全文获取类型
收费全文 | 5488篇 |
免费 | 606篇 |
专业分类
系统科学 | 1073篇 |
理论与方法论 | 275篇 |
现状及发展 | 893篇 |
研究方法 | 2篇 |
综合类 | 3851篇 |
出版年
2021年 | 1篇 |
2018年 | 727篇 |
2017年 | 733篇 |
2016年 | 432篇 |
2015年 | 30篇 |
2014年 | 6篇 |
2013年 | 3篇 |
2012年 | 258篇 |
2011年 | 954篇 |
2010年 | 816篇 |
2009年 | 454篇 |
2008年 | 509篇 |
2007年 | 762篇 |
2006年 | 3篇 |
2005年 | 42篇 |
2004年 | 125篇 |
2003年 | 150篇 |
2002年 | 55篇 |
2001年 | 1篇 |
2000年 | 1篇 |
1998年 | 1篇 |
1994年 | 2篇 |
1991年 | 3篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 4篇 |
1978年 | 2篇 |
1977年 | 3篇 |
1976年 | 1篇 |
1973年 | 1篇 |
1971年 | 2篇 |
1969年 | 2篇 |
1968年 | 1篇 |
1967年 | 3篇 |
排序方式: 共有6094条查询结果,搜索用时 15 毫秒
991.
A Kleene-Stone algebra is a bounded distributive lattice with two unary operations that make it a Kleene and a Stone algebra. In this paper, we study the properties of the prime ideals in a Kleene-Stone algebra and characterize the class of Kleene-Stone algebras that are congruence permutable by means of the dual space of a Kleene-Stone algebra and then show that a finite Kleene-Stone algebra is congruence permutable if and only if it is isomorphic to a direct product of finitely many simple algebras. 相似文献
992.
So far, most of the proposed group key exchange (GKE) protocols do not consider the attack when the adversary reveals the parties’ephemeral private keys without their long-term private keys, so these GKE protocols are insecure on this attack. In this paper, for resisting above attack, we propose a dynamic authenticated group key exchange (AGKE) protocol in the ID-based setting. Different from previous ID-based protocols, our protocol does not utilize bilinear pairings, which makes it more efficient. At last, we analyze the security of the protocol in the eCK (enhanced Canetti-Krawczyk) security model. 相似文献
993.
<正> This paper formulates and analyzes a line search method for general nonlinear equalityconstrained optimization based on filter methods for step acceptance and secant methods for searchdirection.The feature of the new algorithm is that the secant algorithm is used to produce a searchdirection,a backtracking line search procedure is used to generate step size,some filtered rules areused to determine step acceptance,second order correction technique is used to reduce infeasibility andovercome the Maratos effect.Global convergence properties of this method are analyzed:under mildassumptions it is showed that every limit point of the sequence of iterates generated by the algorithmis feasible,and that there exists at least one limit point that is a stationary point for the problem.Moreover,it is also established that the Maratos effect can be overcome in our new approach by addingsecond order correction steps so that fast local superlinear convergence to a second order sufficient localsolution is achieved.Finally,the results of numerical experiments are reported to show the effectivenessof the line search filter secant method. 相似文献
994.
<正> This work is concerned with rates of convergence of numerical methods using Markov chainapproximation for controlled diffusions with stopping (the first exit time from a bounded region).In lieuof considering the associated finite difference schemes for Hamilton-Jacobi-Bellman (HJB) equations,a purely probabilistic approach is used.There is an added difficulty due to the boundary condition,which requires the continuity of the first exit time with respect to the discrete parameter.To prove theconvergence of the algorithm by Markov chain approximation method,a tangency problem might arise.A common approach uses certain conditions to avoid the tangency problem.Here,by modifying thevalue function,it is demonstrated that the tangency problem will not arise in the sense of convergencein probability and in L~1.In addition,controlled diffusions with a discount factor is also treated. 相似文献
995.
<正> This paper considers finite-time χ-consensus problem for a multi-agent system with firstorderindividual dynamics and switching interaction topologies.Several distributed finite-time consensusrules are constructed for multi-agent dynamics in a unified way with the help of Lyapunovfunction and graph theory as well as homogeneity.Time-invariant non-smooth forms of finite-timeneighbor-based controllers are proposed and a numerical example is shown for illustration. 相似文献
996.
