首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14844篇
  免费   906篇
  国内免费   512篇
系统科学   1449篇
丛书文集   376篇
教育与普及   196篇
理论与方法论   319篇
现状及发展   913篇
研究方法   39篇
综合类   12967篇
自然研究   3篇
  2024年   64篇
  2023年   112篇
  2022年   165篇
  2021年   231篇
  2020年   125篇
  2019年   58篇
  2018年   795篇
  2017年   828篇
  2016年   539篇
  2015年   258篇
  2014年   330篇
  2013年   346篇
  2012年   580篇
  2011年   1321篇
  2010年   1129篇
  2009年   831篇
  2008年   914篇
  2007年   1168篇
  2006年   360篇
  2005年   425篇
  2004年   423篇
  2003年   395篇
  2002年   356篇
  2001年   296篇
  2000年   307篇
  1999年   493篇
  1998年   379篇
  1997年   462篇
  1996年   375篇
  1995年   369篇
  1994年   348篇
  1993年   291篇
  1992年   247篇
  1991年   231篇
  1990年   195篇
  1989年   184篇
  1988年   136篇
  1987年   101篇
  1986年   59篇
  1985年   25篇
  1984年   6篇
  1983年   2篇
  1982年   1篇
  1980年   1篇
  1967年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
161.
Formal systems engineering approaches to modeling misperceptions and attitudes are employed within the framework of the graph model for conflict resolution to systematically study the War of 1812 between the United States of America and Great Britain in order to provide enhanced insights into the causes of the war. More specifically, relational definitions for preferences, movements and stability concepts are defined for describing the attitudes and associated behavior of decision makers involved in a conflict. To capture misperceptions of decision makers in the War of 1812, attitudes are studied within the structure of a hypergame. Combining attitudes and misperceptions within the paradigm of the graph model furnishes the flexible analytical tool which demonstrates that misunderstanding of attitudes by Great Britain and the United States may have contributed to the outbreak of this nasty war.  相似文献   
162.
Polynomial composition is the operation of replacing variables in a polynomial with other polynomials. λ-Grgbner basis is an especial Grobner basis. The main problem in the paper is: when does composition commute with λ-Grobner basis computation? We shall answer better the above question. This has a natural application in the computation of λ-Grobner bases.  相似文献   
163.
Modeling a business to match its customer perceived (and customer desired) outcomes, remains an on-going task. This paper considers shows how a service value networks (SVNs) approach may be engaged to model, and deliver, understanding of the front-end business and its direct engagement with its immediate (or front-end) customers. These front-end customers may be either: (1) its off-line, in-store customers - engaging directly with the business sales staff (or representative), or-(2) its on-line, virtual customers - engaging with the business via internet or remote access. In this situation, both the business, and the customer draw upon their respective viewpoints, and both sides influence the interaction. External to these business and customer influences are additional factors that capture the immediate and broader global effects - termed environmental effects. These three business-customer engagement areas of influence are captured by a SVN SEM approach.
Without a business-customer encounter of some kind the likelihood of a services business, and a prospecting customer, successfully engaging in an exchange process is reduced. This exchange may be a physical, and/or services exchange, and/or an information and/or ideas exchange. To the business, this encounter is, in effect, a trade, and as a result, the business targets acquiring an economic exchange that will ultimately deliver a net positive economic outcome. To the customer, external and internal information feeds, servicing, perceived value, and satisfaction, are key encounter drivers. SVNs offers a new way to understand the business-customer encounter, and to then utilize this acquired knowledge to either: (1) build a strategic management model, or (2) reengineer its business networks, and to then create a re-positioned, more customer-aligned business operation - one that is capable of delivering win - win, competitive business-customer solutions.  相似文献   
164.
This paper presents a methodology which determines the allocation of power demand among the committed generating units while minimizes number of objectives as well as meets physical and technological system constraints. The procedure considers two decoupled problems based upon the dependency of their goals on either active power or reactive power generation. Both the problems have been solved sequentially to achieve optimal allocation of active and reactive power generation while minimizes operating cost, gaseous pollutants emission objectives and active power transmission loss with consideration of system operating constraints along with generators prohibited operating zones and transmission line flow limits. The active and reactive power line flows are obtained with the help of generalized generation shift distribution factors (GGDF) and generalized Z-bus distribution factors (GZBDF), respectively. First problem is solved in multi-objective framework in which the best weights assigned to objectives are determined while employing weighting method and in second problem, active power loss of the system is minimized subject to system constraints. The validity of the proposed method is demonstrated on 30-bus IEEE power system.  相似文献   
165.
This paper studies the robust H∞ disturbance attenuation with internal stability for uncertain nonlinear control systems. By adding one power integrator technique, this paper designs a explicit smooth robust dynamic feedback law while rejecting the disturbance to any specified degree of accuracy. Further, the example and simulation results show the effectiveness of the proposed schemes.  相似文献   
166.
闫丽梅  张江  陈娟 《系统仿真学报》2007,19(18):4104-4106,4110
系统的脆性分析的关键是要建立脆性模型。图论针对网络系统可以描述出系统脆性传播的方向和权重。提出了基于图论理论的系统脆性模型建立的方法和步骤。针对7节点电力系统进行了理论的建模和分析,求出了分层的电力系统脆性模型和脆性源。证明了此方法对于网络系统分析的有效性。  相似文献   
167.
There are many practical decision problems where decision makers' preferences may be inconsistent and contradictory. In this paper, new methods for ordering and classifying multi-attribute objects by discordant collective preferences are suggested. These methods are based on the theory of multiset metric spaces. The proposed techniques are applied to ranking companies and a competitive selection of projects, which are estimated by several experts upon multiple qualitative criteria.  相似文献   
168.
Company bankruptcies cost billions of dollars in losses to banks each year. Thus credit risk prediction is a critical part of a bank's loan approval decision process. Traditional financial models for credit risk prediction are no longer adequate for describing today's complex relationship between the financial health and potential bankruptcy of a company. In this work, a multiple classifier system (embedded in a multiple intelligent agent system) is proposed to predict the financial health of a company. In our model, each individual agent (classifier) makes a prediction on the likelihood of credit risk based on only partial information of the company. Each of the agents is an expert, but has limited knowledge (represented by features) about the company. The decisions of all agents are combined together to form a final credit risk prediction. Experiments show that our model out-performs other existing methods using the benchmarking Compustat American Corporations dataset.  相似文献   
169.
Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been proved yet, most cryptographic researchers believe that one-way functions exist. In addition, many candidates for one-way functions have been proposed. Therefore, the key step for developing real-valued cipher systems is to define real one-way functions and to propose candidates for them. In this paper, based on computational complexity theory over the real field, we give two definitions of real one-way functions; one is for digital one-way functions and the other is for general one-way functions. Candidates for these two classes of one-way functions are also proposed. Moreover, we present two examples to demonstrate that the candidates for both digital one-way functions and general one-way functions can be applied to construct secure real-valued cipher systems.  相似文献   
170.
In this paper, we investigate the global controllability of a class of n-dimensional affine nonlinear systems with n- 1 controls and constant control matrix. A necessary and sufficient condition for its global controllability has been obtained by using the methods recently developed. Furthermore, we generalize the above result to a class of affine nonlinear systems with a block-triangular-like structure. Finally, we will give three examples to show the applications of our results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号