首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5263篇
  免费   219篇
  国内免费   300篇
系统科学   244篇
丛书文集   140篇
教育与普及   88篇
理论与方法论   17篇
现状及发展   48篇
研究方法   24篇
综合类   5219篇
自然研究   2篇
  2024年   34篇
  2023年   60篇
  2022年   95篇
  2021年   94篇
  2020年   78篇
  2019年   18篇
  2018年   55篇
  2017年   64篇
  2016年   64篇
  2015年   115篇
  2014年   168篇
  2013年   156篇
  2012年   161篇
  2011年   175篇
  2010年   156篇
  2009年   206篇
  2008年   236篇
  2007年   244篇
  2006年   192篇
  2005年   183篇
  2004年   133篇
  2003年   129篇
  2002年   124篇
  2001年   160篇
  2000年   172篇
  1999年   329篇
  1998年   284篇
  1997年   283篇
  1996年   272篇
  1995年   228篇
  1994年   183篇
  1993年   174篇
  1992年   151篇
  1991年   146篇
  1990年   128篇
  1989年   101篇
  1988年   92篇
  1987年   68篇
  1986年   44篇
  1985年   13篇
  1984年   2篇
  1983年   1篇
  1982年   3篇
  1978年   1篇
  1974年   2篇
  1971年   1篇
  1967年   2篇
  1957年   2篇
排序方式: 共有5782条查询结果,搜索用时 15 毫秒
181.
Traditional Chinese medicine (TCM) has a rich knowledge about human health and disease by its special way evolved along a very long history. As modern medicine is achieving much progress, arguments and disputes toward TCM never end. To avoid losing precious knowledge of living TCM masters, endeavors have been engaged to systematic collection of those knowledge of TCM masters, such as their growth experiences, effective practical cases toward diseases and typical therapeutic principles and methods. Knowledge mining methods have been expected to explore some useful or hidden patterns to unveil some mysteries of the TCM system. In the paper, some computerized methods are applied toward those collected materials about some living TCM masters in China mainland to show a different way of exposing essential ideas of those TCM masters by correspondence visualization which aims to help people understand TCM holistic views toward disease and body, and facilitate tacit knowledge transfer and sense-making of the essence of TCM. The work is one kind of qualitative meta-synthesis of TCM masters' knowledge.  相似文献   
182.
The manner and conditions of running the decision-making system with self-defense electronic jamming are given.After proposing the scenario of applying discrete dynamic Bayesian network to the decision making with self-defense electronic jamming,a decision-making model with self-defense electronic jamming based on the discrete dynamic Bayesian network is established.Then jamming decision inferences by the aid of the algorithm of discrete dynamic Bayesian network are carried on.The simulating result shows that this method is able to synthesize different targets which are not predominant.In this way,various features at the same time,as well as the same feature appearing at different time complement mutually;in addition,the accuracy and reliability of electronic jamming decision making are enhanced significantly.  相似文献   
183.
Krylov subspace method based on data preprocessing technology   总被引:2,自引:0,他引:2  
The performance of adaptive beamforming techniques is limited by the nonhomogeneous clutter scenario. An augmented Krylov subspace method is proposed, which utilizes only a single snapshot of the data for adaptive processing. The novel algorithm puts together a data preprocessor and adaptive Krylov subspace algorithm, where the data preprocessor suppresses discrete interference and the adaptive Krylov subspace algorithm suppresses homogeneous clutter. The novel method uses a single snapshot of the data received by the array antenna to generate a cancellation matrix that does not contain the signal of interest (SOI) component, thus, it mitigates the problem of highly nonstationary clutter environment and it helps to operate in real-time. The benefit of not requiring the training data comes at the cost of a reduced degree of freedom (DOF) of the system. Simulation illustrates the effectiveness in clutter suppression and adaptive beamforming. The numeric results show good agreement with the proposed theorem.  相似文献   
184.
On the basis of capacity flow model, a new model is developed for a load-sharing k-out-of-n: G system consisting of different components, to describe the increase of the same component's failure rates under different loads. All components have exponential life distributions and are nonrepairable in the system. Reliability of load- sharing 2-out- of-3: G system is calculated and some special cases for the system are discussed. The calculation and discussions show that the model is right and practical.  相似文献   
185.
