首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15188篇
  免费   871篇
  国内免费   456篇
系统科学   1417篇
丛书文集   324篇
教育与普及   433篇
理论与方法论   301篇
现状及发展   903篇
研究方法   32篇
综合类   13104篇
自然研究   1篇
  2024年   43篇
  2023年   126篇
  2022年   179篇
  2021年   206篇
  2020年   137篇
  2019年   44篇
  2018年   794篇
  2017年   806篇
  2016年   511篇
  2015年   257篇
  2014年   335篇
  2013年   284篇
  2012年   589篇
  2011年   1276篇
  2010年   1143篇
  2009年   874篇
  2008年   929篇
  2007年   1175篇
  2006年   365篇
  2005年   348篇
  2004年   401篇
  2003年   563篇
  2002年   661篇
  2001年   538篇
  2000年   371篇
  1999年   502篇
  1998年   441篇
  1997年   409篇
  1996年   349篇
  1995年   342篇
  1994年   299篇
  1993年   248篇
  1992年   195篇
  1991年   177篇
  1990年   168篇
  1989年   158篇
  1988年   129篇
  1987年   77篇
  1986年   44篇
  1985年   12篇
  1984年   5篇
  1982年   3篇
  1980年   1篇
  1967年   1篇
排序方式: 共有10000条查询结果,搜索用时 453 毫秒
861.
The state transfer under control fields is analyzed based on the Bloch sphere representation of a single qubit. In order to achieve the target from an arbitrary initial state to a target state, the conditions that parameters should satisfy are deduced separately in two different requirements: One is in the case of the rotation angle around the x-axis being fixed and another is in the situation with a given evolution time. Several typical states trajectories are demonstrated by numerical simulations on the Bloch sphere. The relations between parameters and the trajectories are analyzed.  相似文献   
862.
运用耦合模理论和传输矩阵分析法推出了反射光的偏振相关损耗,并模拟了在不同双折射值下反射偏振相关损耗随波长变化曲线.随着双折射量的变化,光栅反射光的偏振相关损耗在反射谱的带边处能明显的体现出来,尤其是在带边比较陡峭时.光栅的偏振相关损耗随双折射量的增加迅速增大,随着双折射的变化其PDL的左右峰值呈线性变化,PDL的最大值...  相似文献   
863.
A rapid process of hybridisation of man and technology, organisation and technology and society and technology is currently sweeping the world. This process requires a way of (scientific) thinking that takes hybrid systems as the starting point. Such an approach makes it increasingly important for hybrid systems to be interlinked, enabling them to exchange and share information through these links. This linking of (hybrid) systems to enable them to exchange and share information can also be denoted as the realisation of interoperability between (hybrid) systems. Five principles from Luhmann’s systems theory can help us understand interoperability. Interoperability enables (hybrid) systems to join random coalitions and networks. The network centric warfare concept is currently the basis for international efforts aimed at the development and application of interoperability that would enable armed forces to act effectively and efficiently. This paper demonstrates what we can learn from Luhmann’s system’s theory.  相似文献   
864.
Changes in the daily maximum (Tmax) and minimum (Tmin) surface air temperatures and the associated temperature extremes have severe consequences on human society and the natural environment. In this study, we assess vegetation effects on mean Tmax and Tmin over China by computing a vegetation feedback parameter using the satellite-sensed Normalized Difference Vegetation Index (NDVI) and observed temperatures for the period 1982–2002. In all seasons, vegetation exerts a much stronger forcing on Tmax than on Tmin, and thus has a substantial effect on the diurnal temperature range (DTR) over China. Significant positive feedbacks on Tmax and the DTR occupy many areas of China with the feedback parameters exceeding 1°C (0.1 NDVI)–1, while significant negative effects only appear over the summertime climatic and ecological transition zone of northern China and some other isolated areas. Also, the vegetation feedbacks are found to vary with season. In areas where significant feedbacks occur, vegetation contributes to typically 10%–30% of the total variances in Tmax, Tmin, and the DTR. These findings suggest that vegetation memory offers the potential for improving monthly-to-seasonal forecasting of Tmax and Tmin, and the associated temperature extremes over China. Meanwhile, the limitations and uncertainties of the study should be recognized.  相似文献   
865.
<正> Carvalho,Lucchesi and Murty proved that any 1-extendable graph G different from K_2and C_(2n)has at least Δ(G)edge-disjoint removable ears,and any brick G distinct from K_4 and■hasat least Δ(G)-2 removable edges,where Δ(G)denotes the maximum degree of G.In this paper,weimprove the lower bounds for numbers of removable ears and removable edges of 1-extendable graphs.It is proved that any 1-extendable graph G different from K_2 and C_(2n)has at least χ′(G)edge-disjointremovable ears,and any brick G distinct from K_4 and■has at least χ′(G)-2 removable edges,whereχ′(G)denotes the edge-chromatic number of G.  相似文献   
866.
文章通过分析积分公式数模在公路测量放线中的应用,主要论述了CASIO5800在计算器中的应用.  相似文献   
867.
The aim of this paper is to explore an explicit use of the concept of sustainability within transport planning. This paper analyses the concept of sustainability based on a practical approach for a sustainable development of Nordhavn, an area of Copenhagen, exemplifying a complex planning problem. An exploration of the application of the concept of sustainability is carried out using elements of Soft Systems Methodology (SSM). This approach indicates a need to separate the use of sustainability considerations regarding the transport planning ‘process’ from the transport planning ‘results’. The two approaches are related to the planning levels presented by Ulrich (Syst Prac 1(4):415–428, 1988). It was chosen to focus on the understanding of a sustainable transport planning process. This focus is addressed by four stakeholder groups interviewed based on the ‘ought to’ mode of Critical Systems Heuristics (CSH). Finally an outline of some of the factors of a sustainable transport planning process is proposed.  相似文献   
868.
The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated key exchange (3PAKE) protocol. This CLC protocol provides a superior round efficiency (only three rounds), and its resources required for computation are relatively few. However, we find that the leakage of values A V and B V in the CLC protocol will make a man-in-the-middle attack feasible in practice, where A V and B V are the authentication information chosen by the server for the participants A and B. In this paper, we describe our attack on the CLC protocol and further present a modified 3PAKE protocol, which is essentially an improved CLC protocol. Our protocol can resist attacks available, including man-in-the-middle attack we mount on the initial CLC protocol. Meanwhile, we allow that the participants choose their own passwords by themselves, thus avoiding the danger that the server is controlled in the initialization phase. Also, the computational cost of our protocol is lower than that of the CLC protocol.  相似文献   
869.
通过对上海市小学语文教材用字的全面统计后发现,不论是用字的总量还是用字的字种数都存在问题:用字的总量太少,用字的字种数太多.这说明教材编写与课程标准的制定都还需要进一步的研究,都需要提高其操作的科学性.  相似文献   
870.
A pre-processing procedure is designed for a space-surface bistatic synthetic aperture radar (SS-BSAR) system when a time domain image formation algorithm is employed. Three crucial technical issues relating to the procedure are fully discussed. Firstly, unlike image formation algorithms operating in the frequency domain, a time domain algorithm requires the accurate global navigation satellite system (GNSS) time and position. This paper proposes acquisition of this information using a time-and-spatial transfer with precise ephemeris and interpolation. Secondly, synchronization errors and compensation methods in SS-BSAR are analyzed. Finally, taking the non-ideal factors in the echo and the compatibility of image formation algorithms into account, a matched filter based on the minimum delay is constructed. Experimental result using real data suggest the pre-processing is functioning properly.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号