全文获取类型
收费全文 | 1361篇 |
免费 | 64篇 |
国内免费 | 18篇 |
专业分类
化学 | 43篇 |
力学 | 22篇 |
综合类 | 7篇 |
数学 | 447篇 |
物理学 | 123篇 |
无线电 | 801篇 |
出版年
2024年 | 2篇 |
2023年 | 16篇 |
2022年 | 17篇 |
2021年 | 29篇 |
2020年 | 20篇 |
2019年 | 15篇 |
2018年 | 11篇 |
2017年 | 35篇 |
2016年 | 35篇 |
2015年 | 40篇 |
2014年 | 77篇 |
2013年 | 77篇 |
2012年 | 71篇 |
2011年 | 66篇 |
2010年 | 63篇 |
2009年 | 70篇 |
2008年 | 78篇 |
2007年 | 66篇 |
2006年 | 76篇 |
2005年 | 57篇 |
2004年 | 78篇 |
2003年 | 48篇 |
2002年 | 45篇 |
2001年 | 30篇 |
2000年 | 49篇 |
1999年 | 35篇 |
1998年 | 34篇 |
1997年 | 24篇 |
1996年 | 24篇 |
1995年 | 24篇 |
1994年 | 21篇 |
1993年 | 16篇 |
1992年 | 17篇 |
1991年 | 5篇 |
1990年 | 3篇 |
1989年 | 6篇 |
1988年 | 4篇 |
1987年 | 2篇 |
1986年 | 4篇 |
1985年 | 8篇 |
1984年 | 8篇 |
1983年 | 8篇 |
1982年 | 5篇 |
1981年 | 5篇 |
1980年 | 5篇 |
1979年 | 5篇 |
1978年 | 5篇 |
1977年 | 2篇 |
1973年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有1443条查询结果,搜索用时 15 毫秒
81.
传统的地震数据解释方法是利用地震剖面与水平切片的二维图象显示三维数据,它具有很大的局限性。科学可视化技术的出现使得三维数据三维解释成为可能。将科学可视化技术应用于三维地震数据场,则产生了三维地震数据可视化技术,它主要包括面可视化与直接体绘制两种技术。本文主要研究三维地震数据场的直接体绘制方法——光线投射算法。 相似文献
82.
Binary sensor network(BSN) are becoming more attractive due to the low cost deployment, small size, low energy consumption and simple operation.There are two different ways for target tracking in BSN, the weighted algorithms and particle filtering algorithm.The weighted algorithms have good realtime property, however have poor estimation property and some of them does not suit for target’s variable velocity model. The particle filtering algorithm can estimate target's position more accurately with poor realtime property and is not suitable for target’s constant velocity model. In this paper distance weight is adopted to estimate the target’s position, which is different from the existing distance weight in other papers. On the analysis of principle of distance weight (DW), prediction-based distance weighted(PDW) algorithm for target tracking in BSN is proposed. Simulation results proved PDW fits for target's constant and variable velocity models with accurate estimation and good realtime property. 相似文献
83.
Since the frequency of network security incidents is nonlinear, traditional prediction methods such as ARMA, Gray systems are difficult to deal with the problem. When the size of sample is small, methods based on artificial neural network may not reach a high degree of preciseness. Least Squares Support Vector Machines (LSSVM) is a kind of machine learning methods based on the statistics learning theory, it can be applied to solve small sample and non-linear problems very well. This paper applied LSSVM to predict the occur frequency of network security incidents. To improve the accuracy, it used an improved genetic algorithm to optimize the parameters of LSSVM. Verified by real data sets, the improved genetic algorithm (IGA) converges faster than the simple genetic algorithm (SGA), and has a higher efficiency in the optimization procedure. Specially, the optimized LSSVM model worked very well on the prediction of frequency of network security incidents. 相似文献
84.
85.
86.
In this paper, we propose a well targeted algorithm (GAS algorithm) for detecting communities in high clustered networks by presenting group action technology on community division. During the processing of this algorithm, the underlying community structure of a clustered network emerges simultaneously as the corresponding partition of orbits by the permutation groups acting on the node set are achieved. As the derivation of the orbit partition, an algebraic structure r-cycle can be considered as the origin of the community. To be a priori estimation for the community structure of the algorithm, the community separability is introduced to indicate whether a network has distinct community structure. By executing the algorithm on several typical networks and the LFR benchmark, it shows that this GAS algorithm can detect communities accurately and effectively in high clustered networks. Furthermore, we compare the GAS algorithm and the clique percolation algorithm on the LFR benchmark. It is shown that the GAS algorithm is more accurate at detecting non-overlapping communities in clustered networks. It is suggested that algebraic techniques can uncover fresh light on detecting communities in complex networks. 相似文献
87.
激光诱导击穿光谱数据特征自动提取方法研究 总被引:1,自引:0,他引:1
根据激光诱导击穿光谱(LIBS)展宽主要为非线性Lorentz函数模型,利用Levenberg-Marquardt(L-M)算法对该理论模型中的待定参数进行优化估值,扣除了光谱信号中的连续背景,校正和还原了峰位和峰强,并对拟合数据点自动提取方法进行了分析;以MatrixVB与VB混合编程相结合,实现了基于L-M算法的L... 相似文献
88.
In this work we consider scheduling problems where a sequence of assignments from products to machines – or from tasks to operators, or from workers to resources – has to be determined, with the goal of minimizing the costs (=money, manpower, and/or time) that are incurred by the interplay between those assignments. To account for the different practical requirements (e.g. few changes between different products/tasks on the same machine/operator, few production disruptions, or few changes of the same worker between different resources), we employ different objective functions that are all based on elementary combinatorial properties of the schedule matrix. We propose simple and efficient algorithms to solve the corresponding optimization problems, and provide hardness results where such algorithms most likely do not exist. 相似文献
89.
90.
The edit distance problem for rooted unordered trees is known to be NP-hard. Based on this fact, this paper studies exponential-time algorithms for the problem. For a general case, an time algorithm is presented, where and are the numbers of nodes and and are the numbers of branching nodes in two input trees. This algorithm is obtained by a combination of dynamic programming, exhaustive search, and maximum weighted bipartite matching. For bounded degree trees over a fixed alphabet, it is shown that the problem can be solved in time for any fixed . This result is achieved by avoiding duplicate calculations for identical subsets of small subtrees. 相似文献