首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11093篇
  免费   932篇
  国内免费   424篇
系统科学   1495篇
丛书文集   178篇
教育与普及   91篇
理论与方法论   286篇
现状及发展   900篇
研究方法   8篇
综合类   9490篇
自然研究   1篇
  2024年   26篇
  2023年   87篇
  2022年   158篇
  2021年   187篇
  2020年   153篇
  2019年   112篇
  2018年   868篇
  2017年   885篇
  2016年   594篇
  2015年   341篇
  2014年   385篇
  2013年   420篇
  2012年   707篇
  2011年   1371篇
  2010年   1214篇
  2009年   854篇
  2008年   916篇
  2007年   1096篇
  2006年   287篇
  2005年   241篇
  2004年   293篇
  2003年   279篇
  2002年   220篇
  2001年   154篇
  2000年   120篇
  1999年   75篇
  1998年   45篇
  1997年   55篇
  1996年   30篇
  1995年   42篇
  1994年   46篇
  1993年   29篇
  1992年   32篇
  1991年   39篇
  1990年   31篇
  1989年   13篇
  1988年   14篇
  1987年   5篇
  1986年   6篇
  1985年   5篇
  1984年   1篇
  1980年   3篇
  1979年   2篇
  1978年   1篇
  1974年   1篇
  1967年   1篇
  1960年   1篇
  1955年   4篇
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
701.
The state transfer under control fields is analyzed based on the Bloch sphere representation of a single qubit. In order to achieve the target from an arbitrary initial state to a target state, the conditions that parameters should satisfy are deduced separately in two different requirements: One is in the case of the rotation angle around the x-axis being fixed and another is in the situation with a given evolution time. Several typical states trajectories are demonstrated by numerical simulations on the Bloch sphere. The relations between parameters and the trajectories are analyzed.  相似文献   
702.
A rapid process of hybridisation of man and technology, organisation and technology and society and technology is currently sweeping the world. This process requires a way of (scientific) thinking that takes hybrid systems as the starting point. Such an approach makes it increasingly important for hybrid systems to be interlinked, enabling them to exchange and share information through these links. This linking of (hybrid) systems to enable them to exchange and share information can also be denoted as the realisation of interoperability between (hybrid) systems. Five principles from Luhmann’s systems theory can help us understand interoperability. Interoperability enables (hybrid) systems to join random coalitions and networks. The network centric warfare concept is currently the basis for international efforts aimed at the development and application of interoperability that would enable armed forces to act effectively and efficiently. This paper demonstrates what we can learn from Luhmann’s system’s theory.  相似文献   
703.
Changes in the daily maximum (Tmax) and minimum (Tmin) surface air temperatures and the associated temperature extremes have severe consequences on human society and the natural environment. In this study, we assess vegetation effects on mean Tmax and Tmin over China by computing a vegetation feedback parameter using the satellite-sensed Normalized Difference Vegetation Index (NDVI) and observed temperatures for the period 1982–2002. In all seasons, vegetation exerts a much stronger forcing on Tmax than on Tmin, and thus has a substantial effect on the diurnal temperature range (DTR) over China. Significant positive feedbacks on Tmax and the DTR occupy many areas of China with the feedback parameters exceeding 1°C (0.1 NDVI)–1, while significant negative effects only appear over the summertime climatic and ecological transition zone of northern China and some other isolated areas. Also, the vegetation feedbacks are found to vary with season. In areas where significant feedbacks occur, vegetation contributes to typically 10%–30% of the total variances in Tmax, Tmin, and the DTR. These findings suggest that vegetation memory offers the potential for improving monthly-to-seasonal forecasting of Tmax and Tmin, and the associated temperature extremes over China. Meanwhile, the limitations and uncertainties of the study should be recognized.  相似文献   
704.
