首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   49813篇
  免费   1226篇
  国内免费   2035篇
系统科学   1849篇
丛书文集   1848篇
教育与普及   2040篇
理论与方法论   229篇
现状及发展   250篇
研究方法   184篇
综合类   46664篇
自然研究   10篇
  2024年   333篇
  2023年   665篇
  2022年   846篇
  2021年   1052篇
  2020年   612篇
  2019年   219篇
  2018年   388篇
  2017年   542篇
  2016年   482篇
  2015年   1076篇
  2014年   1536篇
  2013年   1382篇
  2012年   1596篇
  2011年   1866篇
  2010年   1734篇
  2009年   2119篇
  2008年   2442篇
  2007年   2279篇
  2006年   1767篇
  2005年   1761篇
  2004年   1251篇
  2003年   1061篇
  2002年   1051篇
  2001年   1243篇
  2000年   1421篇
  1999年   2636篇
  1998年   2476篇
  1997年   2595篇
  1996年   2376篇
  1995年   2072篇
  1994年   1957篇
  1993年   1701篇
  1992年   1435篇
  1991年   1239篇
  1990年   1092篇
  1989年   977篇
  1988年   794篇
  1987年   513篇
  1986年   290篇
  1985年   106篇
  1984年   30篇
  1983年   8篇
  1982年   7篇
  1981年   3篇
  1979年   5篇
  1974年   6篇
  1973年   4篇
  1970年   4篇
  1968年   3篇
  1966年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
161.
A simplified closed-form analytic solution for UWB impulse signal transmitting through a finitely conducting slab is proposed. The approach first requires evaluating the impulse response of the slab and then convolving it with the specified incident field waveform. To obtain the impulsive transmitting field, either for vertical or horizontal polarization, approximations to the refraction coefficients and propagation loss are made, which can be proved to be accurate enough, comparing with their frequency domain solutions. Thereby, it permits simplified closed-form expressions in the time domain for both terms. The resulting transient response for the transmitting impulse field is then given by convolution of the time domMn refraction coefficients and time domain propagation loss. A numerical example of an incident monocyele transmitting through a slab using this technique, is presented, to illustrate the effective use of the method.  相似文献   
162.
Two pairs of approximation operators, which are the scale lower and upper approximations as well as the real line lower and upper approximations, are defined. Their properties and antithesis characteristics are analyzed. The rough function model is generalized based on rough set theory, and the scheme of rough function theory is made more distinct and complete. Therefore, the transformation of the real function analysis from real line to scale is achieved. A series of basic concepts in rough function model including rough numbers, rough intervals, and rough membership functions are defined in the new scheme of the rough function model. Operating properties of rough intervals similar to rough sets are obtained. The relationship of rough inclusion and rough equality of rough intervals is defined by two kinds of tools, known as the lower (upper) approximation operator in real numbers domain and rough membership functions. Their relative properties are analyzed and proved strictly, which provides necessary theoretical foundation and technical support for the further discussion of properties and practical application of the rough function model.  相似文献   
163.
The consistency measurement and weight estimation approach of the hybrid uncertain comparison matrix in the analytic hierarchy process (AHP) are studied. First, the decision-making satisfaction membership function is defined based on the decision making's allowable error. Then, the weight model based on the maximal satisfactory consistency idea is suggested, and the consistency index is put forward. Moreover, the weight distributing value model is developed to solve the decision making misleading problem since the multioptimization solutions in the former model. Finally, the weights are ranked based on the possibility degree approach to obtain the ultimate order.  相似文献   
164.
A new controller design problem of networked control systems with packet dropping is proposed. Depending on the place that the observer is put in the system, the network control systems with packet dropping are modeled as stochastic systems with the random variables satisfying the Bernoulli random binary distribution. The observer-based controller is designed to stabilize the networked system in the sense of mean square, and the prescribed H∞ disturbance attenuation level is achieved. The controller design problem is formulated as the feasibility of the convex optimization problem, which can be solved by a linear matrix inequality (LMI) approach. Numerical examples illustrate the effectiveness of the proposed methods.  相似文献   
165.
