首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6504篇
  免费   650篇
  国内免费   72篇
系统科学   1124篇
丛书文集   41篇
教育与普及   17篇
理论与方法论   283篇
现状及发展   894篇
研究方法   5篇
综合类   4860篇
自然研究   2篇
  2024年   4篇
  2023年   14篇
  2022年   12篇
  2021年   16篇
  2020年   25篇
  2019年   9篇
  2018年   739篇
  2017年   740篇
  2016年   447篇
  2015年   48篇
  2014年   44篇
  2013年   24篇
  2012年   296篇
  2011年   997篇
  2010年   844篇
  2009年   493篇
  2008年   560篇
  2007年   819篇
  2006年   41篇
  2005年   73篇
  2004年   148篇
  2003年   170篇
  2002年   98篇
  2001年   103篇
  2000年   57篇
  1999年   53篇
  1998年   35篇
  1997年   43篇
  1996年   46篇
  1995年   32篇
  1994年   43篇
  1993年   24篇
  1992年   23篇
  1991年   29篇
  1990年   19篇
  1989年   13篇
  1988年   11篇
  1987年   12篇
  1986年   9篇
  1985年   3篇
  1984年   4篇
  1980年   1篇
  1978年   2篇
  1977年   1篇
  1967年   1篇
  1965年   1篇
排序方式: 共有7226条查询结果,搜索用时 252 毫秒
181.
Wearable devices usually work together with smart phones. To ensure only legitimate smart phones can read the data, they must conduct pairing to establish a shared key. Traditional pairing methods require that the pairing devices have a keyboard or screen for user interaction. However, due to the size limitation, keyboards or screens are hard to be installed in the wearable devices. To solve this problem, we propose a novel pairing method by using ambient sound and light. In this new scheme, any pairing request from smart phone will trigger wearable device vibration. Only after users press the confirm key on the device can the pairing process continues. Then pairing devices collect ambient sound and light at the predetermined time and establish a shared key by using the Diffie-Hellman protocol. To protect against potential man-in-the-middle attacks in the key establishment process, an improved interlock protocol with sound and light comparison is conducted to authenticate the key. If both the sound and light collected by the pairing devices are similar enough, the key is accepted. Otherwise, it is rejected. Compared with current context based pairing methods, our scheme does not impose strict synchronization on devices to collect ambient context data. Moreover, our scheme need not collect and exchange contextual information for multiple times to resist offline brute force attacks. The experimental results and security analysis prove the effectiveness of our scheme.  相似文献   
182.
The type III receptor tyrosine kinase FLT3 is frequently mutated in acute myeloid leukemia. Oncogenic FLT3 mutants display constitutive activity leading to aberrant cell proliferation and survival. Phosphorylation on several critical tyrosine residues is known to be essential for FLT3 signaling. Among these tyrosine residues, Y842 is located in the so-called activation loop. The position of this tyrosine residue is well conserved in all receptor tyrosine kinases. It has been reported that phosphorylation of the activation loop tyrosine is critical for catalytic activity for some but not all receptor tyrosine kinases. The role of Y842 residue in FLT3 signaling has not yet been studied. In this report, we show that Y842 is not important for FLT3 activation or ubiquitination but plays a critical role in regulating signaling downstream of the receptor as well as controlling receptor stability. We found that mutation of Y842 in the FLT3-ITD oncogenic mutant background reduced cell viability and increased apoptosis. Furthermore, the introduction of the Y842 mutation in the FLT3-ITD background led to a dramatic reduction in in vitro colony forming capacity. Additionally, mice injected with cells expressing FLT3-ITD/Y842F displayed a significant delay in tumor formation, compared to FLT3-ITD expressing cells. Microarray analysis comparing gene expression regulated by FLT3-ITD versus FLT3-ITD/Y842F demonstrated that mutation of Y842 causes suppression of anti-apoptotic genes. Furthermore, we showed that cells expressing FLT3-ITD/Y842F display impaired activity of the RAS/ERK pathway due to reduced interaction between FLT3 and SHP2 leading to reduced SHP2 activation. Thus, we suggest that Y842 is critical for FLT3-mediated RAS/ERK signaling and cellular transformation.  相似文献   
183.
184.
This paper addresses the problem of multi-objective coalition formation for task allocation. In disaster rescue, due to the dynamics of environments, heterogeneity and complexity of tasks as well as limited available agents, it is hard for the single-objective and single (task)-to-single (agent) task allocation approaches to handle task allocation in such circumstances. To this end, two multi-objective coalition formation for task allocation models are proposed for disaster rescues in this paper. First, through coalition formation, the proposed models enable agents to cooperatively perform complex tasks that cannot be completed by single agent. In addition, through adjusting the weights of multiple task allocation objectives, the proposed models can employ the linear programming to generate more adaptive task allocation plans, which can satisfy different task allocation requirements in disaster rescue. Finally, through employing the multi-stage task allocation mechanism of the dynamic programming, the proposed models can handle the dynamics of tasks and agents in disaster environments. Experimental results indicate that the proposed models have good performance on coalition formation for task allocation in disaster environments, which can generate suitable task allocation plans according to various objectives of task allocation.  相似文献   
185.
