全文获取类型
收费全文 | 10180篇 |
免费 | 417篇 |
国内免费 | 564篇 |
专业分类
系统科学 | 513篇 |
丛书文集 | 259篇 |
教育与普及 | 245篇 |
理论与方法论 | 38篇 |
现状及发展 | 42篇 |
研究方法 | 32篇 |
综合类 | 10030篇 |
自然研究 | 2篇 |
出版年
2024年 | 54篇 |
2023年 | 99篇 |
2022年 | 166篇 |
2021年 | 206篇 |
2020年 | 139篇 |
2019年 | 51篇 |
2018年 | 77篇 |
2017年 | 116篇 |
2016年 | 118篇 |
2015年 | 246篇 |
2014年 | 321篇 |
2013年 | 350篇 |
2012年 | 369篇 |
2011年 | 406篇 |
2010年 | 399篇 |
2009年 | 401篇 |
2008年 | 467篇 |
2007年 | 457篇 |
2006年 | 467篇 |
2005年 | 452篇 |
2004年 | 339篇 |
2003年 | 358篇 |
2002年 | 398篇 |
2001年 | 404篇 |
2000年 | 376篇 |
1999年 | 509篇 |
1998年 | 444篇 |
1997年 | 475篇 |
1996年 | 395篇 |
1995年 | 309篇 |
1994年 | 293篇 |
1993年 | 283篇 |
1992年 | 273篇 |
1991年 | 209篇 |
1990年 | 203篇 |
1989年 | 171篇 |
1988年 | 161篇 |
1987年 | 103篇 |
1986年 | 53篇 |
1985年 | 23篇 |
1984年 | 7篇 |
1983年 | 9篇 |
1982年 | 2篇 |
1981年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
This paper mainly studies the strong convergence properties for weighted sums of extended negatively dependent(END, for short) random variables. Some sufficient conditions to prove the strong law of large numbers for weighted sums of END random variables are provided. In particular, the authors obtain the weighted version of Kolmogorov type strong law of large numbers for END random variables as a product. The results that the authors obtained generalize the corresponding ones for independent ra... 相似文献
22.
双轴自动电子倾斜测试仪是一个高精度、大量程的角度倾斜测量仪器。本文介绍了该仪器的原理和性能,给出了技术指标和实测结果,最后阐明了它的应用领域。 相似文献
23.
柔性可延展电子因其能够适应非平面工作环境,将突破现有电子器件的应用范围,促进信息与人的融合,在智能穿戴电子、柔性显示、生物医疗等领域具有广阔的应用前景。本文提出利用印刷结合真空抽滤方法实现硅胶基衬底表面高分辨复杂可延展电路的制备;研究了丝网印刷工艺实现微孔滤膜表面银纳米线(Ag NWs)图形化沉积的分辨率;讨论了Ag NWs线长、抽滤真空度等因素对沉积分辨率的影响,实现了Ag NWs图形化50 μm线径分辨率及间隔分辨率。本文还研究了硅胶基衬底表面微电极的电阻均一性及拉伸电阻稳定性,并结合电极表面微结构的变化详细讨论了屈曲褶皱结构的出现对微电极拉伸电阻的影响,实现了100 μm线宽微电极100%拉伸幅度下电阻增加仅为初始值的40%。最后,通过集成LED芯片演示了面料基底表面柔性可延展发光电路。本研究对于柔性可延展电路的制备提供了新的思路。 相似文献
24.
基于两次Kalman滤波的观测噪声自适应调整算法 总被引:3,自引:1,他引:3
在实际的目标跟踪过程中,由于目标远近等各种客观因素的影响,观测噪声是随时变化的.但是在标准卡尔曼滤波中,如果将观测噪声协方差设为恒定值,必然造成跟踪结果不理想.针对这种情况,通过在任意时刻施行两次卡尔曼滤波的结果来自适应地调整观测噪声协方差,使卡尔曼滤波算法中的观测噪声协方差与实际值更加接近,从而提高对目标的跟踪精度.最后Monte Carlo仿真实验证明了本算法的有效性. 相似文献
25.
A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and the man in the middle attack if the third party is not trusted. Also, based on the proposed scheme for the first-hand transaction, a new buyer-reseller watermarking protocol and a formal multi-party watermarking protocol are also proposed. The proposed buyer-resell watermarking protocol only needs the original seller to provide transfer certificate and encryption-decryption service to support the second-hand transaction, and the multi-party watermarking protocol with distributed certificate authorities can overcome the difficulty in the combination of multicast mechanism with multiple unique watermarks and allow a seller to multicast the watermarked digital contents and key transaction information to n buyers. Furthermore, the idea of zero knowledge proof is also applied into the proposed scheme to allow the seller to take an effective control on the task performed by the third party. 相似文献
26.
Traditional Chinese medicine (TCM) has a rich knowledge about human health and disease by its special way evolved along a very long history. As modern medicine is achieving much progress, arguments and disputes toward TCM never end. To avoid losing precious knowledge of living TCM masters, endeavors have been engaged to systematic collection of those knowledge of TCM masters, such as their growth experiences, effective practical cases toward diseases and typical therapeutic principles and methods. Knowledge mining methods have been expected to explore some useful or hidden patterns to unveil some mysteries of the TCM system. In the paper, some computerized methods are applied toward those collected materials about some living TCM masters in China mainland to show a different way of exposing essential ideas of those TCM masters by correspondence visualization which aims to help people understand TCM holistic views toward disease and body, and facilitate tacit knowledge transfer and sense-making of the essence of TCM. The work is one kind of qualitative meta-synthesis of TCM masters' knowledge. 相似文献
27.
The manner and conditions of running the decision-making system with self-defense electronic jamming are given.After proposing the scenario of applying discrete dynamic Bayesian network to the decision making with self-defense electronic jamming,a decision-making model with self-defense electronic jamming based on the discrete dynamic Bayesian network is established.Then jamming decision inferences by the aid of the algorithm of discrete dynamic Bayesian network are carried on.The simulating result shows that this method is able to synthesize different targets which are not predominant.In this way,various features at the same time,as well as the same feature appearing at different time complement mutually;in addition,the accuracy and reliability of electronic jamming decision making are enhanced significantly. 相似文献
28.
水下机器人(简称AUV)的自主控制系统起着相当于人类"大脑"的作用,它是AUV的核心技术。本文在QNX操作系统下利用多线程技术设计并实现了AUV自主控制系统。介绍了AUV混杂系统结构和自主控制原理,给出了自主控制系统的多线程结构。设计了多线程同步模块,并与QNX消息传递机制相结合实现了AUV自主控制系统线程间的同步与通信。最后在半实物仿真平台上结合具体案例对自主控制系统进行了验证。仿真结果表明AUV自主控制系统能够正确协调各个线程自主完成使命。 相似文献
29.
Spectral Properties and Positivity of Flows in Infinite Networks with Dynamic Boundary Control Nodes
Xuelian Jin Fu Zheng Ming Fang Chao Gao 《系统科学与信息学报》2009,7(4):319-325
In this paper we study transport processes on infinite networks with dynamic boundary control nodes. These flows can be modeled by operator semigroups on a suitable Banach space. Using functional analytical and graph theoretical methods, we investigate its spectral properties of the system and positivity of the semigroup under appropriate assumptions on the network. 相似文献
30.
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to recondigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance. 相似文献