首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5538篇
  免费   619篇
  国内免费   7篇
系统科学   1077篇
丛书文集   1篇
理论与方法论   275篇
现状及发展   899篇
研究方法   17篇
综合类   3890篇
自然研究   5篇
  2021年   2篇
  2020年   4篇
  2019年   7篇
  2018年   730篇
  2017年   734篇
  2016年   434篇
  2015年   33篇
  2014年   8篇
  2013年   5篇
  2012年   263篇
  2011年   960篇
  2010年   817篇
  2009年   454篇
  2008年   509篇
  2007年   770篇
  2006年   6篇
  2005年   46篇
  2004年   130篇
  2003年   153篇
  2002年   59篇
  2001年   7篇
  2000年   3篇
  1999年   3篇
  1997年   1篇
  1994年   2篇
  1992年   1篇
  1991年   6篇
  1987年   1篇
  1986年   1篇
  1980年   3篇
  1979年   2篇
  1978年   1篇
  1976年   1篇
  1972年   1篇
  1971年   1篇
  1970年   1篇
  1969年   1篇
  1968年   1篇
  1967年   2篇
  1966年   1篇
排序方式: 共有6164条查询结果,搜索用时 46 毫秒
991.
Behavior requirement expression and its satisfiability verification for composite Web services is one of the ongoing issues in service computing.In this paper,the concept of behavior specifications based on activity sequence is proposed to express one kind of behavioral requirements for composite Web services.Its basic element is activity sequence.The method to express such behavioral requirements by behavioral modes is presented.Five behavioral modes used in this method are adopted.Through mapping modes to Labeled Transition Systems(LTSs),these modes are encoded with exact operation semantics.Then,the sufficient and necessary conditions as well as the checking algorithm for satisfiability of behavioral modes are given.Finally,an example analysis is presented.The result indicates that the behavioral requirements based on activity sequence are more suitable for the case of composite Web service than those based on activity or scenario.The behavioral modes expressions are concise and the satisfiability checking is effective by the given algorithm.  相似文献   
992.
With supercritical CO2 fluid extraction(SCFE), essential oil was extracted from three cultivars of Xianning osmanthus. The fresh osmanthus flower was processed with a petroleum ether digestion method to produce the extractum. The yields of essential oil and extractum were 0.19 % and 0.13 % (m/m) respectively. The essential oil and fragrance composition and content extracted were analyzed with gas chromatography-mass spectrometer (GC-MS). The result showed that essential oil contained 36.99%(area/total area) of ionone, ionol and 13.11% of linalool; ionone and ionol contained in extractum were as high as up to 33.33%, while linalool up to 21.92%. Whether essential oil or extractum contains only about 40% fat acid and other ester matters. None of environmental estrogen (phthalic ester) was found in fragrance ingredients. The result also showed that the quality of O. fragrans Albus group fragrance in Xianning is better than that produced in Hangzhou and Anhui districts.  相似文献   
993.
In Cloud computing,data and service requests are responded by remote processes calls on huge data server clusters that are not totally trusted.The new computing pattern may cause many potential security threats.This paper explores how to ensure the integrity and correctness of data storage in cloud computing with user’s key pair.In this paper,we aim mainly at constructing of a quick data chunk verifying scheme to maintain data in data center by implementing a balance strategy of cloud computing costs,removing the heavy computing load of clients,and applying an automatic data integrity maintenance method.In our scheme,third party auditor (TPA) is kept in the scheme,for the sake of the client,to periodically check the integrity of data blocks stored in data center.Our scheme supports quick public data integrity verification and chunk redundancy strategy.Compared with the existing scheme,it takes the advantage of ocean data support and high performance.  相似文献   
994.
Oxide eutectic ceramic in situ composites have attracted significant interest in the application of high-temperature structural materials because of their excellent high-temperature strength, oxidation and creep resistance, as well as outstanding microstructural stability. The directionally solidified ternary Al2O3/YAG/ZrO2 hypereutectic in situ composite was successfully prepared by a laser zone remelting method, aiming to investigate the growth characteristic under ultra-high temperature gradient. The microstructures and phase composition of the as-solidified hypereutectic were characterized by using scanning electron microscopy (SEM), energy dispersive spectroscopy (EDS), and X-ray diffraction (XRD). The results show that the composite presents a typical hypereutectic lamellar microstructure consisting of fine Al2O3 and YAG phases, and the enriched ZrO2 phases with smaller sizes are randomly distributed at the Al2O3/YAG interface and in Al2O3 phases. Laser power and scanning rate strongly affect the sample quality and microstructure characteristic. Additionally, coarse colony microstructures were also observed, and their formation and the effect of temperature gradient on the microstructure were discussed.  相似文献   
995.
