首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7599篇
  免费   692篇
  国内免费   124篇
系统科学   1230篇
丛书文集   70篇
教育与普及   43篇
理论与方法论   285篇
现状及发展   1008篇
研究方法   14篇
综合类   5764篇
自然研究   1篇
  2024年   13篇
  2023年   30篇
  2022年   48篇
  2021年   58篇
  2020年   64篇
  2019年   38篇
  2018年   759篇
  2017年   781篇
  2016年   491篇
  2015年   128篇
  2014年   126篇
  2013年   123篇
  2012年   400篇
  2011年   1091篇
  2010年   954篇
  2009年   580篇
  2008年   633篇
  2007年   881篇
  2006年   127篇
  2005年   122篇
  2004年   188篇
  2003年   204篇
  2002年   118篇
  2001年   61篇
  2000年   45篇
  1999年   33篇
  1998年   25篇
  1997年   22篇
  1996年   33篇
  1995年   26篇
  1994年   23篇
  1993年   14篇
  1992年   20篇
  1991年   18篇
  1990年   16篇
  1989年   16篇
  1988年   12篇
  1987年   5篇
  1985年   9篇
  1981年   4篇
  1980年   5篇
  1979年   10篇
  1978年   7篇
  1977年   6篇
  1973年   3篇
  1972年   3篇
  1970年   7篇
  1968年   3篇
  1967年   5篇
  1963年   3篇
排序方式: 共有8415条查询结果,搜索用时 31 毫秒
981.
本文在分析动车组一级修作业流程特点的基础上,将动车所调车作业计划优化问题构建为整数规划模型并设计了融合"股道均衡分配规则""股道无效占用时间最小化规则""冲突消解策略"的启发式算法对问题进行求解,以动车所实际案例为背景验证了模型和算法的有效性。结果表明,所提出优化模型和算法是有效的;所提启发式算法相比三类常见的调度方法具有明显的优越性。  相似文献   
982.
983.
Cloud storage service reduces the burden of data users by storing users’ data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost.  相似文献   
984.
985.
针对语言偏好信息下的双边匹配问题,提出一种考虑匹配满意性、公平性和稳定性的双边匹配方法.首先,通过构造匹配满意度计算规则,将双边主体的语言偏好信息转化为匹配满意度;然后,给出满意匹配、公平匹配和稳定匹配的定义,在此基础上,考虑稳定匹配约束条件,建立双边匹配多目标优化模型,采用理想点法将多目标优化模型转化为单目标规划模型进行求解;最后,通过一个算例验证了提出方法的可行性和有效性.  相似文献   
986.
This paper is drawn from PhD research funded by the Saudi government on the policy and governance of Saudi schools (Algraini 2017. A critical systemic approach to human development in education: a case study of the Ministry of Education in Saudi Arabia). The aim of this article is to address human development challenges using the Critical Systems Heuristics approach. The results show that the central policy framework limits the opportunity for teachers and learners to contribute to shaping the curriculum and the process for human development. The Saudi Ministry of Education needs to: a) develop policy that takes into account the structure and the processes that shape education outcomes and b) to represent the voices of service users and service providers who have different and overlapping views.  相似文献   
987.
The paper established a double filtering method (DFM) to visualize the skeleton industrial structure (SIS) of one economy and find its evolution rule. Different with the previous researches, this method is from a new view of industrial conjunctions combined by leading sectors to depict the industrial structure. It was proved that the leading sector selected by DFM must be key sector selected by Hirschman-Rasmussen method. Applied DFM to input-output tables of China, Japan and USA and MFA to Japan and USA, the results analysis showed that DFM could overtake the two main shortcomings of minimum flow analysis (MFA), scratch SIS of each economy with its own characteristics, visualize the general evolution rules of the industrial structure with crisscrossed conjunctions among leading sectors.  相似文献   
988.
Progress in research on endocannabinoid signaling has greatly advanced our understanding of how it controls neural circuit excitability in health and disease. In general, endocannabinoid signaling at excitatory synapses suppresses seizures by inhibiting glutamate release. In contrast, endocannabinoid signaling promotes seizures by inhibiting GABA release at inhibitory synapses. The physiological distribution of endocannabinoid signaling molecules becomes disrupted with the development of epileptic focus in patients with mesial temporal lobe epilepsy and in animal models of experimentally induced epilepsy. Augmentation of endocannabinoid signaling can promote the development of epileptic focus at initial stages. However, at later stages, increased endocannabinoid signaling delays it and suppresses spontaneous seizures. Thus, the regulation of endocannabinoid signaling at specific synapses that cause hyperexcitability during particular stages of disease development may be effective for treating epilepsy and epileptogenesis.  相似文献   
989.
Quantitative analysis has always been a difficult problem in security analysis of intrusion tolerance systems. An intrusion tolerance model based on multiple recovery mechanisms is introduced in this paper and how to quantify the security attributes of the model is proposed. A state transition model with recovery states more accurately describes the dynamic behavior of the system. Considering that recovery mechanisms have a great impact on the security performance of the system, we set up the cost models corresponding to different recovery mechanisms. We propose a feasible security measure based on mean cost to security failure in order to evaluate the system cost during the recovery phase. The experimental results confirmed the feasibility of the proposed methods.  相似文献   
990.
In this paper, a life-cycle model with retirement is set up to study how an individual chooses the optimal retiring age on account of wage growth rate, longevity and healthy state. It is proved that there exists optimal retiring age under given conditions. The numerical simulations are given to show how wage growth rate, longevity and healthy state affect retiring age.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号