首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8368篇
  免费   639篇
  国内免费   6篇
系统科学   1111篇
理论与方法论   321篇
现状及发展   2569篇
研究方法   240篇
综合类   4696篇
自然研究   76篇
  2020年   17篇
  2019年   13篇
  2018年   745篇
  2017年   743篇
  2016年   478篇
  2015年   65篇
  2014年   46篇
  2013年   47篇
  2012年   377篇
  2011年   1108篇
  2010年   876篇
  2009年   478篇
  2008年   610篇
  2007年   848篇
  2006年   115篇
  2005年   151篇
  2004年   224篇
  2003年   232篇
  2002年   136篇
  2001年   50篇
  2000年   37篇
  1999年   34篇
  1992年   24篇
  1991年   24篇
  1990年   28篇
  1989年   16篇
  1988年   16篇
  1987年   30篇
  1986年   18篇
  1985年   26篇
  1984年   27篇
  1982年   29篇
  1981年   18篇
  1980年   31篇
  1979年   83篇
  1978年   70篇
  1977年   91篇
  1976年   21篇
  1975年   37篇
  1974年   95篇
  1973年   81篇
  1972年   104篇
  1971年   72篇
  1970年   88篇
  1969年   94篇
  1968年   68篇
  1967年   93篇
  1966年   78篇
  1965年   58篇
  1964年   16篇
排序方式: 共有9013条查询结果,搜索用时 31 毫秒
991.
Solidification of Fe-7.5%Mo-16.5%Si ternary quasiperitectic alloy is investigated by using differential scanning calorimetry (DSC) and drop tube containerless processing techniques.The primary phase is identified as R (Fe5Mo3Si2) and the quasiperitectic phases are τ1 (Fe5MoSi4) and Fe3Si.With the decrease of droplet diameter, the cooling rate and undercooling of the droplets in-crease rapidly.The experiment result indicates that the solidification microstructure is composed of remnant primary phase, qua-sip...  相似文献   
992.
<正> This paper discusses the null boundary controllability of two PDE's,modeling a compositesolid with different physical properties in each layer.Interface conditions are imposed.  相似文献   
993.
Compared with traditional structure-based approaches for the identification of species-specific ligands, the ab initio approach, based on large-scale protein sequences from different species, has been used to locate specific sites that may be important to the molecular selectivity of species. Statistically significant differences in the distribution of residues in different species and differences in the physicochemical properties of residue-specific sites may largely account for species selectivity. The nicotinic acetylcholine receptor (nAChR), an important neuro-receptor with significantly different ligand selectivity in different species, was used to test our method. Because of the lack of nAChR structural information, the mechanism of ligand discrimination is unclear which hinders attempts at novel molecular design. In this study, the specific site residues 186 and 189 in the principal subunits and residues 34, 55, 56, 57, 106 and 112 in complementary subunits of nAChR were identified by applying our method with stringent statistical cutoffs. These sites were predicted to contribute to ligand selectivity and this result coincides well with the known experimental data.  相似文献   
994.
Summary The distribution of substance P-like immunoreactivity was studied in the thoracic dorsal root ganglia of the frogRana esculenta by immunohistochemistry. Substance P-like immunoreactivity was contained in approximately 50% of primary sensory neurons. The immunoreactive fibers arising from the cell bodies are collected in small bundles within the ganglia neuropil before entering the central and peripheral roots.  相似文献   
995.
Different from traditional tax audit, supervision with self-audit is a combination of audit by the taxpayer himself and audit by the tax authority. This paper mainly studies a taxpayer's optimal policy of tax evasion under supervision with self-audit and its related properties, in order to deduce some effective suggestions and theoretical bases to restrain tax evasion. Assuming that only a certain proportion of evaded tax can be discovered when the audit is executed, the authors first formulate a static model with self-audit. This model is divided into two stages. At the first stage, taxpayers declare their taxes, then the tax authority chooses audit objects, based on a known probability, and announces the result; if the taxpayer is chosen, he will enter the second stage, during which he has a chance to pay the evaded tax and the corresponding late fees and then is audited by the tax authority. The authors show the existence and uniqueness of the optimal amount of tax evasion at the first stage and the optimal proportion to self-expose at the second stage. The authors also discuss the related properties of the interior solution, and do elasticity analyses on some parameters. Besides, the authors extend the static model into the corresponding two-period model, and study the existence and uniqueness of the solution of the extended model. Finally, under the assumption that tax evasion can only be discovered with a certain probability when the audit is executed, the authors formulate another static model with self-audit and investigate its properties.  相似文献   
996.
997.
Outcrossing rate in a natural population of Caldesia grandis was estimated by the dominant random amplified polymorphism DNA (RAPD) marker using 10 open-pollinated progeny arrays of 24 individuals. The multilocus outcrossing rate estimated based on all 25 RAPD loci was 0.872 ±0.033 and the single-locus outcrossing rate was 0.795 ±0.032. Multilocus estimates did not differ significantly from the single-locus estimates. The fixation index, F, in the progeny estimated from RAPD data was -0.142 ±0.000. The estimates of multilocus outcrossing rates (t_m) and single-locus outcrossing rates (t_s) obtained from MLDT clearly indicate that outcrossing is predominant in the open-pollinated C. grandis population. An empirical analysis suggests that 15 should be the minimum number of dominant marker loci necessary to achieve robust estimates of t_m.  相似文献   
998.
Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been proved yet, most cryptographic researchers believe that one-way functions exist. In addition, many candidates for one-way functions have been proposed. Therefore, the key step for developing real-valued cipher systems is to define real one-way functions and to propose candidates for them. In this paper, based on computational complexity theory over the real field, we give two definitions of real one-way functions; one is for digital one-way functions and the other is for general one-way functions. Candidates for these two classes of one-way functions are also proposed. Moreover, we present two examples to demonstrate that the candidates for both digital one-way functions and general one-way functions can be applied to construct secure real-valued cipher systems.  相似文献   
999.
The role of peroxisomes in aging   总被引:2,自引:0,他引:2  
  相似文献   
1000.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号