首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   58129篇
  免费   1514篇
  国内免费   2537篇
系统科学   2201篇
丛书文集   2089篇
教育与普及   2213篇
理论与方法论   278篇
现状及发展   287篇
研究方法   194篇
综合类   54904篇
自然研究   14篇
  2024年   377篇
  2023年   754篇
  2022年   1031篇
  2021年   1230篇
  2020年   752篇
  2019年   310篇
  2018年   487篇
  2017年   673篇
  2016年   642篇
  2015年   1329篇
  2014年   1910篇
  2013年   1774篇
  2012年   2023篇
  2011年   2312篇
  2010年   2147篇
  2009年   2608篇
  2008年   2961篇
  2007年   2803篇
  2006年   2164篇
  2005年   2158篇
  2004年   1525篇
  2003年   1347篇
  2002年   1361篇
  2001年   1533篇
  2000年   1670篇
  1999年   2936篇
  1998年   2705篇
  1997年   2800篇
  1996年   2572篇
  1995年   2232篇
  1994年   2114篇
  1993年   1830篇
  1992年   1528篇
  1991年   1364篇
  1990年   1197篇
  1989年   1075篇
  1988年   868篇
  1987年   554篇
  1986年   311篇
  1985年   111篇
  1984年   34篇
  1983年   10篇
  1982年   8篇
  1979年   5篇
  1974年   6篇
  1973年   4篇
  1970年   4篇
  1968年   4篇
  1966年   3篇
  1957年   4篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
流量工程是应对互联网规模和流量高速增长的必要方法,高效的流量工程受限于流量矩阵的测量和已有路由设备转发能力.结合上述挑战提出了基于大流调度的二维路由流量工程方案,建立了描述二维路由大流调度问题的数学优化模型,使用改进的随机取整算法求得问题的近似解.实现了基于Quagga的二维路由大流调度的原型系统,使用扩展链路状态通告下发路由决策信息.真实实验证明,系统能够实现大流的快速调度.仿真实验结果表明,基于二维路由的大流调度明显优于基于传统一维路由方式的大流调度,并且前者能够达到接近最优的调度结果.真实实验和仿真实验证明,该方案不仅仅实现了更为细粒度的流量调度,而且具有更好的可扩展性以及更低的转发流表开销.  相似文献   
992.
In this paper, adaptive event-based consensus of multi-agent systems with general linear dynamics is considered. A novel adaptive event-based controller and a state-dependent triggering function are proposed for each agent. The consensus can be achieved without the assumption that (A,B) is stabilizable. Furthermore, the Zeno-behavior of the concerned closed-loop system is also excluded under certain conditions. Finally, a numerical simulation example is presented to show the effectiveness of the theoretical results.  相似文献   
993.
This paper explores the investors’ feedback to the price change by modelling the price-related dynamics of trading intensity. A component decomposition duration modeling approach, called the component autoregressive conditional duration (CACD) model, is proposed to capture the variation of trading intensity across time intervals between price change events. Based on the CACD model, an empirical analysis is carried out on the Chinese stock market that covers different market statuses. The empirical results suggest that the CACD model can capture the price-related dynamics of trading intensity, which supports the existence of the feedback effect and is robust across different market statuses. The authors also study how the investors react to the price change by examining the driven factors of the price-related dynamics of trading intensity. The authors find that the trading can be triggered by the fast rise in the price level and the high trading volume. Besides, investors are more sensitive to the price change direction in the sideways market than in the upward or downward markets.  相似文献   
994.
Elliptic PDE-constrained optimal control problems with L1-control cost (L1-EOCP) are considered. To solve L1-EOCP, the primal-dual active set (PDAS) method, which is a special semismooth Newton (SSN) method, used to be a priority. However, in general solving Newton equations is expensive. Motivated by the success of alternating direction method of multipliers (ADMM), we consider extending the ADMM to L1-EOCP. To discretize L1-EOCP, the piecewise linear finite element (FE) is considered. However, different from the finite dimensional l1-norm, the discretized L1-norm does not have a decoupled form. To overcome this difficulty, an effective approach is utilizing nodal quadrature formulas to approximately discretize the L1-norm and L2-norm. It is proved that these approximation steps will not change the order of error estimates. To solve the discretized problem, an inexact heterogeneous ADMM (ihADMM) is proposed. Different from the classical ADMM, the ihADMM adopts two different weighted inner products to define the augmented Lagrangian function in two subproblems, respectively. Benefiting from such different weighted techniques, two subproblems of ihADMM can be efficiently implemented. Furthermore, theoretical results on the global convergence as well as the iteration complexity results o(1/k) for ihADMM are given. In order to obtain more accurate solution, a two-phase strategy is also presented, in which the primal-dual active set (PDAS) method is used as a postprocessor of the ihADMM. Numerical results not only confirm error estimates, but also show that the ihADMM and the two-phase strategy are highly efficient.  相似文献   
995.
