首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16023篇
  免费   1047篇
  国内免费   692篇
系统科学   1813篇
丛书文集   223篇
教育与普及   166篇
理论与方法论   317篇
现状及发展   921篇
研究方法   18篇
综合类   14303篇
自然研究   1篇
  2024年   64篇
  2023年   135篇
  2022年   248篇
  2021年   291篇
  2020年   215篇
  2019年   167篇
  2018年   914篇
  2017年   913篇
  2016年   662篇
  2015年   463篇
  2014年   548篇
  2013年   593篇
  2012年   874篇
  2011年   1657篇
  2010年   1563篇
  2009年   1187篇
  2008年   1306篇
  2007年   1517篇
  2006年   691篇
  2005年   640篇
  2004年   564篇
  2003年   428篇
  2002年   357篇
  2001年   278篇
  2000年   246篇
  1999年   242篇
  1998年   134篇
  1997年   135篇
  1996年   114篇
  1995年   102篇
  1994年   92篇
  1993年   64篇
  1992年   80篇
  1991年   66篇
  1990年   59篇
  1989年   50篇
  1988年   50篇
  1987年   33篇
  1986年   7篇
  1985年   3篇
  1983年   1篇
  1981年   1篇
  1980年   3篇
  1977年   1篇
  1969年   1篇
  1967年   1篇
  1966年   1篇
  1955年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
921.
The compound Ba0.615Sr0.35Mg0.035TiO3 was analyzed by the X-ray dispersed spectroscopy analyzer (SEM-EDAX) with the spec-trum image method, a powerful tool for chemical phase identification. The method was first time applied on a ceramic material to collect spectrum image and was progressed to identify the Mg-enriched component with fine scale pocket shown in matrix. This result, together with the stoichiometry result obtained from spot mode spectrum analysis, strongly confirmed the microstructure and properties of dielectric materials.  相似文献   
922.
A rapid process of hybridisation of man and technology, organisation and technology and society and technology is currently sweeping the world. This process requires a way of (scientific) thinking that takes hybrid systems as the starting point. Such an approach makes it increasingly important for hybrid systems to be interlinked, enabling them to exchange and share information through these links. This linking of (hybrid) systems to enable them to exchange and share information can also be denoted as the realisation of interoperability between (hybrid) systems. Five principles from Luhmann’s systems theory can help us understand interoperability. Interoperability enables (hybrid) systems to join random coalitions and networks. The network centric warfare concept is currently the basis for international efforts aimed at the development and application of interoperability that would enable armed forces to act effectively and efficiently. This paper demonstrates what we can learn from Luhmann’s system’s theory.  相似文献   
923.
《刑法修正案(八)》将社区矫正正式写入刑法,但目前我国无论理论上还是实务上,对这一制度的研究与实践均显不成熟。相较世界上多数国家和地区而言,我国在社区矫正的种类上仅限于管制、缓刑、假释与剥夺政治权利五种,不仅规定得过于狭窄,需要拓宽,而且内容上存在诸多缺陷。因此应对我国已有的社区矫正种类进行完善,同时对未有而应有之种类进行构建与创设,从而形成符合我国实际情况的社区矫正种类体系。  相似文献   
924.
Changes in the daily maximum (Tmax) and minimum (Tmin) surface air temperatures and the associated temperature extremes have severe consequences on human society and the natural environment. In this study, we assess vegetation effects on mean Tmax and Tmin over China by computing a vegetation feedback parameter using the satellite-sensed Normalized Difference Vegetation Index (NDVI) and observed temperatures for the period 1982–2002. In all seasons, vegetation exerts a much stronger forcing on Tmax than on Tmin, and thus has a substantial effect on the diurnal temperature range (DTR) over China. Significant positive feedbacks on Tmax and the DTR occupy many areas of China with the feedback parameters exceeding 1°C (0.1 NDVI)–1, while significant negative effects only appear over the summertime climatic and ecological transition zone of northern China and some other isolated areas. Also, the vegetation feedbacks are found to vary with season. In areas where significant feedbacks occur, vegetation contributes to typically 10%–30% of the total variances in Tmax, Tmin, and the DTR. These findings suggest that vegetation memory offers the potential for improving monthly-to-seasonal forecasting of Tmax and Tmin, and the associated temperature extremes over China. Meanwhile, the limitations and uncertainties of the study should be recognized.  相似文献   
925.
<正> Carvalho,Lucchesi and Murty proved that any 1-extendable graph G different from K_2and C_(2n)has at least Δ(G)edge-disjoint removable ears,and any brick G distinct from K_4 and■hasat least Δ(G)-2 removable edges,where Δ(G)denotes the maximum degree of G.In this paper,weimprove the lower bounds for numbers of removable ears and removable edges of 1-extendable graphs.It is proved that any 1-extendable graph G different from K_2 and C_(2n)has at least χ′(G)edge-disjointremovable ears,and any brick G distinct from K_4 and■has at least χ′(G)-2 removable edges,whereχ′(G)denotes the edge-chromatic number of G.  相似文献   
926.
The aim of this paper is to explore an explicit use of the concept of sustainability within transport planning. This paper analyses the concept of sustainability based on a practical approach for a sustainable development of Nordhavn, an area of Copenhagen, exemplifying a complex planning problem. An exploration of the application of the concept of sustainability is carried out using elements of Soft Systems Methodology (SSM). This approach indicates a need to separate the use of sustainability considerations regarding the transport planning ‘process’ from the transport planning ‘results’. The two approaches are related to the planning levels presented by Ulrich (Syst Prac 1(4):415–428, 1988). It was chosen to focus on the understanding of a sustainable transport planning process. This focus is addressed by four stakeholder groups interviewed based on the ‘ought to’ mode of Critical Systems Heuristics (CSH). Finally an outline of some of the factors of a sustainable transport planning process is proposed.  相似文献   
927.
The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated key exchange (3PAKE) protocol. This CLC protocol provides a superior round efficiency (only three rounds), and its resources required for computation are relatively few. However, we find that the leakage of values A V and B V in the CLC protocol will make a man-in-the-middle attack feasible in practice, where A V and B V are the authentication information chosen by the server for the participants A and B. In this paper, we describe our attack on the CLC protocol and further present a modified 3PAKE protocol, which is essentially an improved CLC protocol. Our protocol can resist attacks available, including man-in-the-middle attack we mount on the initial CLC protocol. Meanwhile, we allow that the participants choose their own passwords by themselves, thus avoiding the danger that the server is controlled in the initialization phase. Also, the computational cost of our protocol is lower than that of the CLC protocol.  相似文献   
928.
讨论了希尔伯特空间上的两个不同的幂等算子P、Q的组合aP+bQ-cPQ的可逆性问题,利用幂等算子的性质和空间分解的技巧证明了aP+bQ-cPQ的可逆性与系数的选取无关,其中a,b,c∈C,ab≠0,a+b-c≠0.而且构造反例说明该结果不能推广到aP+bQ-cPQ-dQP的情形.  相似文献   
929.
In this paper,domain decomposition method(DDM) for numerical solutions of mathematical physics equations is improved into dynamic domain decomposition method(DDDM) . The main feature of the DDDM is that the number,shape and volume of the sub-domains are all flexibly changeable during the iterations,so it suits well to be implemented on a reconfigurable parallel computing system. Convergence analysis of the DDDM is given,while an application approach to a weak nonlinear elliptic boundary value problem and a ...  相似文献   
930.
Within the framework of the regularization theory, a spectral regularization method is introduced and analyzed. The convergence estimate under an appropriate choice of regularization parameter is obtained. A numerical implementation is described. Numerical examples show that the proposed method is effective and stable.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号