首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4345篇
  免费   562篇
  国内免费   125篇
化学   354篇
晶体学   8篇
力学   109篇
综合类   93篇
数学   1004篇
物理学   805篇
无线电   2659篇
  2024年   19篇
  2023年   74篇
  2022年   151篇
  2021年   233篇
  2020年   162篇
  2019年   124篇
  2018年   111篇
  2017年   140篇
  2016年   191篇
  2015年   172篇
  2014年   281篇
  2013年   267篇
  2012年   268篇
  2011年   285篇
  2010年   192篇
  2009年   225篇
  2008年   273篇
  2007年   240篇
  2006年   203篇
  2005年   185篇
  2004年   160篇
  2003年   150篇
  2002年   146篇
  2001年   111篇
  2000年   104篇
  1999年   103篇
  1998年   65篇
  1997年   63篇
  1996年   49篇
  1995年   57篇
  1994年   38篇
  1993年   16篇
  1992年   33篇
  1991年   45篇
  1990年   17篇
  1989年   26篇
  1988年   18篇
  1987年   2篇
  1986年   3篇
  1985年   5篇
  1984年   4篇
  1983年   3篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1979年   4篇
  1978年   5篇
  1977年   1篇
  1975年   1篇
  1973年   4篇
排序方式: 共有5032条查询结果,搜索用时 526 毫秒
991.
本文构建了一个Delaunay模型对电压门控钾离子(Kv)通道进行预测。该方法通过建立一系列带有隐含变量的单纯形来分类电压门控钾离子通道,然后通过未知序列在主成分空间里面的投影来预测结构。结果表明该模型无论是在分类和结构预测上均可以得到很好的结果。  相似文献   
992.
This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper. In the meantime, a cooperative jammer (CJ) with multiple antennas transmits carefully crafted adversarial perturbations over the air to fool the eavesdropper into classifying the received superposition of signals as noise. While generating the adversarial perturbation at the CJ, multiple antennas are utilized to improve the attack performance in terms of fooling the eavesdropper. Two main points are considered while exploiting the multiple antennas at the adversary, namely the power allocation among antennas and the utilization of channel diversity. To limit the impact on the bit error rate (BER) at the receiver, the CJ puts an upper bound on the strength of the perturbation signal. Performance results show that this adversarial perturbation causes the eavesdropper to misclassify the received signals as noise with a high probability while increasing the BER at the legitimate receiver only slightly. Furthermore, the adversarial perturbation is shown to become more effective when multiple antennas are utilized.  相似文献   
993.
Recent developments in actuarial literature have shown that credibility theory can serve as an effective tool in mortality modelling, leading to accurate forecasts when applied to single or multi-population datasets. This paper presents a crossed classification credibility formulation of the Lee–Carter method particularly designed for multi-population mortality modelling. Differently from the standard Lee–Carter methodology, where the time index is assumed to follow an appropriate time series process, herein, future mortality dynamics are estimated under a crossed classification credibility framework, which models the interactions between various risk factors (e.g. genders, countries). The forecasting performances between the proposed model, the original Lee–Carter model and two multi-population Lee–Carter extensions are compared for both genders of multiple countries. Numerical results indicate that the proposed model produces more accurate forecasts than the Lee–Carter type models, as evaluated by the mean absolute percentage forecast error measure. Applications with life insurance and annuity products are also provided and a stochastic version of the proposed model is presented.  相似文献   
994.
995.
996.
This paper develops local learning algorithms to solve a classification task with the help of biologically inspired mathematical models of spiking neural networks involving the mechanism of spike-timing-dependent plasticity (STDP). The advantages of the models are their simplicity and, hence, the potential ability to be hardware-implemented in low-energy-consuming biomorphic computing devices. The methods developed are based on two key effects observed in neurons with STDP: mean firing rate stabilization and memorizing repeating spike patterns. As the result, two algorithms to solve a classification task with a spiking neural network are proposed: the first based on rate encoding of the input data and the second based on temporal encoding. The accuracy of the algorithms is tested on the benchmark classification tasks of Fisher's Iris and Wisconsin breast cancer, with several combinations of input data normalization and preprocessing. The respective accuracies are 99% and 94% by F1-score.  相似文献   
997.
王雪松  陈思伟 《雷达学报》2020,9(2):259-276
极化合成孔径雷达(SAR)能够获取目标的全极化信息,在对地观测、灾害评估、侦察监视等民用和军用领域得到广泛应用。国内主要高校、中科院、工业部门和用户单位在该领域开展了卓有成效的工作,取得一大批标志性研究成果。该文简要综述了极化SAR成像解译识别领域的主要研究进展。在解译层面,主要介绍了极化目标分解和极化旋转域解译等理论方法的研究进展。在应用层面,结合研究团队的工作,探讨了上述理论方法在舰船检测、地物分类和建筑物损毁评估等领域的应用成效。最后,对极化SAR目标解译识别技术的研究进行了展望。   相似文献   
998.
提出了基于动态理想解法(TOPSIS)的调制识别方法,将各特征参数看成一个整体,对各个调制方式判别打分,根据得分高低来判定调制样式。该方法简单、方便,弥补了传统判决树法判决门限难于选取的缺点,同时克服了神经网络法训练时间长、对算法要求高的难题。仿真验证了所提方法的有效性,在信噪比10 dB以上时正确识别率接近100%。  相似文献   
999.
基于一位全加器三变量逻辑函数的查表综合   总被引:1,自引:0,他引:1       下载免费PDF全文
通过对1个一位全加器3个输入端不同的组合,可以实现与门、或门、非门、同或门及异或门,因此全加器在数字逻辑电路中有着重要的作用.本文在介绍全加器的基础上提出了用查表法设计基于一位全加器实现任意三变量函数的组合电路和时序电路.在与传统的与非门/或非门的比较中,它显示了优势.  相似文献   
1000.
Some row-action algorithms which exploit special objective function and constraints structure have proven advantageous for solving huge and sparse feasibility or optimization problems. Recently developed block-iterative versions of such special-purpose methods enable parallel computation when the underlying problem is appropriately decomposed. This opens the door for parallel computation in image reconstruction problems of computerized tomography and in the inverse problem of radiation therapy treatment planning, all in their fully discretized modelling approach. Since there is more than one way of deriving block-iterative versions of any row-action method, the choice has to be made with reference to the underlying real-world problem.This research was done with partial support of National Institutes of Health, Grant HL-28438 while the author was with the Medical Image Processing Group (MIPG) at the Department of Radiology, Hospital of the University of Pennsylvania, Philadelphia, PA, USA.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号