首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9216篇
  免费   706篇
  国内免费   233篇
系统科学   1192篇
丛书文集   115篇
教育与普及   166篇
理论与方法论   284篇
现状及发展   900篇
研究方法   24篇
综合类   7469篇
自然研究   5篇
  2024年   26篇
  2023年   44篇
  2022年   71篇
  2021年   86篇
  2020年   49篇
  2019年   20篇
  2018年   754篇
  2017年   764篇
  2016年   461篇
  2015年   113篇
  2014年   136篇
  2013年   126篇
  2012年   413篇
  2011年   1102篇
  2010年   948篇
  2009年   622篇
  2008年   709篇
  2007年   949篇
  2006年   147篇
  2005年   176篇
  2004年   235篇
  2003年   266篇
  2002年   211篇
  2001年   149篇
  2000年   125篇
  1999年   222篇
  1998年   150篇
  1997年   152篇
  1996年   154篇
  1995年   127篇
  1994年   117篇
  1993年   100篇
  1992年   84篇
  1991年   84篇
  1990年   68篇
  1989年   62篇
  1988年   71篇
  1987年   28篇
  1986年   14篇
  1985年   3篇
  1984年   2篇
  1982年   2篇
  1980年   4篇
  1976年   2篇
  1969年   1篇
  1967年   1篇
  1965年   1篇
  1962年   1篇
  1955年   1篇
  1947年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
本文建立了绳槽磨损的一般微分方程.并通过具体数值计算研究了不同条件下的磨损规律.  相似文献   
992.
A group-oriented (t, n) threshold signature scheme employs the cryptographic techniques of secret share, allows any subset of t players out of n players to sign message on behalf of the group and disallows the creation of a valid signature if fewer than t players take part in the signature protocol. In this paper, we proposed a new group-oriented (t, n) threshold signature schemes with traceable signers based on Schnorr signature. The proposed scheme is proved traceable, robust and unforgeable against the "static" adversary with the discrete logarithm assumption in the random oracle model and existence of broadcast channel. The proofs of the strongest security (existential unforgeability against adaptively chosen message attacks under the discrete logarithm assumption) are provided in the random oracle model.  相似文献   
993.
994.
995.
Traditional approach of design by contract, due to mixing the contract code with application code, is difficult for the extensibility and reusability of software system. This paper presents a framework named JADBC for design by contract based on Aspect-Oriented Programming (AOP) to resolve these problems. By providing a new modularized element, aspect, the framework successfully separates the contracts in design by contract, from functional codes. The implementation of this framework is based on dynamic AOP which can have the contract changed at runtime, consequently, enhancing program flexibility. JADBC framework modularizes the contracts in a clear-cut fashion that is easier to design, implement, and maintain. Biography: WEN Jing (1982–), female, Ph.D. candidate, research directions: software engineer, aspect-oriented software development.  相似文献   
996.
The singularly perturbed initial boundary value problems for the reaction diffusion system are raised. Firstly, under suitable conditions, using a iteration technique, the differential inequalities theorem is constructed and introducing two auxiliary functions the existence and uniqueness theorem of solution for the basic reaction diffusion system is proved. Using the singularly perturbed method the formal asymptotic expressions of the solution are constructed with power series theory. By using the comparison theorem the existence and its asymptotic behavior of solution for the original problem are studied. Finally, using method of estimate inequalities, the structure of solutions for the problem is discussed thoroughly in three cases and asymptotic solution of the original problem is given. The asymptotic behavior of solution in the three cases is proved.  相似文献   
997.
文章主要完成两方面的工作:将特征匹配和极线几何估计有机的结合起来,给出一种基于组合优化的特征点匹配方法;以往两视角关系的校正方法是根据图像的亮度信息,对相邻两幅图像对应的亮度误差最小化,而图像的亮度信息会受到拍摄时的角度、光线及噪声的影响.文章提出一种基于边缘信息的校正方案对RANSAC算法进行改进.实验结果表明,利用边缘信息完全脱离了拍摄光线的影响,该方法很好的降低了噪声的影响.  相似文献   
998.
OPTIMAL MAINTENANCE AND REPLACEMENT OF EXTRACTION MACHINERY   总被引:1,自引:1,他引:0  
This paper considers a problem of optimal preventive maintenance and replacement schedule of equipment devoted to extracting resources from known deposits. Typical examples are oil drills, mine shovels, etc. At most one replacement of the existing machinery by a new one is allowed. The problem is formulated as an optimal control problem subject to the state constraint that the remaining deposit at any given time is nonnegative. We show that the optimal preventive maintenance, production rates, and the replacement and salvage times of the existing machinery and the new one, if required, can be obtained by solving sequentially a series of free-end-point optimal control problems. Moreover, an algorithm based on this result is developed and used to solve two illustrative examples.  相似文献   
999.
A new blind equalization algorithm based on the modified constant modulus algorithm (MCMA) and dithered signederror constant modulus algorithm (DSE-CMA) is proposed. This dithered signed-error MCMA (DSE-MCMA) can not only reduce the computational complexity, but also recover the phase rotation in the complex channel. Simulation results have verified the analysis and indicated the good property of DSE-MCMA.  相似文献   
1000.
对载人航天安全性评价时,需要处理两类不同的数据,即随机性数据和可能性数据。本文根据载人航天过程,初步建立了功能的对象模型,在此基础上,基于模糊规划方法,将两类安全性数据进行了统一处理,并提出了载人航天系统安全性模糊评价的求解方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号