首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   47981篇
  免费   1934篇
  国内免费   2261篇
系统科学   1830篇
丛书文集   1741篇
教育与普及   1919篇
理论与方法论   206篇
现状及发展   231篇
研究方法   156篇
综合类   46082篇
自然研究   11篇
  2024年   144篇
  2023年   640篇
  2022年   927篇
  2021年   905篇
  2020年   658篇
  2019年   238篇
  2018年   405篇
  2017年   553篇
  2016年   557篇
  2015年   1130篇
  2014年   1563篇
  2013年   1494篇
  2012年   1633篇
  2011年   1962篇
  2010年   1939篇
  2009年   2210篇
  2008年   2464篇
  2007年   2396篇
  2006年   1861篇
  2005年   1819篇
  2004年   1323篇
  2003年   1183篇
  2002年   1274篇
  2001年   1343篇
  2000年   1483篇
  1999年   2529篇
  1998年   2290篇
  1997年   2329篇
  1996年   2155篇
  1995年   1932篇
  1994年   1669篇
  1993年   1426篇
  1992年   1262篇
  1991年   1135篇
  1990年   980篇
  1989年   860篇
  1988年   719篇
  1987年   450篇
  1986年   227篇
  1985年   84篇
  1984年   15篇
  1983年   6篇
  1982年   1篇
  1981年   1篇
  1955年   2篇
排序方式: 共有10000条查询结果,搜索用时 312 毫秒
1.
Many pretrained deep learning models have been released to help engineers and researchers develop deep learning-based systems or conduct research with minimall effort. Previous work has shown that at secret message can be embedded in neural network parameters without compromising the accuracy of the model. Malicious developers can, therefore, hide malware or other baneful information in pretrained models, causing harm to society. Hence, reliable detection of these vicious pretrained models is urgently needed. We analyze existing approaches for hiding messages and find that they will ineluctably cause biases in the parameter statistics. Therefore, we propose steganalysis methods for steganography on neural network parameters that extract statistics from benign and malicious models and build classifiers based on the extracted statistics. To the best of our knowledge, this is the first study on neural network steganalysis. The experimental results reveal that our proposed algorithm can effectively detect a model with an embedded message. Notably, our detection methods are still valid in cases where the payload of the stego model is low.  相似文献   
2.
针对司法实践中对于可解释性及预测性能的需求, 本文提出了一种基于概率图模型的量刑智能辅助方法. 该方法以量刑要素为基石建立含有隐节点的概率图模型, 由极大似然准则估计刑期分布的参数, 进而计算分布的数学期望得到预测值. 关于危险驾驶罪的实验结果表明, 概率图模型的预测准确率优于基于决策树和神经网络等的模型, 且具有良好的可解释性.  相似文献   
3.
在基于到达角(angle of arrival, AoA)的三维目标跟踪中, 伪线性卡尔曼滤波具有稳定性高和计算复杂度低的优点, 但是严重的偏差问题使其跟踪精度迅速下降。针对该问题, 提出一种二次约束卡尔曼滤波(quadratic constraint Kalman filter, QCKF)算法。首先引入涉及所有观测噪声项的增广矩阵, 然后建立与线性卡尔曼滤波等价的目标函数并且附加含有二次项的约束条件, 以此降低偏差影响, 实现更准确的状态更新。QCKF算法采用广义特征值分解求解约束优化问题, 无法直接通过状态更新表达式推导其协方差矩阵, 因此利用约束条件以及矩阵扰动方法完成协方差矩阵更新。仿真分析表明, QCKF算法相较于其他非线性滤波算法具有更优的跟踪性能, 不仅在低噪声条件下可达到后验克拉美罗下界, 而且当噪声严重时能够显著降低跟踪误差, 并且计算开销不高。  相似文献   
4.
随着信息技术发展,设备健康数据与知识图谱技术结合为设备健康发展带来新的发展机遇,知识图谱利用其多种特异性优势,使企业系统中积累的海量设备维修数据得到有效整合利用.本文提出基于知识图谱的核电设备健康管理知识建模与分析方法,并根据实体关系模型构建维修知识图谱本体框架,同时基于核电企业实际的维修工单数据,从统计分析和关联分析两方面取得良好的实践效果.研究结果表明,知识图谱能够在设备维修知识的集成上解决传统的数据孤岛问题,同时能基于故障的可视化分析为维修人员和管理人员提供决策和知识支持.  相似文献   
5.
 结合空间科学卫星项目的成本管理特点,根据项目管理理论和方法,以某空间科学卫星项目为例,对卫星项目成本管理过程进行实证研究,通过分析该卫星成本预算、成本控制等管理过程发现其存在的问题,提出改进方案、措施及项目成本管理改进的框架,探讨了项目负责人制的组织结构、项目成本管理体系、项目成本控制体系等具体优化措施。  相似文献   
6.
