首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14154篇
  免费   1618篇
  国内免费   518篇
化学   1481篇
晶体学   13篇
力学   398篇
综合类   204篇
数学   2476篇
物理学   2487篇
无线电   9231篇
  2024年   40篇
  2023年   140篇
  2022年   378篇
  2021年   546篇
  2020年   487篇
  2019年   369篇
  2018年   352篇
  2017年   542篇
  2016年   645篇
  2015年   678篇
  2014年   1114篇
  2013年   1093篇
  2012年   1030篇
  2011年   1042篇
  2010年   680篇
  2009年   682篇
  2008年   827篇
  2007年   875篇
  2006年   745篇
  2005年   672篇
  2004年   604篇
  2003年   504篇
  2002年   352篇
  2001年   309篇
  2000年   261篇
  1999年   194篇
  1998年   165篇
  1997年   135篇
  1996年   130篇
  1995年   128篇
  1994年   98篇
  1993年   75篇
  1992年   65篇
  1991年   50篇
  1990年   35篇
  1989年   31篇
  1988年   27篇
  1987年   27篇
  1986年   21篇
  1985年   23篇
  1984年   30篇
  1983年   10篇
  1982年   13篇
  1981年   11篇
  1980年   9篇
  1979年   10篇
  1978年   7篇
  1977年   9篇
  1976年   5篇
  1973年   6篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
31.
This paper presents a simulation-based study of cellular packet CDMA systems operating in an integrated voice/data traffic scenario. Spread-spectrum CDMA provides a suitable framework for resource-shared packet transport capable of combining isochronous (voice, ISDN) and bursty data services. In this work, a general network model for cellular packet CDMA with mixed voice/data traffic is described and used to evaluate the capacity/performance impact of several key system parameters. First, the effect of spreading factor (N) and forward error correction (FEC) rate are studied, confirming earlier work indicating a weak dependence onN and a well-defined optimum code rate in the range of 0.5–0.7 (with BCH coding). Next, the effect of propagation loss coefficient () on network capacity is investigated over a range of possible assumptions for, including both constant and distance-dependent models. The results show that system capacity depends strongly on, varying by as much as a factor of 2 over the range of parameters considered. For a given distance-dependent assumption, performance results are also obtained for different cell sizes in order to understand the overall spatial reuse efficiency achievable in different cellular and microcellular scenarios. This is followed by an investigation of traffic source model effects: first the capacity improvement from voice activity detection VAD) is presented, showing the expected 21 gains. Results for varying proportions of voice and data traffic intensities indicate that the operating efficiency does not change significantly as the proportion of bursty data relative to voice is varied.  相似文献   
32.
针对微博、微信、微视频等新媒体及移动互联网的快速发展给运营商带来的巨大冲击,分析了运营商目前在新媒体领域遇到的困境及应对新媒体挑战的思路,提出了新媒体分析技术的方法和步骤,举例阐述了新媒体技术在营销支撑分析中的应用,从运营管理的角度介绍了运营管理和投诉管理的功能实现,并给出了基于新媒体运营管理功能的系统建设方案及系统实施效果.  相似文献   
33.
移动社交网络的应用已经成为是近几年来应用的热点。现有的基于地理位置的社交网络信息数据有自身的特点,分别论述了基于地理位置的社交网络的信息来源,几种基于地理位置的社交网络所形成的数据集以及其数据类型。  相似文献   
34.
季刊  赵正文  王婷  黄婧 《信息技术》2011,(10):225-227
简要分析了面向对象数据库技术产生的必然性,着重介绍一种面向对象数据库技术——对象关系型数据库,包括它的内容和特点;以及基于实际研发项目全面阐述了压裂措施管理系统中面向对象数据库的统一建模,并对其实现数据共享提供基础性的统一数据结构的支持。  相似文献   
35.