Public spending is a major policy tool for the government to adjust the macro economic progress. This paper characterizes the effects of shocks in government spending and taxes on Chinese economy growth since 1978. It does so by using a mixed structural VAR (SVAR) approach. Identification is achieved by using institutional information about the tax and spending to identify automatic and discretionary response, and by implication, to infer fiscal shocks. The results show positive government spending shocks as having a positive effect on output, and positive tax shocks as having a negative effects.  相似文献   
166.
In rough communication, because each agent has a different language and cannot provide precise communication to each other, the concept translated among multi-agents will loss some information and this results in a less or rougher concept. With different translation sequences, the problem of information loss is varied. To get the translation sequence, in which the jth agent taking part in rough communication gets maximum information, a simulated annealing algorithm is used. Analysis and simulation of this algorithm demonstrate its effectiveness.  相似文献   
167.
The paper is concerned with positive observer design for positive Markovian jump systems with partly known transition rates. By applying a linear co-positive type Lyapunov-Krasovskii function, a sufficient condition is proposed to ensure the stochastic stability of the error positive system and the existence of the positive observer, which is computed in linear programming. Finally, an example is given to demonstrate the validity of the main results.  相似文献   
168.
Hybrid systems are dynamical systems with interacting discrete computation and continuous physical processes, which have become more common, more indispensable, and more complicated in our modern life. Particularly, many of them are safety-critical, and therefore are required to meet a critical safety standard. Invariant generation plays a central role in the verification and synthesis of hybrid systems. In the previous work, the fourth author and his coauthors gave a necessary and sufficient condition for a semi-algebraic set being an invariant of a polynomial autonomous dynamical system, which gave a confirmative answer to the open problem. In addition, based on which a complete algorithm for generating all semi-algebraic invariants of a given polynomial autonomous hybrid system with the given shape was proposed. This paper considers how to extend their work to non-autonomous dynamical and hybrid systems. Non-autonomous dynamical and hybrid systems are with inputs, which are very common in practice; in contrast, autonomous ones are without inputs. Furthermore, the authors present a sound and complete algorithm to verify semi-algebraic invariants for non-autonomous polynomial hybrid systems. Based on which, the authors propose a sound and complete algorithm to generate all invariants with a pre-defined template.  相似文献   
169.
Cascading failures often occur in congested complex networks. Cascading failures can be expressed as a three-phase process: generation, diffusion, and dissipation of congestion. Different from the betweenness centrality, a congestion function is proposed to represent the extent of congestion on a given node. Inspired by the restart process of a node, we introduce the concept of “delay time,” during which the overloaded node cannot receive or forward any traffic, so an intergradation between permanent removal and nonremoval is built and the flexibility of the presented model is demonstrated. Considering the connectivity of a network before and after cascading failures is not cracked because the overloaded node are not removed from network permanently in our model, a new evaluation function of network efficiency is also proposed to measure the damage caused by cascading failures. Finally, we investigate the effects of network structure and size, delay time, processing ability, and traffic generation speed on congestion propagation. Cascading processes composed of three phases and some factors affecting cascade propagation are uncovered as well.  相似文献   
170.
A digraph D(V, E) is said to be graceful if there exists an injection f : V(G) →{0, 1,... , |E|} such that the induced function f' : E(G) --~ {1, 2,… , |E|} which is defined by f' (u, v) = [f(v) - f(u)] (rood |E|+ 1) for every directed edge (u, v) is a bijection. Here, f is called a graceful labeling (graceful numbering) of D(V, E), while f' is called the induced edge's graceful labeling of D. In this paper we discuss the gracefulness of the digraph n- Cm and prove that n. Cm is a graceful digraph for m = 15, 17 and even  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号