首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   54226篇
  免费   2285篇
  国内免费   2564篇
系统科学   2246篇
丛书文集   1863篇
教育与普及   2095篇
理论与方法论   233篇
现状及发展   258篇
研究方法   160篇
综合类   52200篇
自然研究   20篇
  2024年   164篇
  2023年   738篇
  2022年   1114篇
  2021年   1132篇
  2020年   800篇
  2019年   349篇
  2018年   520篇
  2017年   715篇
  2016年   737篇
  2015年   1424篇
  2014年   2046篇
  2013年   1908篇
  2012年   2104篇
  2011年   2519篇
  2010年   2417篇
  2009年   2769篇
  2008年   2992篇
  2007年   2881篇
  2006年   2271篇
  2005年   2084篇
  2004年   1487篇
  2003年   1222篇
  2002年   1257篇
  2001年   1316篇
  2000年   1512篇
  1999年   2580篇
  1998年   2352篇
  1997年   2395篇
  1996年   2192篇
  1995年   1974篇
  1994年   1717篇
  1993年   1470篇
  1992年   1315篇
  1991年   1168篇
  1990年   997篇
  1989年   884篇
  1988年   742篇
  1987年   460篇
  1986年   230篇
  1985年   88篇
  1984年   16篇
  1983年   6篇
  1982年   1篇
  1981年   5篇
  1980年   1篇
  1955年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Many pretrained deep learning models have been released to help engineers and researchers develop deep learning-based systems or conduct research with minimall effort. Previous work has shown that at secret message can be embedded in neural network parameters without compromising the accuracy of the model. Malicious developers can, therefore, hide malware or other baneful information in pretrained models, causing harm to society. Hence, reliable detection of these vicious pretrained models is urgently needed. We analyze existing approaches for hiding messages and find that they will ineluctably cause biases in the parameter statistics. Therefore, we propose steganalysis methods for steganography on neural network parameters that extract statistics from benign and malicious models and build classifiers based on the extracted statistics. To the best of our knowledge, this is the first study on neural network steganalysis. The experimental results reveal that our proposed algorithm can effectively detect a model with an embedded message. Notably, our detection methods are still valid in cases where the payload of the stego model is low.  相似文献   
2.
随着信息技术发展,设备健康数据与知识图谱技术结合为设备健康发展带来新的发展机遇,知识图谱利用其多种特异性优势,使企业系统中积累的海量设备维修数据得到有效整合利用.本文提出基于知识图谱的核电设备健康管理知识建模与分析方法,并根据实体关系模型构建维修知识图谱本体框架,同时基于核电企业实际的维修工单数据,从统计分析和关联分析两方面取得良好的实践效果.研究结果表明,知识图谱能够在设备维修知识的集成上解决传统的数据孤岛问题,同时能基于故障的可视化分析为维修人员和管理人员提供决策和知识支持.  相似文献   
3.
For evaluating the influence of the Chinese renminbi(RMB) joining in the special drawing right(SDR) basket on RMB's internationalization, the authors systemically study the risk spillover networks and examine the dynamic relationship of exchange rates among the SDR currencies including the US dollar(USD), European Union euro(EUR), Japanese yen(JPY) and British pound(GBP).The empirical results demonstrate that the USD takes a dominant position and holds the biggest risk spillover to other currencies, and the RMB's inclusion to the SDR basket makes the risk spillover to get average, giving rise to the SDR currency system more stable to a certain degree. The inclusion of the RMB in the SDR not only can reduce the systematic risk of the SDR, but also has a certain impact on the international exchange rate markets. Nowadays, in front of the growing trade friction, more such researches could help to effectively deal with the currency disputes.  相似文献   
4.
为提高移动通信系统的性能,构建了一个存在主网络干扰和窃听者的双向认知中继网络的物理层安全传输模型,设计了一种中继选择和功率分配的联合优化策略,用于对抗窃听者,保护收发节点的信息传输。通过仿真分析得出,此非凸优化问题限制条件较多,难以保证粒子群优化算法随机生成的初始解的可行性,从而造成求解困难。提出了一种基于可变网格优化和粒子群优化算法的混合优化算法。仿真结果表明此算法提高了次级网络的保密速率,提升了次级网络的安全性能。  相似文献   
5.
6.
