全文获取类型
收费全文 | 10399篇 |
免费 | 354篇 |
国内免费 | 702篇 |
专业分类
系统科学 | 932篇 |
丛书文集 | 252篇 |
教育与普及 | 78篇 |
理论与方法论 | 14篇 |
现状及发展 | 100篇 |
综合类 | 10073篇 |
自然研究 | 6篇 |
出版年
2024年 | 74篇 |
2023年 | 106篇 |
2022年 | 185篇 |
2021年 | 152篇 |
2020年 | 202篇 |
2019年 | 134篇 |
2018年 | 145篇 |
2017年 | 204篇 |
2016年 | 228篇 |
2015年 | 329篇 |
2014年 | 505篇 |
2013年 | 430篇 |
2012年 | 632篇 |
2011年 | 744篇 |
2010年 | 520篇 |
2009年 | 623篇 |
2008年 | 628篇 |
2007年 | 742篇 |
2006年 | 667篇 |
2005年 | 570篇 |
2004年 | 506篇 |
2003年 | 466篇 |
2002年 | 390篇 |
2001年 | 325篇 |
2000年 | 299篇 |
1999年 | 287篇 |
1998年 | 227篇 |
1997年 | 216篇 |
1996年 | 211篇 |
1995年 | 170篇 |
1994年 | 107篇 |
1993年 | 114篇 |
1992年 | 85篇 |
1991年 | 50篇 |
1990年 | 57篇 |
1989年 | 52篇 |
1988年 | 30篇 |
1987年 | 22篇 |
1986年 | 11篇 |
1985年 | 6篇 |
1955年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
代码传输是实现无线传感器网络应用重构的关键技术.首先研究传感器网络环境自适应应用重构(EAAR)模型的两种代码传输模式-拉模式和推模式,并结合两种模式的特点提出一种适用于分簇传感器网络的能量有效代码传输模式-基于簇的混合代码传输(Cluster-based Hybrid Code Transmission, CHCT).在该模式下,簇头节点采用拉方式从基站获取代码,簇内节点采用推方式进行代码传输.仿真实验验证了方法的有效性并讨论了影响CHCT性能的主要参数. 相似文献
62.
提出一种基于ANN和GA融合的自学习自适应的模糊规则提取算法,用来对油层进行识别.其方法是:首先运用人工神经网络(ANN)对训练样本进行有导师学习,网络的输入是测井属性,输出表达为网络权值和输入的函数Ψk=f(xi(WG1)ij,(WG2)jk)(其中:Ψk代表含油性类别Ck的判别函数;C1为干层;C2为水层;C3为差油层;C4为油层).然后,以Ψk作为遗传算法(GA)中的适应度函数提取对应于类别Ck的模糊规则.最后,通过某油田oilsk81和oilsk83油井的实证研究表明,该方法能够有效地识别储层的含油性. 相似文献
63.
Alexandra Sauer 《Systemic Practice and Action Research》2008,21(6):497-515
The participation of non-state actors in implementation processes is often understood as a means to increase compliance efficiency. But the implementation of spatial policies frequently focuses on pre-established goals, processes and instruments and thus renders difficult open discourse and shared decision-making. This paper introduces conflict pattern analysis (CPA) as a tool that supports the analysis of the actual actor constellation in order to define efficient approaches that avoid common problems of participatory processes. CPA is a semi-formalised method that helps to identify key-actors, their relations and interaction amongst each other as well as their core beliefs, interests and resources. It aggregates this information to interaction patterns that can be compared, classified and linked to different participatory methods on a theoretically informed basis. Particularly on the local and regional level, this could be the first step for successful (participatory) implementation strategies. 相似文献
64.
对于不同时标的时变时滞竞争神经网络的网络模型,通过构造适当的Lyapunov函数,结合微分不等式分析,研究了时变时滞竞争神经网络的全局指数稳定性,获得了新的全局指数稳定性判据,所得判据推广和改进了前人的相关结论。最后的数值仿真例子证明了该算法的有效性。 相似文献
65.
