首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   17395篇
  免费   42篇
  国内免费   53篇
系统科学   253篇
丛书文集   445篇
教育与普及   36篇
理论与方法论   50篇
现状及发展   7992篇
研究方法   745篇
综合类   7815篇
自然研究   154篇
  2012年   215篇
  2011年   430篇
  2010年   101篇
  2009年   95篇
  2008年   277篇
  2007年   348篇
  2006年   291篇
  2005年   305篇
  2004年   277篇
  2003年   329篇
  2002年   272篇
  2001年   611篇
  2000年   612篇
  1999年   349篇
  1993年   87篇
  1992年   329篇
  1991年   254篇
  1990年   298篇
  1989年   272篇
  1988年   263篇
  1987年   278篇
  1986年   287篇
  1985年   342篇
  1984年   242篇
  1983年   220篇
  1982年   201篇
  1981年   239篇
  1980年   263篇
  1979年   570篇
  1978年   470篇
  1977年   469篇
  1976年   355篇
  1975年   379篇
  1974年   591篇
  1973年   461篇
  1972年   415篇
  1971年   514篇
  1970年   659篇
  1969年   573篇
  1968年   493篇
  1967年   531篇
  1966年   447篇
  1965年   331篇
  1959年   198篇
  1958年   293篇
  1957年   192篇
  1956年   172篇
  1955年   167篇
  1954年   159篇
  1948年   87篇
排序方式: 共有10000条查询结果,搜索用时 10 毫秒
131.
Atomicity is necessary for reliable and secure electronic commerce transaction and to guarantee the participants' interests. An atomic and efficient e-cash (electronic cash) transaction protocol based on the classical e-cash scheme is presented. The delivery of digital goods is incorporated into the process of payment in the protocol. Apart from ensuring all three levels of atomicity, the novel protocol features high efficiency and practicability with unfavorable strong assumption removed. Furthermore, the proposed protocol provides non-repudiation proofs for any future disputes. At last, analysis of the atomicity and efficiency is illustrated.  相似文献   
132.
Abstract: The cooperative mechanism is one main issue in the decentralized supply chain system, especially in an asym-metric information structure. We analyze the non-cooperative game behavior of a 2-echelon distribution supply chain,compare the results with the system optimal solution, and give the supplier dominated cooperative mechanisms. We alsoanalyze the validity of our contract under the asymmetric retailers' holding cost information and give some useful conclu-sions.  相似文献   
133.
Abstract: A array of the azimuthally averaged range-profile vectors and the inter-class and intra-class divergence matrixesare constructed iwth many frames of the high resolution range profiles which result from radar echoes of airplanes. Takingthe methods of whitening transformation and SVD produces a system of subspace vectors for target recognition. Where-upon, a template library for target recognition is built by the projection of a class-mean vector made from the radar dataonto the subspace for recognition. By Euclidean distance, a comparison is made between the above projection and eachtemplate in the library, to decide which class the target belongs to. Finally, simulations with the experimental radar dataarte given to show that the proposed method is robust to variation in azimuth and immune to additive Gaussian noisewhen SNR≥5dB.  相似文献   
134.
Abstract: A novel evolutionary route planner for aircraft is proposed in this paper. In the new planner, individual candi-dates are evaluated with respect to the workspace, thus the computation of the configuration space is not required. By usingproblem-specific chromosome structure and genetic operators, the routes are generated in real time, with different missionconstraints such as minimum route leg length and flying altitude, maximum turning angle, maximum climbing/diving an-gle and route distance constraint taken into account.  相似文献   
135.
Abstract: After a recursive multi-step-ahead predictor for nonlinear systems based on local recurrent neural networks isintroduced, an intelligent PID controller is adopted to correct the errors including identified model errors and accumulatederrors produced in the recursive process. Characterized by predictive control, this method can achieve a good controlaccuracy and has good robustness. A simulation study shows that this control algorithm is very effective.  相似文献   
136.
1 .INTRODUCTIONItisknownthatphysicaloptics(PO)hasbeenwidelyusedinfastpredictionofradarcrosssection (RCS)ofacomplexconductingorcoatedobject.POisadoptedwithoutexceptionamongtheissuedfamouscomputa tionalsoftwareofhigh frequencyEMscatteringbyacomplexobjectsuchasRECOTA[1 ] ,GRECO[2 ,3] ,X PATCH[4] ,whereonlytheisotropiccoatingisconcerned .However,theanisotropiccoatingencoun teredinsomepracticalapplicationsimpelsonetofindthesuitablesolutionforhigh frequencyscatteringbytheobjectcoatedwi…  相似文献   
137.
1 .INTRODUCTIONTheabilityofpositioningmobileobjects (MOs) ,in cludingvehiclesandtravelersholdingmobiletermi nals,isafundamentalfunctionforsomeITSsubsys tems,suchasemergencyrescue,securitysystem ,au tomaticnavigationsystem ,andtrafficinducementsystem[1 ] .Atpresent,therearethreedominatingtypes[2 ]ofwirelesspositioningtechnologies,i.e.positioningbasedonsatellites,positioningbasedondedicatedcommunicationsystemsandpositioningbasedonpub liclandwirelesstelecommunicationsystems (PLMTS) ,respe…  相似文献   
138.
Many blind channel estimation methods have been proposed for direct sequence (DS) code-division multiple access (CDMA) systems, so we can certainly use them to estimate the finite impulse response (FIR) channel for the multi-carrier (MC-) CDMA system. In this paper, the MC-CDMA system is interpreted as an equivalent time-domain DS-CD-MA system with specific spreading codes. Then, an equivalently time-domain blind channel estimator is derived for the  相似文献   
139.
In wireless networks, packet access is a popular mode, and the key problem is how to improve throughput and access delay performance, especially the throughput for wireless channels. These results will be a reference for not only a wireless channel but also a common MAC protocol.  相似文献   
140.
Support vector machine (SVM), as a novel approach in pattern recognition, has demonstrated a success in face detection and face recognition. In this paper, a face recognition approach based on the SVM classifier with the nearest neighbor classifier (NNC) is proposed. The principal component analysis (PCA) is used to reduce the dimension and extract features. Then one-against-all stratedy is used to train the SVM classifiers. At the testing stage, we propose an al-  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号