首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   25810篇
  免费   1243篇
  国内免费   1286篇
系统科学   1983篇
丛书文集   702篇
教育与普及   307篇
理论与方法论   355篇
现状及发展   1017篇
研究方法   83篇
综合类   23886篇
自然研究   6篇
  2024年   131篇
  2023年   222篇
  2022年   411篇
  2021年   509篇
  2020年   371篇
  2019年   192篇
  2018年   952篇
  2017年   1021篇
  2016年   743篇
  2015年   676篇
  2014年   843篇
  2013年   800篇
  2012年   1145篇
  2011年   1928篇
  2010年   1694篇
  2009年   1399篇
  2008年   1651篇
  2007年   1841篇
  2006年   945篇
  2005年   952篇
  2004年   764篇
  2003年   826篇
  2002年   1063篇
  2001年   1012篇
  2000年   740篇
  1999年   878篇
  1998年   620篇
  1997年   552篇
  1996年   512篇
  1995年   499篇
  1994年   414篇
  1993年   369篇
  1992年   312篇
  1991年   324篇
  1990年   287篇
  1989年   235篇
  1988年   197篇
  1987年   146篇
  1986年   80篇
  1985年   25篇
  1984年   7篇
  1983年   3篇
  1982年   8篇
  1981年   3篇
  1980年   4篇
  1979年   5篇
  1972年   6篇
  1970年   3篇
  1969年   3篇
  1967年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Quantitative analysis has always been a difficult problem in security analysis of intrusion tolerance systems. An intrusion tolerance model based on multiple recovery mechanisms is introduced in this paper and how to quantify the security attributes of the model is proposed. A state transition model with recovery states more accurately describes the dynamic behavior of the system. Considering that recovery mechanisms have a great impact on the security performance of the system, we set up the cost models corresponding to different recovery mechanisms. We propose a feasible security measure based on mean cost to security failure in order to evaluate the system cost during the recovery phase. The experimental results confirmed the feasibility of the proposed methods.  相似文献   
992.
This paper described an improved underwater confrontation simulation method of naval amphibious operational training system. The initial position of submarine forces on the enemy is generated automatically, and the attacking distance model of torpedoes is established based on the kinematics theory, which is more flexible and reasonable to judge the launch condition compared to traditional method. The two kinds of confrontation behavior models on the enemy submarine are created to depict its tactical action from the defensive to the offensive as well as the contrary, ensuring that operational style is simulated more comprehensively and properly. The existing motion trajectory estimation and collision detection algorithms on operational platforms are also improved to reduce the iteration error and further enhance the detection accuracy of target hit.  相似文献   
993.
End-use energy consumption can reflect the industrial development of a country and the living standards of its residents. The study of end-use energy consumption can provide a solid basis for industrial restructuring, energy saving, and emission reduction. In this paper, we analyzed the end-use energy consumption of a region in Northwestern China, and applied the Markov prediction method to forecast the future demand of different types of end-use energy. This provides a reference for the energy structure optimization in the Northwestern China.  相似文献   
994.
Cloud storage service reduces the burden of data users by storing users’ data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost.  相似文献   
995.
PPP项目往往特许期较长,复杂和不确定因素较多,利益主体目标不同,能够明确分配的风险因素往往不会产生较大的争议,需要双方共享的风险便成为PPP管理成败的关键。本文将前景理论引入PPP共享风险管理的过程中,分析了公私双方均选择积极管理策略的均衡在实际中难以达成的原因,得出了影响演化稳定策略的因素有:公私方积极管理的额外感知成本,对风险发生概率的正确判断,损失分担系数和奖惩力度。为加强PPP项目共享风险的有效管理,本文提出了加强公私双方风险识别和评估能力和风险概率判断的准确性,落实责任分担机制,加强奖惩力度等措施。  相似文献   
996.
