全文获取类型
收费全文 | 9322篇 |
免费 | 780篇 |
国内免费 | 192篇 |
专业分类
系统科学 | 1189篇 |
丛书文集 | 104篇 |
教育与普及 | 87篇 |
理论与方法论 | 287篇 |
现状及发展 | 901篇 |
研究方法 | 9篇 |
综合类 | 7716篇 |
自然研究 | 1篇 |
出版年
2024年 | 11篇 |
2023年 | 40篇 |
2022年 | 57篇 |
2021年 | 55篇 |
2020年 | 52篇 |
2019年 | 30篇 |
2018年 | 758篇 |
2017年 | 765篇 |
2016年 | 477篇 |
2015年 | 133篇 |
2014年 | 138篇 |
2013年 | 127篇 |
2012年 | 368篇 |
2011年 | 1099篇 |
2010年 | 939篇 |
2009年 | 588篇 |
2008年 | 662篇 |
2007年 | 948篇 |
2006年 | 149篇 |
2005年 | 172篇 |
2004年 | 244篇 |
2003年 | 267篇 |
2002年 | 189篇 |
2001年 | 153篇 |
2000年 | 118篇 |
1999年 | 241篇 |
1998年 | 207篇 |
1997年 | 197篇 |
1996年 | 176篇 |
1995年 | 149篇 |
1994年 | 127篇 |
1993年 | 133篇 |
1992年 | 117篇 |
1991年 | 84篇 |
1990年 | 94篇 |
1989年 | 81篇 |
1988年 | 46篇 |
1987年 | 54篇 |
1986年 | 27篇 |
1985年 | 16篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1980年 | 1篇 |
1967年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 944 毫秒
991.
给出了延迟离散Hopfield -型神经网络的收敛性定理。在广义异步运行方式下 ,证明了对称连接权阵 (只要w0 对称 )条件下的收敛性定理 ,推广了已有的延迟离散Hopfield -型神经网络的收敛性结果 ,表明网络收敛滞后于能量函数收敛最多 2n 1步。最后给出了能量函数的极大值点与延迟离散Hopfield -型神经网络的稳定态的关系。 相似文献
992.
传递函数拟合算法及其在变压器绕组变形诊断中的应用 总被引:4,自引:0,他引:4
提出了利用网络的实测数据拟合其传递函数的实用算法。本算法是基于当某极点的实部较小时,该极点对网络传递函数的作用区域集中于其虚部附近,所以利用其虚部近的测量数据可以较准确的拟合同该极点。对拟合结果使用高斯-赛德尔型迭代法进行修正可以进一步改善所得结果。对几组变压器的实测数据所做的计算证实了所提出的算法,此外对传递函数的拟合在变压器绕组变形中的可能应用进行了探讨。 相似文献
993.
Joseph W. Dauben 《Archive for History of Exact Sciences》2008,62(2):91-178
In December and January of 1983–1984, archaeologists excavating the tomb of an ancient Chinese provincial bureaucrat at a
Western Han Dynasty site near Zhangjiashan, in Jiangling county, Hubei Province, discovered a number of books on bamboo strips,
including inter alia works on legal statutes, military practice, and medicine. Among these was a previously unknown mathematical work on some
200 bamboo strips, the
Suan shu shu, or Book of Numbers and Computations. Based upon other works found in the tomb, especially a copy of the
Er nian lü ling (Laws and Decrees of the Second Year (of the reign of empress Lü, i.e. Lü Hou)), archaeologists have dated the tomb to ca. 186 BCE (Lü Hou’s regency lasted from 188 to 180 BCE). The Suan shu shu, as the earliest yet discovered work devoted specifically to mathematics from ancient China, has stirred considerable interest
among Chinese historians of science. The translation and commentary offered here draw extensively on the works cited in Sect.
3 below. Several appendixes devoted to specific issues related to translating the Suan shu shu, including its title and the problem of determining English equivalents for various commodities that arise in the text, may
be found in Appendix II.
An erratum to this article can be found at 相似文献
994.
