首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   138篇
  免费   15篇
  国内免费   23篇
系统科学   34篇
教育与普及   7篇
现状及发展   4篇
综合类   131篇
  2024年   1篇
  2023年   1篇
  2016年   1篇
  2015年   2篇
  2014年   10篇
  2013年   1篇
  2012年   3篇
  2011年   23篇
  2010年   33篇
  2009年   27篇
  2008年   6篇
  2007年   7篇
  2006年   35篇
  2005年   8篇
  2004年   7篇
  2003年   2篇
  2001年   2篇
  2000年   2篇
  1999年   1篇
  1992年   1篇
  1988年   1篇
  1986年   1篇
  1980年   1篇
排序方式: 共有176条查询结果,搜索用时 62 毫秒
1.
基于高斯混合模型的EM学习算法   总被引:7,自引:0,他引:7  
本文研究了一类基于无监督聚类学习的算法——EM算法的算法实现.EM算法通常用于存在隐含变量时的聚类学习,由于引入了隐含变量,导致算法难以保证收敛和达到极优值.本文通过将该算法应用于高斯混合模型的学习,引入重叠度分析的方法改进EM算法的约束条件,从而能够确保EM算法的正确学习.  相似文献   
2.
1.INTRODUCTION DiscreteHopfieldneuralnetwork(DHNN)isoneof thefamousneuralnetworkswithawiderangeofap plications,suchascontentaddressablememory,pat ternrecognition,andcombinatorialoptimiza tion[1~5].ThestabilityofDHNNmeansthatevery trajectorymustconvergetowardsanequilibrium point,oralimitcycle.Becausethestabilityof DHNNisthefoundationofthenetwork’sapplica tionsandisthemostbasicandimportantproblem,thestabilityanalysisoftheDHNNhasattractedcon siderableinterest.Manyresearchershavefocu…  相似文献   
3.
Molecular studies using trace DNA, such as from museum specimens, ancient or forensic samples and samples obtained noninvasively, often have a common problem of low quality of DNA templates. Amplification errors, such as allelic dropout and false allele, may arise during polymerase chain reaction (PCR) using such samples. A mathematical model which treats homozygotes and heterozygotes discriminately has been developed to measure sample quality and compute the confidence level of using multipletube approaches. We use plucked hair samples collected from 26 individual Sichuan snub-nosed monkeys (Rhinopithecus roxel- lana) to test the model. In this case, a confidence level of 99% can be achieved by three positive PCRs. If the sample quality is very poor and requires many PCR replicates, an alternative multiplestep genotyping method is recommended. This model enables researchers to optimize experimental protocols through pilot studies and obtain reliable genetic information using noninvasive sampling method.  相似文献   
4.
Dysosma versipellis (Hance) M. Cheng ex Ying (Berberidaceae) is a rare and vulnerable, perennial herb endemic to China with pharmaceutical significance. Increasing habitat loss and over-exploitation of the plant has severely affected the plant’s in situ conservation, necessitating ex situ conservation and commercial cultivation. The light regime is a critical environmental factor contributing to successful ex situ conservation via efficient production of biomass and secondary metabolites. We investigated th...  相似文献   
5.
Using liquid Fe 60 Cu 40 alloy as a model, the structure of liquid Fe-Cu alloy systems is investigated in the temperature range 1200 2200 K, covering a large metastable undercooled regime, to understand the phase separation of liquid Fe-Cu alloys on the atomic scale. The total pair distribution functions (PDFs) indicate that liquid Fe 60 Cu 40 alloy is ordered in the short range and disordered in the long range. If the atom types are ignored, the total atom number densities and PDFs demonstrate that the atoms are distributed homogenously in the liquid alloy. However, the segregation of Fe and Cu atoms is very obvious with decreasing temperature. The partial PDFs and coordination numbers show that the Cu and Fe atoms are not apt to get together on the atomic scale at low temperatures; this will lead to large fluctuations and phase separation in liquid Fe-Cu alloy.  相似文献   
6.
In this paper, we consider a double compound Poisson risk model involving two independent classes ofinsurance risks with a threshold dividend strategy. We derived the integro-differential equations (IDE) with certain boundary conditions for the present value of dividends until ruin. When the claims from both classes are exponentially distributed, we show that the threshold dividend strategy is an optimal dividend strategy.  相似文献   
7.
D’oh 《世界博览》2009,(15):69-71
两性之间能传递出迷人的韵律.但最微小的问题可能暗中破坏了两人的感情:地板上乱扔的脏袜子,吃饭时大声吧唧嘴……就像坏了的水龙头漏出的水滴。它们侵蚀了二人世界中的美好,亲密关系只能是苍白的记忆。  相似文献   
8.
Radon-Nikodym theorem in signed Loeb space   总被引:1,自引:0,他引:1  
This paper gives the Radon-Nikodym theorem in signed Loeb space under 1-saturated nonstandard model. First,the nonstandard characterization of absolute continuity is discussed,on which Radon-Nikodym theorem in signed Loeb space is obtained. Then,some facts about a finite signed Loeb measure and its variation are shown.  相似文献   
9.
Amplitudes, rates, periodicities, causes and future trends of temperature variations based on tree rings for the past 2485 years on the central-eastern Tibetan Plateau were analyzed. The results showed that extreme climatic events on the Plateau, such as the Medieval Warm Period, Little Ice Age and 20th Century Warming appeared synchronously with those in other places worldwide. The largest amplitude and rate of temperature change occurred during the Eastern Jin Event (343-425 AD), and not in the late 20th century. There were significant cycles of 1324 a, 800 a, 199 a, 110 a and 2-3 a in the 2485-year temperature series. The 1324 a, 800 a, 199 a and 110 a cycles are associated with solar activity, which greatly affects the Earth surface temperature. The long-term trends (>1000 a) of temperature were controlled by the millennium-scale cycle, and amplitudes were dominated by multi-century cycles. Moreover, cold intervals corresponded to sunspot minimums. The prediction indicated that the temperature will decrease in the future until to 2068 AD and then increase again.  相似文献   
10.
0 IntroductionIdentity-based (ID-based) cryptography[1]is rapidly emer-gingin recent years .The concept of the proxy signature scheme was first in-troduced by Mamboet al[2]in 1996 .The concept of thresholdproxy signature was proposed[3 ,4]. Apractical and secure (t,n) threshold proxy signature scheme should satisfy the secre-cy,the proxy protected,the unforgeability,the non-repudia-tion,the ti me constraint ,andthe known signers[5].In 2006 , Baoet al[6]proposed an ID-based thresholdproxy si…  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号