全文获取类型
收费全文 | 636篇 |
免费 | 28篇 |
国内免费 | 21篇 |
专业分类
化学 | 145篇 |
力学 | 53篇 |
综合类 | 44篇 |
数学 | 333篇 |
物理学 | 110篇 |
出版年
2023年 | 8篇 |
2022年 | 21篇 |
2021年 | 43篇 |
2020年 | 25篇 |
2019年 | 28篇 |
2018年 | 21篇 |
2017年 | 29篇 |
2016年 | 17篇 |
2015年 | 18篇 |
2014年 | 28篇 |
2013年 | 62篇 |
2012年 | 32篇 |
2011年 | 38篇 |
2010年 | 29篇 |
2009年 | 38篇 |
2008年 | 27篇 |
2007年 | 43篇 |
2006年 | 32篇 |
2005年 | 33篇 |
2004年 | 22篇 |
2003年 | 18篇 |
2002年 | 14篇 |
2001年 | 14篇 |
2000年 | 10篇 |
1999年 | 10篇 |
1998年 | 4篇 |
1997年 | 3篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1993年 | 4篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有685条查询结果,搜索用时 15 毫秒
21.
提出一种交互式自动挖掘知识的模型,论述了该模型的原理、实现机制,并讨论了模型中数据宝藏和影响域及其相互关系.该模型同时具有在线性与深入挖掘的优点,能灵活有效地满足实际应用的需求. 相似文献
22.
A. J. W. Duijvestijn 《BIT Numerical Mathematics》1972,12(3):318-324
The correctness of an in-place permutation algorithm is proved. The algorithm exchanges elements belonging to a permutation cycle. A suitable assertion is constructed from which the correctness can be deduced after completion of the algorithm.An in-place rectangular matrix transposition algorithm is given as an example. 相似文献
23.
ZHANG Zhenyue & ZHA Hongyuan Department of Mathematics Zhejiang University Yuquan Campus Hangzhou China Department of Computer Science Engineering The Pennsylvania State University University Park PA U.S.A. 《中国科学A辑(英文版)》2004,47(6):908-920
We present our recent work on both linear and nonlinear data reduction methods and algorithms: for the linear case we discuss results on structure analysis of SVD of column-partitioned matrices and sparse low-rank approximation; for the nonlinear case we investigate methods for nonlinear dimensionality reduction and manifold learning. The problems we address have attracted great deal of interest in data mining and machine learning. 相似文献
24.
25.
Given a sample of binary random vectors with i.i.d. Bernoulli(p) components, that is equal to 1 (resp. 0) with probability p (resp. 1−p), we first establish a formula for the mean of the size of the random Galois lattice built from this sample, and a more complex one for its variance. Then, noticing that closed α-frequent itemsets are in bijection with closed α-winning coalitions, we establish similar formulas for the mean and the variance of the number of closed α-frequent itemsets. This can be interesting for the study of the complexity of some data mining problems such as association rule mining, sequential pattern mining and classification. 相似文献
26.
27.
ZHENG Jianguo LIU Fang WANG Lei JIAO Licheng 《Chinese Journal of Lasers》2001,10(6):427-431
1 Introduction Knowledgediscoveryindatabases (KDD)isconcernedwithextractingusefulinformationfromdatabases.Thetermdatamininghashistoricallybeenusedinthedatabasecommunityandinstatistics (ofteninthelatterwithnegativeconnotationstoindicateimproperdataanaly… 相似文献
28.
Artificial intelligence is one of the fastest-developing areas of science that covers a remarkably wide range of problems to be solved. It has found practical application in many areas of human activity, also in medicine. One of the directions of cooperation between computer science and medicine is to assist in diagnosing and proposing treatment methods with the use of IT tools. This study is the result of collaboration with the Children’s Memorial Health Institute in Warsaw, from where a database containing information about patients suffering from Bruton’s disease was made available. This is a rare disorder, difficult to detect in the first months of life. It is estimated that one in 70,000 to 90,000 children will develop Bruton’s disease. But even these few cases need detailed attention from doctors. Based on the data contained in the database, data mining was performed. During this process, knowledge was discovered that was presented in a way that is understandable to the user, in the form of decision trees. The best models obtained were used for the implementation of expert systems. Based on the data introduced by the user, the system conducts expertise and determines the severity of the course of the disease or the severity of the mutation. The CLIPS language was used for developing the expert system. Then, using this language, software was developed producing six expert systems. In the next step, experimental verification was performed, which confirmed the correctness of the developed systems. 相似文献
29.
Shenghan Zhou Houxiang Liu Bang Chen Wenkui Hou Xinpeng Ji Yue Zhang Wenbing Chang Yiyong Xiao 《Entropy (Basel, Switzerland)》2021,23(6)
The traditional sequential pattern mining method is carried out considering the whole time period and often ignores the sequential patterns that only occur in local time windows, as well as possible periodicity. Therefore, in order to overcome the limitations of traditional methods, this paper proposes status set sequential pattern mining with time windows (SSPMTW). In contrast to traditional methods, the item status is considered, and time windows, minimum confidence, minimum coverage, minimum factor set ratios and other constraints are added to mine more valuable rules in local time windows. The periodicity of these rules is also analyzed. According to the proposed method, this paper improves the Apriori algorithm, proposes the TW-Apriori algorithm, and explains the basic idea of the algorithm. Then, the feasibility, validity and efficiency of the proposed method and algorithm are verified by small-scale and large-scale examples. In a large-scale numerical example solution, the influence of various constraints on the mining results is analyzed. Finally, the solution results of SSPM and SSPMTW are compared and analyzed, and it is suggested that SSPMTW can excavate the laws existing in local time windows and analyze the periodicity of the laws, which solves the problem of SSPM ignoring the laws existing in local time windows and overcomes the limitations of traditional sequential pattern mining algorithms. In addition, the rules mined by SSPMTW reduce the entropy of the system. 相似文献
30.
It is shown that the optimal robust digital image watermarking based on singular value decomposition using differential evolution algorithm proposed by Veysel Aslantas [Opt. Commun. 282(5):769-777 (2009)] has a serious fundamental flaw and should not be used for proof of ownership application. 相似文献