Aluminum alloy matrix composites have found a predominant place in research, and their applications are explored in almost all industries. The aerospace industry has been using precipitation-hardenable alloys in structural applications. However, insufficient literature is available on the influence of multiwalled carbon nanotubes (MWCNTs) on precipitation-hardenable alloy composite materials; thus, this work was designed to elucidate the effect on MWCNT reinforcement on AA2219 with and without precipitation hardening. Reinforcement with MWCNTs has been reported to accelerate precipitation and to achieve greater hardness within a much shorter time. The addition of 0.75wt% MWCNTs resulted in maximal hardness at 90 min, which is approximately 27% of improvement over the maximum hardness achieved by the corresponding monolithic alloy after 10 h of aging. The sample reinforced with 0.75wt% MWCNTs showed an improvement of 82% in hardness by solutionizing and aging compared to that achieved by sintering.  相似文献   
997.
【目的】获得高温高压下NiTi2的热力学性质。【方法】结合准谐德拜模型采用基于密度泛函理论的平面波赝势方法。【结果】对NiTi2高压下的结构进行了几何结构优化,获得了其力学的弹性性能,表明NiTi2在高压下呈弹性各向异性,同时获得了高温高压下NiTi2的热力学性质。【结论】有助于构建 Ni-Ti合金体系的多项物态方程。
  相似文献   
998.
Huge quantities of zinc leaching residues (ZLRs) generated from zinc production are dumped continuously around the world and pose a potential environmental threat because of their considerable amounts of entrained heavy metals (mainly lead). Most ZLRs have not been properly treated and the valuable metals in them have not yet been effectively recovered. Herein, the deep cleaning of a ZLR and recovery of valuable metals via a hydrometallurgical route were investigated. The cleaning process consists of two essential stages:acid leaching followed by calcium chloride leaching. The optimum conditions for extracting zinc, copper, and indium by acid leaching were a sulfuric acid concentration of 200 g·L-1, a liquid/solid ratio of 4:1 (mL/g), a leaching time of 2 h, and a temperature of 90℃. For lead and silver extractions, the optimum conditions were a calcium chloride concentration of 400 g·L-1, a pH value of 1.0, a leaching time of 1 h, and a temperature of 30℃. After calcium chloride leaching, silver and lead were extracted out and the lead was finally recovered as electrolytic lead by electrowinning. The anglesite phase, which poses the greatest potential environmental hazard, was removed from the ZLR after deep cleaning, thus reducing the cost of environmental management of ZLRs. The treatment of chlorine and spent electrolyte generated in the process was discussed.  相似文献   
999.
A liquid-nitrogen-cooling friction stir spot welding (C-FSSW) technology was developed for welding AZ31 magnesium alloy sheets. The liquid-nitrogen cooling degraded the deformability of the welded materials such that the width of interfacial cracks increased with increasing cooling time. The grain size of the stirred zone (SZ) and the heat-affected zone (HAZ) of the C-FSSW-welded joints decreased, whereas that of the thermomechanically affected zone (TMAZ) increased with increasing cooling time. The maximum tensile shear load of the C-FSSW-welded joints welded with a cooling time of 5 or 7 s was larger than that of the friction stir spot welding (FSSW)-welded joint, and the tensile shear load decreased with increasing cooling time. The microhardness of the C-FSSW-welded joints was greater than that of the FSSW-welded joint. Moreover, the microhardness of the SZ and the HAZ of the C-FSSW-welded joints increased, whereas that of the TMAZ decreased, with increasing cooling time.  相似文献   
1000.
Two kinds of argon shroud protection devices with two different basic structures were designed and investigated. Industrial experiments and numerical simulations were used to examine the protection effect, and the mechanism of air entrapment during the casting of steel ingots was analyzed. The influence of the structure of the argon shroud protection device on the protection effect was investigated. An argon shroud protection device mounted to the nozzle holder on the bottom of the ladle does not provide a good protection effect because air can easily flow into the teeming system and cause reoxidation of molten steel during teeming. By contrast, an argon shroud protection device seated on the top of the central trumpet provides an excellent protection effect, where air has little chance of flowing into the teeming system during casting. The feasibilities of the argon shroud protection devices are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号