首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5796篇
  免费   178篇
  国内免费   172篇
系统科学   302篇
丛书文集   113篇
教育与普及   47篇
理论与方法论   29篇
现状及发展   1018篇
研究方法   33篇
综合类   4593篇
自然研究   11篇
  2023年   53篇
  2022年   76篇
  2021年   73篇
  2020年   63篇
  2019年   36篇
  2018年   33篇
  2017年   50篇
  2016年   75篇
  2015年   147篇
  2014年   153篇
  2013年   156篇
  2012年   285篇
  2011年   309篇
  2010年   139篇
  2009年   150篇
  2008年   144篇
  2007年   164篇
  2006年   152篇
  2005年   300篇
  2004年   590篇
  2003年   570篇
  2002年   282篇
  2001年   175篇
  2000年   215篇
  1999年   178篇
  1998年   83篇
  1997年   75篇
  1996年   53篇
  1995年   55篇
  1994年   38篇
  1993年   32篇
  1992年   67篇
  1991年   48篇
  1990年   57篇
  1989年   51篇
  1988年   53篇
  1985年   37篇
  1979年   61篇
  1978年   39篇
  1975年   38篇
  1974年   56篇
  1973年   49篇
  1972年   50篇
  1971年   66篇
  1970年   54篇
  1969年   68篇
  1968年   59篇
  1967年   41篇
  1966年   55篇
  1965年   41篇
排序方式: 共有6146条查询结果,搜索用时 625 毫秒
431.
By analyzing the current distribution of Bow-Tie amerma used in short-pulse ground penetrating radar, the methods of antenna load and driving are presented in this paper to reduce strength of reflective wave both at antenna end and excitation point. The numerical simulation results show the strength oi reflective wave is smaller than -55dB comparing with the driving wave when the methods are adopted.  相似文献   
432.
In this paper, we present a strategy to implement multi pose face detection in compressed domain. The strategy extracts firstly feature vectors from DCT domain, and then uses a boosting algorithm to build classifiers to distinguish faces and non-faces. Moreover. to get more accurate results of the face detection, we present a kernel function and a linear combination to build incrementally the strong classifiers based on the weak classifiers. Through comparing and analyzing results of some experiments on the synthetic data and the natural data, we can get more satisfied results by the strong classifiers than by the weak classifies.  相似文献   
433.
Making use of Microsoft Visual Studio. NET platform, hierarchical network planning is realized in working procedure time-optimization of the construction by TBM. and hierarchical network graph of the construction by TBM is drawn based on browser. Then the theory of system realization is discussed, six components of system that can be reused are explained emphatically. The realization of hierarchical network panning in Internet provides available guarantee for controlling rate of progress in large-scale or middle-sized projects.  相似文献   
434.
This paper introduces the definition and calculation of the association matrix between ontologies, h uses the association matrix to describe the relations between concepls ill different ontologics and uses concept vectors to represent queries; then computes the vectors with the association matrix in order to rewrite queries, This paper proposes a simple method of querying through heterogeneous Ontology using association matrix. This method is based on the correctness of approximate information filtering theory; and it is simple to be implemented and expected to run quite fast.  相似文献   
435.
Outlier detection has very important applied value in data mining literature. Different outlier detection algorithms based on distinct theories have different definitions and mining processes. The three-dimensional space graph for constructing applied algorithms and an improved GridOf algorithm were proposed in terms of analyzing the existing outlier detection algorithms from criterion and theory.  相似文献   
436.
Clustering in high-dimensional space is an important domain in data mining. It is the process of discovering groups in a high-dimensional dataset, in such way, that the similarity between the elements of the same cluster is maximum and between different clusters is minimal. Many clustering algorithms are not applicable to high dimensional space for its sparseness and decline properties. Dimensionality reduction is an effective method to solve this problem. The paper proposes a novel clustering algorithm CFSBC based onclosed frequent hemsets derived from association rule mining. which can get the clustering attributes with high efficiency. The algorithm has several advantages. First, it deals effectively with the problem of dimensionality reduction. Second, it is applicable to different kinds of attributes, Third, it is suitable for very large data sets. Experiment shows that the proposed algorithm is effective and efficient  相似文献   
437.
Integrated semantic similarity model based on ontology   总被引:1,自引:0,他引:1  
To solve the problem of the inadequacy of semantic processing in the intelligent question answering system. an integrated semantic similarity model which calculates the semantic similarity using the geometric distance and informarion content is presented in this paper. With the help of interrelationship between concepts, the information content ofconcepts and the strength of the edges in the ontology network. we can calculate the semantic similarity between two concepts and provide information for the further calculation of the semantic similarity between user‘s question and answers in knowlegdge base. The results of the experiments on the prototype have shown that the semantic problem in natural language processing can also be solved with the help of the knowledge and the abundant semantic information in ontology. More than 90% accuracy with less than 50 ms average searching time in the intelligent question answering prototype system based on ontology has been reached. The result is vety satisfied.  相似文献   
438.
To construct a high efficient text clustering algorithm, the multilevel graph model and the refinement algorithm used in the uncoarsening phase is discussed, The model is applied to text clustering. The performance of clustering algorithm has to be improved with the refinement algorithm application, The experiment result demonstrated that the muhilevel graph text clustering algorithm is available,  相似文献   
439.
Component-based development needs a well-designed components library and a set of support tools. This paper presents the design and implementation of a components library system model and its support tool UMLCASE. A set of practical CASE tools is constructed. UMLCASE can use UML to design Use Case Diagram. Class Diagram etc. And it integrates with components library system.  相似文献   
440.
A new admission control algorithm considering the network self-similar access characteristics is proposed. Taking advantage of the mathematical model of the network traffic admission control which can effectively overcome the self-similar characteristics of tile network requests, through the scheduling of the differential service queue based on priority while at the same time taking into account various factors including access characteristics of requests, load information, etc. smoothness of the admission control is ensured by the algorlthm proposed in this paper. We design a non-linear self-adapting control algorithm by introducing an exponential admission function, thus overcomes the negative aspects introduced by static threshold parameters. Simulation results show that the scheme proposed in this paper can effectively improve the resource utilization of the clusters, while at the same time protecting the service with high priority. Our simulation resuhs also show that this algorithm can improve system stability and reliability too.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号