首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15113篇
  免费   990篇
  国内免费   498篇
系统科学   1420篇
丛书文集   245篇
教育与普及   194篇
理论与方法论   304篇
现状及发展   910篇
研究方法   46篇
综合类   13480篇
自然研究   2篇
  2024年   65篇
  2023年   134篇
  2022年   177篇
  2021年   205篇
  2020年   142篇
  2019年   73篇
  2018年   805篇
  2017年   832篇
  2016年   543篇
  2015年   275篇
  2014年   316篇
  2013年   286篇
  2012年   567篇
  2011年   1293篇
  2010年   1153篇
  2009年   842篇
  2008年   930篇
  2007年   1260篇
  2006年   392篇
  2005年   524篇
  2004年   413篇
  2003年   374篇
  2002年   327篇
  2001年   299篇
  2000年   303篇
  1999年   489篇
  1998年   458篇
  1997年   498篇
  1996年   437篇
  1995年   347篇
  1994年   320篇
  1993年   275篇
  1992年   283篇
  1991年   227篇
  1990年   224篇
  1989年   185篇
  1988年   142篇
  1987年   112篇
  1986年   59篇
  1985年   9篇
  1984年   1篇
  1978年   2篇
  1968年   1篇
  1967年   1篇
  1957年   1篇
排序方式: 共有10000条查询结果,搜索用时 328 毫秒
881.
The state transfer under control fields is analyzed based on the Bloch sphere representation of a single qubit. In order to achieve the target from an arbitrary initial state to a target state, the conditions that parameters should satisfy are deduced separately in two different requirements: One is in the case of the rotation angle around the x-axis being fixed and another is in the situation with a given evolution time. Several typical states trajectories are demonstrated by numerical simulations on the Bloch sphere. The relations between parameters and the trajectories are analyzed.  相似文献   
882.
A rapid process of hybridisation of man and technology, organisation and technology and society and technology is currently sweeping the world. This process requires a way of (scientific) thinking that takes hybrid systems as the starting point. Such an approach makes it increasingly important for hybrid systems to be interlinked, enabling them to exchange and share information through these links. This linking of (hybrid) systems to enable them to exchange and share information can also be denoted as the realisation of interoperability between (hybrid) systems. Five principles from Luhmann’s systems theory can help us understand interoperability. Interoperability enables (hybrid) systems to join random coalitions and networks. The network centric warfare concept is currently the basis for international efforts aimed at the development and application of interoperability that would enable armed forces to act effectively and efficiently. This paper demonstrates what we can learn from Luhmann’s system’s theory.  相似文献   
883.
Changes in the daily maximum (Tmax) and minimum (Tmin) surface air temperatures and the associated temperature extremes have severe consequences on human society and the natural environment. In this study, we assess vegetation effects on mean Tmax and Tmin over China by computing a vegetation feedback parameter using the satellite-sensed Normalized Difference Vegetation Index (NDVI) and observed temperatures for the period 1982–2002. In all seasons, vegetation exerts a much stronger forcing on Tmax than on Tmin, and thus has a substantial effect on the diurnal temperature range (DTR) over China. Significant positive feedbacks on Tmax and the DTR occupy many areas of China with the feedback parameters exceeding 1°C (0.1 NDVI)–1, while significant negative effects only appear over the summertime climatic and ecological transition zone of northern China and some other isolated areas. Also, the vegetation feedbacks are found to vary with season. In areas where significant feedbacks occur, vegetation contributes to typically 10%–30% of the total variances in Tmax, Tmin, and the DTR. These findings suggest that vegetation memory offers the potential for improving monthly-to-seasonal forecasting of Tmax and Tmin, and the associated temperature extremes over China. Meanwhile, the limitations and uncertainties of the study should be recognized.  相似文献   
884.
<正> Carvalho,Lucchesi and Murty proved that any 1-extendable graph G different from K_2and C_(2n)has at least Δ(G)edge-disjoint removable ears,and any brick G distinct from K_4 and■hasat least Δ(G)-2 removable edges,where Δ(G)denotes the maximum degree of G.In this paper,weimprove the lower bounds for numbers of removable ears and removable edges of 1-extendable graphs.It is proved that any 1-extendable graph G different from K_2 and C_(2n)has at least χ′(G)edge-disjointremovable ears,and any brick G distinct from K_4 and■has at least χ′(G)-2 removable edges,whereχ′(G)denotes the edge-chromatic number of G.  相似文献   
885.
The aim of this paper is to explore an explicit use of the concept of sustainability within transport planning. This paper analyses the concept of sustainability based on a practical approach for a sustainable development of Nordhavn, an area of Copenhagen, exemplifying a complex planning problem. An exploration of the application of the concept of sustainability is carried out using elements of Soft Systems Methodology (SSM). This approach indicates a need to separate the use of sustainability considerations regarding the transport planning ‘process’ from the transport planning ‘results’. The two approaches are related to the planning levels presented by Ulrich (Syst Prac 1(4):415–428, 1988). It was chosen to focus on the understanding of a sustainable transport planning process. This focus is addressed by four stakeholder groups interviewed based on the ‘ought to’ mode of Critical Systems Heuristics (CSH). Finally an outline of some of the factors of a sustainable transport planning process is proposed.  相似文献   
886.
天然气具有无污染、资源丰富的特点,它对于我国社会发展具有非常重要的意义与作用。通过数字技术应用以及管道信息化建设可以有效的提高天然气管道的建设水平,实现对天然气的动态管理。文章在分析相关文献的基础上,对我国天然气管道施工的管理系统模式进行了分析和探讨。文章首先明确了施工管理系统的目的及意义,对我国天然气施工管理系统构建的目标进行了阐述,并对天然气施工管理信息业务分析状况进行了探讨,最后对施工管理信息的功能进行了总结,以期对我国社会发展具有一定的借鉴意义。  相似文献   
887.
The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated key exchange (3PAKE) protocol. This CLC protocol provides a superior round efficiency (only three rounds), and its resources required for computation are relatively few. However, we find that the leakage of values A V and B V in the CLC protocol will make a man-in-the-middle attack feasible in practice, where A V and B V are the authentication information chosen by the server for the participants A and B. In this paper, we describe our attack on the CLC protocol and further present a modified 3PAKE protocol, which is essentially an improved CLC protocol. Our protocol can resist attacks available, including man-in-the-middle attack we mount on the initial CLC protocol. Meanwhile, we allow that the participants choose their own passwords by themselves, thus avoiding the danger that the server is controlled in the initialization phase. Also, the computational cost of our protocol is lower than that of the CLC protocol.  相似文献   
888.
In this paper,domain decomposition method(DDM) for numerical solutions of mathematical physics equations is improved into dynamic domain decomposition method(DDDM) . The main feature of the DDDM is that the number,shape and volume of the sub-domains are all flexibly changeable during the iterations,so it suits well to be implemented on a reconfigurable parallel computing system. Convergence analysis of the DDDM is given,while an application approach to a weak nonlinear elliptic boundary value problem and a ...  相似文献   
889.
Within the framework of the regularization theory, a spectral regularization method is introduced and analyzed. The convergence estimate under an appropriate choice of regularization parameter is obtained. A numerical implementation is described. Numerical examples show that the proposed method is effective and stable.  相似文献   
890.
浅析混凝土质量控制   总被引:1,自引:0,他引:1  
通过对混凝土性能的阐述,提出保证混凝土质量的各个环节及因素.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号