首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1911篇
  免费   188篇
  国内免费   27篇
化学   149篇
力学   54篇
综合类   54篇
数学   675篇
物理学   119篇
无线电   1075篇
  2023年   12篇
  2022年   33篇
  2021年   78篇
  2020年   57篇
  2019年   52篇
  2018年   56篇
  2017年   64篇
  2016年   81篇
  2015年   88篇
  2014年   142篇
  2013年   172篇
  2012年   139篇
  2011年   117篇
  2010年   100篇
  2009年   109篇
  2008年   128篇
  2007年   142篇
  2006年   120篇
  2005年   108篇
  2004年   73篇
  2003年   58篇
  2002年   50篇
  2001年   32篇
  2000年   27篇
  1999年   20篇
  1998年   2篇
  1997年   8篇
  1996年   7篇
  1995年   3篇
  1994年   5篇
  1993年   6篇
  1992年   4篇
  1991年   5篇
  1989年   1篇
  1988年   3篇
  1985年   4篇
  1984年   4篇
  1983年   6篇
  1982年   3篇
  1981年   4篇
  1979年   3篇
排序方式: 共有2126条查询结果,搜索用时 431 毫秒
1.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors.  相似文献   
2.
Anup Bhat B  Harish SV  Geetha M 《ETRI Journal》2021,43(6):1024-1037
Mining high utility itemsets (HUIs) from transaction databases considers such factors as the unit profit and quantity of purchased items. Two-phase tree-based algorithms transform a database into compressed tree structures and generate candidate patterns through a recursive pattern-growth procedure. This procedure requires a lot of memory and time to construct conditional pattern trees. To address this issue, this study employs two compressed tree structures, namely, Utility Count Tree and String Utility Tree, to enumerate valid patterns and thus promote fast utility computation. Furthermore, the study presents an algorithm called single-phase utility computation (SPUC) that leverages these two tree structures to mine HUIs in a single phase by incorporating novel pruning strategies. Experiments conducted on both real and synthetic datasets demonstrate the superior performance of SPUC compared with IHUP, UP-Growth, and UP-Growth+ algorithms.  相似文献   
3.
郑春香  董甲东 《信息技术》2006,30(10):53-55
探讨分类挖掘技术在高校实际工作中的应用方式与应用领域。以高校人事管理为模型,应用数据挖掘中决策树算法,对高校人力资源数据源中的信息进行分析,发现其中有价值的数据模式,寻找其中存在的关系和规则,对高校人才规划提供比较客观的决策支持。  相似文献   
4.
基于数据挖掘的OLAP分析技术及应用   总被引:4,自引:1,他引:3  
数据仓库和数据挖掘技术是目前信息技术研究的热点问题之一,介绍了数据挖掘(data mining)、数据仓库(datawarehouse)及联机分析处理(OLAP)技术。并以零售业决策支持系统为例,介绍了该系统的体系结构、数据仓库的设计、系统实现关键技术及各子系统功能,着重论述了如何利用OLAP技术实现企业决策支持系统。  相似文献   
5.
The users' interest can be mined from the web cache and can be used widely. The interest can be specialized by the two-tuple (term, weight) in the simple interest model, in which the association relations are not mined, and then the interest cannot be associated in expressing the users' interest. Based on analyzing the WWW cache model, this letter brings forward a two-dimensional interest model and gives the interrelated methods on how to store the two-dimensional interest model effectively.  相似文献   
6.
The users‘ interest can be mined from the web cache and can be used widely.The interest can be specialized by the two-tuple(term,weight) in the simple interest model,in which the association relations are not mined.and then interest cannot be associated in expressing the users‘interest.Based on analyzing the WWW cache model,this letter brings forward a twodimensional interest model and gives the interrelated methods on how to store the two-dimensional interest model effectively.  相似文献   
7.
In this paper, based on the utility preferential attachment, we propose a new unified model to generate different network topologies such as scale-free, small-world and random networks. Moreover, a new network structure named super scale network is found, which has monopoly characteristic in our simulation experiments. Finally, the characteristics ofthis new network are given.  相似文献   
8.
注浆覆岩离层力学机理及其离层发育分类研究   总被引:4,自引:0,他引:4  
依据覆岩离层生成的力学机理,结合煤层开采程度的不同,将可注浆层位的离层划分为三类.以岩石的应变为指标,确立了覆岩离层可注浆层位岩梁的断裂步距表达式,理论上证明了划分注浆层位的合理性.根据岩石的全应力应变试验,结合现场实际观测数据,对以应变为指标的岩梁断裂步距表达式做了初步验证.结果表明:可注浆层位的分类和断裂步距表达式的确定对注浆减沉工程具有指导意义.  相似文献   
9.
带有回报计划的动态客户关系管理模型及实验应用分析   总被引:1,自引:0,他引:1  
在客户最大化效用及公司最大化CLV的动态环境下。对所提的带有回报计划的动态客户关系管理模型用于某超市的客户数据库中,发现模型的结果对这类客户是适用的。并给出了不同的客户状态空间对应的有效营销组合策略。结果表明:合适的回报计划可以促进客户的购买、提高公司的利润及缓解价格竞争。回报极限应该比客户的平均购买水平偏高,回报率应该与回报极限的改变方向一致。计划的时间范围应定在一年左右比较合适。对于累积购买水平较高的客户一般不邮寄商品信息。在回报计划的初期与末期不用打折。中期对那些购买次数很少的客户可以实行相应的降价策略。  相似文献   
10.
In this paper we consider the optimal investment problem in a market where the stock price process is modeled by a geometric Levy process (taking into account jumps). Except for the geometric Brownian model and the geometric Poissonian model, the resulting models are incomplete and there are many equivalent martingale measures. However, the model can be completed by the so-called power-jump assets. By doing this we allow investment in these new assets and we can try to maximize the expected utility of these portfolios. As particular cases we obtain the optimal portfolios based in stocks and bonds, showing that the new assets are superfluous for certain martingale measures that depend on the utility function we use.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号