The risk classification of BBS posts is important to the evaluation of societal risk level within a period. Using the posts collected from Tianya forum as the data source, the authors adopted the societal risk indicators from socio psychology, and conduct document-level multiple societal risk classification of BBS posts. To effectively capture the semantics and word order of documents, a shallow neural network as Paragraph Vector is applied to realize the distributed vector representations of the posts in the vector space. Based on the document vectors, the authors apply one classification method KNN to identify the societal risk category of the posts. The experimental results reveal that paragraph vector in document-level societal risk classification achieves much faster training speed and at least 10% improvements of F-measures than Bag-of-Words. Furthermore, the performance of paragraph vector is also superior to edit distance and Lucene-based search method. The present work is the first attempt of combining document embedding method with socio psychology research results to public opinions area.  相似文献   
186.
The margin maximization problem in digital subscriber line (DSL) systems is investigated. The particle swarm optimization (PSO) theory is applied to the nonconvex margin optimization problem with the target power and rate constraints. PSO is a new evolution algorithm based on the social behavior of swarms, which can solve discontinuous, nonconvex and nonlinear problems efficiently. The proposed algorithm can converge to the global optimal solution, and numerical example demonstrates that the proposed algorithm can guarantee the fast convergence within a few iterations.  相似文献   
187.
N-acetamide C60 nitride (N-acetamide-1,2-dihydro-1,2-aza-fullerene [60]) has been synthesized by the reaction of C60 and azidoacetamide and initially characterized. Its mechanism was that the objective product is formed through intermediate triazoline. The computational study shows that N-nitride structure is thermodynamically more stable by using the semi-empirical AM1 SCF-MO method. The properties of optical limiting were tested by using double frequency Nd: YAG pulse laser system and showed that the optical limiting mechanism is reverse saturation absorption. At wavelength of 532 nm, compared with optical limiting for ns pulse, this new material has good optical limiting character for ps pulse. At wavelength of 707 nm, the capacity of optical limiting of the derivative is prior to C60.  相似文献   
188.
针对传统方法难以分析掺烧生活垃圾后的水泥窑复杂燃烧特性的问题,引入数据挖掘技术,以国内某水泥厂为对象,采集相关参数数据,使用稳定性选择算法分析各参数对煤耗与NOx排量的影响系数,通过随机森林算法建立煤耗与NOx排量的数学模型,结合K-means聚类算法得出关键优化参数及其最优值。结果表明,该方法能够建立精确的煤耗与NOx排量模型,挖掘出节能减排的关键优化参数及其最优目标值。通过改善关键优化参数至最优值,能够大大降低煤耗与NOx排量,可指导水泥厂优化窑内燃烧特性。  相似文献   
189.
诺贝尔经济学奖得主丹尼尔.卡尼曼及其合作者阿莫斯.特沃斯基的展望理论指出决策行为会受到价值函数形式的影响。本文首先介绍展望理论,给出若干具体的价值函数形式,在考虑投资者决策受价值函数影响的基础上建立基于对参照点收益价值函数转化的若干资产选择模型,从直觉上能够判断出这些模型更加符合投资决策心理和行为,而实证结果也表明这些资产选择模型能够有效地降低负离差风险。  相似文献   
190.
Aiming at technical difficulties in feature extraction for the inverse synthetic aperture radar (ISAR) target recognition, this paper imports the concept of visual perception and presents a novel method, which is based on the combination of non-negative sparse coding (NNSC) and linear discrimination optimization, to recognize targets in ISAR images. This method implements NNSC on the matrix constituted by the intensities of pixels in ISAR images for training, to obtain non-negative sparse bases which characterize sparse distribution of strong scattering centers. Then this paper chooses sparse bases via optimization criteria and calculates the corresponding non-negative sparse codes of both training and test images as the feature vectors, which are input into k neighbors classifier to realize recognition finally. The feasibility and robustness of the proposed method are proved by comparing with the template matching, principle component analysis (PCA) and non-negative matrix factorization (NMF) via simulations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号