首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12723篇
  免费   968篇
  国内免费   490篇
系统科学   1534篇
丛书文集   176篇
教育与普及   101篇
理论与方法论   317篇
现状及发展   920篇
研究方法   17篇
综合类   11116篇
  2024年   47篇
  2023年   84篇
  2022年   156篇
  2021年   175篇
  2020年   137篇
  2019年   92篇
  2018年   826篇
  2017年   854篇
  2016年   587篇
  2015年   311篇
  2014年   388篇
  2013年   382篇
  2012年   742篇
  2011年   1432篇
  2010年   1275篇
  2009年   943篇
  2008年   1005篇
  2007年   1209篇
  2006年   392篇
  2005年   390篇
  2004年   388篇
  2003年   334篇
  2002年   249篇
  2001年   179篇
  2000年   187篇
  1999年   199篇
  1998年   188篇
  1997年   158篇
  1996年   157篇
  1995年   119篇
  1994年   124篇
  1993年   91篇
  1992年   75篇
  1991年   67篇
  1990年   64篇
  1989年   68篇
  1988年   56篇
  1987年   21篇
  1986年   12篇
  1985年   6篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1973年   4篇
  1969年   1篇
  1968年   2篇
  1967年   1篇
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
21.
平果铝高压溶出过程,结疤的形成是不可避免的,而且对生产带来的危害也很大。对结疤形成影响因素的研究,对于生产中结疤的治理,强化氧化铝生产具有十分重要的意义。  相似文献   
22.
波纹纤维混凝土的动力耗散研究   总被引:6,自引:0,他引:6  
根据曲线纤维的几何特点和受力性能 ,推导了波纹纤维混凝土的本构关系 ,在本构理论的基础上进行动力耗散研究  相似文献   
23.
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.  相似文献   
24.
In this experiment, using the methods of drought-stress in the pot and PEG simulative drought-stress, three native rocky-slope grasses Pogonatherum panideum(Lam.) Hack, Erioophorum comosum nees and Cynodon dactylon cultivated in the pots were selected as materials to study their drought-resistance by analyzing the indexes such as the leaf area index, the drying roots accumulation, the holding water ability of leaf, the relative conductance of leaf, the soluble protein, chlorophyll. At the same time, by comparing with membership function value of each index, the order of each grass drought-resistance was decided. The results showed that the drought-resistance of Erioophorum comosum nees was stronger than Cynodon dactylon and drought-resistance of Cynodon dactylon was stronger than Pogonatherum panideum (Lam.) Hack. The purpose of the experimental results was to find theoretical foundations for selecting and cultivating native protecting-slope vegetations to adapt to rocky slopes.  相似文献   
25.
μC/OS-Ⅱ is an open source real-time kernel adopting priority preemptive schedule strategy. Aiming at the problem of μC/OS-Ⅱ failing to support homology priority tasks scheduling, an approach for solution is proposed. The basic idea is adding round-robin scheduling strategy in its original scheduler in order to schedule homology priority tasks through time slice roundrobin. Implementation approach is given in detail. Firstly, the Task Control Block (TCB) is extended. And then, a new priority index table is created, in which each index pointer points to a set of homology priority tasks. Eventually, on the basis of reconstructing μC/OS-Ⅱ real-time kernel, task scheduling module is rewritten. Otherwise, schedulability of homology task supported by modified kernel had been analyzed, and deadline formula of created homology tasks is given. By theoretical analysis and experiment verification, the modified kernel can support homology priority tasks scheduling, meanwhile, it also remains preemptive property of original μC/OS-Ⅱ.  相似文献   
26.
对模糊控制和预测控制相结合的控制方法进行研究,提出了一种简单易于实现的模糊预测控制的组合方法.此方法将模糊控制的定性分析特点和预测控制的定量分析特点有效地结合起来,同时积分器的引入可以消除稳态偏差.仿真结果表明,该方法对控制作用的滞后时间不确定的系统十分有效.  相似文献   
27.
Today, liver transplantation (LT) is the only established treatment for end-stage liver diseases. The de- velopment of LT, including OLT, cadaveric LT, split LT, living donor LT (LDLT), brings hopes to patients with these diseases. However, increasing donor shortage, rejection and life-long immunosuppression with its side effects are the major limitations of this therapy strategy. Bone marrow-derived stem cells (BMDSCs) are capable of differentiating into hepatocyte-like cells and contribute to liver injury repair. The microenvironment of liver injury caused by rejection, ischemia/reperfusion, loss of liver mass, recurrence of HCV and "small-for-size syndrome" after LT can attract a variety of bone marrow-derived stem cell population to the peripheral circulation and then migration to the injury liver to promote the hepatic function restoration. Additionally, BMDSCs can also take part in the functional regeneration of living donor liver after LDLT. This participation in liver regeneration may be associated to the interac- tion between SDF-1and its receptor CXCR4, involving HGF, IL-8, MMP9, and VEGF/VEGFR-2. BMDSC with its bio-characteristics could maintain the allograft tolerance from different angles and in different ways. In conclusion, BMDSCs transplantation, as a new assistant therapeutic method for LT, will ex- pand the space of LT, and provide more survival opportunities for the patients suffering liver diseases in the future.  相似文献   
28.
29.
在用“奇偶点图上作业法”求解“中国邮路问题”时,需检查图中的每一个回路.当图中回路较多时,检查不便且易出错.针对此,本文建立了求解“中国邮路问题”的0-1规划模型,并给出了算例。  相似文献   
30.
0 IntroductionNowthere are many well known cryptosystems based ondiscrete logarithms , such as the ElGamal cryptosys-tem[1]and the digital signature algorithm(DSA)[2]. Discretelogarithms have many advantages . Breaking the discrete log-arithm modulo pri mepappears to be somewhat harder thanfactoringintegern,and elliptic curve cryptosystems may usemuchsmaller keysizesthan RSA-basedcryptosystems of com-parable security.The discrete logarithmproblemover a group can be bro-ken down into a numb…  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号