首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5445篇
  免费   599篇
系统科学   1073篇
理论与方法论   275篇
现状及发展   868篇
综合类   3828篇
  2024年   1篇
  2018年   727篇
  2017年   732篇
  2016年   431篇
  2015年   30篇
  2014年   3篇
  2013年   2篇
  2012年   256篇
  2011年   950篇
  2010年   814篇
  2009年   454篇
  2008年   506篇
  2007年   762篇
  2006年   2篇
  2005年   41篇
  2004年   121篇
  2003年   149篇
  2002年   55篇
  2000年   1篇
  1994年   2篇
  1991年   3篇
  1990年   1篇
  1967年   1篇
排序方式: 共有6044条查询结果,搜索用时 15 毫秒
101.
Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been proved yet, most cryptographic researchers believe that one-way functions exist. In addition, many candidates for one-way functions have been proposed. Therefore, the key step for developing real-valued cipher systems is to define real one-way functions and to propose candidates for them. In this paper, based on computational complexity theory over the real field, we give two definitions of real one-way functions; one is for digital one-way functions and the other is for general one-way functions. Candidates for these two classes of one-way functions are also proposed. Moreover, we present two examples to demonstrate that the candidates for both digital one-way functions and general one-way functions can be applied to construct secure real-valued cipher systems.  相似文献   
102.
In this paper, we investigate the global controllability of a class of n-dimensional affine nonlinear systems with n- 1 controls and constant control matrix. A necessary and sufficient condition for its global controllability has been obtained by using the methods recently developed. Furthermore, we generalize the above result to a class of affine nonlinear systems with a block-triangular-like structure. Finally, we will give three examples to show the applications of our results.  相似文献   
103.
Public discourse in Western democracies, particularly in the United States, is far from the Habermasian ideal of citizens engaging in a rational discussion of public affairs. Rather than providing an arena for informed deliberation, the growing expertise of the media, lobbyists, and politicians has sub-optimized the current system of discourse to focus on emotional manipulation and the creation of polarized interests, each competing with each other for dominance. Avoiding a potentially disastrous outcome from this unbalancing of public discourse requires a revitalization of the public sphere and a return of the citizen voice in public decision making. To that end, systems thinkers have a tremendous opportunity and can play an important role. This article will explore the current challenges facing public discourse and outline that potential role.  相似文献   
104.
105.
Increasingly knowledge has become a determining factor in achieving life’s potential and is the currency of the age. Without access to Information an individuals’ knowledge base cannot be enriched and without knowledge the individual becomes increasingly powerless. Advances in technology have provided opportunities for some to add to their stock of knowledge but access to sources of information is uneven and can lead to social unrest. The availability of information is an important factor in managing change and empowering citizens. The question about information and power then becomes one of ownership or sovereignty of the information. If we are to create an open society then we need to ensure that there is open access to knowledge through flexible and intelligent information systems that are available for all. In this paper we consider if we are truly entering the knowledge age or the age of ignorance.  相似文献   
106.
This paper describes the change in a researcher's practices from one of studying regional industrial development at a distance to one of working closely with a network of agri-food managers. This is accompanied by a discussion of the methodological and theoretical possibilities for an action research inspired economic geography. Some of the core characteristics of a pragmatic conceptualization of action research are revised. It is argued that theoretical developments within economic geography make possible a dialogue between researchers and local actors and that economic geography is challenged to accept that knowledge is generated through such a dialogue. Attempts to create a dialogue between action research and economic geography in a specific Norwegian industrial and geographical context are described. These attempts indicate that the researcher's methodological approach has been transformed from a narrow one relying solely on conventional social science methods to a broader one including participatory action research.  相似文献   
107.
This study started with problems that my colleagues (and I) were experiencing with interaction and intercultural communication among students in our diverse classrooms. Educators were also experiencing difficulties in motivating students to work effectively in groups. The purpose of this paper was to seek solutions to these problems by exploring variations of the group oral assessment structure in a multilingual and multicultural context. Four phases of assessments were conducted at two tertiary institutions in South Africa using a combination of action research and a participatory approach. Not only did this study succeed in addressing the problems but it also revealed the added benefits of using an action research methodology.  相似文献   
108.
In the present paper, we focus on constructive spherical codes. By employing algebraic geometry codes, we give an explicit construction of spherical code sequences. By making use of the idea involved in the proof of the Gilbert-Varshamov bound in coding theory, we construct a spherical code sequence in exponential time which meets the best-known asymptotic bound by Shamsiev and Wyner.  相似文献   
109.
In this paper, we investigate the growth of meromorphic solutions of higher order linear differential equation f^(k) +Ak-1 (z)e^Pk-1^(z) f^(k-1) +…+A1 (z)e^P1(z) f′ +Ao(z)e^Po(z) f = 0 (k ≤ 2), where Pj(z) (j = 0, 1,..., k - 1) are nonconstant polynomials such that deg Pj = n (j = 0, 1,..., k - 1) and Aj(z)(≠ 0) (j = 0, 1,..., k - 1) are meromorphic functions with order p(Aj) 〈 n (j = 0, 1,..., k - 1).  相似文献   
110.
In order to tradeoff exploration/exploitation and inspired by cell genetic algorithm a cellshift crossover operator for evolutionary algorithm (EA) is proposed in this paper. The definition domain is divided into n-dimension cubic sub-domains (cell) and each individual locates at an ndimensional cube. Cell-shift crossover first exchanges the cell numbers of the crossover pair if they are in the different cells (exploration) and subsequently shift the first individual from its initial place to the other individual's cell place. If they are already in the same cell heuristic crossover (exploitation) is used. Cell-shift/heuristic crossover adaptively executes exploration/exploitation search with the vary of genetic diversity. The cell-shift EA has excellent performance in terms of efficiency and efficacy on ten usually used optimization benchmarks when comparing with the recent well-known FEP evolutionary algorithm.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号