首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16964篇
  免费   658篇
  国内免费   71篇
系统科学   1118篇
丛书文集   29篇
教育与普及   21篇
理论与方法论   300篇
现状及发展   6256篇
研究方法   586篇
综合类   9255篇
自然研究   128篇
  2018年   741篇
  2017年   749篇
  2016年   451篇
  2012年   460篇
  2011年   1235篇
  2010年   887篇
  2009年   526篇
  2008年   702篇
  2007年   995篇
  2006年   248篇
  2005年   274篇
  2004年   323篇
  2003年   338篇
  2002年   302篇
  2001年   435篇
  2000年   428篇
  1999年   288篇
  1992年   236篇
  1991年   197篇
  1990年   215篇
  1989年   191篇
  1988年   201篇
  1987年   219篇
  1986年   190篇
  1985年   252篇
  1984年   226篇
  1983年   171篇
  1982年   176篇
  1981年   180篇
  1980年   170篇
  1979年   403篇
  1978年   340篇
  1977年   250篇
  1976年   291篇
  1975年   260篇
  1974年   272篇
  1973年   224篇
  1972年   244篇
  1971年   308篇
  1970年   374篇
  1969年   254篇
  1968年   307篇
  1967年   293篇
  1966年   249篇
  1965年   178篇
  1964年   99篇
  1959年   88篇
  1958年   162篇
  1957年   100篇
  1956年   91篇
排序方式: 共有10000条查询结果,搜索用时 692 毫秒
11.
12.
The development of new technologically advanced products requires the contribution from a range of skills and disciplines, which are often difficult to find within a single company or organization. Requirements establishment practices in Systems Engineering (SE), while ensuring coordination of activities and tasks across the supply network, fall short when it comes to facilitate knowledge sharing and negotiation during early system design. Empirical observations show that when system-level requirements are not available or not mature enough, engineers dealing with the development of long lead-time sub-systems tend to target local optima, rather than opening up the design space. This phenomenon causes design teams to generate solutions that do not embody the best possible configuration for the overall system. The aim of this paper is to show how methodologies for value-driven design may address this issue, facilitating early stage design iterations and the resolution of early stage design trade-offs. The paper describes how such methodologies may help gathering and dispatching relevant knowledge about the ‘design intent’ of a system to the cross-functional engineering teams, so to facilitate a more concurrent process for requirement elicitation in SE. The paper also describes EVOKE (Early Value Oriented design exploration with KnowledgE maturity), a concept selection method that allows benchmarking design options at sub-system level on the base of value-related information communicated by the system integrators. The use of EVOKE is exemplified in an industrial case study related to the design of an aero-engine component. EVOKE’s ability to raise awareness on the value contribution of early stage design concepts in the SE process has been further verified with industrial practitioners in ad-hoc design episodes.  相似文献   
13.
G protein-coupled receptor (GPCR) signalling is mediated through transactivation-independent signalling pathways or the transactivation of protein tyrosine kinase receptors and the recently reported activation of the serine/threonine kinase receptors, most notably the transforming growth factor-β receptor family. Since the original observation of GPCR transactivation of protein tyrosine kinase receptors, there has been considerable work on the mechanism of transactivation and several pathways are prominent. These pathways include the “triple membrane bypass” pathway and the generation of reactive oxygen species. The recent recognition of GPCR transactivation of serine/threonine kinase receptors enormously broadens the GPCR signalling paradigm. It may be predicted that the transactivation of serine/threonine kinase receptors would have mechanistic similarities with transactivation of tyrosine kinase pathways; however, initial studies suggest that these two transactivation pathways are mechanistically distinct. Important questions are the relative importance of tyrosine and serine/threonine transactivation pathways, the contribution of transactivation to overall GPCR signalling, mechanisms of transactivation and the range of cell types in which this phenomenon occurs. The ultimate significance of transactivation-dependent signalling remains to be defined but it appears to be prominent and if so will represent a new cell signalling frontier.  相似文献   
14.
Reconsideration on Homogeneous Quadratic Riemann Boundary Value Problem   总被引:1,自引:0,他引:1  
The homogeneous quadratic Riemann boundary value problem (1) with Hoelder continuous coefficients for the normal case was considered by the author in 1997. But the solutions obtained there are incomplete. Here its general method of solution is obtained.  相似文献   
15.
Abrupt climate change:Debate or action   总被引:4,自引:1,他引:3  
Global abrupt climate changes have been documented by various climate records, including ice cores, ocean sediment cores, lake sediment cores, cave deposits, loess deposits and pollen records. The climate system prefers to be in one of two stable states, i.e. interstadial or stadial conditions, but not in between. The transition between two states has an abrupt character. Abrupt climate changes are, in general, synchronous in the northern hemisphere and tropical regions. The timescale for abrupt climate changes can be as short as a decade. As the impacts may be potentially serious, we need to take actions such as reducing CO2 emissions to the atmosphere.  相似文献   
16.
We prove that the model with physical and human capital adjustment costs has optimal solution when the production function is increasing return and the structure of vetor fields of the model changes substantially when the prodution function from decreasing return turns to increasing return. And it is shown that the economy is improved when the coefficients of adjustment costs become small.  相似文献   
17.
18.
19.
20.
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号