For evaluating the influence of the Chinese renminbi(RMB) joining in the special drawing right(SDR) basket on RMB's internationalization, the authors systemically study the risk spillover networks and examine the dynamic relationship of exchange rates among the SDR currencies including the US dollar(USD), European Union euro(EUR), Japanese yen(JPY) and British pound(GBP).The empirical results demonstrate that the USD takes a dominant position and holds the biggest risk spillover to other currencies, and the RMB's inclusion to the SDR basket makes the risk spillover to get average, giving rise to the SDR currency system more stable to a certain degree. The inclusion of the RMB in the SDR not only can reduce the systematic risk of the SDR, but also has a certain impact on the international exchange rate markets. Nowadays, in front of the growing trade friction, more such researches could help to effectively deal with the currency disputes.  相似文献   
7.
为提高移动通信系统的性能,构建了一个存在主网络干扰和窃听者的双向认知中继网络的物理层安全传输模型,设计了一种中继选择和功率分配的联合优化策略,用于对抗窃听者,保护收发节点的信息传输。通过仿真分析得出,此非凸优化问题限制条件较多,难以保证粒子群优化算法随机生成的初始解的可行性,从而造成求解困难。提出了一种基于可变网格优化和粒子群优化算法的混合优化算法。仿真结果表明此算法提高了次级网络的保密速率,提升了次级网络的安全性能。  相似文献   
8.
9.
The NLRP3 inflammasome is a critical innate immune pathway responsible for producing active interleukin (IL)-1β, which is associated with tumor development and immunity. However, the mechanisms regulating the inflammatory microenvironment, tumorigenesis and tumor immunity are unclear. Herein, we show that the NLRP3 inflammasome was over-expressed in human HNSCC tissues and that the IL-1β concentration was increased in the peripheral blood of HNSCC patients. Additionally, elevated NLRP3 inflammasome levels were detected in tumor tissues of Tgfbr1/Pten 2cKO HNSCC mice, and elevated IL-1β levels were detected in the peripheral blood serum, spleen, draining lymph nodes and tumor tissues. Blocking NLRP3 inflammasome activation using MCC950 remarkably reduced IL-1β production in an HNSCC mouse model and reduced the numbers of myeloid-derived suppressor cells (MDSCs), regulatory T cells (Tregs) and tumor-associated macrophages (TAMs). Moreover, inhibiting NLRP3 inflammasome activation increased the numbers of CD4+ and CD8+ T cells in HNSCC mice. Notably, the numbers of exhausted PD-1+ and Tim3+ T cells were significantly reduced. A human HNSCC tissue microarray showed that NLRP3 inflammasome expression was correlated with the expression of CD8 and CD4, the Treg marker Foxp3, the MDSC markers CD11b and CD33, and the TAM markers CD68 and CD163, PD-1 and Tim3. Overall, our results demonstrate that the NLRP3 inflammasome/IL-1β pathway promotes tumorigenesis in HNSCC and inactivation of this pathway delays tumor growth, accompanied by decreased immunosuppressive cell accumulation and an increased number of effector T cells. Thus, inhibition of the tumor microenvironment through the NLRP3 inflammasome/IL-1β pathway may provide a novel approach for HNSCC therapy.  相似文献   
10.
The flotation of hemimorphite using the S(Ⅱ)–Pb(Ⅱ)–xanthate process,which includes sulfidization with sodium sulfide,activation by lead cations,and subsequent flotation with xanthate,was investigated.The flotation results indicated that hemimorphite floats when the S(Ⅱ)–Pb(Ⅱ)–xanthate process is used; a maximum recovery of approximately 90% was obtained.Zeta-potential,contact-angle,scanning electron microscopy–energy-dispersive spectrometry(SEM–EDS),and diffuse-reflectance infrared Fourier transform spectroscopy(DRIFTS) measurements were used to characterize the activation products on the hemimorphite surface and their subsequent interaction with sodium butyl xanthate(SBX).The results showed that a Zn S coating formed on the hemimorphite surface after the sample was conditioned in an Na2 S solution.However,the formation of a Zn S coating on the hemimorphite surface did not improve hemimorphite flotation.With the subsequent addition of lead cations,Pb S species formed on the mineral surface.The formation of the Pb S species on the surface of hemimorphite significantly increased the adsorption capacity of SBX,forming lead xanthate(referred to as chemical adsorption) and leading to a substantial improvement in hemimorphite flotation.Our results indicate that the addition of lead cations is a critical step in the successful flotation of hemimorphite using the sulfidization–lead ion activation–xanthate process.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号