全文获取类型
收费全文 | 14154篇 |
免费 | 1618篇 |
国内免费 | 518篇 |
专业分类
化学 | 1481篇 |
晶体学 | 13篇 |
力学 | 398篇 |
综合类 | 204篇 |
数学 | 2476篇 |
物理学 | 2487篇 |
无线电 | 9231篇 |
出版年
2024年 | 40篇 |
2023年 | 140篇 |
2022年 | 378篇 |
2021年 | 546篇 |
2020年 | 487篇 |
2019年 | 369篇 |
2018年 | 352篇 |
2017年 | 542篇 |
2016年 | 645篇 |
2015年 | 678篇 |
2014年 | 1114篇 |
2013年 | 1093篇 |
2012年 | 1030篇 |
2011年 | 1042篇 |
2010年 | 680篇 |
2009年 | 682篇 |
2008年 | 827篇 |
2007年 | 875篇 |
2006年 | 745篇 |
2005年 | 672篇 |
2004年 | 604篇 |
2003年 | 504篇 |
2002年 | 352篇 |
2001年 | 309篇 |
2000年 | 261篇 |
1999年 | 194篇 |
1998年 | 165篇 |
1997年 | 135篇 |
1996年 | 130篇 |
1995年 | 128篇 |
1994年 | 98篇 |
1993年 | 75篇 |
1992年 | 65篇 |
1991年 | 50篇 |
1990年 | 35篇 |
1989年 | 31篇 |
1988年 | 27篇 |
1987年 | 27篇 |
1986年 | 21篇 |
1985年 | 23篇 |
1984年 | 30篇 |
1983年 | 10篇 |
1982年 | 13篇 |
1981年 | 11篇 |
1980年 | 9篇 |
1979年 | 10篇 |
1978年 | 7篇 |
1977年 | 9篇 |
1976年 | 5篇 |
1973年 | 6篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
31.
Rajamani Ganesh Kuriacose Joseph Newman D. Wilson Dipankar Raychaudhuri 《International Journal of Wireless Information Networks》1994,1(3):199-222
This paper presents a simulation-based study of cellular packet CDMA systems operating in an integrated voice/data traffic scenario. Spread-spectrum CDMA provides a suitable framework for resource-shared packet transport capable of combining isochronous (voice, ISDN) and bursty data services. In this work, a general network model for cellular packet CDMA with mixed voice/data traffic is described and used to evaluate the capacity/performance impact of several key system parameters. First, the effect of spreading factor (N) and forward error correction (FEC) rate are studied, confirming earlier work indicating a weak dependence onN and a well-defined optimum code rate in the range of 0.5–0.7 (with BCH coding). Next, the effect of propagation loss coefficient () on network capacity is investigated over a range of possible assumptions for, including both constant and distance-dependent models. The results show that system capacity depends strongly on, varying by as much as a factor of 2 over the range of parameters considered. For a given distance-dependent assumption, performance results are also obtained for different cell sizes in order to understand the overall spatial reuse efficiency achievable in different cellular and microcellular scenarios. This is followed by an investigation of traffic source model effects: first the capacity improvement from voice activity detection VAD) is presented, showing the expected 21 gains. Results for varying proportions of voice and data traffic intensities indicate that the operating efficiency does not change significantly as the proportion of bursty data relative to voice is varied. 相似文献
32.
针对微博、微信、微视频等新媒体及移动互联网的快速发展给运营商带来的巨大冲击,分析了运营商目前在新媒体领域遇到的困境及应对新媒体挑战的思路,提出了新媒体分析技术的方法和步骤,举例阐述了新媒体技术在营销支撑分析中的应用,从运营管理的角度介绍了运营管理和投诉管理的功能实现,并给出了基于新媒体运营管理功能的系统建设方案及系统实施效果. 相似文献
33.
移动社交网络的应用已经成为是近几年来应用的热点。现有的基于地理位置的社交网络信息数据有自身的特点,分别论述了基于地理位置的社交网络的信息来源,几种基于地理位置的社交网络所形成的数据集以及其数据类型。 相似文献
34.
