首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13575篇
  免费   465篇
  国内免费   752篇
系统科学   524篇
丛书文集   486篇
教育与普及   364篇
理论与方法论   53篇
现状及发展   97篇
研究方法   59篇
综合类   13201篇
自然研究   8篇
  2024年   102篇
  2023年   156篇
  2022年   244篇
  2021年   330篇
  2020年   180篇
  2019年   87篇
  2018年   142篇
  2017年   159篇
  2016年   169篇
  2015年   322篇
  2014年   459篇
  2013年   475篇
  2012年   505篇
  2011年   568篇
  2010年   492篇
  2009年   565篇
  2008年   631篇
  2007年   624篇
  2006年   485篇
  2005年   520篇
  2004年   417篇
  2003年   363篇
  2002年   460篇
  2001年   447篇
  2000年   432篇
  1999年   730篇
  1998年   537篇
  1997年   623篇
  1996年   544篇
  1995年   506篇
  1994年   472篇
  1993年   395篇
  1992年   337篇
  1991年   314篇
  1990年   272篇
  1989年   251篇
  1988年   217篇
  1987年   132篇
  1986年   74篇
  1985年   28篇
  1984年   8篇
  1983年   3篇
  1982年   3篇
  1980年   5篇
  1976年   2篇
  1969年   1篇
  1965年   1篇
  1962年   1篇
  1955年   1篇
  1947年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been proved yet, most cryptographic researchers believe that one-way functions exist. In addition, many candidates for one-way functions have been proposed. Therefore, the key step for developing real-valued cipher systems is to define real one-way functions and to propose candidates for them. In this paper, based on computational complexity theory over the real field, we give two definitions of real one-way functions; one is for digital one-way functions and the other is for general one-way functions. Candidates for these two classes of one-way functions are also proposed. Moreover, we present two examples to demonstrate that the candidates for both digital one-way functions and general one-way functions can be applied to construct secure real-valued cipher systems.  相似文献   
82.
This paper investigates the termination problems of multi-path polynomial programs (MPPs) with equational loop guards. To establish sufficient conditions for termination and nontermination simultaneously, the authors propose the notion of strong/weak non-termination which under/over- approximates non-termination. Based on polynomial ideal theory, the authors show that the set of all strong non-terminating inputs (SNTI) and weak non-terminating inputs (WNTI) both correspond to tile real varieties of certain polynomial ideals. Furthermore, the authors prove that the variety of SNTI is computable, and under some sufficient conditions the variety of WNTI is also computable. Then by checking the computed SNTI and WNTI varieties in parallel, termination properties of a consid- ered MPP can be asserted. As a consequence, the authors establish a new framework for termination analysis of MPPs.  相似文献   
83.
本文总结了小学应用题教学中的一般规律,只要我们能领会它的规律,遵循小学生思维发展的规律和认知特点,在教学中结合本班学生基础能力的实际情况,灵活变通地开展教学活动,定能培养起学生的学习兴趣,有效地提高学生解答应用题的能力.  相似文献   
84.
Piperidine absorbs CO2 and H2O in air to form a molecular complex: piperidium-l-piperidinecarboxylate-H2O. The structure of the complex was characterized by X-ray single crystal diffraction. The crystal structure was determined to be triclinic, space group P1^-with a=0.648 6(8) nm, b=0.809 200) nm, c= 1.357 1(16) nm, a=96.96706)°, β =102.506(15)°,γ=104.202 05)°, Z=2. The complex is stabilized via five hydrogen bonds between the three components, N-O electrostatic interaction and O-O interaction (electron transfer) betweenl-piperidinecarboxylate and H2O. Due to electron transference of carbamate ion, the oxygen atom in water molecule is strongly negatively charged and the O-H bond is considerably shorter than that of the free molecule of water. The formation of the molecular complex is a reversible process and will decompose upon heating. The mechanism of formation and stabilization is further investigated herein.  相似文献   
85.
Agent-based scheduling refers to applying intelligent agents to autonomously allocate resources to jobs.Decentralized agent-based scheduling approaches have ach...  相似文献   
86.
针对时间反演(time reversal, TR)技术无法较好地解决聚焦区内非法用户窃听的问题,提出了一种TR技术联合接收端人工噪声的物理层安全传输方案。首先,利用时间反演技术的空时聚焦性提高合法用户接收端的信噪比(signal to noise ratio, SNR)。其次,通过在接收端加入人工噪声来干扰非法用户对合法用户保密信息的窃听,以聚焦区内外系统安全性能为基础,推导出保密信干噪比(signal to interference plus noise ratio, SINR)、可达保密速率和误码率(bit error rate, BER)的解析表达式。最后,通过仿真分析证明了所提方案能提高系统的SINR和可达保密速率,同时还能降低合法用户的BER,使系统拥有更好的安全性能。  相似文献   
87.
柔性制造系统在工业发展中的作用越来越大,而如何使柔性制造系统发挥最大的功效则是现阶段面临的一个主要问题。文章基于蚁群思想,提出了一种融合网格法的蚁群算法来求解柔性制造系统工艺路线优化配置的方法。算例结果证明,该算法能使系统设备工作负荷达到均衡,从而提高系统工作效率。  相似文献   
88.
Mutations of cystic fibrosis transmembrane conductance regulator (CFTR) cause cystic fibrosis, the most common life-limiting recessive genetic disease among Caucasians. CFTR mutations have also been linked to increased risk of various cancers but remained controversial for a long time. Recent studies have begun to reveal that CFTR is not merely an ion channel but also an important regulator of cancer development and progression with multiple signaling pathways identified. In this review, we will first present clinical findings showing the correlation of genetic mutations or aberrant expression of CFTR with cancer incidence in multiple cancers. We will then focus on the roles of CFTR in fundamental cellular processes including transformation, survival, proliferation, migration, invasion and epithelial–mesenchymal transition in cancer cells, highlighting the signaling pathways involved. Finally, the association of CFTR expression levels with patient prognosis, and the potential of CFTR as a cancer prognosis indicator in human malignancies will be discussed.  相似文献   
89.
Adaptive immunity critically contributes to control acute infection with enteropathogenic Yersinia pseudotuberculosis; however, the role of CD4+ T cell subsets in establishing infection and allowing pathogen persistence remains elusive. Here, we assessed the modulatory capacity of Y. pseudotuberculosis on CD4+ T cell differentiation. Using in vivo assays, we report that infection with Y. pseudotuberculosis resulted in enhanced priming of IL-17-producing T cells (Th17 cells), whereas induction of Foxp3+ regulatory T cells (Tregs) was severely disrupted in gut-draining mesenteric lymph nodes (mLNs), in line with altered frequencies of tolerogenic and proinflammatory dendritic cell (DC) subsets within mLNs. Additionally, by using a DC-free in vitro system, we could demonstrate that Y. pseudotuberculosis can directly modulate T cell receptor (TCR) downstream signaling within naïve CD4+ T cells and Tregs via injection of effector molecules through the type III secretion system, thereby affecting their functional properties. Importantly, modulation of naïve CD4+ T cells by Y. pseudotuberculosis resulted in an enhanced Th17 differentiation and decreased induction of Foxp3+ Tregs in vitro. These findings shed light to the adjustment of the Th17-Treg axis in response to acute Y. pseudotuberculosis infection and highlight the direct modulation of CD4+ T cell subsets by altering their TCR downstream signaling.  相似文献   
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号