首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5543篇
  免费   600篇
  国内免费   2篇
系统科学   1073篇
理论与方法论   275篇
现状及发展   878篇
研究方法   20篇
综合类   3897篇
自然研究   2篇
  2024年   1篇
  2018年   727篇
  2017年   732篇
  2016年   433篇
  2015年   31篇
  2014年   5篇
  2013年   2篇
  2012年   263篇
  2011年   956篇
  2010年   817篇
  2009年   454篇
  2008年   523篇
  2007年   766篇
  2006年   14篇
  2005年   46篇
  2004年   133篇
  2003年   153篇
  2002年   61篇
  2001年   4篇
  2000年   4篇
  1999年   3篇
  1998年   1篇
  1995年   1篇
  1994年   2篇
  1992年   2篇
  1991年   3篇
  1990年   1篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1980年   1篇
  1977年   1篇
  1967年   1篇
排序方式: 共有6145条查询结果,搜索用时 15 毫秒
81.
Modeling a business to match its customer perceived (and customer desired) outcomes, remains an on-going task. This paper considers shows how a service value networks (SVNs) approach may be engaged to model, and deliver, understanding of the front-end business and its direct engagement with its immediate (or front-end) customers. These front-end customers may be either: (1) its off-line, in-store customers - engaging directly with the business sales staff (or representative), or-(2) its on-line, virtual customers - engaging with the business via internet or remote access. In this situation, both the business, and the customer draw upon their respective viewpoints, and both sides influence the interaction. External to these business and customer influences are additional factors that capture the immediate and broader global effects - termed environmental effects. These three business-customer engagement areas of influence are captured by a SVN SEM approach.
Without a business-customer encounter of some kind the likelihood of a services business, and a prospecting customer, successfully engaging in an exchange process is reduced. This exchange may be a physical, and/or services exchange, and/or an information and/or ideas exchange. To the business, this encounter is, in effect, a trade, and as a result, the business targets acquiring an economic exchange that will ultimately deliver a net positive economic outcome. To the customer, external and internal information feeds, servicing, perceived value, and satisfaction, are key encounter drivers. SVNs offers a new way to understand the business-customer encounter, and to then utilize this acquired knowledge to either: (1) build a strategic management model, or (2) reengineer its business networks, and to then create a re-positioned, more customer-aligned business operation - one that is capable of delivering win - win, competitive business-customer solutions.  相似文献   
82.
This paper presents a methodology which determines the allocation of power demand among the committed generating units while minimizes number of objectives as well as meets physical and technological system constraints. The procedure considers two decoupled problems based upon the dependency of their goals on either active power or reactive power generation. Both the problems have been solved sequentially to achieve optimal allocation of active and reactive power generation while minimizes operating cost, gaseous pollutants emission objectives and active power transmission loss with consideration of system operating constraints along with generators prohibited operating zones and transmission line flow limits. The active and reactive power line flows are obtained with the help of generalized generation shift distribution factors (GGDF) and generalized Z-bus distribution factors (GZBDF), respectively. First problem is solved in multi-objective framework in which the best weights assigned to objectives are determined while employing weighting method and in second problem, active power loss of the system is minimized subject to system constraints. The validity of the proposed method is demonstrated on 30-bus IEEE power system.  相似文献   
83.
This paper studies the robust H∞ disturbance attenuation with internal stability for uncertain nonlinear control systems. By adding one power integrator technique, this paper designs a explicit smooth robust dynamic feedback law while rejecting the disturbance to any specified degree of accuracy. Further, the example and simulation results show the effectiveness of the proposed schemes.  相似文献   
84.
There are many practical decision problems where decision makers' preferences may be inconsistent and contradictory. In this paper, new methods for ordering and classifying multi-attribute objects by discordant collective preferences are suggested. These methods are based on the theory of multiset metric spaces. The proposed techniques are applied to ranking companies and a competitive selection of projects, which are estimated by several experts upon multiple qualitative criteria.  相似文献   
85.
Company bankruptcies cost billions of dollars in losses to banks each year. Thus credit risk prediction is a critical part of a bank's loan approval decision process. Traditional financial models for credit risk prediction are no longer adequate for describing today's complex relationship between the financial health and potential bankruptcy of a company. In this work, a multiple classifier system (embedded in a multiple intelligent agent system) is proposed to predict the financial health of a company. In our model, each individual agent (classifier) makes a prediction on the likelihood of credit risk based on only partial information of the company. Each of the agents is an expert, but has limited knowledge (represented by features) about the company. The decisions of all agents are combined together to form a final credit risk prediction. Experiments show that our model out-performs other existing methods using the benchmarking Compustat American Corporations dataset.  相似文献   
86.
Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been proved yet, most cryptographic researchers believe that one-way functions exist. In addition, many candidates for one-way functions have been proposed. Therefore, the key step for developing real-valued cipher systems is to define real one-way functions and to propose candidates for them. In this paper, based on computational complexity theory over the real field, we give two definitions of real one-way functions; one is for digital one-way functions and the other is for general one-way functions. Candidates for these two classes of one-way functions are also proposed. Moreover, we present two examples to demonstrate that the candidates for both digital one-way functions and general one-way functions can be applied to construct secure real-valued cipher systems.  相似文献   
87.
In this paper, we investigate the global controllability of a class of n-dimensional affine nonlinear systems with n- 1 controls and constant control matrix. A necessary and sufficient condition for its global controllability has been obtained by using the methods recently developed. Furthermore, we generalize the above result to a class of affine nonlinear systems with a block-triangular-like structure. Finally, we will give three examples to show the applications of our results.  相似文献   
88.
Public discourse in Western democracies, particularly in the United States, is far from the Habermasian ideal of citizens engaging in a rational discussion of public affairs. Rather than providing an arena for informed deliberation, the growing expertise of the media, lobbyists, and politicians has sub-optimized the current system of discourse to focus on emotional manipulation and the creation of polarized interests, each competing with each other for dominance. Avoiding a potentially disastrous outcome from this unbalancing of public discourse requires a revitalization of the public sphere and a return of the citizen voice in public decision making. To that end, systems thinkers have a tremendous opportunity and can play an important role. This article will explore the current challenges facing public discourse and outline that potential role.  相似文献   
89.
90.
Increasingly knowledge has become a determining factor in achieving life’s potential and is the currency of the age. Without access to Information an individuals’ knowledge base cannot be enriched and without knowledge the individual becomes increasingly powerless. Advances in technology have provided opportunities for some to add to their stock of knowledge but access to sources of information is uneven and can lead to social unrest. The availability of information is an important factor in managing change and empowering citizens. The question about information and power then becomes one of ownership or sovereignty of the information. If we are to create an open society then we need to ensure that there is open access to knowledge through flexible and intelligent information systems that are available for all. In this paper we consider if we are truly entering the knowledge age or the age of ignorance.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号