首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5463篇
  免费   618篇
系统科学   1073篇
理论与方法论   276篇
现状及发展   879篇
研究方法   10篇
综合类   3843篇
  2021年   1篇
  2018年   727篇
  2017年   732篇
  2016年   430篇
  2015年   31篇
  2014年   3篇
  2013年   4篇
  2012年   259篇
  2011年   952篇
  2010年   815篇
  2009年   454篇
  2008年   509篇
  2007年   765篇
  2006年   4篇
  2005年   41篇
  2004年   123篇
  2003年   150篇
  2002年   59篇
  2000年   2篇
  1999年   1篇
  1996年   1篇
  1994年   4篇
  1993年   1篇
  1991年   3篇
  1986年   1篇
  1985年   2篇
  1984年   1篇
  1982年   1篇
  1981年   1篇
  1979年   1篇
  1976年   2篇
  1967年   1篇
排序方式: 共有6081条查询结果,搜索用时 31 毫秒
911.
A method of sequence-based typing (SBT) has been adopted to assort types of exons 2 and 3, which have the most polymorphism, of HLA-B locus of the Tujia nation group in Hubei province. The correlation among the HLA-B alleles, human papillomavirus (HPV) infection and cervical cancer risk has also been investigated. Under the condition of resident location and age, race unified, 100 specimens of cancer patients were sampled as a case group, of which 86 were HPV positive and were screened for HLA-B alleles; while 187 specimens were taken from healthy people, of which 92 were HPV negative as a control group. The result shows that by comparing the above mentioned 86 HPV positive cervical cancer group and 92 HPV negative normal group, it was concluded that HLA-B*6701 was only found in the cervical cancer group (p < 0.034), which shows that HLA-B*6701 can be used as an important candidate biological marking gene for generation of cervical cancer in Wufeng county of Hubei province.  相似文献   
912.
The Sutong Bridge, a cable-stayed located in the southeast coastal area of China, is vulnerable to the Pacific typhoons. From the data measured by two 3D ultrasonic anemometers at the height of 76 m and 306 m, the wind characteristics (including 10-minute mean wind speed and direction, turbulence intensity and gust factor, power spectral density and integral scale of turbulence) of Typhoon Kalmaegi are analyzed The comparison of 10-minute mean wind velocity from the two anemometers validates the reliability...  相似文献   
913.
We study the functions with low differential uniformity, and concentrates mainly on the properties of perfect nonlinear (PN) functions, including the properties of the derivative of the components of those functions. Some sufficient and necessary conditions have been explored to judge when a function is a PN function. These conditions may be useful in constructing new PN functions. We also construct some functions with differential 4-uniformity that have rarely been studied in the literature. Some of the constructed functions with differential 4-uniformity have high nonlinearity as well. Finally, a class of functions with differential 4-uniformity which are not extended affine equivalent to any power functions are constructed.  相似文献   
914.
Generalized ridge estimation of a semiparametric regression model   总被引:1,自引:0,他引:1  
We considered the following semiparametric regres-sion model yi = X iT β+ s ( t i ) + ei (i =1,2,,n). First,the general-ized ridge estimators of both parameters and non-parameters are given without a restrained design matrix. Second,the generalized ridge estimator will be compared with the penalized least squares estimator under a mean squares error,and some conditions in which the former excels the latter are given. Finally,the validity and feasibility of the method is illustrated by a simulation example.  相似文献   
915.
A Kleene-Stone algebra is a bounded distributive lattice with two unary operations that make it a Kleene and a Stone algebra. In this paper, we study the properties of the prime ideals in a Kleene-Stone algebra and characterize the class of Kleene-Stone algebras that are congruence permutable by means of the dual space of a Kleene-Stone algebra and then show that a finite Kleene-Stone algebra is congruence permutable if and only if it is isomorphic to a direct product of finitely many simple algebras.  相似文献   
916.
So far, most of the proposed group key exchange (GKE) protocols do not consider the attack when the adversary reveals the parties’ephemeral private keys without their long-term private keys, so these GKE protocols are insecure on this attack. In this paper, for resisting above attack, we propose a dynamic authenticated group key exchange (AGKE) protocol in the ID-based setting. Different from previous ID-based protocols, our protocol does not utilize bilinear pairings, which makes it more efficient. At last, we analyze the security of the protocol in the eCK (enhanced Canetti-Krawczyk) security model.  相似文献   
917.
<正> This paper formulates and analyzes a line search method for general nonlinear equalityconstrained optimization based on filter methods for step acceptance and secant methods for searchdirection.The feature of the new algorithm is that the secant algorithm is used to produce a searchdirection,a backtracking line search procedure is used to generate step size,some filtered rules areused to determine step acceptance,second order correction technique is used to reduce infeasibility andovercome the Maratos effect.Global convergence properties of this method are analyzed:under mildassumptions it is showed that every limit point of the sequence of iterates generated by the algorithmis feasible,and that there exists at least one limit point that is a stationary point for the problem.Moreover,it is also established that the Maratos effect can be overcome in our new approach by addingsecond order correction steps so that fast local superlinear convergence to a second order sufficient localsolution is achieved.Finally,the results of numerical experiments are reported to show the effectivenessof the line search filter secant method.  相似文献   
918.
<正> This work is concerned with rates of convergence of numerical methods using Markov chainapproximation for controlled diffusions with stopping (the first exit time from a bounded region).In lieuof considering the associated finite difference schemes for Hamilton-Jacobi-Bellman (HJB) equations,a purely probabilistic approach is used.There is an added difficulty due to the boundary condition,which requires the continuity of the first exit time with respect to the discrete parameter.To prove theconvergence of the algorithm by Markov chain approximation method,a tangency problem might arise.A common approach uses certain conditions to avoid the tangency problem.Here,by modifying thevalue function,it is demonstrated that the tangency problem will not arise in the sense of convergencein probability and in L~1.In addition,controlled diffusions with a discount factor is also treated.  相似文献   
919.
<正> This paper considers finite-time χ-consensus problem for a multi-agent system with firstorderindividual dynamics and switching interaction topologies.Several distributed finite-time consensusrules are constructed for multi-agent dynamics in a unified way with the help of Lyapunovfunction and graph theory as well as homogeneity.Time-invariant non-smooth forms of finite-timeneighbor-based controllers are proposed and a numerical example is shown for illustration.  相似文献   
920.
<正> This paper proposes a systematic design method of overlap frequency domain equalization(FDE) for single carrier (SC) transmission without a guard interval (GI).Based on the analysis of signal-to-interference-plus-noise ratio (SINR) of the equalizer output for each symbol,the authors adaptivelydetermine the block of the overlap FDE,where the block is defined as a set of symbols at the equalizeroutput with sufficiently low error rate,for a certain fixed sliding window size,which corresponds toa fast Fourier transform (FFT) window size.The proposed method takes advantage of the fact thatthe utility part of the equalized signal is localized around the center of the FFT window.In addition,the authors also propose to adjust the block size in order to control the computational complexity ofthe equalization per processed sample associating with the average bit error rate (BER) of the system.Simulation results show that the proposed scheme can achieve comparable BER performance to theconventional SC-FDE scheme with sufficient GI insertion for both the coded and uncoded cases withvarious modulation levels,while requiring lower computational complexity compared to the SC overlapFDE transmission with the fixed block.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号