全文获取类型
收费全文 | 5263篇 |
免费 | 219篇 |
国内免费 | 300篇 |
专业分类
系统科学 | 244篇 |
丛书文集 | 140篇 |
教育与普及 | 88篇 |
理论与方法论 | 17篇 |
现状及发展 | 48篇 |
研究方法 | 24篇 |
综合类 | 5219篇 |
自然研究 | 2篇 |
出版年
2024年 | 34篇 |
2023年 | 60篇 |
2022年 | 95篇 |
2021年 | 94篇 |
2020年 | 78篇 |
2019年 | 18篇 |
2018年 | 55篇 |
2017年 | 64篇 |
2016年 | 64篇 |
2015年 | 115篇 |
2014年 | 168篇 |
2013年 | 156篇 |
2012年 | 161篇 |
2011年 | 175篇 |
2010年 | 156篇 |
2009年 | 206篇 |
2008年 | 236篇 |
2007年 | 244篇 |
2006年 | 192篇 |
2005年 | 183篇 |
2004年 | 133篇 |
2003年 | 129篇 |
2002年 | 124篇 |
2001年 | 160篇 |
2000年 | 172篇 |
1999年 | 329篇 |
1998年 | 284篇 |
1997年 | 283篇 |
1996年 | 272篇 |
1995年 | 228篇 |
1994年 | 183篇 |
1993年 | 174篇 |
1992年 | 151篇 |
1991年 | 146篇 |
1990年 | 128篇 |
1989年 | 101篇 |
1988年 | 92篇 |
1987年 | 68篇 |
1986年 | 44篇 |
1985年 | 13篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 3篇 |
1978年 | 1篇 |
1974年 | 2篇 |
1971年 | 1篇 |
1967年 | 2篇 |
1957年 | 2篇 |
排序方式: 共有5782条查询结果,搜索用时 15 毫秒
181.
Traditional Chinese medicine (TCM) has a rich knowledge about human health and disease by its special way evolved along a very long history. As modern medicine is achieving much progress, arguments and disputes toward TCM never end. To avoid losing precious knowledge of living TCM masters, endeavors have been engaged to systematic collection of those knowledge of TCM masters, such as their growth experiences, effective practical cases toward diseases and typical therapeutic principles and methods. Knowledge mining methods have been expected to explore some useful or hidden patterns to unveil some mysteries of the TCM system. In the paper, some computerized methods are applied toward those collected materials about some living TCM masters in China mainland to show a different way of exposing essential ideas of those TCM masters by correspondence visualization which aims to help people understand TCM holistic views toward disease and body, and facilitate tacit knowledge transfer and sense-making of the essence of TCM. The work is one kind of qualitative meta-synthesis of TCM masters' knowledge. 相似文献
182.
The manner and conditions of running the decision-making system with self-defense electronic jamming are given.After proposing the scenario of applying discrete dynamic Bayesian network to the decision making with self-defense electronic jamming,a decision-making model with self-defense electronic jamming based on the discrete dynamic Bayesian network is established.Then jamming decision inferences by the aid of the algorithm of discrete dynamic Bayesian network are carried on.The simulating result shows that this method is able to synthesize different targets which are not predominant.In this way,various features at the same time,as well as the same feature appearing at different time complement mutually;in addition,the accuracy and reliability of electronic jamming decision making are enhanced significantly. 相似文献
183.
Krylov subspace method based on data preprocessing technology 总被引:2,自引:0,他引:2
The performance of adaptive beamforming techniques is limited by the nonhomogeneous clutter scenario. An augmented Krylov subspace method is proposed, which utilizes only a single snapshot of the data for adaptive processing. The novel algorithm puts together a data preprocessor and adaptive Krylov subspace algorithm, where the data preprocessor suppresses discrete interference and the adaptive Krylov subspace algorithm suppresses homogeneous clutter. The novel method uses a single snapshot of the data received by the array antenna to generate a cancellation matrix that does not contain the signal of interest (SOI) component, thus, it mitigates the problem of highly nonstationary clutter environment and it helps to operate in real-time. The benefit of not requiring the training data comes at the cost of a reduced degree of freedom (DOF) of the system. Simulation illustrates the effectiveness in clutter suppression and adaptive beamforming. The numeric results show good agreement with the proposed theorem. 相似文献
184.
On the basis of capacity flow model, a new model is developed for a load-sharing k-out-of-n: G system consisting of different components, to describe the increase of the same component's failure rates under different loads. All components have exponential life distributions and are nonrepairable in the system. Reliability of load- sharing 2-out- of-3: G system is calculated and some special cases for the system are discussed. The calculation and discussions show that the model is right and practical. 相似文献
185.
The risk classification of BBS posts is important to the evaluation of societal risk level within a period. Using the posts collected from Tianya forum as the data source, the authors adopted the societal risk indicators from socio psychology, and conduct document-level multiple societal risk classification of BBS posts. To effectively capture the semantics and word order of documents, a shallow neural network as Paragraph Vector is applied to realize the distributed vector representations of the posts in the vector space. Based on the document vectors, the authors apply one classification method KNN to identify the societal risk category of the posts. The experimental results reveal that paragraph vector in document-level societal risk classification achieves much faster training speed and at least 10% improvements of F-measures than Bag-of-Words. Furthermore, the performance of paragraph vector is also superior to edit distance and Lucene-based search method. The present work is the first attempt of combining document embedding method with socio psychology research results to public opinions area. 相似文献
186.
Margin optimization algorithm for digital subscriber lines based on particle swarm optimization* 下载免费PDF全文
The margin maximization problem in digital subscriber line (DSL) systems is investigated. The particle swarm optimization (PSO) theory is applied to the nonconvex margin optimization problem with the target power and rate constraints. PSO is a new evolution algorithm based on the social behavior of swarms, which can solve discontinuous, nonconvex and nonlinear problems efficiently. The proposed algorithm can converge to the global optimal solution, and numerical example demonstrates that the proposed algorithm can guarantee the fast convergence within a few iterations. 相似文献
187.
N-acetamide C60 nitride (N-acetamide-1,2-dihydro-1,2-aza-fullerene [60]) has been synthesized by the reaction of C60 and azidoacetamide and initially characterized. Its mechanism was that the objective product is formed through intermediate
triazoline. The computational study shows that N-nitride structure is thermodynamically more stable by using the semi-empirical
AM1 SCF-MO method. The properties of optical limiting were tested by using double frequency Nd: YAG pulse laser system and
showed that the optical limiting mechanism is reverse saturation absorption. At wavelength of 532 nm, compared with optical
limiting for ns pulse, this new material has good optical limiting character for ps pulse. At wavelength of 707 nm, the capacity
of optical limiting of the derivative is prior to C60. 相似文献
188.
189.
190.
Aiming at technical difficulties in feature extraction for the inverse synthetic aperture radar (ISAR) target recognition, this paper imports the concept of visual perception and presents a novel method, which is based on the combination of non-negative sparse coding (NNSC) and linear discrimination optimization, to recognize targets in ISAR images. This method implements NNSC on the matrix constituted by the intensities of pixels in ISAR images for training, to obtain non-negative sparse bases which characterize sparse distribution of strong scattering centers. Then this paper chooses sparse bases via optimization criteria and calculates the corresponding non-negative sparse codes of both training and test images as the feature vectors, which are input into k neighbors classifier to realize recognition finally. The feasibility and robustness of the proposed method are proved by comparing with the template matching, principle component analysis (PCA) and non-negative matrix factorization (NMF) via simulations. 相似文献