全文获取类型
收费全文 | 3954篇 |
免费 | 80篇 |
国内免费 | 266篇 |
专业分类
教育 | 1704篇 |
科学研究 | 1426篇 |
各国文化 | 3篇 |
体育 | 53篇 |
综合类 | 110篇 |
文化理论 | 10篇 |
信息传播 | 994篇 |
出版年
2024年 | 1篇 |
2023年 | 36篇 |
2022年 | 85篇 |
2021年 | 139篇 |
2020年 | 156篇 |
2019年 | 106篇 |
2018年 | 109篇 |
2017年 | 108篇 |
2016年 | 84篇 |
2015年 | 156篇 |
2014年 | 283篇 |
2013年 | 266篇 |
2012年 | 312篇 |
2011年 | 313篇 |
2010年 | 244篇 |
2009年 | 303篇 |
2008年 | 271篇 |
2007年 | 297篇 |
2006年 | 254篇 |
2005年 | 239篇 |
2004年 | 180篇 |
2003年 | 137篇 |
2002年 | 95篇 |
2001年 | 51篇 |
2000年 | 25篇 |
1999年 | 18篇 |
1998年 | 7篇 |
1997年 | 5篇 |
1996年 | 3篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1957年 | 2篇 |
排序方式: 共有4300条查询结果,搜索用时 15 毫秒
31.
Hong-Guang Ma Xiao-Fei Zhu Ming-Shun Ai Ji-Dong Wang 《Journal of The Franklin Institute》2007,344(8):1102-1112
A fault diagnosis method for analog circuit is proposed in this paper. An all-purpose amplifier is taken as the typical circuit under test (CUT). The chaotic signal, which is generated by an improved Chua's circuit, is employed as the excitation signal of CUT. The algorithm for phase-space reconstruction of chaotic time series is a combination algorithm of multiple autocorrelation and Γ-test. The circuit state is estimated based on detecting the geometric change of Chua's attractor with a data-mining approach. For the purpose of information fusion, another eight features are extracted from the testing data to comprehensively determine the CUT states. A discussion is made for comparing the effectiveness of each feature according to the testing results. 相似文献
32.
Current citation-based document retrieval systems generally offer only limited search facilities, such as author search. In order to facilitate more advanced search functions, we have developed a significantly improved system that employs two novel techniques: Context-based Cluster Analysis (CCA) and Context-based Ontology Generation frAmework (COGA). CCA aims to extract relevant information from clusters originally obtained from disparate clustering methods by building relationships between them. The built relationships are then represented as formal context using the Formal Concept Analysis (FCA) technique. COGA aims to generate ontology from clusters relationship built by CCA. By combining these two techniques, we are able to perform ontology learning from a citation database using clustering results. We have implemented the improved system and have demonstrated its use for finding research domain expertise. We have also conducted performance evaluation on the system and the results are encouraging. 相似文献
33.
本文在梳理概括了国内外专利文本挖掘技术研究进展基础上,探索建立一种基于对专利文本中特定动宾(AO)结构进行挖掘分析的专利功能分析方法,并通过专利功能的定义、提取和分析将专利技术与相关产业进行对接,实现了从专利文本中识别产业化的潜在领域。更为重要的是,本文提出了描述专利技术功能效用的S曲线和S指数,完善和改进了专利技术产业化适用性量化评价模型,并定义了该模型中的S指数、专利功能的绝对重要性指数(AI)和专利功能的相对重要性指数(RI)三个评价指标。最后,以具备"reduce PM2.5"功能的专利为例,验证了基于功能分析的专利技术产业化适用性评价模型的可行性,为中国专利技术产业化路径选择提供了新思路。 相似文献
34.
图书馆自动化系统更新中数据转换方法探讨 总被引:1,自引:0,他引:1
本文阐述了图书馆自动化系统的必要性,并探讨了系统更新中书目数据转换的方法。 相似文献
35.
美国和欧盟的数据隐私保护策略 总被引:2,自引:0,他引:2
Internet用户对数据隐私问题日益关注,对隐私的担忧是用户使用的主要障碍。有效的数据隐私保护对Internet产业的发展极为重要。本文对美国和欧盟的数据隐私保护策略进行了介绍,以期对我国的数据隐私保护起借鉴作用。 相似文献
36.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism.
Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to
be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report
and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace
the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual
theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing
of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in
the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much
more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these
dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line
question is whether the assessment of these gives sufficient reason for trust. 相似文献
37.
38.
39.
40.