In recent studies of generative adversarial networks (GAN), researchers have attempted to combine adversarial perturbation with data hiding in order to protect the privacy and authenticity of the host image simultaneously. However, most of the studied approaches can only achieve adversarial perturbation through a visible watermark; the quality of the host image is low, and the concealment of data hiding cannot be achieved. In this work, we propose a true data hiding method with adversarial effect for generating high-quality covers. Based on GAN, the data hiding area is selected precisely by limiting the modification strength in order to preserve the fidelity of the image. We devise a genetic algorithm that can explore decision boundaries in an artificially constrained search space to improve the attack effect as well as construct aggressive covert adversarial samples by detecting “sensitive pixels” in ordinary samples to place discontinuous perturbations. The results reveal that the stego-image has good visual quality and attack effect. To the best of our knowledge, this is the first attempt to use covert data hiding to generate adversarial samples based on GAN.  相似文献   
36.
Feature selection (FS) is a vital step in data mining and machine learning, especially for analyzing the data in high-dimensional feature space. Gene expression data usually consist of a few samples characterized by high-dimensional feature space. As a result, they are not suitable to be processed by simple methods, such as the filter-based method. In this study, we propose a novel feature selection algorithm based on the Explosion Gravitation Field Algorithm, called EGFAFS. To reduce the dimensions of the feature space to acceptable dimensions, we constructed a recommended feature pool by a series of Random Forests based on the Gini index. Furthermore, by paying more attention to the features in the recommended feature pool, we can find the best subset more efficiently. To verify the performance of EGFAFS for FS, we tested EGFAFS on eight gene expression datasets compared with four heuristic-based FS methods (GA, PSO, SA, and DE) and four other FS methods (Boruta, HSICLasso, DNN-FS, and EGSG). The results show that EGFAFS has better performance for FS on gene expression data in terms of evaluation metrics, having more than the other eight FS algorithms. The genes selected by EGFAGS play an essential role in the differential co-expression network and some biological functions further demonstrate the success of EGFAFS for solving FS problems on gene expression data.  相似文献   
37.
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted image steganography to a new stage. To improve the performance of steganography, this paper proposes a novel scheme that uses the Transformer for feature extraction in steganography. In addition, an image encryption algorithm using recursive permutation is proposed to further enhance the security of secret images. We conduct extensive experiments to demonstrate the effectiveness of the proposed scheme. We reveal that the Transformer is superior to the compared state-of-the-art deep-learning models in feature extraction for steganography. In addition, the proposed image encryption algorithm has good attributes for image security, which further enhances the performance of the proposed scheme of steganography.  相似文献   
38.
关联规则是数据挖掘中的重要研究内容之一,对在事务数据库不变,只对最小支持度和最小可信度进行改变的情况下,针对关联规则的维护问题,设计了一个增量式更新的改进算法AIUA。  相似文献   
39.
选取山西省为研究对象,以美国国家极轨合作仪件-可见红外成像辐射计套件(NPP-VIIRS)夜间灯光数据、GDP统计数据等为数据源,构建GDP空间化拟合模型,建立山西省GDP密度图,据此研究山西省经济的空间差异性。通过对NPP-VIIRS夜间灯光数据的空间化处理,提取灯光指数,并将其与GDP进行回归拟合,建立最佳回归模型,得到GDP密度拟合图;利用县级GDP数据进行线性纠正,从而提高GDP的模拟精度。结果表明:(1)NPP-VIIRS夜间灯光数据与GDP的相关性较高,可用于山西省GDP模拟;(2)与GDP分区建模相比,GDP整体建模的精度更高;(3)山西省GDP的空间分布整体呈由城市中心逐渐向周边辐射的特点,构成GDP过渡带。  相似文献   
40.
阐述了当前电信企业各项计算机管理系统的现状 ,指出存在的不足 ,提出开发建设新的电信决策支持系统的意义 ;介绍电信决策支持系统的体系结构和所涉及的新技术、新概念 ,并指出了电信决策支持系统建设的难点 ,较详细地介绍了电信决策支持系统所实现的主要功能。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号