全文获取类型
收费全文 | 10712篇 |
免费 | 270篇 |
国内免费 | 548篇 |
专业分类
系统科学 | 365篇 |
丛书文集 | 366篇 |
教育与普及 | 292篇 |
理论与方法论 | 32篇 |
现状及发展 | 72篇 |
研究方法 | 44篇 |
综合类 | 10355篇 |
自然研究 | 4篇 |
出版年
2024年 | 67篇 |
2023年 | 129篇 |
2022年 | 200篇 |
2021年 | 226篇 |
2020年 | 112篇 |
2019年 | 48篇 |
2018年 | 95篇 |
2017年 | 118篇 |
2016年 | 113篇 |
2015年 | 238篇 |
2014年 | 355篇 |
2013年 | 292篇 |
2012年 | 329篇 |
2011年 | 396篇 |
2010年 | 365篇 |
2009年 | 388篇 |
2008年 | 472篇 |
2007年 | 459篇 |
2006年 | 374篇 |
2005年 | 381篇 |
2004年 | 308篇 |
2003年 | 239篇 |
2002年 | 270篇 |
2001年 | 284篇 |
2000年 | 312篇 |
1999年 | 582篇 |
1998年 | 573篇 |
1997年 | 583篇 |
1996年 | 525篇 |
1995年 | 456篇 |
1994年 | 412篇 |
1993年 | 329篇 |
1992年 | 320篇 |
1991年 | 296篇 |
1990年 | 221篇 |
1989年 | 238篇 |
1988年 | 187篇 |
1987年 | 125篇 |
1986年 | 69篇 |
1985年 | 17篇 |
1984年 | 6篇 |
1979年 | 2篇 |
1977年 | 2篇 |
1976年 | 2篇 |
1973年 | 2篇 |
1972年 | 2篇 |
1969年 | 4篇 |
1967年 | 2篇 |
1964年 | 1篇 |
1957年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 453 毫秒
401.
基于Unity3D研制了一种由地面控制终端、机器人本体和三维仿真系统3部分组成的水下机器人半实物仿真系统,为水下机器人开发过程中的性能测试、控制算法分析和人员操作培训提供了仿真和测试平台。该系统采用同一地面控制终端作为三维仿真系统和机器人控制系统的统一指令输入源,以实现虚拟对象和机器人本体的同步工作,可对系统进行实时监测、调参。采用多目视觉技术对机器人位置采集,对传感器数据进行卡尔曼滤波处理。机器人运动仿真试验结果表明,机器人实际运动路径和仿真规划路径基本相同,该系统动态响应性和控制系统同步性较好。 相似文献
402.
403.
An event-triggered control(ETC) system transmits data packages and updates control inputs only when the predefined criterion is satisfied. In this way, network communication and computing resources are scheduled more reasonably in contrast to the traditional periodic sampling strategy.Small-gain approach proposed in recent literatures is a new modeling method to deal with nonlinear ETC systems. Different from traditional ETC models, stability criteria are proposed in the form of input to state stability(ISS) gain to design the triggering mechanisms. This paper introduces additional dynamic variables in this model and proposes a small-gain based dynamic event-triggered strategy.Sufficient conditions to guarantee the stability of the system are derived with the help of cyclic-smallgain theorem and Zeno behaviors are avoided to ensure the feasibility of this method in practical applications. Numerical simulations are given to demonstrate the effectiveness of our approach. 相似文献
404.
As a representative emerging financial market, the Chinese stock market is more prone to volatility because of investor sentiment. It is reasonable to use efficient predictive methods to analyze the influence of investor sentiment on stock price forecasting. This paper conducts a comparative study about the predictive performance of artificial neural network, support vector regression (SVR) and autoregressive integrated moving average and selects SVR to study the asymmetry effect of investor sentiment on different industry index predictions. After studying the relevant financial indicators, the results divide the Shenwan first-class industries into two types and show that the industries affected by investor sentiment are composed of young companies with high growth and high operative pressure and there are a great number of investment bubbles in those companies. 相似文献
405.
There is overwhelming evidence that anthropogenic activity has exerted a great influence on climate extremes, especially on heat events at continental to global... 相似文献
406.
数据的完整性是指数据库中数据的正确性、有效性和一致性。完整性约束条件是完整性控制机制的核心。在SQL Server数据库应用系统中,有多种方法进行数据的完整性保护,应根据各种完整性约束的优点将它们结合起来使用,充分发挥SQLServer提供的数据完整性的效能,确保数据准确性和一致性。 相似文献
407.
408.
Wheeled foot quadruped robot HITAN-I 总被引:2,自引:0,他引:2
0IntroductionInthe past,much work has been done toinvestigatefour-legged walking.Two of the earliest works are the G.E.Quadruped and Phoney[1].With the introduction ofmore powerful computers,more and more bionic robotshave beeninvented in recent years.WARP1[2]in2002,TITAN[3-5]from1989,BISAM[6]in1998and SCOUTII[7]in1999are examples for these developments.Asground vehicle,the advantages of mobile robot have beenrecognized by peopleinengineeringfields.Ground mobilerobots are usually cl… 相似文献
409.
In this article, an optimal switching integrity attack problem is investigated to study the response of feedback control systems under attack. The authors model the malicious attacks on sensors as additive norm bounded signals. The authors consider an attacker who is only capable of launching attacks to limited number of sensors once a time and changing the combinations of attacked sensors all over the time. The objective of this paper is to find the optimal switching sequence of these combinations and the optimal attack input. The authors solve this problem by transforming it into a traditional optimal control problem with new control variables vary continuously in the range [0, 1]. The optimal solutions of the new control variables are of bang-bang-type. Therefore, an algebraic switching condition and an optimal attack input can be obtained. Finally, numerical results are provided to illustrate the effectiveness of the methods. 相似文献
410.
Journal of Systems Science and Complexity - Weispfenning in 1992 introduced the concepts of comprehensive Gröbner system/basis of a parametric polynomial system, and he also presented an... 相似文献