In this paper, PID (proportional-integral-derivative) controllers will be designed to solve the tracking problem for a class of coupled multi-agent systems, where each agent is described by a second-order high-dimensional nonlinear uncertain dynamical system, which only has access to its own tracking error information and does not need to communicate with others. This paper will show that a 3-dimensional manifold can be constructed based on the information about the Lipschitz constants of the system nonlinear dynamics, such that whenever the three parameters of each PID controller are chosen from the manifold, the whole multi-agent system can be stabilized globally and the tracking error of each agent approaches to zero asymptotically. For a class of coupled first-order multi-agent nonlinear uncertain systems, a PI controller will be designed to stabilize the whole system.  相似文献   
7.
8.
The NLRP3 inflammasome is a critical innate immune pathway responsible for producing active interleukin (IL)-1β, which is associated with tumor development and immunity. However, the mechanisms regulating the inflammatory microenvironment, tumorigenesis and tumor immunity are unclear. Herein, we show that the NLRP3 inflammasome was over-expressed in human HNSCC tissues and that the IL-1β concentration was increased in the peripheral blood of HNSCC patients. Additionally, elevated NLRP3 inflammasome levels were detected in tumor tissues of Tgfbr1/Pten 2cKO HNSCC mice, and elevated IL-1β levels were detected in the peripheral blood serum, spleen, draining lymph nodes and tumor tissues. Blocking NLRP3 inflammasome activation using MCC950 remarkably reduced IL-1β production in an HNSCC mouse model and reduced the numbers of myeloid-derived suppressor cells (MDSCs), regulatory T cells (Tregs) and tumor-associated macrophages (TAMs). Moreover, inhibiting NLRP3 inflammasome activation increased the numbers of CD4+ and CD8+ T cells in HNSCC mice. Notably, the numbers of exhausted PD-1+ and Tim3+ T cells were significantly reduced. A human HNSCC tissue microarray showed that NLRP3 inflammasome expression was correlated with the expression of CD8 and CD4, the Treg marker Foxp3, the MDSC markers CD11b and CD33, and the TAM markers CD68 and CD163, PD-1 and Tim3. Overall, our results demonstrate that the NLRP3 inflammasome/IL-1β pathway promotes tumorigenesis in HNSCC and inactivation of this pathway delays tumor growth, accompanied by decreased immunosuppressive cell accumulation and an increased number of effector T cells. Thus, inhibition of the tumor microenvironment through the NLRP3 inflammasome/IL-1β pathway may provide a novel approach for HNSCC therapy.  相似文献   
9.
The flotation of hemimorphite using the S(Ⅱ)–Pb(Ⅱ)–xanthate process,which includes sulfidization with sodium sulfide,activation by lead cations,and subsequent flotation with xanthate,was investigated.The flotation results indicated that hemimorphite floats when the S(Ⅱ)–Pb(Ⅱ)–xanthate process is used; a maximum recovery of approximately 90% was obtained.Zeta-potential,contact-angle,scanning electron microscopy–energy-dispersive spectrometry(SEM–EDS),and diffuse-reflectance infrared Fourier transform spectroscopy(DRIFTS) measurements were used to characterize the activation products on the hemimorphite surface and their subsequent interaction with sodium butyl xanthate(SBX).The results showed that a Zn S coating formed on the hemimorphite surface after the sample was conditioned in an Na2 S solution.However,the formation of a Zn S coating on the hemimorphite surface did not improve hemimorphite flotation.With the subsequent addition of lead cations,Pb S species formed on the mineral surface.The formation of the Pb S species on the surface of hemimorphite significantly increased the adsorption capacity of SBX,forming lead xanthate(referred to as chemical adsorption) and leading to a substantial improvement in hemimorphite flotation.Our results indicate that the addition of lead cations is a critical step in the successful flotation of hemimorphite using the sulfidization–lead ion activation–xanthate process.  相似文献   
10.
A broker in an open e-marketplace enables buyers and sellers to do business with each other. Although a broker plays an important role in e-marketplaces, theory and guidelines for matching between buyers and sellers in multi-attribute exchanges are limited. Therefore, a challenge for a broker’s responsibility is how to maximize a buyer’s total satisfaction degree as its goals under the consideration of trade-off between a buyer’s buying quantity and price paid to a seller, and other attributes. To solve this challenge, this paper proposes an economic model-based matching approach between a buyer’s requirements and a seller’s offers. The major contributions of this paper are that (i) a broker can model a seller’s price policy as per a buyer’s buying quantity through communication between a broker and a seller; (ii) due to each buyer’s different quantity demand, a broker models a buyer’s satisfaction degree as per a buyer’s buying quantity based on communication between a broker and a buyer; and (iii) to carry out a broker’s matching processes, an objective function and a set of constraints are generated to help a broker to maximize a buyer’s total satisfaction degree. Experimental results demonstrate the good performance of the proposed approach.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号