首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7054篇
  免费   381篇
  国内免费   604篇
系统科学   849篇
丛书文集   165篇
教育与普及   45篇
理论与方法论   39篇
现状及发展   82篇
综合类   6858篇
自然研究   1篇
  2024年   81篇
  2023年   78篇
  2022年   100篇
  2021年   103篇
  2020年   120篇
  2019年   82篇
  2018年   93篇
  2017年   129篇
  2016年   138篇
  2015年   205篇
  2014年   329篇
  2013年   281篇
  2012年   488篇
  2011年   498篇
  2010年   375篇
  2009年   453篇
  2008年   442篇
  2007年   586篇
  2006年   471篇
  2005年   446篇
  2004年   359篇
  2003年   342篇
  2002年   254篇
  2001年   258篇
  2000年   204篇
  1999年   200篇
  1998年   168篇
  1997年   149篇
  1996年   154篇
  1995年   128篇
  1994年   82篇
  1993年   71篇
  1992年   41篇
  1991年   26篇
  1990年   33篇
  1989年   27篇
  1988年   16篇
  1987年   13篇
  1986年   7篇
  1985年   2篇
  1984年   3篇
  1955年   4篇
排序方式: 共有8039条查询结果,搜索用时 31 毫秒
31.
The participation of non-state actors in implementation processes is often understood as a means to increase compliance efficiency. But the implementation of spatial policies frequently focuses on pre-established goals, processes and instruments and thus renders difficult open discourse and shared decision-making. This paper introduces conflict pattern analysis (CPA) as a tool that supports the analysis of the actual actor constellation in order to define efficient approaches that avoid common problems of participatory processes. CPA is a semi-formalised method that helps to identify key-actors, their relations and interaction amongst each other as well as their core beliefs, interests and resources. It aggregates this information to interaction patterns that can be compared, classified and linked to different participatory methods on a theoretically informed basis. Particularly on the local and regional level, this could be the first step for successful (participatory) implementation strategies.  相似文献   
32.
采用PSO混合编码,提出了一种基于混合MPSO-BP的RBF自构建学习算法。该算法中,每个粒子由整数与实数两部分构成,分别对RBF的基函数个数及相关参数(中心、宽度和输出层权值)进行编码。同时设计了一个特殊的适应度函数,在保证精度的前提下,使网络的结构相对简单,以增强网络的自适应与泛化能力,减少主观因素设计对网络性能的影响。仿真实验表明,相对于RBF其他学习算法,所提算法隐节点少、精度高、泛化能力强。  相似文献   
33.
基于UKF的自组织模糊神经网络训练算法   总被引:1,自引:0,他引:1  
如何生成最优的模糊规则数及模糊规则的自动生成和修剪是模糊神经网络训练算法研究的重点,针对这一问题,提出了基于无迹卡尔曼滤波(unscented Kalman filter, UKF)的自组织模糊神经网络的训练算法。分析了模糊神经网络的非线性动力系统表示,并用递推最小二乘法(recursive least square, RLS)和UKF分别学习线性和非线性的参数,给出了模糊规则生成的准则和参数更新的策略;然后,用误差下降率方法作为模糊规则修剪的策略,删除作用不大的规则。通过典型的函数逼近和系统辨识实例,表明所提算法得到的模糊神经网络的结构更为紧凑,泛化性能更佳。  相似文献   
34.
The relationship between tacit knowledge and informal networks has not been fully explored.Tacit knowledge cannot be well managed directly,because it is deeply embedded in individual actions and experiences.This study proposes an approach to managing informal networks as a new middle way to facilitate the sharing and transferring of tacit knowledge,owing to the fact that tacit knowledge is mostly shared and transferred through informal networks.To support the idea of the approach,an empirical case study of applying the approach to management of a large scientific project is also included.Our findings suggest that informal networks play essential roles for management of tacit knowledge,and thus good management of informal networks can lead to efficient sharing and transferring of tacit knowledge.  相似文献   
35.
基于神经网络威胁判断模型   总被引:6,自引:0,他引:6  
将神经网络理论应用于防空指挥控制系统中 ,研究了威胁判断模型 ,实例表明该方法是可行的 .  相似文献   
36.
对于一类连续时间的非线性动态系统x=f(x)+Bu+d,当系统中的非线性函数f(x)满足有界或线性增长条件(具有未知的增长系数)时,首先证明了f(x)中的x落入一紧集中,然后根据径向基函数网络或模糊系统的逼近性质,给出了两种自适应调节器的设计方法.利用李亚普诺夫稳定性理论,证明了控制算法是全局稳定的,闭环系统的状态是一致最终有界的,且控制律是稳定的.  相似文献   
37.
给出了延迟离散Hopfield -型神经网络的收敛性定理。在广义异步运行方式下 ,证明了对称连接权阵 (只要w0 对称 )条件下的收敛性定理 ,推广了已有的延迟离散Hopfield -型神经网络的收敛性结果 ,表明网络收敛滞后于能量函数收敛最多 2n 1步。最后给出了能量函数的极大值点与延迟离散Hopfield -型神经网络的稳定态的关系。  相似文献   
38.
Cascading failures often occur in congested complex networks. Cascading failures can be expressed as a three-phase process: generation, diffusion, and dissipation of congestion. Different from the betweenness centrality, a congestion function is proposed to represent the extent of congestion on a given node. Inspired by the restart process of a node, we introduce the concept of “delay time,” during which the overloaded node cannot receive or forward any traffic, so an intergradation between permanent removal and nonremoval is built and the flexibility of the presented model is demonstrated. Considering the connectivity of a network before and after cascading failures is not cracked because the overloaded node are not removed from network permanently in our model, a new evaluation function of network efficiency is also proposed to measure the damage caused by cascading failures. Finally, we investigate the effects of network structure and size, delay time, processing ability, and traffic generation speed on congestion propagation. Cascading processes composed of three phases and some factors affecting cascade propagation are uncovered as well.  相似文献   
39.
An intelligent security systems engineering approach is used to analyze fire and explosive critical incidents, a growing concern in urban communities. A feed-forward back-propagation neural network models the damages arising from these critical incidents. The overall goal is to promote fire safety and sustainable security. The intelligent security systems engineering prediction model uses a fully connected multilayer neural network and considers a number of factors related to the fire or explosive incident including the type of property affected, the time of day, and the ignition source. The network was trained on a large number of critical incident records reported in Toronto, Canada between 2000 and 2006. Our intelligent security systems engineering approach can help emergency responders by improving critical incident analysis, sustainable security, and fire risk management.  相似文献   
40.
A new vertical handoff decision algorithm is proposed to maximize the system benefit in heterogeneous wireless networks which comprise cellular networks and wireless local area networks (WLANs). Firstly the block probability, the drop probability and the number of users in the heterogeneous networks are calculated in the channel-guard call admission method, and a function of the system benefit which is based on the new call arrival rate and the handoff call arrival rate is proposed. Then the optimal radius of WLAN is obtained by using simulation annealing (SA) method to maximize the benefit. All the nodes should handoff from cellular network to WLAN if they enter WLAN’s scope and handoff fromWLAN to cellular network if they leave the scope. Finally, the algorithm in different new call arrival rates and handoff call arrival rates is analyzed and results show that it can achieve good effects.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号