首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6741篇
  免费   710篇
  国内免费   109篇
系统科学   1160篇
丛书文集   48篇
教育与普及   18篇
理论与方法论   281篇
现状及发展   873篇
研究方法   4篇
综合类   5176篇
  2024年   8篇
  2023年   38篇
  2022年   55篇
  2021年   49篇
  2020年   40篇
  2019年   31篇
  2018年   760篇
  2017年   780篇
  2016年   477篇
  2015年   89篇
  2014年   90篇
  2013年   93篇
  2012年   342篇
  2011年   1035篇
  2010年   891篇
  2009年   528篇
  2008年   574篇
  2007年   825篇
  2006年   52篇
  2005年   81篇
  2004年   165篇
  2003年   173篇
  2002年   93篇
  2001年   47篇
  2000年   40篇
  1999年   26篇
  1998年   14篇
  1997年   19篇
  1996年   28篇
  1995年   25篇
  1994年   18篇
  1993年   8篇
  1992年   15篇
  1991年   11篇
  1990年   7篇
  1989年   14篇
  1988年   5篇
  1987年   3篇
  1986年   2篇
  1985年   3篇
  1981年   1篇
  1980年   1篇
  1974年   2篇
  1967年   1篇
  1955年   1篇
排序方式: 共有7560条查询结果,搜索用时 515 毫秒
981.
In this paper, the generalized inverse eigenvalue problem for the (P,Q)-conjugate matrices and the associated approximation problem are discussed by using generalized singular value decomposition (GSVD). Moreover, the least residual problem of the above generalized inverse eigenvalue problem is studied by using the canonical correlation decomposition (CCD). The solutions to these problems are derived. Some numerical examples are given to illustrate the main results.  相似文献   
982.
Varieties of trusted computing products usually follow the mechanism of liner-style chain of trust according to the specifications of TCG. The distinct advantage is that the compatibility with the existing computing platform is preferable, while the shortcomings are obvious simultaneously. A new star-style trust model with the ability of data recovery is proposed in this paper. The model can enhance the hardware-based root of trust in platform measurement, reduce the loss of trust during transfer process, extend the border of trust flexibly, and have the ability of data backup and recovery. The security and reliability of system is much more improved. It is proved that the star-style trust model is much better than the liner-style trust model in trust transfer and boundary extending etc. using formal methods in this paper. We illuminate the design and implementation of a kind of trusted PDA acting on star-style trust model.  相似文献   
983.
In uncertain data management, lineages are often used for probability computation of result tuples. However, most of existing works focus on tuple level lineage, which results in imprecise data derivation. Besides, correlations among attributes cannot be captured. In this paper, for base tuples with multiple uncertain attributes, we define attribute level annotation to annotate each attribute. Utilizing these annotations to generate lineages of result tuples can realize more precise derivation. Simultaneously, they can be used for dependency graph construction. Utilizing dependency graph, we can represent not only constraints on schemas but also correlations among attributes. Combining the dependency graph and attribute level lineage, we can correctly compute probabilities of result tuples and precisely derivate data. In experiments, comparing lineage on tuple level and attribute level, it shows that our method has advantages on derivation precision and storage cost.  相似文献   
984.
A novel anonymous authentication scheme is proposed based on the ring signature. In the scheme, the private key and the the freely chosen anonymity set are used to achieve anonymous authentication. In terms of the threshold sharing, a group of t members jointly implement threshold tracking. In order to improve the security of tracking, message recovery equation is used to verify and recover data leaked by the user. Compared with Liu et al’s scheme, the proposed scheme can resist conspiracy tracking and has less computational cost. On the premise of the discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai, and Wolf (LRSW) and Diffie-Hellman (DDH) assumption, the scheme is proved to meet the demands of anonymous authentication. The scheme has broad application prospects in many fields such as ad hoc network, electronic voting, and so on.  相似文献   
985.
This paper presents a systematic method of designing the calibration toolbox of automotive electronic control unit (ECU) based on real-time workshop (RTW). To break the strong coupling of each functional layer, the hierarchical architecture of the calibration system is divided into the bottom driver layer, the intermediate interface layer and the top application layer. The driver functions meeting the specification of the automotive open system are sent and received in the intermediate interface layer. To reduce the development costs, the portable user codes are generated by RTW which provides a development environment from system simulation to hardware implementation. Specifically, the calibration codes yielded from the controller area network (CAN) calibration protocol (CCP) module are integrated into the control codes, called by a compiler in the daemons to build a corresponding project, and then downloaded into the object board to provide the A2L file. The experiments illustrate that the different drive modules are only needed to be replaced for the implementation of the calibration system applied in different hardware platforms.  相似文献   
986.
