首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14026篇
  免费   106篇
  国内免费   48篇
系统科学   155篇
丛书文集   208篇
教育与普及   41篇
理论与方法论   75篇
现状及发展   6064篇
研究方法   512篇
综合类   6983篇
自然研究   142篇
  2015年   83篇
  2013年   118篇
  2012年   306篇
  2011年   447篇
  2008年   192篇
  2007年   216篇
  2006年   214篇
  2005年   426篇
  2004年   686篇
  2003年   654篇
  2002年   338篇
  2001年   354篇
  2000年   432篇
  1999年   255篇
  1992年   204篇
  1991年   172篇
  1990年   187篇
  1989年   185篇
  1988年   194篇
  1987年   170篇
  1986年   191篇
  1985年   255篇
  1984年   162篇
  1983年   162篇
  1982年   112篇
  1981年   126篇
  1980年   162篇
  1979年   431篇
  1978年   316篇
  1977年   329篇
  1976年   246篇
  1975年   250篇
  1974年   387篇
  1973年   317篇
  1972年   342篇
  1971年   366篇
  1970年   463篇
  1969年   428篇
  1968年   417篇
  1967年   371篇
  1966年   340篇
  1965年   252篇
  1964年   79篇
  1959年   117篇
  1958年   211篇
  1957年   169篇
  1956年   160篇
  1955年   132篇
  1954年   132篇
  1948年   104篇
排序方式: 共有10000条查询结果,搜索用时 671 毫秒
751.
In this paper, we present a strategy to implement multi pose face detection in compressed domain. The strategy extracts firstly feature vectors from DCT domain, and then uses a boosting algorithm to build classifiers to distinguish faces and non-faces. Moreover. to get more accurate results of the face detection, we present a kernel function and a linear combination to build incrementally the strong classifiers based on the weak classifiers. Through comparing and analyzing results of some experiments on the synthetic data and the natural data, we can get more satisfied results by the strong classifiers than by the weak classifies.  相似文献   
752.
Making use of Microsoft Visual Studio. NET platform, hierarchical network planning is realized in working procedure time-optimization of the construction by TBM. and hierarchical network graph of the construction by TBM is drawn based on browser. Then the theory of system realization is discussed, six components of system that can be reused are explained emphatically. The realization of hierarchical network panning in Internet provides available guarantee for controlling rate of progress in large-scale or middle-sized projects.  相似文献   
753.
This paper introduces the definition and calculation of the association matrix between ontologies, h uses the association matrix to describe the relations between concepls ill different ontologics and uses concept vectors to represent queries; then computes the vectors with the association matrix in order to rewrite queries, This paper proposes a simple method of querying through heterogeneous Ontology using association matrix. This method is based on the correctness of approximate information filtering theory; and it is simple to be implemented and expected to run quite fast.  相似文献   
754.
Outlier detection has very important applied value in data mining literature. Different outlier detection algorithms based on distinct theories have different definitions and mining processes. The three-dimensional space graph for constructing applied algorithms and an improved GridOf algorithm were proposed in terms of analyzing the existing outlier detection algorithms from criterion and theory.  相似文献   
755.
Clustering in high-dimensional space is an important domain in data mining. It is the process of discovering groups in a high-dimensional dataset, in such way, that the similarity between the elements of the same cluster is maximum and between different clusters is minimal. Many clustering algorithms are not applicable to high dimensional space for its sparseness and decline properties. Dimensionality reduction is an effective method to solve this problem. The paper proposes a novel clustering algorithm CFSBC based onclosed frequent hemsets derived from association rule mining. which can get the clustering attributes with high efficiency. The algorithm has several advantages. First, it deals effectively with the problem of dimensionality reduction. Second, it is applicable to different kinds of attributes, Third, it is suitable for very large data sets. Experiment shows that the proposed algorithm is effective and efficient  相似文献   
756.
Integrated semantic similarity model based on ontology   总被引:1,自引:0,他引:1  
To solve the problem of the inadequacy of semantic processing in the intelligent question answering system. an integrated semantic similarity model which calculates the semantic similarity using the geometric distance and informarion content is presented in this paper. With the help of interrelationship between concepts, the information content ofconcepts and the strength of the edges in the ontology network. we can calculate the semantic similarity between two concepts and provide information for the further calculation of the semantic similarity between user‘s question and answers in knowlegdge base. The results of the experiments on the prototype have shown that the semantic problem in natural language processing can also be solved with the help of the knowledge and the abundant semantic information in ontology. More than 90% accuracy with less than 50 ms average searching time in the intelligent question answering prototype system based on ontology has been reached. The result is vety satisfied.  相似文献   
757.
To construct a high efficient text clustering algorithm, the multilevel graph model and the refinement algorithm used in the uncoarsening phase is discussed, The model is applied to text clustering. The performance of clustering algorithm has to be improved with the refinement algorithm application, The experiment result demonstrated that the muhilevel graph text clustering algorithm is available,  相似文献   
758.
Component-based development needs a well-designed components library and a set of support tools. This paper presents the design and implementation of a components library system model and its support tool UMLCASE. A set of practical CASE tools is constructed. UMLCASE can use UML to design Use Case Diagram. Class Diagram etc. And it integrates with components library system.  相似文献   
759.
A new admission control algorithm considering the network self-similar access characteristics is proposed. Taking advantage of the mathematical model of the network traffic admission control which can effectively overcome the self-similar characteristics of tile network requests, through the scheduling of the differential service queue based on priority while at the same time taking into account various factors including access characteristics of requests, load information, etc. smoothness of the admission control is ensured by the algorlthm proposed in this paper. We design a non-linear self-adapting control algorithm by introducing an exponential admission function, thus overcomes the negative aspects introduced by static threshold parameters. Simulation results show that the scheme proposed in this paper can effectively improve the resource utilization of the clusters, while at the same time protecting the service with high priority. Our simulation resuhs also show that this algorithm can improve system stability and reliability too.  相似文献   
760.
An improved double-threshold method based on gradient histogram   总被引:2,自引:0,他引:2  
This paper analyzes the characteristics of the output gradient histogram and shortages of several traditional automatic threshold methods in order to segment the gradient image better. Then an improved double-threshold method is proposed, which is combined with the method of maximum classes variance, estimatingarea method and double-threshold method. This method can automatically select two different thresholds to segment gradient images. The computer simulation is performed on the traditional methods and this algorithm and proves that this method can get satisfying result.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号