首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10202篇
  免费   418篇
  国内免费   564篇
系统科学   513篇
丛书文集   264篇
教育与普及   243篇
理论与方法论   38篇
现状及发展   42篇
研究方法   32篇
综合类   10050篇
自然研究   2篇
  2024年   54篇
  2023年   99篇
  2022年   165篇
  2021年   205篇
  2020年   140篇
  2019年   51篇
  2018年   78篇
  2017年   115篇
  2016年   118篇
  2015年   246篇
  2014年   322篇
  2013年   350篇
  2012年   368篇
  2011年   406篇
  2010年   399篇
  2009年   403篇
  2008年   471篇
  2007年   458篇
  2006年   469篇
  2005年   451篇
  2004年   340篇
  2003年   358篇
  2002年   398篇
  2001年   407篇
  2000年   378篇
  1999年   509篇
  1998年   446篇
  1997年   477篇
  1996年   394篇
  1995年   308篇
  1994年   296篇
  1993年   286篇
  1992年   273篇
  1991年   207篇
  1990年   205篇
  1989年   173篇
  1988年   160篇
  1987年   105篇
  1986年   52篇
  1985年   23篇
  1984年   7篇
  1983年   9篇
  1982年   2篇
  1981年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
 柔性可延展电子因其能够适应非平面工作环境,将突破现有电子器件的应用范围,促进信息与人的融合,在智能穿戴电子、柔性显示、生物医疗等领域具有广阔的应用前景。本文提出利用印刷结合真空抽滤方法实现硅胶基衬底表面高分辨复杂可延展电路的制备;研究了丝网印刷工艺实现微孔滤膜表面银纳米线(Ag NWs)图形化沉积的分辨率;讨论了Ag NWs线长、抽滤真空度等因素对沉积分辨率的影响,实现了Ag NWs图形化50 μm线径分辨率及间隔分辨率。本文还研究了硅胶基衬底表面微电极的电阻均一性及拉伸电阻稳定性,并结合电极表面微结构的变化详细讨论了屈曲褶皱结构的出现对微电极拉伸电阻的影响,实现了100 μm线宽微电极100%拉伸幅度下电阻增加仅为初始值的40%。最后,通过集成LED芯片演示了面料基底表面柔性可延展发光电路。本研究对于柔性可延展电路的制备提供了新的思路。  相似文献   
22.
基于两次Kalman滤波的观测噪声自适应调整算法   总被引:3,自引:1,他引:3  
在实际的目标跟踪过程中,由于目标远近等各种客观因素的影响,观测噪声是随时变化的.但是在标准卡尔曼滤波中,如果将观测噪声协方差设为恒定值,必然造成跟踪结果不理想.针对这种情况,通过在任意时刻施行两次卡尔曼滤波的结果来自适应地调整观测噪声协方差,使卡尔曼滤波算法中的观测噪声协方差与实际值更加接近,从而提高对目标的跟踪精度.最后Monte Carlo仿真实验证明了本算法的有效性.  相似文献   
23.
A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and the man in the middle attack if the third party is not trusted. Also, based on the proposed scheme for the first-hand transaction, a new buyer-reseller watermarking protocol and a formal multi-party watermarking protocol are also proposed. The proposed buyer-resell watermarking protocol only needs the original seller to provide transfer certificate and encryption-decryption service to support the second-hand transaction, and the multi-party watermarking protocol with distributed certificate authorities can overcome the difficulty in the combination of multicast mechanism with multiple unique watermarks and allow a seller to multicast the watermarked digital contents and key transaction information to n buyers. Furthermore, the idea of zero knowledge proof is also applied into the proposed scheme to allow the seller to take an effective control on the task performed by the third party.  相似文献   
24.
Traditional Chinese medicine (TCM) has a rich knowledge about human health and disease by its special way evolved along a very long history. As modern medicine is achieving much progress, arguments and disputes toward TCM never end. To avoid losing precious knowledge of living TCM masters, endeavors have been engaged to systematic collection of those knowledge of TCM masters, such as their growth experiences, effective practical cases toward diseases and typical therapeutic principles and methods. Knowledge mining methods have been expected to explore some useful or hidden patterns to unveil some mysteries of the TCM system. In the paper, some computerized methods are applied toward those collected materials about some living TCM masters in China mainland to show a different way of exposing essential ideas of those TCM masters by correspondence visualization which aims to help people understand TCM holistic views toward disease and body, and facilitate tacit knowledge transfer and sense-making of the essence of TCM. The work is one kind of qualitative meta-synthesis of TCM masters' knowledge.  相似文献   
25.
The manner and conditions of running the decision-making system with self-defense electronic jamming are given.After proposing the scenario of applying discrete dynamic Bayesian network to the decision making with self-defense electronic jamming,a decision-making model with self-defense electronic jamming based on the discrete dynamic Bayesian network is established.Then jamming decision inferences by the aid of the algorithm of discrete dynamic Bayesian network are carried on.The simulating result shows that this method is able to synthesize different targets which are not predominant.In this way,various features at the same time,as well as the same feature appearing at different time complement mutually;in addition,the accuracy and reliability of electronic jamming decision making are enhanced significantly.  相似文献   
26.
水下机器人(简称AUV)的自主控制系统起着相当于人类"大脑"的作用,它是AUV的核心技术。本文在QNX操作系统下利用多线程技术设计并实现了AUV自主控制系统。介绍了AUV混杂系统结构和自主控制原理,给出了自主控制系统的多线程结构。设计了多线程同步模块,并与QNX消息传递机制相结合实现了AUV自主控制系统线程间的同步与通信。最后在半实物仿真平台上结合具体案例对自主控制系统进行了验证。仿真结果表明AUV自主控制系统能够正确协调各个线程自主完成使命。  相似文献   
27.
In this paper we study transport processes on infinite networks with dynamic boundary control nodes. These flows can be modeled by operator semigroups on a suitable Banach space. Using functional analytical and graph theoretical methods, we investigate its spectral properties of the system and positivity of the semigroup under appropriate assumptions on the network.  相似文献   
28.
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to recondigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance.  相似文献   
29.
基于离散动态贝叶斯网络的辐射源目标识别研究   总被引:5,自引:0,他引:5  
提出基于离散动态贝叶斯网络模型,对若干可观测的目标特征参数进行综合推理.推导了离散动态贝叶斯网络的推理算法.建立了目标识别的离散动态贝叶斯网络模型.应用图形模式,使得计算量大大简化,降低了实用的复杂性.仿真结果表明,该方法能够将各种目标特征进行综合,使得各种特征及不同时刻的同一特征互相修正补充,克服了依靠单一特征进行目标识别的局限.  相似文献   
30.
城市竞争力作为一个比较概念,是城市在竞争中所表现出的相对优势、比较差距、吸引力与收益力的综合指标,其受制约与影响的因素很多.本文从决定城市竞争力的社会、经济、环境、空间结构四要素着手,设计一个新型的金字塔城市结构竞争力模型,在此基础上构建一套城市综合竞争力评价指标体系,选取长沙市为样本进行实证分析并提出相应对策.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号