A class of singular perturbation boundary problem of elliptic equation for higher order is studied. Firstly, under suitable conditions, the generalized outer solution to reduced problems is considered. Then the generalized interior shock asymptotic solution to original problem is constructed by using the theory of generalized functions. Finally, using the fixed point theorem of functional analytic, the uniformly validity of the generalized asymptotic solution with interior shock and boundary layers is proved.  相似文献   
987.
The composite field multiplication is an important and complex module in symmetric cipher algorithms, and its realization performance directly restricts the processing speed of symmetric cipher algorithms. Based on the characteristics of composite field multiplication in symmetric cipher algorithms and the realization principle of its reconfigurable architectures, this paper describes the reconfigurable composite field multiplication over GF((2~8)~k)(k=1,2,3,4) in RISC(reduced instruction set computer) processor and VLIW(very long instruction word) processor architecture, respectively. Through configuration, the architectures can realize the composite field multiplication over GF(2~8), GF((2~8)~2), GF((2~8)~3) and GF((2~8)~4) flexibly and efficiently. We simulated the function of circuits and synthesized the reconfigurable design based on the 0.18 μm CMOS(complementary metal oxide semiconductor) standard cell library and the comparison with other same kind designs. The result shows that the reconfigurable design proposed in the paper can provide higher efficiency under the premise of flexibility.  相似文献   
988.
In the present study, the chemical and mechanical properties and the thermal expansion of a carbon nanotube (CNT)-based crystalline nano-aluminum (nano Al) composite were reported. The properties of nanocomposites were tailored by incorporating CNTs into the nano Al matrix using a physical mixing method. The elastic moduli and the coefficient of thermal expansion (CTE) of the nanocomposites were also estimated to understand the effects of CNT reinforcement in the Al matrix. Microstructural characterization of the nanocomposite reveals that the CNTs are dispersed and embedded in the Al matrix. The experimental results indicate that the incorporation of CNTs into the nano Al matrix results in the increase in hardness and elastic modulus along with a concomitant decrease in the coefficient of thermal expansion. The hardness and elastic modulus of the nanocomposite increase by 21% and 20%, respectively, upon CNT addition. The CTE of CNT/Al nanocomposite decreases to 70% compared with that of nano Al.  相似文献   
989.
The equilibrium reaction between CaO—Al2O3—SiO2—MgO slag and 28MnCr5 molten steel was calculated to obtain the suitable slag composition which is effective for decreasing the oxygen content in molten steel. The dissolved oxygen content [O] in molten steel under different top slag conditions was calculated using a thermodynamic model and was measured using an electromotive force method in slag–steel equilibrium experiments at 1873 K. The relations among [O], the total oxygen content (T.O), and the composition of the slag were investigated. The experimental results show that both [O] and T.O decrease with decreasing SiO2 content of the slag and exhibit different trends with the changes in the CaO/Al2O3 mass ratio of the slag. Increasing the CaO/Al2O3 mass ratio results in a decrease in [O] and an increase in T.O. To ensure that T.O ≤ 20 ppm and [O] ≤ 10 ppm, the SiO2 content should be controlled to <5wt%, and the CaO/Al2O3 mass ratio should be in the range from 1.2 to 1.6.  相似文献   
990.
The strategy that replacing part of MnS with BN was proposed in order to decrease the sulfur content in sulfur based free-cutting steel. The effects of BN and MnS inclusions on the microstructure and machinability of the steel were systematically investigated. The results show that most of the BN and MnS inclusions exist individually in the steel and only a small amount of them are in a composite state forming either isolated particles or clusters of particles. In the case of multi-phased steel, the theoretical calculation predicts that the volume of large BN particles should be 0.7 times of the volume of large MnS particles. The machinability of this type of BN and MnS alloy steel over a wide range of cutting speeds ranging from a low speed appropriate for drilling to a high speed appropriate for turning is confirmed as being equal to or superior to that of an MnS reference steel, even though the sulfur content in the composite steel is only half that of the MnS steel. The aptitude for cutting effect of 240 ppm nitrogen and 115 ppm boron in the composite steel is demonstrated to be equivalent or even better than 1000 ppm sulfur in MnS free-cutting steel.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号