Gituru Wahiti Robert 《武汉大学学报:自然科学英文版》2007,12(2):337-342
Outcrossing rate in a natural population of Caldesia grandis was estimated by the dominant random amplified polymorphism DNA (RAPD) marker using 10 open-pollinated progeny arrays of 24 individuals. The multilocus outcrossing rate estimated based on all 25 RAPD loci was 0.872 ±0.033 and the single-locus outcrossing rate was 0.795 ±0.032. Multilocus estimates did not differ significantly from the single-locus estimates. The fixation index, F, in the progeny estimated from RAPD data was -0.142 ±0.000. The estimates of multilocus outcrossing rates (t_m) and single-locus outcrossing rates (t_s) obtained from MLDT clearly indicate that outcrossing is predominant in the open-pollinated C. grandis population. An empirical analysis suggests that 15 should be the minimum number of dominant marker loci necessary to achieve robust estimates of t_m. 相似文献
995.
Participatory Sustainability Impact Assessment: Scientific Policy Advice as a Social Learning Process 总被引:3,自引:3,他引:0
Manuel Gottschick 《Systemic Practice and Action Research》2008,21(6):479-495
This paper deals with the development of scientific policy advice by providing a methodology to foster a social learning process.
The methodology, called participatory Sustainability Impact Assessment (pSIA), aims to structure complex problem situations,
to clarify interests and basic assumptions, to interpret scientific studies, to develop impact assessment, and to explore
sensitivity of uncertainty and lack of information. In pSIA workshops the participants are supposed to build conceptual models
with different modelling methods, like System Dynamics, Value Chain Analysis, and Morphological Analysis. A case study is
presented that describes a workshop series with political as well as academic actors, applying the pSIA approach to an impact
assessment of Economic Partnership Agreements between the European Union and the Eastern and Southern Africa Region.
相似文献
Manuel GottschickEmail: URL: www.agchange.de |
996.
ZHANG Tao ZOU Xuecheng ZHAO Guangzhou SHEN Xubang 《武汉大学学报:自然科学英文版》2007,12(3):491-495
A 3.5 times PLL clock frequency multiplier for low voltage different signal (LVDS) driver is presented. A novel adaptive charge pump can automatically switch the loop bandwidth and a voltage-controlled oscillator (VCO) is designed with the aid of frequency ranges reuse technology. The circuit is implemented using 1st Silicon 0.25 μm mixed-signal complementary metal-oxide-semiconductor (CMOS) process. Simulation results show that the PLL clock frequency multiplier has very low phase noise and very short capture time . 相似文献
997.
Belgacem BETTAYEB Imed KACEM Kondo H.ADJALLAH LOSI-ICD CNRS FRE Universitéde technologie de Troyes France 《系统科学与系统工程学报(英文版)》2008,17(4):446-459
This article investigates identical parallel machines scheduling with family setup times. The objective function being the weighted sum of completion times, the problem is known to be strongly NP-hard. We propose a constructive heuristic algorithm and three complementary lower bounds. Two of these bounds proceed by elimination of setup times or by distributing each of them to jobs of the corresponding family, while the third one is based on a lagrangian relaxation. The bounds and the heuristic are incorporated into a branch-and-bound algorithm. Experimental results obtained outperform those of the methods presented in previous works, in term of size of solved problems. 相似文献
998.
Zhaozhi ZHANG Nan JIANG 《系统科学与复杂性》2007,20(4):486-491
Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been proved yet, most cryptographic researchers believe that one-way functions exist. In addition, many candidates for one-way functions have been proposed. Therefore, the key step for developing real-valued cipher systems is to define real one-way functions and to propose candidates for them. In this paper, based on computational complexity theory over the real field, we give two definitions of real one-way functions; one is for digital one-way functions and the other is for general one-way functions. Candidates for these two classes of one-way functions are also proposed. Moreover, we present two examples to demonstrate that the candidates for both digital one-way functions and general one-way functions can be applied to construct secure real-valued cipher systems. 相似文献
999.
1000.
丘京辉 《苏州大学学报(医学版)》1998,14(3):93-95
设(E,t)是局部凸空间诱导序列(E_n,t_n)_n∈N的诱导极限.则(E,t)=ind(E_n,t_n)为正则当且仅当对于(E,t)中每个Mackey收敛于o的序列(x_k)存在自然数n=n(x_k),使(x_k)含于且有界于(E_n,t_n).由此可获得关于正则性的一系列等价刻划. 相似文献