首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5525篇
  免费   621篇
系统科学   1078篇
理论与方法论   276篇
现状及发展   892篇
研究方法   18篇
综合类   3873篇
自然研究   9篇
  2022年   1篇
  2021年   1篇
  2019年   5篇
  2018年   732篇
  2017年   732篇
  2016年   434篇
  2015年   34篇
  2014年   6篇
  2013年   8篇
  2012年   265篇
  2011年   961篇
  2010年   816篇
  2009年   457篇
  2008年   511篇
  2007年   767篇
  2006年   7篇
  2005年   47篇
  2004年   133篇
  2003年   154篇
  2002年   63篇
  2001年   1篇
  2000年   1篇
  1994年   2篇
  1991年   3篇
  1989年   1篇
  1984年   2篇
  1982年   1篇
  1967年   1篇
排序方式: 共有6146条查询结果,搜索用时 0 毫秒
761.
This paper described an improved underwater confrontation simulation method of naval amphibious operational training system. The initial position of submarine forces on the enemy is generated automatically, and the attacking distance model of torpedoes is established based on the kinematics theory, which is more flexible and reasonable to judge the launch condition compared to traditional method. The two kinds of confrontation behavior models on the enemy submarine are created to depict its tactical action from the defensive to the offensive as well as the contrary, ensuring that operational style is simulated more comprehensively and properly. The existing motion trajectory estimation and collision detection algorithms on operational platforms are also improved to reduce the iteration error and further enhance the detection accuracy of target hit.  相似文献   
762.
Cloud storage service reduces the burden of data users by storing users’ data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost.  相似文献   
763.
Quantitative analysis has always been a difficult problem in security analysis of intrusion tolerance systems. An intrusion tolerance model based on multiple recovery mechanisms is introduced in this paper and how to quantify the security attributes of the model is proposed. A state transition model with recovery states more accurately describes the dynamic behavior of the system. Considering that recovery mechanisms have a great impact on the security performance of the system, we set up the cost models corresponding to different recovery mechanisms. We propose a feasible security measure based on mean cost to security failure in order to evaluate the system cost during the recovery phase. The experimental results confirmed the feasibility of the proposed methods.  相似文献   
764.
In this paper, a life-cycle model with retirement is set up to study how an individual chooses the optimal retiring age on account of wage growth rate, longevity and healthy state. It is proved that there exists optimal retiring age under given conditions. The numerical simulations are given to show how wage growth rate, longevity and healthy state affect retiring age.  相似文献   
765.
End-use energy consumption can reflect the industrial development of a country and the living standards of its residents. The study of end-use energy consumption can provide a solid basis for industrial restructuring, energy saving, and emission reduction. In this paper, we analyzed the end-use energy consumption of a region in Northwestern China, and applied the Markov prediction method to forecast the future demand of different types of end-use energy. This provides a reference for the energy structure optimization in the Northwestern China.  相似文献   
766.
Aluminum alloy matrix composites have found a predominant place in research, and their applications are explored in almost all industries. The aerospace industry has been using precipitation-hardenable alloys in structural applications. However, insufficient literature is available on the influence of multiwalled carbon nanotubes (MWCNTs) on precipitation-hardenable alloy composite materials; thus, this work was designed to elucidate the effect on MWCNT reinforcement on AA2219 with and without precipitation hardening. Reinforcement with MWCNTs has been reported to accelerate precipitation and to achieve greater hardness within a much shorter time. The addition of 0.75wt% MWCNTs resulted in maximal hardness at 90 min, which is approximately 27% of improvement over the maximum hardness achieved by the corresponding monolithic alloy after 10 h of aging. The sample reinforced with 0.75wt% MWCNTs showed an improvement of 82% in hardness by solutionizing and aging compared to that achieved by sintering.  相似文献   
767.
Self-crosslinked gelatin-oxidized hyaluronic acid/ hydroxyapatite (GEL-OHA/HAp) composite bone substitute was successfully prepared with a novel in situ precipitation method without using any toxic chemical cross-linkers, and its characterizations, including elemental composition, surface morphology, crystallinity, and structure of crystalline phase, were carried out. In order to evaluate its corresponding performances, comparisons with glutaraldehyde crosslinked gelatin/hydroxyapatite (GEL-Glu/ HAp) composite were made in detail. The results indicate that nano-HAp crystallites are homogeneously dispersed in both GEL-OHA/HAp and GEL-Glu/HAp composites, and the HAp crystallites in the former take larger particle size than those in the latter. Mechanical property tests show the acceptable mechanical strength at high strain of GEL-OHA/HAp composite. Study of in vitro degradation and swelling demonstrate that the two composites have similar degradation rate and water absorption capability. By in vitro cell culture, it has been found out that the cells on the GEL-OHA/HAp composite show higher proliferative potential than the cells on the GEL-Glu/HAp composite. Compared with GEL-Glu/HAp composite, GEL-OHA/HAp composite provides an excellent strategy for preparation of non-toxic bone substitute with acceptable corresponding properties.  相似文献   
768.
In this paper, the generalized inverse eigenvalue problem for the (P,Q)-conjugate matrices and the associated approximation problem are discussed by using generalized singular value decomposition (GSVD). Moreover, the least residual problem of the above generalized inverse eigenvalue problem is studied by using the canonical correlation decomposition (CCD). The solutions to these problems are derived. Some numerical examples are given to illustrate the main results.  相似文献   
769.
In uncertain data management, lineages are often used for probability computation of result tuples. However, most of existing works focus on tuple level lineage, which results in imprecise data derivation. Besides, correlations among attributes cannot be captured. In this paper, for base tuples with multiple uncertain attributes, we define attribute level annotation to annotate each attribute. Utilizing these annotations to generate lineages of result tuples can realize more precise derivation. Simultaneously, they can be used for dependency graph construction. Utilizing dependency graph, we can represent not only constraints on schemas but also correlations among attributes. Combining the dependency graph and attribute level lineage, we can correctly compute probabilities of result tuples and precisely derivate data. In experiments, comparing lineage on tuple level and attribute level, it shows that our method has advantages on derivation precision and storage cost.  相似文献   
770.
A novel anonymous authentication scheme is proposed based on the ring signature. In the scheme, the private key and the the freely chosen anonymity set are used to achieve anonymous authentication. In terms of the threshold sharing, a group of t members jointly implement threshold tracking. In order to improve the security of tracking, message recovery equation is used to verify and recover data leaked by the user. Compared with Liu et al’s scheme, the proposed scheme can resist conspiracy tracking and has less computational cost. On the premise of the discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai, and Wolf (LRSW) and Diffie-Hellman (DDH) assumption, the scheme is proved to meet the demands of anonymous authentication. The scheme has broad application prospects in many fields such as ad hoc network, electronic voting, and so on.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号