首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15591篇
  免费   1057篇
  国内免费   595篇
系统科学   1592篇
丛书文集   285篇
教育与普及   186篇
理论与方法论   306篇
现状及发展   920篇
研究方法   23篇
综合类   13928篇
自然研究   3篇
  2024年   37篇
  2023年   91篇
  2022年   179篇
  2021年   174篇
  2020年   149篇
  2019年   85篇
  2018年   824篇
  2017年   862篇
  2016年   579篇
  2015年   324篇
  2014年   407篇
  2013年   436篇
  2012年   722篇
  2011年   1448篇
  2010年   1329篇
  2009年   960篇
  2008年   1030篇
  2007年   1356篇
  2006年   462篇
  2005年   464篇
  2004年   564篇
  2003年   683篇
  2002年   878篇
  2001年   695篇
  2000年   426篇
  1999年   444篇
  1998年   231篇
  1997年   236篇
  1996年   207篇
  1995年   163篇
  1994年   176篇
  1993年   127篇
  1992年   114篇
  1991年   114篇
  1990年   70篇
  1989年   84篇
  1988年   52篇
  1987年   30篇
  1986年   20篇
  1985年   3篇
  1984年   2篇
  1983年   1篇
  1982年   2篇
  1981年   1篇
  1980年   1篇
  1967年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
It is well known that considering a non-Euclidean Minkowski metric in Multidimensional Scaling, either for the distance model or for the loss function, increases the computational problem of local minima considerably. In this paper, we propose an algorithm in which both the loss function and the composition rule can be considered in any Minkowski metric, using a multivariate randomly alternating Simulated Annealing procedure with permutation and translation phases. The algorithm has been implemented in Fortran and tested over classical and simulated data matrices with sizes up to 200 objects. A study has been carried out with some of the common loss functions to determine the most suitable values for the main parameters. The experimental results confirm the theoretical expectation that Simulated Annealing is a suitable strategy to deal by itself with the optimization problems in Multidimensional Scaling, in particular for City-Block, Euclidean and Infinity metrics.  相似文献   
82.
The characterization of non-stationary signal requires joint time and frequency information. However, time and frequency are a pair of non-commuting variables that cannot constitute a joint probability density in the time-frequency plane. The time-frequency distributions have difficult interpretation problems arising from negative and complex values or spurious components. In this paper, we get time-frequency information from the marginal distributions in rotated directions in the time-frequency plane. The rigorous probability interpretation of the marginal distributions is without any ambiguities. This time-frequency transformation is similar to the computerized axial tomography (CT or CAT) and is applied to signal analysis and signal detection and reveals a lot of advantages especially in the signal detection of the low signal/noise (S/N).  相似文献   
83.
The participation of non-state actors in implementation processes is often understood as a means to increase compliance efficiency. But the implementation of spatial policies frequently focuses on pre-established goals, processes and instruments and thus renders difficult open discourse and shared decision-making. This paper introduces conflict pattern analysis (CPA) as a tool that supports the analysis of the actual actor constellation in order to define efficient approaches that avoid common problems of participatory processes. CPA is a semi-formalised method that helps to identify key-actors, their relations and interaction amongst each other as well as their core beliefs, interests and resources. It aggregates this information to interaction patterns that can be compared, classified and linked to different participatory methods on a theoretically informed basis. Particularly on the local and regional level, this could be the first step for successful (participatory) implementation strategies.  相似文献   
84.
In this paper, we introduce a new class of generalized convex function, namely, a-pseudounivex function, by combining the concepts of pseudo-univex and α-invex functions. Further, we establish some relationships between vector variational-like inequality problems and vector optimization problems under the assumptions of α-pseudo-univex functions. Results obtained in this paper present a refinement and improvement of previously known results.  相似文献   
85.
The geomagnetic fields, which play important roles in the ionospheric dynamo, can greatly affect the global distribution of ionospheric electric fields, currents and other ionospheric electrodynamics phenomena. In the study of ionospheric electrodynamics phenomena, such as the longitudinal variations of ionospheric electric fields, the non-dipolar component of the geomagnetic fields must be taken into account. In this paper, we deduce a theoretical electric field model for ionospheric dynamo at mid- and low-latitude which adopt a modified magnetic apex coordinates system. In the new electric field model, the geomagnetic fields can be calculated from either the IGRF model or the dipole field model, and the neutral winds and conductivities are calculated based on empirical models. Then the dynamo equation for the electric potential is finally solved in terms of the line-by-line iteration method, and the ionospheric electric fields and currents are derived from the calculated potential. Our model can reproduce the main features of the ionospheric electrodynamics processes, so it will be a useful tool for the investigation of the upper atmosphere and ionosphere.  相似文献   
86.
本文采用血清溶血素测定新方法,对兰州三爱堂解放军第一医院人工发酵培养的冬虫夏草菌丝体进行实验分析。结果表明,对正常小鼠的体液免疫功能无影响,但对由环磷酰胺引起的体液免疫功能低下有明显的恢复,说明该菌丝体与天然虫草有一致的功能。  相似文献   
87.
采用了双参数变分方法,计算了锂原子的基态能量,其结果较用单参数变分方法在精度上有所提高。  相似文献   
88.
针对孝昌县农村人口、土地、区位、粮食、资源等因素,从孝昌县自然社会经济条件出发,分析了孝昌县持续农业和农村发展面临的困境以及潜在优势,探讨了孝昌县持续农业和农村发展的方向,指出持续农业和农村发展的综合举措,旨在谋求贫困县脱贫致富奔小康的路子。  相似文献   
89.
本文介绍立方体结构并行处理系统的原理及可靠性的计算机仿真并给出结果  相似文献   
90.
With the explosive growth of network applications, the threat of the malicious code against network security becomes increasingly serious. In this paper we explore the mechanism of the malicious code by giving an attack model of the maliciouscode, and discuss the critical techniques of implementation and prevention against the malicious code. The remaining problems and emerging trends in this area are also addressed in the paper.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号