首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11645篇
  免费   429篇
  国内免费   610篇
系统科学   487篇
丛书文集   429篇
教育与普及   274篇
理论与方法论   50篇
现状及发展   74篇
研究方法   45篇
综合类   11322篇
自然研究   3篇
  2024年   78篇
  2023年   139篇
  2022年   233篇
  2021年   293篇
  2020年   165篇
  2019年   79篇
  2018年   118篇
  2017年   159篇
  2016年   177篇
  2015年   287篇
  2014年   412篇
  2013年   444篇
  2012年   439篇
  2011年   526篇
  2010年   462篇
  2009年   499篇
  2008年   544篇
  2007年   556篇
  2006年   454篇
  2005年   455篇
  2004年   375篇
  2003年   293篇
  2002年   360篇
  2001年   348篇
  2000年   353篇
  1999年   573篇
  1998年   451篇
  1997年   532篇
  1996年   452篇
  1995年   407篇
  1994年   384篇
  1993年   318篇
  1992年   280篇
  1991年   256篇
  1990年   215篇
  1989年   204篇
  1988年   152篇
  1987年   110篇
  1986年   64篇
  1985年   26篇
  1984年   7篇
  1983年   3篇
  1982年   1篇
  1980年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
基于CMAC-PID控制的柴油发电机组的建模与仿真   总被引:2,自引:1,他引:2  
侯世英  时文飞  万江 《系统仿真学报》2007,19(13):3052-3055,3063
在分析柴油发电机组系统组成的基础上,建立了火电厂应急柴油发电机组在MATLAB/SIMULINK环境下的仿真模型,提出了应急柴油发电机组调速系统的CMAC-PID控制方案。对顺序投入负载时,机组的机械、电气性能作了仿真分析,结果表明CMAC-PID控制的应急柴油发电机组,转速瞬态调整率要比常规PID控制下小,稳定时间也短,显示了良好的动态特性。  相似文献   
72.
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermeasures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions. the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation.  相似文献   
73.
Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been proved yet, most cryptographic researchers believe that one-way functions exist. In addition, many candidates for one-way functions have been proposed. Therefore, the key step for developing real-valued cipher systems is to define real one-way functions and to propose candidates for them. In this paper, based on computational complexity theory over the real field, we give two definitions of real one-way functions; one is for digital one-way functions and the other is for general one-way functions. Candidates for these two classes of one-way functions are also proposed. Moreover, we present two examples to demonstrate that the candidates for both digital one-way functions and general one-way functions can be applied to construct secure real-valued cipher systems.  相似文献   
74.
复杂性视野中的生态城市系统建设   总被引:1,自引:0,他引:1  
对复杂性理论的兴起、生态城市及其系统复杂性进行了分析总结,运用复杂性理论,提出了生态城市系统建设相应的建设对策。  相似文献   
75.
This paper investigates the termination problems of multi-path polynomial programs (MPPs) with equational loop guards. To establish sufficient conditions for termination and nontermination simultaneously, the authors propose the notion of strong/weak non-termination which under/over- approximates non-termination. Based on polynomial ideal theory, the authors show that the set of all strong non-terminating inputs (SNTI) and weak non-terminating inputs (WNTI) both correspond to tile real varieties of certain polynomial ideals. Furthermore, the authors prove that the variety of SNTI is computable, and under some sufficient conditions the variety of WNTI is also computable. Then by checking the computed SNTI and WNTI varieties in parallel, termination properties of a consid- ered MPP can be asserted. As a consequence, the authors establish a new framework for termination analysis of MPPs.  相似文献   
76.
Piperidine absorbs CO2 and H2O in air to form a molecular complex: piperidium-l-piperidinecarboxylate-H2O. The structure of the complex was characterized by X-ray single crystal diffraction. The crystal structure was determined to be triclinic, space group P1^-with a=0.648 6(8) nm, b=0.809 200) nm, c= 1.357 1(16) nm, a=96.96706)°, β =102.506(15)°,γ=104.202 05)°, Z=2. The complex is stabilized via five hydrogen bonds between the three components, N-O electrostatic interaction and O-O interaction (electron transfer) betweenl-piperidinecarboxylate and H2O. Due to electron transference of carbamate ion, the oxygen atom in water molecule is strongly negatively charged and the O-H bond is considerably shorter than that of the free molecule of water. The formation of the molecular complex is a reversible process and will decompose upon heating. The mechanism of formation and stabilization is further investigated herein.  相似文献   
77.
针对时间反演(time reversal, TR)技术无法较好地解决聚焦区内非法用户窃听的问题,提出了一种TR技术联合接收端人工噪声的物理层安全传输方案。首先,利用时间反演技术的空时聚焦性提高合法用户接收端的信噪比(signal to noise ratio, SNR)。其次,通过在接收端加入人工噪声来干扰非法用户对合法用户保密信息的窃听,以聚焦区内外系统安全性能为基础,推导出保密信干噪比(signal to interference plus noise ratio, SINR)、可达保密速率和误码率(bit error rate, BER)的解析表达式。最后,通过仿真分析证明了所提方案能提高系统的SINR和可达保密速率,同时还能降低合法用户的BER,使系统拥有更好的安全性能。  相似文献   
78.
柔性制造系统在工业发展中的作用越来越大,而如何使柔性制造系统发挥最大的功效则是现阶段面临的一个主要问题。文章基于蚁群思想,提出了一种融合网格法的蚁群算法来求解柔性制造系统工艺路线优化配置的方法。算例结果证明,该算法能使系统设备工作负荷达到均衡,从而提高系统工作效率。  相似文献   
79.
Mutations of cystic fibrosis transmembrane conductance regulator (CFTR) cause cystic fibrosis, the most common life-limiting recessive genetic disease among Caucasians. CFTR mutations have also been linked to increased risk of various cancers but remained controversial for a long time. Recent studies have begun to reveal that CFTR is not merely an ion channel but also an important regulator of cancer development and progression with multiple signaling pathways identified. In this review, we will first present clinical findings showing the correlation of genetic mutations or aberrant expression of CFTR with cancer incidence in multiple cancers. We will then focus on the roles of CFTR in fundamental cellular processes including transformation, survival, proliferation, migration, invasion and epithelial–mesenchymal transition in cancer cells, highlighting the signaling pathways involved. Finally, the association of CFTR expression levels with patient prognosis, and the potential of CFTR as a cancer prognosis indicator in human malignancies will be discussed.  相似文献   
80.
Opisthorchis viverrini-related cholangiocarcinoma (CCA), a fatal bile duct cancer, is a major public health concern in areas endemic for this parasite. We report here whole-exome sequencing of eight O. viverrini-related tumors and matched normal tissue. We identified and validated 206 somatic mutations in 187 genes using Sanger sequencing and selected 15 genes for mutation prevalence screening in an additional 46 individuals with CCA (cases). In addition to the known cancer-related genes TP53 (mutated in 44.4% of cases), KRAS (16.7%) and SMAD4 (16.7%), we identified somatic mutations in 10 newly implicated genes in 14.8-3.7% of cases. These included inactivating mutations in MLL3 (in 14.8% of cases), ROBO2 (9.3%), RNF43 (9.3%) and PEG3 (5.6%), and activating mutations in the GNAS oncogene (9.3%). These genes have functions that can be broadly grouped into three biological classes: (i) deactivation of histone modifiers, (ii) activation of G protein signaling and (iii) loss of genome stability. This study provides insight into the mutational landscape contributing to O. viverrini-related CCA.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号