首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   77篇
  免费   20篇
  国内免费   7篇
系统科学   10篇
现状及发展   18篇
研究方法   6篇
综合类   69篇
自然研究   1篇
  2022年   1篇
  2021年   2篇
  2020年   4篇
  2019年   2篇
  2018年   7篇
  2017年   10篇
  2016年   6篇
  2015年   7篇
  2014年   12篇
  2013年   6篇
  2012年   5篇
  2011年   9篇
  2010年   4篇
  2009年   5篇
  2008年   6篇
  2007年   7篇
  2006年   2篇
  2005年   1篇
  2004年   2篇
  2003年   2篇
  2002年   1篇
  1999年   1篇
  1971年   1篇
  1967年   1篇
排序方式: 共有104条查询结果,搜索用时 0 毫秒
71.
72.
In recent years, a wide variety of studies have applied soft systems methodology (SSM) to address the complexities of the messy situations. This paper seeks to identify 1) application areas and 2) application levels of the use of SSM in dealing with problematical situations. To do so, 149 articles published between 2000 and 2015 were studied. The findings revealed the application of SSM in new application areas such as sustainable development, knowledge management and project management. The results of this study also indicated that researchers applied SSM at three levels: SSM as a process of inquiry, SSM as an action-oriented methodology, and the hybrid use of SSM. Based on the findings, SSM at the level of a single methodology for bringing out changes has been less welcomed by researchers, but the application levels of inquiry processes and hybrid approaches have been more utilized. This suggests that in the correspondence of SSM with the nature or situation of problems, a sort of incommensurability is witnessed. Factors arising from the nature of the problem, inadequate mastery of the researcher over SSM or the limitations of SSM can exert an influence on this incommensurability.  相似文献   
73.
Objective: To develop a new bioinformatic tool based on a data-mining approach for extraction of the most informative proteins that could be used to find the potential biomarkers for the detection of cancer. Methods: Two independent datasets from serum samples of 253 ovarian cancer and 167 breast cancer patients were used. The samples were examined by surfaceenhanced laser desorption/ionization time-of-flight mass spectrometry (SELDI-TOF MS). The datasets were used to extract the informative proteins using a data-mining method in the discrete stationary wavelet transform domain. As a dimensionality reduction procedure, the hard thresholding method was applied to reduce the number of wavelet coefficients. Also, a distance measure was used to select the most discriminative coefficients. To find the potential biomarkers using the selected wavelet coefficients, we applied the inverse discrete stationary wavelet transform combined with a two-sided t-test. Results: From the ovarian cancer dataset, a set of five proteins were detected as potential biomarkers that could be used to identify the cancer patients from the healthy cases with accuracy, sensitivity, and specificity of 100%. Also, from the breast cancer dataset, a set of eight proteins were found as the potential biomarkers that could separate the healthy cases from the cancer patients with accuracy of 98.26%, sensitivity of 100%, and specificity of 95.6%. Conclusion: The results have shown that the new bioinformatic tool can be used in combination with the high-throughput proteomic data such as SELDI-TOF MS to find the potential biomarkers with high discriminative power.  相似文献   
74.
The aim of this study was to produce bulk nanocrystalline Al/Al12(Fe,V)3Si alloys by mechanical alloying (MA) and subsequent hot pressing (HP) of elemental powders. A nanostructured Al-based solid solution was formed by MA of elemental powders for 60 h. After HP of the as-milled powders at 550℃ for 20 min, the Al12(Fe,V)3Si phase was precipitated in a nanocrystalline Al matrix. Scanning electron microscopy (SEM) images of the bulk samples represented a homogeneous and uniform microstructure that was superior to those previously obtained by rapid solidification-powder metallurgy (RS-PM). Nanostructured Al-8.5Fe-1.3V-1.7Si and Al-11.6Fe-1.3V-2.3Si alloys ex-hibited high HV hardness values of~205 and~254, respectively, which are significantly higher than those reported for the RS-PM counter-parts.  相似文献   
75.