以农业AGROVOC本体为例,结合语义万维网推理机制定性分析冗余信息产生原因,利用复杂网络分析方法量化推理过程中产生的冗余,进而确定本体中的核心概念,解决推理冗余问题。实验表明,复杂网络分析方法可从定量角度找出核心节点及导致推理产生冗余的边,并揭示了语义冗余引起的推理效率降低问题。为优化本体设计、提高推理效率提供了一种新的可行方法。 相似文献
66.
基于标签传播动力学提出了一种识别网络关键节点的算法,主要思想是把每个节点接收到不同标签的数量作为判断节点重要性的指标。应用两种不同的传播模型,在不同网络上与其它中心性指标作比较。结果表明:基于标签传播的中心性指标比其它的中心性方法可以更好地识别网络中的关键节点。基于标签传播的中心性指标还具有以下优势:不需要利用网络的结构信息,因此可以推广到大规模网络上;揭示了一种现象——好的接收者往往也是好的传播者。 相似文献
67.
根据信息网络的结构和应用功能,在分析高功率微波对构成信息网络的电子设备效应机理基础上,构建了多层次的信息网络系统的效能评估指标体系.将区间数与云模型相结合,提出了区间云模型的评估方法,通过区间层次分析法得到评价指标的区间权重,实现了系统评估指标的定性与定量的相互转换,并利用评价区间云模型拟合出信息网络的综合效能.结合实例模拟分析,验证了该方法可行性和有效性.结果分析表明,使用区间数表示更能体现评估过程中的模糊性和不确定性因素. 相似文献
68.
Cascading failures often occur in congested complex networks. Cascading failures can be expressed as a three-phase process:
generation, diffusion, and dissipation of congestion. Different from the betweenness centrality, a congestion function is
proposed to represent the extent of congestion on a given node. Inspired by the restart process of a node, we introduce the
concept of “delay time,” during which the overloaded node cannot receive or forward any traffic, so an intergradation between
permanent removal and nonremoval is built and the flexibility of the presented model is demonstrated. Considering the connectivity
of a network before and after cascading failures is not cracked because the overloaded node are not removed from network permanently
in our model, a new evaluation function of network efficiency is also proposed to measure the damage caused by cascading failures.
Finally, we investigate the effects of network structure and size, delay time, processing ability, and traffic generation
speed on congestion propagation. Cascading processes composed of three phases and some factors affecting cascade propagation
are uncovered as well. 相似文献
69.
INTELLIGENT SECURITY SYSTEMS ENGINEERING FOR MODELING FIRE CRITICAL INCIDENTS: TOWARDS SUSTAINABLE SECURITY 总被引:2,自引:0,他引:2
An intelligent security systems engineering approach is used to analyze fire and explosive critical incidents, a growing concern
in urban communities. A feed-forward back-propagation neural network models the damages arising from these critical incidents.
The overall goal is to promote fire safety and sustainable security. The intelligent security systems engineering prediction
model uses a fully connected multilayer neural network and considers a number of factors related to the fire or explosive
incident including the type of property affected, the time of day, and the ignition source. The network was trained on a large
number of critical incident records reported in Toronto, Canada between 2000 and 2006. Our intelligent security systems engineering
approach can help emergency responders by improving critical incident analysis, sustainable security, and fire risk management. 相似文献
70.
A new vertical handoff decision algorithm is proposed to maximize the system benefit in heterogeneous wireless networks which comprise cellular networks and wireless local area networks (WLANs). Firstly the block probability, the drop probability and the number of users in the heterogeneous networks are calculated in the channel-guard call admission method, and a function of the system benefit which is based on the new call arrival rate and the handoff call arrival rate is proposed. Then the optimal radius of WLAN is obtained by using simulation annealing (SA) method to maximize the benefit. All the nodes should handoff from cellular network to WLAN if they enter WLAN’s scope and handoff fromWLAN to cellular network if they leave the scope. Finally, the algorithm in different new call arrival rates and handoff call arrival rates is analyzed and results show that it can achieve good effects. 相似文献