首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8609篇
  免费   167篇
  国内免费   132篇
系统科学   1208篇
丛书文集   120篇
教育与普及   22篇
理论与方法论   302篇
现状及发展   877篇
综合类   6379篇
  2025年   8篇
  2024年   21篇
  2023年   24篇
  2022年   44篇
  2021年   50篇
  2020年   43篇
  2019年   37篇
  2018年   772篇
  2017年   797篇
  2016年   501篇
  2015年   131篇
  2014年   128篇
  2013年   137篇
  2012年   409篇
  2011年   1115篇
  2010年   995篇
  2009年   617篇
  2008年   732篇
  2007年   977篇
  2006年   203篇
  2005年   212篇
  2004年   241篇
  2003年   244篇
  2002年   177篇
  2001年   102篇
  2000年   83篇
  1999年   34篇
  1998年   5篇
  1997年   5篇
  1996年   6篇
  1995年   3篇
  1994年   4篇
  1993年   10篇
  1992年   4篇
  1991年   8篇
  1990年   4篇
  1989年   2篇
  1988年   9篇
  1987年   2篇
  1986年   4篇
  1985年   5篇
  1984年   1篇
  1980年   1篇
  1967年   1篇
排序方式: 共有8908条查询结果,搜索用时 0 毫秒
81.
In this paper,we propose a new image denoising method that combines total variation(TV) method and wavelet shrinkage. In our method,a noisy image is decomposed into subbands of LL,LH,HL,and HH in wavelet domain. LL subband contains the low frequency coefficients along with less noise,which can be easily eliminated using TV-based method. More edges and other detailed information like textures are contained in the other three subbands,and we propose a shrinkage method based on the local variance to extract th...  相似文献   
82.
The urbanization process is a trend occurring inevitably in the historical development. This paper reviews the progress of the urbanization in Guangzhou and focuses on the change of water quality in the Guangzhou reach of the Pearl River. 8 kinds of main pollutant parameters were collected from 9 important sections in the Guangzhou reach of the Pearl River from 1986 to 2000 and the water quality change was analyzed per time and space. The study concludes that the surface water quality of Guangzhou reflects ...  相似文献   
83.
The Sutong Bridge, a cable-stayed located in the southeast coastal area of China, is vulnerable to the Pacific typhoons. From the data measured by two 3D ultrasonic anemometers at the height of 76 m and 306 m, the wind characteristics (including 10-minute mean wind speed and direction, turbulence intensity and gust factor, power spectral density and integral scale of turbulence) of Typhoon Kalmaegi are analyzed The comparison of 10-minute mean wind velocity from the two anemometers validates the reliability...  相似文献   
84.
In this study, we selected 10 susceptible SNPs loci to investigate their contribution to susceptibility to type 2 diabetes in Han Chinese among Hubei population. We genotyped SNPs rs5219, rs1801282, rs1470579, rs1111875, rs1081661, rs7754840, rs4506565, rs13266634, rs4402960, and rs5643981 by using the method of polymerase chain reaction-ligase detection reaction (PCR-LDR). In a case-control study, we have genotyped the 10 candidate susceptibility SNP loci, and here, we reported that the SNP rs5219 in KCNJ1...  相似文献   
85.
Radon-Nikodym theorem in signed Loeb space   总被引:1,自引:0,他引:1  
This paper gives the Radon-Nikodym theorem in signed Loeb space under 1-saturated nonstandard model. First,the nonstandard characterization of absolute continuity is discussed,on which Radon-Nikodym theorem in signed Loeb space is obtained. Then,some facts about a finite signed Loeb measure and its variation are shown.  相似文献   
86.
A Kleene-Stone algebra is a bounded distributive lattice with two unary operations that make it a Kleene and a Stone algebra. In this paper, we study the properties of the prime ideals in a Kleene-Stone algebra and characterize the class of Kleene-Stone algebras that are congruence permutable by means of the dual space of a Kleene-Stone algebra and then show that a finite Kleene-Stone algebra is congruence permutable if and only if it is isomorphic to a direct product of finitely many simple algebras.  相似文献   
87.
The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication security protocol of mobile agent system. It provides multifactor authentication, encryption transmission, and integrity protection of mobile agent.  相似文献   
88.
通过对参与者交互次数的设定,设计了一个可验证的理性秘密共享方案.该方案能够有效的阻止秘密分发者的欺骗,并使得参与者没有偏离方案的动机.通过对该方案的分析,证明了方案满足公平性、可行性和正确性等性质.  相似文献   
89.
In this paper, we consider a double compound Poisson risk model involving two independent classes ofinsurance risks with a threshold dividend strategy. We derived the integro-differential equations (IDE) with certain boundary conditions for the present value of dividends until ruin. When the claims from both classes are exponentially distributed, we show that the threshold dividend strategy is an optimal dividend strategy.  相似文献   
90.
Diethyl malonate being an initial raw material,processed with chlorination-replacement-desalination-vacuum rectification,is used to produce carbonyl diethyl malonate.An experiment for optimization determines that the best reaction condition was:① reaction for 7 h at 10 ℃ with mole-ratio being 2.4︰1 between chloride and raw material(diethyl malonate);② reaction for 4.5 h at 118 ℃ with mole-ratio being 1.2︰1 between the anhydrous sodium acetate and intermediate Ⅰ.The final product carbonyl diethyl malonate recovery ratio reaches up to as high as 79.12% with a purity of 96.4%,which meets the market requirement.This synthesis technique has the advantages of simple process,moderate reaction conditions,high yield and low cost,being suitable for industrial scale production.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号