首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   68656篇
  免费   20265篇
  国内免费   10190篇
系统科学   2664篇
丛书文集   1329篇
教育与普及   1346篇
理论与方法论   250篇
现状及发展   674篇
研究方法   191篇
综合类   92649篇
自然研究   8篇
  2024年   663篇
  2023年   812篇
  2022年   1067篇
  2021年   1326篇
  2020年   1617篇
  2019年   3709篇
  2018年   3914篇
  2017年   4173篇
  2016年   4356篇
  2015年   4583篇
  2014年   5079篇
  2013年   4429篇
  2012年   3954篇
  2011年   3908篇
  2010年   4177篇
  2009年   3629篇
  2008年   3342篇
  2007年   3416篇
  2006年   2561篇
  2005年   2613篇
  2004年   2701篇
  2003年   2189篇
  2002年   2011篇
  2001年   1672篇
  2000年   1681篇
  1999年   2809篇
  1998年   2659篇
  1997年   2763篇
  1996年   2457篇
  1995年   2097篇
  1994年   2064篇
  1993年   1898篇
  1992年   1747篇
  1991年   1603篇
  1990年   1369篇
  1989年   1200篇
  1988年   1045篇
  1987年   688篇
  1986年   480篇
  1985年   207篇
  1984年   60篇
  1983年   30篇
  1982年   28篇
  1981年   17篇
  1978年   19篇
  1977年   31篇
  1972年   76篇
  1970年   15篇
  1968年   19篇
  1967年   17篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
201.
The Wigner-Ville distribution (WVD) and the cross Wigner-Ville distribution (XWVD) have been shown to be efficient in the estimation of instantaneous frequency (IF). But the statistical result of the IF estimation from XWVD peak is much better than using WVD peak. The reason is given from a statistical point of view. Theoretical studies show that XWVD of the analyzed signal can be estimated from XWVD of the noise-contaminated signal. The estimation is unbiased, and the variance is equal to that of noise. In this case, WVD cannot be estimated from W-VD of the noise-contaminated signal. Therefore, higher SNR is required when WVD is used to analyze signals.  相似文献   
202.
Considering the design problem of non-fragile decentralized H∞ controller with gain variations, the dynamic feedback controller by measurement feedback for uncertain linear systems is constructed and studied. The parameter uncertainties are considered to be unknown but norm bounded. The design procedures are investigated in terms of positive definite solutions to modify algebraic Riccati inequalities. Using information exchange among local controllers, the designed non-fragile decentralized H∞ controllers guarantee that the uncertain closed-loop linear systems are stable and with H∞ -norm bound on disturbance attenuation. A sufficient condition that there are such non-fragile H∞ controllers is obtained by algebraic Riccati inequalities. The approaches to solve modified algebraic Riccati inequalities are carried out preliminarily. Finally, a numerical example to show the validity of the proposed approach is given.  相似文献   
203.
Delay-dependent robust stability of cellular neural networks with time-varying discrete and distributed time-varying delays is considered. Based on Lyapunov stability theory and the linear matrix inequality (LMIs) technique, delay-dependent stability criteria are derived in terms of LMIs avoiding bounding certain cross terms, which often leads to conservatism. The effectiveness of the proposed stability criteria and the improvement over the existing results are illustrated in the numerical examples.  相似文献   
204.
论文以2007年《涌现》杂志发表物为分析对象,讨论了当今复杂性科学探索的若干特征,对2007复杂性研究的境况做了综述,对未来的复杂性研究做了进一步的展望。  相似文献   
205.
Preface     
Different from traditional tax audit, supervision with self-audit is a combination of audit by the taxpayer himself and audit by the tax authority. This paper mainly studies a taxpayer’s optimal policy of tax evasion under supervision with self-audit and its related properties, in order to deduce some effective suggestions and theoretical bases to restrain tax evasion. Assuming that only a certain proportion of evaded tax can be discovered when the audit is executed, the authors first formulate a static model with self-audit. This model is divided into two stages. At the first stage, taxpayers declare their taxes, then the tax authority chooses audit objects, based on a known probability, and announces the result; if the taxpayer is chosen, he will enter the second stage, during which he has a chance to pay the evaded tax and the corresponding late fees and then is audited by the tax authority. The authors show the existence and uniqueness of the optimal amount of tax evasion at the first stage and the optimal proportion to self-expose at the second stage. The authors also discuss the related properties of the interior solution, and do elasticity analyses on some parameters. Besides, the authors extend the static model into the corresponding two-period model, and study the existence and uniqueness of the solution of the extended model. Finally, under the assumption that tax evasion can only be discovered with a certain probability when the audit is executed, the authors formulate another static model with self-audit and investigate its properties. This research is partially supported by the National Natural Science Foundation of China under Grant Nos. 60674082, 70221001, and 70731003.  相似文献   
206.
This paper formulates a robust stage-structured SI eco-epidemiological model with periodic constant pulse releasing of infectious pests with pathogens. The authors show that the conditions for global attractivity of the 'pest-eradication' periodic solution and permanence of the system depend on time delay, hence, the authors call it "profitless". Further, the authors present a pest management strategy in which the pest population is kept under the economic threshold level (ETL) when the pest population is uniformly persistent. By numerical analysis, the authors also show that constant maturation time delay for the susceptible pests and pulse releasing of the infectious pests can bring obvious effects on the dynamics of system.  相似文献   
207.
Patent documents are unique external sources of information that reveal the core technology underlying new inventions.Patents also serve as a strategic data source that can be mined to discover state-of-the-art technical development and subsequently help guide R&D investments.This research incorporates an ontology schema to extract and represent patent concepts.A clustering algorithm with non-exhaustive overlaps is proposed to overcome deficiencies with exhaustive clustering methods used in patent mining and technology discovery.The non-exhaustive clustering approach allows for the clustering of patent documents with overlapping technical findings and claims,a feature that enables the grouping of patents that define related key innovations.Legal advisors can use this approach to study potential cases of patent infringement or devise strategies to avoid litigation.The case study demonstrates the use of non-exhaustive overlaps algorithm by clustering US and Japan radio frequency identification (RFID) patents and by analyzing the legal implications of automated discovery of patent infringement.  相似文献   
208.
空时自适应处理典型方法综合性能评估   总被引:6,自引:0,他引:6  
对典型空时自适应处理方法的综合性能进行了评估,主要从误差鲁棒性、运算量、采样要求、自适应方向图、频响图、实现复杂度几个方面进行了比较与分析,为实际工程实现和发展新的空时二维自适应处理器作参考。  相似文献   
209.
利用人工神经网络将舰船磁场的三个分量进行序贯融合处理 ,从而进行对舰船关键部位的精确识别 ,给出了处理方法及检验结果 ,并分析了提高网络推广性能的措施。  相似文献   
210.
光学区雷达目标散射中心提取及识别方法研究   总被引:6,自引:0,他引:6  
首先回顾了在宽带体制下光学区雷达目标频域响应的特性 ,而后给出了矩阵束算法的原理 ,并应用该算法提取光学区雷达目标的散射中心 ,提出了所谓“基于散射中心极点和幅度的相关匹配目标识别方法” ,最后给出了五种飞机缩比模型宽带散射数据的实验结果。实验结果表明 ,该识别方法在白噪声条件下具有高识别率和强抗噪声能力。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号