms. Educators were also experiencing difficulties in motivating students to work effectively in groups. The purpose of this paper was to seek solutions to these problems by exploring variations of the group oral assessment structure in a multilingual and multicultural context. Four phases of assessments were conducted at two tertiary institutions in South Africa using a combination of action research and a participatory approach. Not only did this study succeed in addressing the problems but it also revealed the added benefits of using an action research methodology.  相似文献   
149.
In the present paper, we focus on constructive spherical codes. By employing algebraic geometry codes, we give an explicit construction of spherical code sequences. By making use of the idea involved in the proof of the Gilbert-Varshamov bound in coding theory, we construct a spherical code sequence in exponential time which meets the best-known asymptotic bound by Shamsiev and Wyner.  相似文献   
150.
In this paper, we investigate the growth of meromorphic solutions of higher order linear differential equation f^(k) +Ak-1 (z)e^Pk-1^(z) f^(k-1) +…+A1 (z)e^P1(z) f′ +Ao(z)e^Po(z) f = 0 (k ≤ 2), where Pj(z) (j = 0, 1,..., k - 1) are nonconstant polynomials such that deg Pj = n (j = 0, 1,..., k - 1) and Aj(z)(≠ 0) (j = 0, 1,..., k - 1) are meromorphic functions with order p(Aj) 〈 n (j = 0, 1,..., k - 1).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号