<正> This paper proposes a systematic design method of overlap frequency domain equalization(FDE) for single carrier (SC) transmission without a guard interval (GI).Based on the analysis of signal-to-interference-plus-noise ratio (SINR) of the equalizer output for each symbol,the authors adaptivelydetermine the block of the overlap FDE,where the block is defined as a set of symbols at the equalizeroutput with sufficiently low error rate,for a certain fixed sliding window size,which corresponds toa fast Fourier transform (FFT) window size.The proposed method takes advantage of the fact thatthe utility part of the equalized signal is localized around the center of the FFT window.In addition,the authors also propose to adjust the block size in order to control the computational complexity ofthe equalization per processed sample associating with the average bit error rate (BER) of the system.Simulation results show that the proposed scheme can achieve comparable BER performance to theconventional SC-FDE scheme with sufficient GI insertion for both the coded and uncoded cases withvarious modulation levels,while requiring lower computational complexity compared to the SC overlapFDE transmission with the fixed block. 相似文献
997.
Coordinating pricing and inventory decisions in a bounded production system with uncertain yield 总被引:1,自引:1,他引:0
Most inventory researches assume that production level can fluctuate arbitrarily. However, large fluctuation of the production
level in many firms may be much costly. This paper addresses the coordinating pricing and inventory control problem in a bounded
production system with uncertain yield, in which the production level is constrained between a maximum and minimum level in
each period and the price can be adjusted dynamically. We show that the optimal policy is the interval base-stock-list-price
policy. Also, we study the impact of the production bounds and uncertainty of the yield on the production system. Numerical
experiments are also performed to study the impact of parameters on the system. 相似文献
998.
Yutaka Baba 《系统科学与系统工程学报(英文版)》2010,19(4):496-503
We study an M/PH/1 queue with phase type working vacation and vacation interruption where the vacation time follows a phase
type distribution. The server serves the customers at a lower rate in a vacation period. The server comes back to the regular
busy period at a service completion without completing the vacation. Such policy is called vacation interruption. In terms
of quasi birth and death process and matrix-geometric solution method, we obtain the stationary queue length distribution.
Moreover we obtain the conditional stochastic decomposition structures of queue length and waiting time when the service time
distribution in the regular busy period is exponential. 相似文献
999.
Patent documents are unique external sources of information that reveal the core technology underlying new inventions.Patents also serve as a strategic data source that can be mined to discover state-of-the-art technical development and subsequently help guide R&D investments.This research incorporates an ontology schema to extract and represent patent concepts.A clustering algorithm with non-exhaustive overlaps is proposed to overcome deficiencies with exhaustive clustering methods used in patent mining and technology discovery.The non-exhaustive clustering approach allows for the clustering of patent documents with overlapping technical findings and claims,a feature that enables the grouping of patents that define related key innovations.Legal advisors can use this approach to study potential cases of patent infringement or devise strategies to avoid litigation.The case study demonstrates the use of non-exhaustive overlaps algorithm by clustering US and Japan radio frequency identification (RFID) patents and by analyzing the legal implications of automated discovery of patent infringement. 相似文献
1000.
Assessment of the uncertainties in temperature change in China during the last century 总被引:3,自引:0,他引:3
QingXiang Li WenJie Dong Wei Li XiaoRong Gao P. Jones J. Kennedy D. Parker 《科学通报(英文版)》2010,55(19):1974-1982
We have used the China Homogenized Historic Temperature dataset and some long-term station series of the neighbor countries from CRUTEM3, a 5°×5° gridded dataset of monthly mean temperature since 1900, to provide a 107-year record of surface tem-perature trends and variability. We derived a comprehensive set of uncertainty estimates to accompany the data: measurement and sampling errors, uncertainties in temperature bias estimates, and uncertainties arising from limited observational coverage on large-scale averages have all been estimated. We reanalysed the temperature changes during the period of record. The best estimates of trends for 1900–2006 with uncertainties at 95% confidence range are about 0.09±0.017°C/decade for the year as a whole, and 0.14±0.021°C/decade, 0.11±0.021°C/decade, 0.04±0.017°C/decade, and 0.07±0.017°C/decade for winter, spring, summer and autumn respectively. For 1954–2006, the trends for annual, winter, spring, summer and autumn are: 0.26±0.032°C/decade, 0.35±0.046°C/decade, 0.25±0.051°C/decade, 0.16±0.037°C/decade and 0.22±0.055°C/decade. Winter saw the most significant warming trend in both 1900–2006 and 1954–2006, while during the most recent period (the satellite era, 1979–2006), all the seasons show similar warming trends: 0.45±0.13°C/decade, 0.51±0.11°C/decade, 0.52±0.16°C/decade, 0.37±0.10°C/decade and 0.50±0.16°C/decade for annual, winter, spring, summer and autumn. Trends arising from urbanization have been evaluated as less than 5% of the total warming trend for 1951–2001, so this bias was not removed. 相似文献