首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5470篇
  免费   620篇
  国内免费   2篇
系统科学   1073篇
理论与方法论   275篇
现状及发展   877篇
研究方法   13篇
综合类   3854篇
  2018年   728篇
  2017年   732篇
  2016年   432篇
  2015年   30篇
  2014年   3篇
  2013年   3篇
  2012年   257篇
  2011年   953篇
  2010年   814篇
  2009年   454篇
  2008年   515篇
  2007年   768篇
  2006年   8篇
  2005年   46篇
  2004年   122篇
  2003年   152篇
  2002年   59篇
  2001年   1篇
  2000年   1篇
  1994年   2篇
  1992年   1篇
  1991年   3篇
  1980年   1篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
  1972年   1篇
  1967年   2篇
排序方式: 共有6092条查询结果,搜索用时 62 毫秒
971.
Distribution characteristics of soil organic matter(SOM) and total nitrogen(TN) were studied in different plant communities of the Yajiageng vertical belt in Gongga Mountain around the Dadu River banks. The results show: (1) the contents of SOM and TN of the plant communities gradually decreased with the following order: subalpine coniferous forest (3 027 m), subalpine meadow (3 873 m), coniferous broadleaved mixed forest(2 737 m), subalpine shrub(3 565 m) and treeline(3 564 m). (2) With soil profile depth increasing, the contents of SOM and TN gradually decreased. For different vegetation types, the contents of SOM and TN in sub-alpine coniferous forest were higher than that of other vegetational types. (3)The ratio of the content of carbon to the content of total nitrogen (Cc/CTN)WaS 13.5-27.6, which was relatively lower than the appropriate Cc/CTN of 25-30, and indicated that the soil in favor of the organic matter decomposed and nutrients released. Cc/CTN in the soil had no correlation with sea level altitude. However, its distribution in the soil x, aried with different vegetation types. (4) Nitrogen in SOM existed mainly in the form of organic nitrogen, and Cc/CTN in the soil was not obvious correlated with SOM and TN.  相似文献   
972.
In Chinese question answering system, because there is more semantic relation in questions than that in query words, the precision can be improved by expanding query while using natural language questions to retrieve documents. This paper proposes a new approach to query expansion based on semantics and statistics Firstly automatic relevance feedback method is used to generate a candidate expansion word set. Then the expanded query words are selected from the set based on the semantic similarity and seman- tic relevancy between the candidate words and the original words. Experiments show the new approach is effective for Web retrieval and out-performs the conventional expansion approaches.  相似文献   
973.
This paper studies the existence, uniqueness, and stability of solutions for stochastic impulsive systems. By employing Lyapunov-like functions, some sufficient conditions of the global existence, uniqueness, and stability of solutions for stochastic impulsive systems are established. Furthermore, the results are specialized to the case of linear stochastic impulsive systems. Finally, some examples are given to illustrate the applications of our theory.  相似文献   
974.
A novel approach (HGO-EAC) for hybrid genetic op-timization (GO) with elite ant colony (EAC) is proposed for the automatic modulation recognition of communication signals,through which we improve the basic ant colony algorithms by referencing elite strategy and present a new fusion strategy for genetic optimization and elite ant colony. This approach is used to train the neural networks as the classifier for modulation. Simula-tion results indicate good performance on an additive white Gaus-sian noise (AWGN) channel,with recognition rate reaching to 70% especially for CW even at signal-to-noise ratios as low as 5 dB. This approach can achieve a high recognition rate for the typical modulations such as CW,4ASK,4FSK,BPSK,and QAM16. Test result shows that it has better performance than BP algorithm and basic ant colony algorithms by achieving faster training and stronger robustness.  相似文献   
975.
Workflow management systems are widely used in improving the efficiency of business processes.To develop a workflow management system is the key to workflow modeling.In this paper,the compositional time net is presented to model workflow processes on the basis of the analyzing methods of time Petri nets and workflows,and to describe the static relationships and the dynamic semantics of the task of multiple workflow composition.The paper puts more emphasis on checking the soundness of composed workflow,at the same time,combinational problems of non-conditional structure of the compositional time net are introduced and analyzed.A sufficient and necessary condition for determining the soundness of compositional nets is obtained.  相似文献   
976.
For the problem of the original direct anonymous attestation (DAA) scheme’s complexity and great time consumption, a new DAA scheme based on symmetric bilinear pairings is presented, which gives a practical solution to ECC-based TPM in protecting the privacy of the TPM. The scheme still includes five procedures or algorithms: Setup, Join, Sign, Verify and Rogue tagging, but gets rid of zero-knowledge proof and takes on a new process and framework, of which the main operations are addition, scalar multiplication and bilinear maps on supersingular elliptic curve systems. Moreover, the scheme adequately utilizes the properties of bilinear maps as well as the signature and verification of the ecliptic curve system itself. Compared with other schemes, the new DAA scheme not only satisfies the same properties, and shows better simplicity and high efficiency. This paper gives not only a detailed security proof of the proposed scheme, but also a careful performance analysis by comparing with the existing DAA schemes.  相似文献   
977.
Diethyl malonate being an initial raw material,processed with chlorination-replacement-desalination-vacuum rectification,is used to produce carbonyl diethyl malonate.An experiment for optimization determines that the best reaction condition was:① reaction for 7 h at 10 ℃ with mole-ratio being 2.4︰1 between chloride and raw material(diethyl malonate);② reaction for 4.5 h at 118 ℃ with mole-ratio being 1.2︰1 between the anhydrous sodium acetate and intermediate Ⅰ.The final product carbonyl diethyl malonate recovery ratio reaches up to as high as 79.12% with a purity of 96.4%,which meets the market requirement.This synthesis technique has the advantages of simple process,moderate reaction conditions,high yield and low cost,being suitable for industrial scale production.  相似文献   
978.
Under the foundation of Hermitean Clifford setting,we define the fundamental operators for complex Clifford algebra valued functions,obtain some properties of these operators,and discuss a representation of sl(2;C) on Clifford algebra of even dimension.  相似文献   
979.
Behavior requirement expression and its satisfiability verification for composite Web services is one of the ongoing issues in service computing.In this paper,the concept of behavior specifications based on activity sequence is proposed to express one kind of behavioral requirements for composite Web services.Its basic element is activity sequence.The method to express such behavioral requirements by behavioral modes is presented.Five behavioral modes used in this method are adopted.Through mapping modes to Labeled Transition Systems(LTSs),these modes are encoded with exact operation semantics.Then,the sufficient and necessary conditions as well as the checking algorithm for satisfiability of behavioral modes are given.Finally,an example analysis is presented.The result indicates that the behavioral requirements based on activity sequence are more suitable for the case of composite Web service than those based on activity or scenario.The behavioral modes expressions are concise and the satisfiability checking is effective by the given algorithm.  相似文献   
980.
In Cloud computing,data and service requests are responded by remote processes calls on huge data server clusters that are not totally trusted.The new computing pattern may cause many potential security threats.This paper explores how to ensure the integrity and correctness of data storage in cloud computing with user’s key pair.In this paper,we aim mainly at constructing of a quick data chunk verifying scheme to maintain data in data center by implementing a balance strategy of cloud computing costs,removing the heavy computing load of clients,and applying an automatic data integrity maintenance method.In our scheme,third party auditor (TPA) is kept in the scheme,for the sake of the client,to periodically check the integrity of data blocks stored in data center.Our scheme supports quick public data integrity verification and chunk redundancy strategy.Compared with the existing scheme,it takes the advantage of ocean data support and high performance.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号