首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5445篇
  免费   620篇
系统科学   1073篇
理论与方法论   275篇
现状及发展   875篇
研究方法   4篇
综合类   3833篇
自然研究   5篇
  2019年   1篇
  2018年   730篇
  2017年   732篇
  2016年   430篇
  2015年   30篇
  2014年   3篇
  2013年   4篇
  2012年   258篇
  2011年   951篇
  2010年   814篇
  2009年   454篇
  2008年   506篇
  2007年   762篇
  2006年   2篇
  2005年   43篇
  2004年   121篇
  2003年   150篇
  2002年   56篇
  2000年   2篇
  1999年   1篇
  1994年   2篇
  1991年   3篇
  1980年   2篇
  1978年   2篇
  1975年   4篇
  1974年   1篇
  1967年   1篇
排序方式: 共有6065条查询结果,搜索用时 444 毫秒
621.
<正> This paper discusses the null boundary controllability of two PDE's,modeling a compositesolid with different physical properties in each layer.Interface conditions are imposed.  相似文献   
622.
Compared with traditional structure-based approaches for the identification of species-specific ligands, the ab initio approach, based on large-scale protein sequences from different species, has been used to locate specific sites that may be important to the molecular selectivity of species. Statistically significant differences in the distribution of residues in different species and differences in the physicochemical properties of residue-specific sites may largely account for species selectivity. The nicotinic acetylcholine receptor (nAChR), an important neuro-receptor with significantly different ligand selectivity in different species, was used to test our method. Because of the lack of nAChR structural information, the mechanism of ligand discrimination is unclear which hinders attempts at novel molecular design. In this study, the specific site residues 186 and 189 in the principal subunits and residues 34, 55, 56, 57, 106 and 112 in complementary subunits of nAChR were identified by applying our method with stringent statistical cutoffs. These sites were predicted to contribute to ligand selectivity and this result coincides well with the known experimental data.  相似文献   
623.
Different from traditional tax audit, supervision with self-audit is a combination of audit by the taxpayer himself and audit by the tax authority. This paper mainly studies a taxpayer's optimal policy of tax evasion under supervision with self-audit and its related properties, in order to deduce some effective suggestions and theoretical bases to restrain tax evasion. Assuming that only a certain proportion of evaded tax can be discovered when the audit is executed, the authors first formulate a static model with self-audit. This model is divided into two stages. At the first stage, taxpayers declare their taxes, then the tax authority chooses audit objects, based on a known probability, and announces the result; if the taxpayer is chosen, he will enter the second stage, during which he has a chance to pay the evaded tax and the corresponding late fees and then is audited by the tax authority. The authors show the existence and uniqueness of the optimal amount of tax evasion at the first stage and the optimal proportion to self-expose at the second stage. The authors also discuss the related properties of the interior solution, and do elasticity analyses on some parameters. Besides, the authors extend the static model into the corresponding two-period model, and study the existence and uniqueness of the solution of the extended model. Finally, under the assumption that tax evasion can only be discovered with a certain probability when the audit is executed, the authors formulate another static model with self-audit and investigate its properties.  相似文献   
624.
Outcrossing rate in a natural population of Caldesia grandis was estimated by the dominant random amplified polymorphism DNA (RAPD) marker using 10 open-pollinated progeny arrays of 24 individuals. The multilocus outcrossing rate estimated based on all 25 RAPD loci was 0.872 ±0.033 and the single-locus outcrossing rate was 0.795 ±0.032. Multilocus estimates did not differ significantly from the single-locus estimates. The fixation index, F, in the progeny estimated from RAPD data was -0.142 ±0.000. The estimates of multilocus outcrossing rates (t_m) and single-locus outcrossing rates (t_s) obtained from MLDT clearly indicate that outcrossing is predominant in the open-pollinated C. grandis population. An empirical analysis suggests that 15 should be the minimum number of dominant marker loci necessary to achieve robust estimates of t_m.  相似文献   
625.
Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been proved yet, most cryptographic researchers believe that one-way functions exist. In addition, many candidates for one-way functions have been proposed. Therefore, the key step for developing real-valued cipher systems is to define real one-way functions and to propose candidates for them. In this paper, based on computational complexity theory over the real field, we give two definitions of real one-way functions; one is for digital one-way functions and the other is for general one-way functions. Candidates for these two classes of one-way functions are also proposed. Moreover, we present two examples to demonstrate that the candidates for both digital one-way functions and general one-way functions can be applied to construct secure real-valued cipher systems.  相似文献   
626.
We extend the classical newsvendor problem by introducing a downside risk constraint from the perspective of inventory control. At the beginning of a replenishment period the newsvendor will place an order, then he will review the inventory level at the end of the period. If the inventory level is positive then he will bear the holding cost and if the inventory level is negative then he will bear the backorder cost. The optimal order quantity has a simple form. We analyze the form of the optimal order quan-tity when we restrict that the probability that the cost level is larger than or equal to a fixed cost constant is less than a fixed value of probability. At last, we analyze the case that the fixed cost constant is equal to the expected cost.  相似文献   
627.
A wide range of literature concerning classical asymptotic properties for linear models with adaptive control is available, such as strong laws of large numbers or central limit theorems. Unfortunately, in contrast with the situation without control, it appears to be impossible to find sharp asymptotic or nonasymptotic properties such as large deviation principles or exponential inequalities. Our purpose is to provide a first step towards that direction by proving a very simple exponential inequality for the standard least squares estimator of the unknown parameter of Gaussian autoregressive process in adaptive tracking.  相似文献   
628.
629.
This paper introduces agent-based methodology to build a distributed autonomic storage system infrastructure, and an effectively negotiation mechanism based on agent is applied for data location. We present Availability-based Data Allocation (ADA) algorithm as a data placement strategy to achieve high efficient utilization of storage resources by employing multiple distributed storage resources. We use Bloom filter in each storage device to track the location of data. We present the data lookup strategy that small size of read request is handled directly, and large size of read request is handled by cooperation with storage devices.The performance evaluation shows that the data location mechanism is high available and can work well for heterogeneous autonomic storage systems.  相似文献   
630.
We discuss the linear conjugate boundary value problems on the unit circle and the real axis. We obtain some Fredholm integral equations. Using thess equations we discuss the solvable conditions on these problems and we also give a direct method for the extension problems on the real axis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号