Chs5p is a component of the exomer, a coat complex required to transport the chitin synthase Chs3p from the trans-Golgi network to the plasma membrane. The Chs5p N-terminal region exhibits fibronectin type III (FN3) and BRCT domains. FN3 domains are present in proteins that mediate adhesion processes, whereas BRCT domains are involved in DNA repair. Several fungi—including Schizosaccharomyces pombe, which has no detectable amounts of chitin—have proteins similar to Chs5p. Here we show that the FN3 and BRCT motifs in Chs5p behave as a module that is necessary and sufficient for Chs5p localization and for cargo delivery. The N-terminal regions of S. cerevisiae Chs5p and S. pombe Cfr1p are interchangeable in terms of Golgi localization, but not in terms of exomer assembly, showing that the conserved function of this module is protein retention in this organelle and that the interaction between the exomer components is organism-specific.  相似文献   
76.
The best prediction of generalized autoregressive conditional heteroskedasticity (GARCH) models with α‐stable innovations, α‐stable power‐GARCH models and autoregressive moving average (ARMA) models with GARCH in mean effects (ARMA‐GARCH‐M) are proposed. We present a sufficient condition for stationarity of α‐stable GARCH models. The prediction methods are easy to implement in practice. The proposed prediction methods are applied for predicting future values of the daily SP500 stock market and wind speed data.  相似文献   
77.
78.
As an innovative concept, an optimal predictive impedance controller(OPIC) is introduced here to control a lower limb rehabilitation robot(LLRR) in the presence of uncertainty. The desired impedance law is considered to propose a conventional model-based impedance controller for the LLRR. However, external disturbances, model imperfection, and parameters uncertainties reduce the performance of the controller in practice. In order to cope with these uncertainties, an optimal predictive compensator is introduced as a solution for a proposed convex optimization problem, which is performed on a forward finite-length horizon. As a result, the LLRR has the desired behavior even in an uncertain environment. The performance and efficiency of the proposed controller are verified by the simulation results.  相似文献   
79.
From the early ninth century until about eight centuries later, the Middle East witnessed a series of both simple and systematic astronomical observations for the purpose of testing contemporary astronomical tables and deriving the fundamental solar, lunar, and planetary parameters. Of them, the extensive observations of lunar eclipses available before 1000 AD for testing the ephemeredes computed from the astronomical tables are in a relatively sharp contrast to the twelve lunar observations that are pertained to the four extant accounts of the measurements of the basic parameters of Ptolemaic lunar model. The last of them are Taqī al-Dīn Mu?ammad b. Ma‘rūf’s (1526–1585) trio of lunar eclipses observed from Istanbul, Cairo, and Thessalonica in 1576–1577 and documented in chapter 2 of book 5 of his famous work, Sidrat muntaha al-afkar fī malakūt al-falak al-dawwār (The Lotus Tree in the Seventh Heaven of Reflection). In this article, we provide a detailed analysis of the accuracy of his solar (1577–1579) and lunar observations.  相似文献   
80.
Several security solutions have been proposed to detect network abnormal behavior. However, successful attacks is still a big concern in computer society. Lots of security breaches, like Distributed Denial of Service(DDoS),botnets, spam, phishing, and so on, are reported every day, while the number of attacks are still increasing. In this paper, a novel voting-based deep learning framework, called VNN, is proposed to take the advantage of any kinds of deep learning structures. Considering several models created by different aspects of data and various deep learning structures, VNN provides the ability to aggregate the best models in order to create more accurate and robust results. Therefore, VNN helps the security specialists to detect more complicated attacks. Experimental results over KDDCUP'99 and CTU-13, as two well known and more widely employed datasets in computer network area, revealed the voting procedure was highly effective to increase the system performance, where the false alarms were reduced up to 75% in comparison with the original deep learning models, including Deep Neural Network(DNN), Convolutional Neural Network(CNN), Long Short-Term Memory(LSTM), and Gated Recurrent Unit(GRU).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号