首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13917篇
  免费   493篇
  国内免费   866篇
系统科学   660篇
丛书文集   309篇
教育与普及   222篇
理论与方法论   57篇
现状及发展   87篇
研究方法   20篇
综合类   13921篇
  2024年   48篇
  2023年   138篇
  2022年   215篇
  2021年   289篇
  2020年   194篇
  2019年   152篇
  2018年   148篇
  2017年   190篇
  2016年   211篇
  2015年   462篇
  2014年   635篇
  2013年   668篇
  2012年   767篇
  2011年   860篇
  2010年   806篇
  2009年   805篇
  2008年   952篇
  2007年   860篇
  2006年   693篇
  2005年   710篇
  2004年   496篇
  2003年   459篇
  2002年   645篇
  2001年   583篇
  2000年   482篇
  1999年   480篇
  1998年   338篇
  1997年   321篇
  1996年   266篇
  1995年   230篇
  1994年   222篇
  1993年   190篇
  1992年   168篇
  1991年   150篇
  1990年   136篇
  1989年   95篇
  1988年   98篇
  1987年   61篇
  1986年   34篇
  1985年   9篇
  1984年   2篇
  1983年   1篇
  1981年   2篇
  1980年   2篇
  1969年   1篇
  1968年   1篇
  1961年   1篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
81.
利用"囚徒困境"模型分析了利他行为者在与利己行为者的个体生存博弈中的不利处境.对于扩展的群体的生存博弈模型,从理论上证明了只要利他行为的回报充分大,群体的利他行为就会存在.利用元胞自动机的仿真验证了这一现象.对个体和群体两种生存博弈的分析表明,互惠利他行为是群体机制的一种涌现现象.  相似文献   
82.
为应对移动流量的爆炸式增长,在异构网络中引入缓存成为目前的热点研究方向之一。目前缓存部署策略存在缓存命中率不高、缓存数据冗余度较高等问题,没有充分利用存储资源,直接影响网络的性能。针对以上问题,提出一种基于用户兴趣感知的虚拟聚类协作缓存部署策略来提高缓存系统性能。根据用户距离构造虚拟聚类,依据内容请求因子确定系统缓存内容,采用基站协作缓存以及用户间虚拟聚类方式共享缓存内容,以缓存命中率最大化为目标建立优化模型并通过贪婪算法求解。理论分析及仿真结果表明,在异构网络场景下,跟现有方法相比,所提方法在缓存命中率、系统平均传输时延等性能上均有明显提升。  相似文献   
83.
基于广义随机Petri网的城市道路公交优先建模与性能研究   总被引:1,自引:0,他引:1  
针对当前城市道路网存在的交通拥堵问题,根据城市地面交通的特点和公交优先的原则,利用广义随机Petri网通过将变迁分为时间变迁和瞬时变迁,结合禁止弧和赋予各弧不同的优先权, 构建公交优先策略模型,为实施公交优先策略提供理论依据.  相似文献   
84.
针对当前装备维修质量评价忽视维修过程影响因素这一问题,将过程评价指标体系作为修后评价指标体系的先验知识,构建了一种基于贝叶斯网络的复杂装备维修质量评价模型。首先,建立了过程评价指标体系和修后评价指标体系,并对各项指标进行了简要分析。然后,建立了维修质量评价的贝叶斯网络模型,通过改进的模糊综合评价方法确定了根节点的先验概率,通过专家经验法确定了子节点的条件概率,并给出了模型的具体求解步骤。最后,通过算例仿真与分析对提出的方法进行了验证。结果表明,提出的方法能够在一定程度上解决复杂装备的维修质量评价问题,为完善复杂装备的维修质量评价理论提供了借鉴。  相似文献   
85.
This paper focuses on reducing the complexity of K-best sphere decoding (SD) algorithm for the detection of uncoded multi-ple input multiple output (MIMO) systems. The proposed algorithm utilizes the threshold-pruning method to cut nodes with partial Euclidean distances (PEDs) larger than the threshold. Both the known noise value and the unknown noise value are considered to generate the threshold, which is the sum of the two values. The known noise value is the smal est PED of signals in the detected layers. The unknown noise value is generated by the noise power, the quality of service (QoS) and the signal-to-noise ratio (SNR) bound. Simulation results show that by considering both two noise values, the proposed algorithm makes an efficient reduction while the performance drops little.  相似文献   
86.