This paper considers the use of polar codes to enable secure transmission over parallel relay channels.By exploiting the properties of polar codes over parallel channels, a polar encoding algorithm is designed based on Channel State Information(CSI) between the legitimate transmitter(Alice) and the legitimate receiver(Bob).Different from existing secure transmission schemes, the proposed scheme does not require CSI between Alice and the eavesdropper(Eve). The proposed scheme is proven to be reliable and shown to be capable of transmitting information securely under Amplify-and-Forward(AF) relay protocol, thereby providing security against passive and active attackers.  相似文献   
996.
Masking is one of the most commonly used Side-Channel Attack(SCA) countermeasures and is built on a security framework, such as the ISW framework, and ensures theoretical security through secret sharing.Unfortunately, the theoretical security cannot guarantee practical security, because several possible weaknesses may exist in the actual implementation. These weaknesses likely come from the masking schemes or are introduced by the implementation methods. Finding the possible weakness of the masking scheme is an interesting and important issue for real applications. In this paper, the possible weaknesses for masking schemes in FieldProgrammable Gate Array(FPGA) design are discussed. It was found that the combinational circuit is the key to the security of masking schemes. The Toggle Count(TC) method and its extension are utilized to evaluate the security of masking schemes in the design phase and the implementation phase separately. Comparing different logic-level simulators for the Xilinx FPGA platform, the behavioral and post-translate simulations are considered as the analysis method in the design phase, while the post-map and the post-route simulations are used to find the weakness during the implementation phase. Moreover, a Standard Delay Format(SDF) based improvement scheme is proposed to significantly increase the effectiveness of the TC model.  相似文献   
997.
The Wiener index of a connected graph (molecule graph) G is the sum of the distances between all pairs of vertices of G. In this paper, simple exact formula are established for the expected value of Wiener index in random cyclooctane chain. Moreover, we obtain the average value of the Wiener indices with respect to the set of all cyclooctane chains with n octagons.  相似文献   
998.
采用盆栽试验,测定鸡树条荚!扦插苗和播种苗在干旱胁迫下的生理指标.结果表明:鸡树条荚!嫩枝扦插苗、播种苗和硬枝扦插苗叶片相对含水量(RWC)均呈下降趋势,说明干旱胁迫下鸡树条荚!叶片保水能力较弱;3种鸡树条荚!幼苗叶片可溶性蛋白、游离脯氨酸(Pro)、丙二醛(MDA)、相对电导率和叶绿素含量均表现为先增加后降低的变化规律,各生理指标在第12天和第15天达到峰值.  相似文献   
999.
目的 分析五味子21 a间在国产保健食品中作为原料的应用情况,为进一步研发五味子保健食品提供参考.方法 利用回顾性调查方法,抽取国家食品药品监督管理总局(CFDA)网站中1996—2016年已注册的保健食品信息,建立五味子保健食品专题数据库,分析五味子相关保健食品的功能分布、与之配伍的中药种类、频次、功效成分(或标志性成分)、地区分布及年代分布等.结果 1996—2016年期间含五味子的国产保健食品共有351个,涉及功能20种,配方原料数量最多6种,与五味子配伍使用的原料前5位为枸杞子、酸枣仁、人参、葛根、黄芪,功效成分涉及118种,申请地中前5位依次为北京市、广东省、陕西省、吉林省及黑龙江省.结论 含五味子保健食品的开发总量不足,档次较低,接近食品形态的剂型较少,没有形成基于五味子医药文化及民俗文化的品牌优势.  相似文献   
1000.
目的探讨TEC与EC序贯T方案在乳腺癌术后的临床疗效和安全性.方法入组60例乳腺癌术后化疗患者,按术后所应用的化疗方案划分为TEC组(25例)和EC序贯T组(35例),回顾性分析TEC方案与EC序贯T方案的术后化疗疗效、安全性.结果 TEC方案与EC序贯T方案一般情况如年龄、TMN分期、病理类型、肿瘤直径、分化程度、乳腺癌受体、淋巴转移、远处转移在组间未见显著差异;但EC序贯T方案的3 a无病生存率、总生存期显著高于TEC方案;TEC方案与EC序贯T方案在血液毒性方面、胃肠道反应、疲劳、黏膜炎等方面无显著差异,EC序贯T组的神经毒性显著高于TEC组(P0.001).结论乳腺癌术后EC序贯T方案可以延长乳腺癌患者术后的远期生存期,但神经毒性反应较严重,故在应用此方案的同时,应联用营养神经治疗,并密切观察神经毒性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号