首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5378篇
  免费   506篇
  国内免费   459篇
  6343篇
  2024年   26篇
  2023年   146篇
  2022年   184篇
  2021年   224篇
  2020年   311篇
  2019年   287篇
  2018年   278篇
  2017年   321篇
  2016年   338篇
  2015年   361篇
  2014年   373篇
  2013年   396篇
  2012年   232篇
  2011年   253篇
  2010年   216篇
  2009年   212篇
  2008年   203篇
  2007年   262篇
  2006年   233篇
  2005年   188篇
  2004年   168篇
  2003年   148篇
  2002年   170篇
  2001年   120篇
  2000年   96篇
  1999年   102篇
  1998年   97篇
  1997年   58篇
  1996年   52篇
  1995年   69篇
  1994年   32篇
  1993年   28篇
  1992年   24篇
  1991年   23篇
  1990年   11篇
  1989年   9篇
  1988年   17篇
  1987年   12篇
  1986年   10篇
  1985年   7篇
  1984年   8篇
  1983年   4篇
  1982年   8篇
  1981年   5篇
  1979年   4篇
  1978年   5篇
  1976年   2篇
  1973年   2篇
  1958年   1篇
  1950年   1篇
排序方式: 共有6343条查询结果,搜索用时 9 毫秒
1.
Sequential medical trials involving paired data   总被引:2,自引:0,他引:2  
  相似文献   
2.
Risk assessments often rely on deterministic models using long-term averages or “steady-state” values of input variables. Such models do not provide the information needed to estimate acute exposures. This study uses extreme value theory to examine the frequency and magnitude of daily pollutant concentrations in surface soils predicted at six U.S. locations. Concentrations are predicted using a deposition-leaching model and 50 years of historical precipitation data. A stochastic model also is used to generate 1000 years of precipitation data as modeling inputs for each location. The annual maximum concentrations at each site are fitted to a Gumbel type I distribution to estimate occurrence probability. For soluble pollutants, the predicted concentration varied substantially with precipitation, and the maximum daily concentrations exceeded annual averages by 4 to 8 times. Observed and synthetic precipitation data produced similar results at most study locations, though the synthetic data provided a slightly better fit to the Gumbel type I distribution. The precipitation model allows the generation of representative precipitation data that extend limited historical records. The extreme value analysis facilitates the evaluation of maximum pollutant concentrations, return periods, and other statistics that are important in evaluating acute exposures.  相似文献   
3.
Due to the fact that the flood data series of small drainage basins is relatively short, available data are often not sufficient for flood risk analysis. This presents the problem of risk analysis using very small data samples. One method that can be applied is to regard the available small samples as fuzzy information and optimize them using information diffusion technology to yield analytical results with greater reliability. In this article a risk analysis method based on information diffusion theory is applied to create a new flood risk analysis model. Application of the model is illustrated taking the Jinhuajiang and Qujiang drainage basins as examples. This is a new attempt at applying information diffusion theory in flood risk analysis. Computations based on this analytical flood risk model can yield an estimated flood damage value that is relatively accurate. This study indicates that the aforementioned model exhibits fairly stable analytical results, even when using a small set of sample data. The results also indicate that information diffusion technology is highly capable of extracting useful information and therefore improves system recognition accuracy. This method can be easily applied and the analytical results produced are easy to understand. Results are accurate enough to act as a guide in disaster situations.  相似文献   
4.
Practically all animals must find food while avoiding predators.An individual's perception of predation risk may depend on manyfactors, such as distance to refuge and group size, but it isunclear whether individuals respond to different factors ina similar manner. We tested whether flocks of foraging starlingsresponded in the same way to an increased perception of predationrisk by assessing three factors: (1) neighbor distances, (2)habitat obstruction, and (3) recent exposure to a predator.We found that in all three scenarios of increased risk, starlingsreduced their interscan intervals (food-searching bouts), whichincreased the frequency of their vigilance periods. We thenexamined how one of these factors, habitat obstruction, affectedescape speed by simulating an attack with a model predator.Starlings were slower to respond in visually obstructed habitats(long grass swards) and slower when they had their head downin obstructed habitats than when they had their head down inopen habitats. In addition, reaction times were quicker whenstarlings could employ their peripheral fields of vision. Ourresults demonstrate that different sources of increased riskcan generate similar behavioral responses within a species.The degree of visibility in the physical and social environmentaffects both the actual and perceived risk of predation.  相似文献   
5.
Mycotoxins are fungal metabolite which may in some cases exhibit a high health hazard potential. Mycotoxins can show carcinogenic, mutagenic, toxic, teratogenic or immunotoxic effects. Mycotoxin exposure in the workplace may occur through inhalation and skin contact,e.g. during occupational handling of organic matter such as livestock feed, food products, or waste. Various studies suggest that both acute and chronic effects can occur, depending at least on the exposure level. The magnitude of the potential health risks associated with a respiratory or dermal intake of mycotoxins has largely remained unclear to date. However, according to the directive 2000/54/EC on biological agents and the corresponding German Biological Agents Ordinance, employers are also required to consider the potential hazards posed by toxic effects of biological agents when assessing workplace risks. The aim of this article, therefore, is to present some basis information that should facilitate an evaluation of the significance of mycotoxins in the context of assessing workplace risks. It also provides suggestions for occupational health and safety measures.  相似文献   
6.
7.
8.
9.
International actions to combat the threat posed by invasive alien species (IAS) to crops and biodiversity have intensified in recent years. The formulation of 15 guiding principles on IAS by the Convention on Biological Diversity (CBD) stimulated the International Plant Protection Convention (IPPC) to review its role in protecting biodiversity. IPPC standards now demonstrate clearly that the risks posed by any organism that is directly or indirectly injurious to cultivated or uncultivated plants can be assessed and managed under the IPPC. Since the IPPC, unlike the CBD, constitutes an international legal instrument recognised by the World Trade Organization, greater protection from the introduction of IAS is now available. However, phytosanitary measures can only be enacted if they can be justified by risk analysis and we outline some novel strategies to improve the assessment and management of the risks posed by IAS, highlighting some of the key challenges which remain.  相似文献   
10.
Food sharing: a model of manipulation by harassment   总被引:3,自引:1,他引:2  
Most analyses of food-sharing behavior invoke complex explanationssuch as indirect and delayed benefits for sharing via kin selectionand reciprocal altruism. However, food sharing can be a moregeneral phenomenon accounted for by more parsimonious, mutualisticexplanations. We propose a game theoretical model of a generalsharing situation in which food owners share because it is in their own self-interest—they avoid high costs associatedwith beggar harassment. When beggars harass, owners may benefitfrom sharing part of the food if their consumption rate islow relative to the rate of cost accrual. Our model predictsthat harassment can be a profitable strategy for beggars if they reap some direct benefits from harassing other than sharedfood (such as picking up scraps). Therefore, beggars may manipulatethe owner's fitness payoffs in such a way as to make sharingmutualistic.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号