This paper deals with the blind separation of nonstation-ary sources and direction-of-arrival (DOA) estimation in the under-determined case, when there are more sources than sensors. We assume the sources to be time-frequency (TF) disjoint to a certain extent. In particular, the number of sources presented at any TF neighborhood is strictly less than that of sensors. We can identify the real number of active sources and achieve separation in any TF neighborhood by the sparse representation method. Compared with the subspace-based algorithm under the same sparseness assumption, which suffers from the extra noise effect since it can-not estimate the true number of active sources, the proposed algorithm can estimate the number of active sources and their cor-responding TF values in any TF neighborhood simultaneously. An-other contribution of this paper is a new estimation procedure for the DOA of sources in the underdetermined case, which combines the TF sparseness of sources and the clustering technique. Sim-ulation results demonstrate the validity and high performance of the proposed algorithm in both blind source separation (BSS) and DOA estimation.  相似文献   
87.
The 16-ary quadrature amplitude modulation (16QAM) is a high spectral efficient scheme for high-speed transmission systems. To remove the phase ambiguity in the coherent detection system, differential-encoded 16QAM (DE-16QAM) is usually used, however, it will cause performance degradation about 3 dB as compared to the conventional 16QAM. To overcome the performance loss, a serial concatenated system with outer low density parity check (LDPC) codes and inner DE-16QAM is proposed. At the receiver, joint iterative differential demodulation and decoding (ID) is carried out to approach the maximum likelihood performance. Moreover, a genetic evolution algorithm based on the extrinsic information transfer chart is proposed to optimize the degree distribution of the outer LDPC codes. Both theoretical analyses and simulation results indicate that this algorithm not only compensates the performance loss, but also obtains a significant performance gain, which is up to 1 dB as compared to the conventional non-DE-16QAM.  相似文献   
88.
This paper is concerned with the optimal and suboptimal deconvolution problems for discrete-time systems with random delayed observations. When the random delay is known online, i.e., time stamped, the random delayed system is reconstructed as an equivalent delay-free one by using measurement reorganization technique, and then an optimal input white noise estimator is presented based on the stochastic Kahnan filtering theory. However, tb_e optimal white-noise estimator is timevarying, stochastic, and doesn't converge to a steady state in general. Then an alternative suboptimal input white-noise estimator with deterministic gains is developed under a new criteria. The estimator gain and its respective error covariance-matrix information are derived based on a new suboptimal state estimator. It can be shown that the suboptimal input white-noise estimator converges to a steady-state one under appropriate assumptions.  相似文献   
89.
The positive impacts of managing projects as a portfolio are quantified by comparing the value of the integrated risk of a project portfolio and the aggregation of single project risks implemented separately. Firstly, the integrated risk is defined by proposing risky events based on set theory. Secondly, as projects interact with each other in a project portfolio, the integrated risk is evaluated by using a Bayesian network structure learning algorithm to construct an interdependent network of risks. Finally, the integrated risk of a practical case is assessed using this method, and the results show that the proposed method is an effective tool for calculating the extent of risk reduction of implementing a project portfolio and identifying the most risky project, so as to assist companies in making comprehensive decisions in the phase of portfolio selection and portfolio controlling.  相似文献   
90.
基于MATLAB的温室温度模糊专家控制仿真研究   总被引:11,自引:0,他引:11  
胥芳  盛军强  陈教料  邱磊 《系统仿真学报》2007,19(11):2464-2466,2471
在依据能量和物质平衡的温室温度数学模型基础上,建立了温室环境温度模糊专家控制系统的MATLAB仿真模型,包括对控制变量的选取、模糊集的定义、论域等级的划分、隶属函数的选择及模糊控制规则的制定,并用Simulink对控制系统进行了仿真分析。仿真结果证明了该温室环境温度模糊控制策略的有效性及合理性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号