首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14125篇
  免费   515篇
  国内免费   597篇
系统科学   501篇
丛书文集   516篇
教育与普及   359篇
理论与方法论   90篇
现状及发展   60篇
研究方法   41篇
综合类   13667篇
自然研究   3篇
  2024年   80篇
  2023年   167篇
  2022年   260篇
  2021年   287篇
  2020年   187篇
  2019年   82篇
  2018年   127篇
  2017年   140篇
  2016年   146篇
  2015年   329篇
  2014年   387篇
  2013年   383篇
  2012年   420篇
  2011年   498篇
  2010年   432篇
  2009年   535篇
  2008年   607篇
  2007年   636篇
  2006年   521篇
  2005年   491篇
  2004年   361篇
  2003年   347篇
  2002年   339篇
  2001年   392篇
  2000年   405篇
  1999年   848篇
  1998年   679篇
  1997年   782篇
  1996年   683篇
  1995年   639篇
  1994年   534篇
  1993年   472篇
  1992年   430篇
  1991年   377篇
  1990年   347篇
  1989年   301篇
  1988年   257篇
  1987年   198篇
  1986年   92篇
  1985年   31篇
  1984年   3篇
  1983年   2篇
  1982年   1篇
  1955年   2篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
41.
SEA方法及其在C~3I系统效能分析中的应用(Ⅱ)——交战模型   总被引:3,自引:0,他引:3  
本文采用SEA方法建立了C3I系统在一种典型交战环境下的系统效能模型及其分析程序,举例说明了系统效能计算结果的战术涵义。由于C3I系统所处的交战环境是千变万化的,因此采用SEA方法建立一般交战情形下通用的C3I系统效能模型仍是十分困难的工作。然而,本文的分析过程可起到一定的示范作用。  相似文献   
42.
基于神经网络和微分对策理论的制导律   总被引:2,自引:0,他引:2  
根据微分对策制导律目前面临的困境,本文尝试将神经网络引入微分对策制导律。采用BP模型,将微分对策的定量和定性分析结合起来。以导弹与飞机格斗为例,探讨其实现的可能性和优点,为将来发展基于微分对策理论的智能制导律提供了一定的思路。  相似文献   
43.
A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and the man in the middle attack if the third party is not trusted. Also, based on the proposed scheme for the first-hand transaction, a new buyer-reseller watermarking protocol and a formal multi-party watermarking protocol are also proposed. The proposed buyer-resell watermarking protocol only needs the original seller to provide transfer certificate and encryption-decryption service to support the second-hand transaction, and the multi-party watermarking protocol with distributed certificate authorities can overcome the difficulty in the combination of multicast mechanism with multiple unique watermarks and allow a seller to multicast the watermarked digital contents and key transaction information to n buyers. Furthermore, the idea of zero knowledge proof is also applied into the proposed scheme to allow the seller to take an effective control on the task performed by the third party.  相似文献   
44.
A compressed sensing (CS) based channel estimation algorithm is proposed by using the delay-Doppler sparsity of the fast fading channel. A compressive basis expansion channel model with sparsity in both time and frequency domains is given. The pilots in accordance with a novel random pilot matrix in both time and frequency domains are sent to measure the delay-Doppler sparsity channel. The relatively nonzero channel coefficients are tracked by random pilots at a sampling rate significantly below the Nyquist rate. The sparsity channels are estimated from a very limited number of channel measurements by the basis pursuit algorithm. The proposed algorithm can effectively improve the channel estimation performance when the number of pilot symbols is reduced with improvement of throughput efficiency.  相似文献   
45.
Target modeling and scattering function calculating are important prerequisites and groundwork for the synthetic aperture radar (SAR) imaging simulation. According to the difficult problems that normal methods cannot calculate the scattering function of electrically large object under the condition to wideband, an effective method of improved equivalent edge currents is presented and applied to SAR imaging simulation for the first time. This method improves calculating velocity and has relatively high precision. The concrete steps of applying the method are given. By way of the simulation experiment, the effectiveness of the method is verified.  相似文献   
46.
H.264/AVC video coding standard can achieve roughly half of the bit-savings over MPEG2 and MPEG4 for a given quality. However, this comes at a cost in considerably increased complexity at the encoder and thus increases the difficulty in hardware implementation. The high redundancy that exists between the successive frames of a video sequence makes it possible to achieve a high data compression ratio. Motion estimation (ME) plays an important role in motion compensated video coding. A fast motion estimation algorithm for H.264/AVC is proposed based on centered prediction, called centered prediction based fast mixed search algorithm (CPFMS). It makes use of the spatial and temporal correlation in motion vector (MV) fields and feature of all-zero blocks to accelerate the searching process. With the initialized searching point prediction, adaptive search window changing and searching direction decision, CPFMS is provided to reduce computation in block-matching process. The experimental results show that the speed of CPFMS is nearly 12 times of FS with a negligible peak signal-noise ratio (PSNR) loss. Also, the efficiency of CPFMS outperforms some popular fast algorithms such as hybrid unsymmetrical cross multi-hexagongrid search and a novel multidirectional gradient descent search evidently.  相似文献   
47.
<正> In this paper,a two-scale finite element approach is proposed and analyzed for approximationsof Green's function in three-dimensions.This approach is based on a two-scale finite elementspace defined,respectively,on the whole domain with size H and on some subdomain containing singularpoints with size h (h H).It is shown that this two-scale discretization approach is very efficient.In particular,the two-scale discretization approach is applied to solve Poisson-Boltzmann equationssuccessfully.  相似文献   
48.
The approach of available transfer capability (denoted as ATC) incorporating wind generation has been paid very high attention since the development of wind generation. Based on the maximum function, this paper presents an ATC model. The characteristic of the new model is twofold. First, it considers wind turbines connected to power system and static security of power system simultaneously. Second, it is a system of semismooth equations and can be solved easily. By using the smoothing strategy, a smoothing Newton method is adopted for solving the proposed new ATC model. Numerical simulation results of the IEEE 30-bus and 118-bus system show that the new model and algorithm are feasible and effective. The impact of wind turbines connected to power system on ATC is also analyzed.  相似文献   
49.
Under the complicated electromagnetism circumstance, the model of data fusion control and guidance of surface-to-air missile weapon systems is established. Such ways and theories as Elman-NN, radar tracking and filter's data fusion net based on the group method for data-processing (GMRDF) are applied to constructing the model of data fusion. The highly reliable state estimation of the tracking targets and the improvement in accuracy of control and guidance are obtained. The purpose is optimization design of data fusion control and guidance of surface-to-air missile weapon systems and improving the fighting effectiveness of surface-to-air missile weapon systems.  相似文献   
50.
To solve the uncertain multi-attribute group decisionmaking of unknown attribute weights, three optimal models are built to decide the corresponding ideal solution weights, standard deviation weights and mean deviation weights. The comprehensive attribute weights are gotten through the product of the above three kinds of weights. And each decision maker's weighted decision matrices are also received by using the integrated attribute weights. The closeness degrees are also gotten by use of technique for order preference by similarity to ideal solution (TOPSIS) through dealing with the weighted decision matrices. At the same time the group decision matrix and weighted group decision matrix are gotten by using each decision-maker’s closeness degree to every project. Then the vertical TOPSIS method is used to calculate the closeness degree of each project. So these projects can be ranked according to their values of the closeness degree. The process of the method is also given step by step. Finally, a numerical example demonstrates the feasibility and effectiveness of the approach.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号