<正> Carvalho,Lucchesi and Murty proved that any 1-extendable graph G different from K_2and C_(2n)has at least Δ(G)edge-disjoint removable ears,and any brick G distinct from K_4 and■hasat least Δ(G)-2 removable edges,where Δ(G)denotes the maximum degree of G.In this paper,weimprove the lower bounds for numbers of removable ears and removable edges of 1-extendable graphs.It is proved that any 1-extendable graph G different from K_2 and C_(2n)has at least χ′(G)edge-disjointremovable ears,and any brick G distinct from K_4 and■has at least χ′(G)-2 removable edges,whereχ′(G)denotes the edge-chromatic number of G.  相似文献   
705.
The aim of this paper is to explore an explicit use of the concept of sustainability within transport planning. This paper analyses the concept of sustainability based on a practical approach for a sustainable development of Nordhavn, an area of Copenhagen, exemplifying a complex planning problem. An exploration of the application of the concept of sustainability is carried out using elements of Soft Systems Methodology (SSM). This approach indicates a need to separate the use of sustainability considerations regarding the transport planning ‘process’ from the transport planning ‘results’. The two approaches are related to the planning levels presented by Ulrich (Syst Prac 1(4):415–428, 1988). It was chosen to focus on the understanding of a sustainable transport planning process. This focus is addressed by four stakeholder groups interviewed based on the ‘ought to’ mode of Critical Systems Heuristics (CSH). Finally an outline of some of the factors of a sustainable transport planning process is proposed.  相似文献   
706.
The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated key exchange (3PAKE) protocol. This CLC protocol provides a superior round efficiency (only three rounds), and its resources required for computation are relatively few. However, we find that the leakage of values A V and B V in the CLC protocol will make a man-in-the-middle attack feasible in practice, where A V and B V are the authentication information chosen by the server for the participants A and B. In this paper, we describe our attack on the CLC protocol and further present a modified 3PAKE protocol, which is essentially an improved CLC protocol. Our protocol can resist attacks available, including man-in-the-middle attack we mount on the initial CLC protocol. Meanwhile, we allow that the participants choose their own passwords by themselves, thus avoiding the danger that the server is controlled in the initialization phase. Also, the computational cost of our protocol is lower than that of the CLC protocol.  相似文献   
707.
In this paper,domain decomposition method(DDM) for numerical solutions of mathematical physics equations is improved into dynamic domain decomposition method(DDDM) . The main feature of the DDDM is that the number,shape and volume of the sub-domains are all flexibly changeable during the iterations,so it suits well to be implemented on a reconfigurable parallel computing system. Convergence analysis of the DDDM is given,while an application approach to a weak nonlinear elliptic boundary value problem and a ...  相似文献   
708.
蔡超 《韶关学院学报》2010,31(10):164-166
不同的学习风格产生不尽相同的学习效果,了解学习风格的类型和成因有利于提高学生的学习效率。通过对日语专业学生学习风格的问卷调查研究以及相关数据的统计分析,掌握学生学习风格的总体倾向并深入探讨其成因,有助于引导学生培养多样化的学习风格,以顺利实现人才培养目标。  相似文献   
709.
Within the framework of the regularization theory, a spectral regularization method is introduced and analyzed. The convergence estimate under an appropriate choice of regularization parameter is obtained. A numerical implementation is described. Numerical examples show that the proposed method is effective and stable.  相似文献   
710.
The approach of available transfer capability (denoted as ATC) incorporating wind generation has been paid very high attention since the development of wind generation. Based on the maximum function, this paper presents an ATC model. The characteristic of the new model is twofold. First, it considers wind turbines connected to power system and static security of power system simultaneously. Second, it is a system of semismooth equations and can be solved easily. By using the smoothing strategy, a smoothing Newton method is adopted for solving the proposed new ATC model. Numerical simulation results of the IEEE 30-bus and 118-bus system show that the new model and algorithm are feasible and effective. The impact of wind turbines connected to power system on ATC is also analyzed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号