以支付结算网络为例,通过构建复杂网络中的流动性循环模型,基于仿真模拟研究了不同网络拓扑结构和不同风险场景下的系统性风险与流动性救助问题.研究发现:1)网络拓扑结构对系统稳健性有显著影响,系统呈现出"稳健而脆弱"的特点,即网络节点间差异越小、相互连接越紧密,系统性风险发生的概率越小,但风险一旦形成,则后果更为严重;2)由于系统性风险的程度与系统流动性正缺口规模呈现线性正相关关系,在进行流动性救助时,基于节点流动性正缺口的救助资金配置方案均不劣于平均分配或基于冲击规模分配的方案,但在不同网络拓扑结构下,方案间的差异程度存在显著差异;3)在基于节点流动性正缺口的配置方案下,网络拓扑结构对不同救助顺序的效果也存在影响,但仅在网络节点间差异较大且中等救助规模下,影响才是显著的.  相似文献   
186.
This paper studies the output synchronization problem for a class of networked non-linear multi-agent systems with switching topology and time-varying delays. To synchronize the outputs, a leader is introduced whose connectivity to the followers varies with time, and a novel data-driven consensus protocol based on model free adaptive control is proposed, where the reference input of each follower is designed to be the time-varying average of the neighboring agents’ outputs. Both the case when the leader is with a prescribed reference input and the case otherwise are considered. The proposed protocol allows for time-varying delays, switching topology, and does not use the agent structure or the dynamics information implicitly or explicitly. Sufficient conditions are derived to guarantee the closed-loop stability, and conditions for consensus convergence are obtained, where only a joint spanning tree is required. Numerical simulations and practical experiments are conducted to demonstrate the effectiveness of the proposed protocol.  相似文献   
187.
Nested clusters arise independently in graph partitioning and in the study of contours. We take a step toward unifying these two instances of nested clusters. We show that the graph theoretical tight clusters introduced by Dress, Steel, Moulton and Wu in 2010 are a special case of nested clusters associated to contours.  相似文献   
188.
This paper examines the risk-return relationship for the carbon future market during Phases I, II and III of the European Union Emission Trading Scheme (EU ETS). The risk factors derived from the newly developed LSW model, are embedded into a GARCH framework. This new specification is compared with several GARCH-M type models analyzing the risk-return relationship in the carbon market. The results show that the new specification consistently achieves a good fit and possesses superior explanatory power for the European Union Allowance (EUA) data. Some policy suggestions regarding market efficiency are also provided.  相似文献   
189.
In this paper, we propose a framework for applying the combined use of soft systems methodology (SSM) and critical discourse analysis (CDA) based on social semiotic systemic functional linguistics to social practices. In the social practice, ‘participation’ mode of Checkland’s SSM is used for ‘problem-solving’ whilst CDA is used to problematize ‘problem-solving’ processes within the practice. During the meta-process of problematization of our research, we used Churchman’s systems approach and its theory of ‘boundary critique’ in order to explore issues such as governance, inequality of power, and social values within the organization examined for this study. In other words, the process-oriented methodology proposed in this paper consists of two processes: that of ‘problem-solving’ based on SSM and of problematization of naturalized discourse from the perspective of CDA and two phases of boundary critique in social practice. A detailed account of a case study of Korean social enterprise is given to demonstrate how our proposed framework of the combined use of SSM and CDA is applied into practice. Reflecting the outcome of the case study, this paper argues that critical social research from systemic inquiry using what we call ‘process-oriented methodology’ is useful to address some of the social and complex issues related to understanding dynamic relation between power and discourse amongst participants in the social enterprise in Korean contexts.  相似文献   
190.
Some techniques using linear algebra was introduced by Faugère in F4 to speed up the reduction process during Gr?bner basis computations.These techniques can also be used in fast implementations of F5 and some other signature-based Gr?bner basis algorithms.When these techniques are applied,a very important step is constructing matrices from critical pairs and existing polynomials by the Symbolic Preprocessing function(given in F4).Since multiplications of monomials and polynomials are involved in the Symbolic Preprocessing function,this step can be very costly when the number of involved polynomials/monomials is huge.In this paper,multiplications of monomials and polynomials for a Boolean polynomial ring are investigated and a specific method of implementing the Symbolic Preprocessing function over Boolean polynomial rings is reported.Many examples have been tested by using this method,and the experimental data shows that the new method is very efficient.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号