35.
In recent studies of generative adversarial networks (GAN), researchers have attempted to combine adversarial perturbation with data hiding in order to protect the privacy and authenticity of the host image simultaneously. However, most of the studied approaches can only achieve adversarial perturbation through a visible watermark; the quality of the host image is low, and the concealment of data hiding cannot be achieved. In this work, we propose a true data hiding method with adversarial effect for generating high-quality covers. Based on GAN, the data hiding area is selected precisely by limiting the modification strength in order to preserve the fidelity of the image. We devise a genetic algorithm that can explore decision boundaries in an artificially constrained search space to improve the attack effect as well as construct aggressive covert adversarial samples by detecting “sensitive pixels” in ordinary samples to place discontinuous perturbations. The results reveal that the stego-image has good visual quality and attack effect. To the best of our knowledge, this is the first attempt to use covert data hiding to generate adversarial samples based on GAN. 相似文献
36.
Feature selection (FS) is a vital step in data mining and machine learning, especially for analyzing the data in high-dimensional feature space. Gene expression data usually consist of a few samples characterized by high-dimensional feature space. As a result, they are not suitable to be processed by simple methods, such as the filter-based method. In this study, we propose a novel feature selection algorithm based on the Explosion Gravitation Field Algorithm, called EGFAFS. To reduce the dimensions of the feature space to acceptable dimensions, we constructed a recommended feature pool by a series of Random Forests based on the Gini index. Furthermore, by paying more attention to the features in the recommended feature pool, we can find the best subset more efficiently. To verify the performance of EGFAFS for FS, we tested EGFAFS on eight gene expression datasets compared with four heuristic-based FS methods (GA, PSO, SA, and DE) and four other FS methods (Boruta, HSICLasso, DNN-FS, and EGSG). The results show that EGFAFS has better performance for FS on gene expression data in terms of evaluation metrics, having more than the other eight FS algorithms. The genes selected by EGFAGS play an essential role in the differential co-expression network and some biological functions further demonstrate the success of EGFAFS for solving FS problems on gene expression data. 相似文献
37.
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted image steganography to a new stage. To improve the performance of steganography, this paper proposes a novel scheme that uses the Transformer for feature extraction in steganography. In addition, an image encryption algorithm using recursive permutation is proposed to further enhance the security of secret images. We conduct extensive experiments to demonstrate the effectiveness of the proposed scheme. We reveal that the Transformer is superior to the compared state-of-the-art deep-learning models in feature extraction for steganography. In addition, the proposed image encryption algorithm has good attributes for image security, which further enhances the performance of the proposed scheme of steganography. 相似文献
38.
关联规则是数据挖掘中的重要研究内容之一,对在事务数据库不变,只对最小支持度和最小可信度进行改变的情况下,针对关联规则的维护问题,设计了一个增量式更新的改进算法AIUA。 相似文献
39.
选取山西省为研究对象,以美国国家极轨合作仪件-可见红外成像辐射计套件(NPP-VIIRS)夜间灯光数据、GDP统计数据等为数据源,构建GDP空间化拟合模型,建立山西省GDP密度图,据此研究山西省经济的空间差异性。通过对NPP-VIIRS夜间灯光数据的空间化处理,提取灯光指数,并将其与GDP进行回归拟合,建立最佳回归模型,得到GDP密度拟合图;利用县级GDP数据进行线性纠正,从而提高GDP的模拟精度。结果表明:(1)NPP-VIIRS夜间灯光数据与GDP的相关性较高,可用于山西省GDP模拟;(2)与GDP分区建模相比,GDP整体建模的精度更高;(3)山西省GDP的空间分布整体呈由城市中心逐渐向周边辐射的特点,构成GDP过渡带。 相似文献
40.
阐述了当前电信企业各项计算机管理系统的现状 ,指出存在的不足 ,提出开发建设新的电信决策支持系统的意义 ;介绍电信决策支持系统的体系结构和所涉及的新技术、新概念 ,并指出了电信决策支持系统建设的难点 ,较详细地介绍了电信决策支持系统所实现的主要功能。 相似文献