Silver in the form of AgNO3 was added to ZnO-based varistor ceramics prepared by the solid-state reaction method. The effects of AgNO3 on both the microstructure and electrical properties of the varistors were studied in detail. The optimum addition amount of AgNO3 in ZnO-based varistors was also determined. The mechanism for grain growth inhibition by silver doping was also proposed. The results indicate that the varistor threshold voltage increases substantially along with the AgNO3 content increasing from 0 to 1.5mol%. Also, the introduction of AgNO3 can depress the mean grain size of ZnO, which is mainly responsible for the threshold voltage. Furthermore, the addition of AgNO3 results in a slight decrease of donor density and a more severe fall in the density of interface states, which cause a decline in barrier height and an increase in the depletion layer.  相似文献   
996.
The dynamics of the globalized multimedia sources and request demands, which requires high computations and bandwidths, makes the IT infrastructure a challenge for live streaming applications. Migrating the system to a geo-distributed cloud and leasing servers is an ideal alternative for supporting large-scale live streaming applications with dynamic contents and demands. The new challenge of multimedia live streaming applications in a geo-distributed cloud is how to efficiently arrange and migrate services among different cloud sites to guarantee the distribute users’ experience at modest costs. This paper first investigates cloud leasing policies for live streaming applications and finds that there is no detailed algorithm to help live streaming applications arrange and migrate services among different cloud sites. Then, we present a quality of service (QoS) guarantee cost-effective cloud leasing policy for live streaming applications. Meanwhile, we design a genetic algorithm (GA) to deal with the leasing policy among cloud sites of diverse lease prices. Experimental results confirm the effectiveness of the proposed model and the efficiency of the involved GA.  相似文献   
997.
Letting a = 1 in a- Wythoff’s game introduced by Fraenkel yields Wythoff’s game which is a well-known 2-player impartial combinatorial game introduced by Wythoff in 1907. A method of solving n-player impartial games was presented by Krawec in 2012. In this paper, we employ Krawec’s function to analyze n > 2 players a-Wythoff’s game and obtain game values for all a 1. The results obtained cover n-player Wythoff’s game, a special case 1-Wythoff’s game.  相似文献   
998.
Shor proposed a quantum polynomial-time integer factorization algorithm to break the RSA public-key cryptosystem. In this paper, we propose a new quantum algorithm for breaking RSA by computing the order of the RSA ciphertext C. The new algorithm has the following properties: 1) recovering the RSA plaintext M from the ciphertext C without factoring n; 2) avoiding the even order of the element; 3) having higher success probability than Shor’s; 4) having the same complexity as Shor’s.  相似文献   
999.
Action recognition is important for understanding the human behaviors in the video, and the video representation is the basis for action recognition. This paper provides a new video representation based on convolution neural networks (CNN). For capturing human motion information in one CNN, we take both the optical flow maps and gray images as input, and combine multiple convolutional features by max pooling across frames. In another CNN, we input single color frame to capture context information. Finally, we take the top full connected layer vectors as video representation and train the classifiers by linear support vector machine. The experimental results show that the representation which integrates the optical flow maps and gray images obtains more discriminative properties than those which depend on only one element. On the most challenging data sets HMDB51 and UCF101, this video representation obtains competitive performance.  相似文献   
1000.
Small or smooth cloned regions are difficult to be detected in image copy-move forgery (CMF) detection. Aiming at this problem, an effective method based on image segmentation and swarm intelligent (SI) algorithm is proposed. This method segments image into small nonoverlapping blocks. A calculation of smooth degree is given for each block. Test image is segmented into independent layers according to the smooth degree. SI algorithm is applied in finding the optimal detection parameters for each layer. These parameters are used to detect each layer by scale invariant features transform (SIFT)-based scheme, which can locate a mass of keypoints. The experimental results prove the good performance of the proposed method, which is effective to identify the CMF image with small or smooth cloned region.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号