首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   17557篇
  免费   691篇
  国内免费   71篇
系统科学   1127篇
丛书文集   29篇
教育与普及   22篇
理论与方法论   313篇
现状及发展   6634篇
研究方法   606篇
综合类   9422篇
自然研究   166篇
  2018年   751篇
  2017年   763篇
  2016年   462篇
  2012年   467篇
  2011年   1299篇
  2010年   897篇
  2009年   529篇
  2008年   715篇
  2007年   1189篇
  2006年   257篇
  2005年   283篇
  2004年   331篇
  2003年   425篇
  2002年   363篇
  2001年   443篇
  2000年   432篇
  1999年   294篇
  1992年   242篇
  1991年   200篇
  1990年   218篇
  1989年   194篇
  1988年   201篇
  1987年   223篇
  1986年   190篇
  1985年   259篇
  1984年   229篇
  1983年   171篇
  1982年   180篇
  1981年   180篇
  1980年   172篇
  1979年   409篇
  1978年   340篇
  1977年   252篇
  1976年   291篇
  1975年   263篇
  1974年   283篇
  1973年   228篇
  1972年   246篇
  1971年   309篇
  1970年   379篇
  1969年   258篇
  1968年   315篇
  1967年   300篇
  1966年   253篇
  1965年   178篇
  1964年   99篇
  1959年   88篇
  1958年   162篇
  1957年   100篇
  1956年   91篇
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
11.
12.
The development of new technologically advanced products requires the contribution from a range of skills and disciplines, which are often difficult to find within a single company or organization. Requirements establishment practices in Systems Engineering (SE), while ensuring coordination of activities and tasks across the supply network, fall short when it comes to facilitate knowledge sharing and negotiation during early system design. Empirical observations show that when system-level requirements are not available or not mature enough, engineers dealing with the development of long lead-time sub-systems tend to target local optima, rather than opening up the design space. This phenomenon causes design teams to generate solutions that do not embody the best possible configuration for the overall system. The aim of this paper is to show how methodologies for value-driven design may address this issue, facilitating early stage design iterations and the resolution of early stage design trade-offs. The paper describes how such methodologies may help gathering and dispatching relevant knowledge about the ‘design intent’ of a system to the cross-functional engineering teams, so to facilitate a more concurrent process for requirement elicitation in SE. The paper also describes EVOKE (Early Value Oriented design exploration with KnowledgE maturity), a concept selection method that allows benchmarking design options at sub-system level on the base of value-related information communicated by the system integrators. The use of EVOKE is exemplified in an industrial case study related to the design of an aero-engine component. EVOKE’s ability to raise awareness on the value contribution of early stage design concepts in the SE process has been further verified with industrial practitioners in ad-hoc design episodes.  相似文献   
13.
G protein-coupled receptor (GPCR) signalling is mediated through transactivation-independent signalling pathways or the transactivation of protein tyrosine kinase receptors and the recently reported activation of the serine/threonine kinase receptors, most notably the transforming growth factor-β receptor family. Since the original observation of GPCR transactivation of protein tyrosine kinase receptors, there has been considerable work on the mechanism of transactivation and several pathways are prominent. These pathways include the “triple membrane bypass” pathway and the generation of reactive oxygen species. The recent recognition of GPCR transactivation of serine/threonine kinase receptors enormously broadens the GPCR signalling paradigm. It may be predicted that the transactivation of serine/threonine kinase receptors would have mechanistic similarities with transactivation of tyrosine kinase pathways; however, initial studies suggest that these two transactivation pathways are mechanistically distinct. Important questions are the relative importance of tyrosine and serine/threonine transactivation pathways, the contribution of transactivation to overall GPCR signalling, mechanisms of transactivation and the range of cell types in which this phenomenon occurs. The ultimate significance of transactivation-dependent signalling remains to be defined but it appears to be prominent and if so will represent a new cell signalling frontier.  相似文献   
14.
Reconsideration on Homogeneous Quadratic Riemann Boundary Value Problem   总被引:1,自引:0,他引:1  
The homogeneous quadratic Riemann boundary value problem (1) with Hoelder continuous coefficients for the normal case was considered by the author in 1997. But the solutions obtained there are incomplete. Here its general method of solution is obtained.  相似文献   
15.
Abrupt climate change:Debate or action   总被引:4,自引:1,他引:3  
Global abrupt climate changes have been documented by various climate records, including ice cores, ocean sediment cores, lake sediment cores, cave deposits, loess deposits and pollen records. The climate system prefers to be in one of two stable states, i.e. interstadial or stadial conditions, but not in between. The transition between two states has an abrupt character. Abrupt climate changes are, in general, synchronous in the northern hemisphere and tropical regions. The timescale for abrupt climate changes can be as short as a decade. As the impacts may be potentially serious, we need to take actions such as reducing CO2 emissions to the atmosphere.  相似文献   
16.
We prove that the model with physical and human capital adjustment costs has optimal solution when the production function is increasing return and the structure of vetor fields of the model changes substantially when the prodution function from decreasing return turns to increasing return. And it is shown that the economy is improved when the coefficients of adjustment costs become small.  相似文献   
17.
18.
19.
20.
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号