首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13781篇
  免费   1170篇
  国内免费   715篇
化学   471篇
晶体学   7篇
力学   1067篇
综合类   233篇
数学   12094篇
物理学   1794篇
  2023年   86篇
  2022年   135篇
  2021年   184篇
  2020年   242篇
  2019年   238篇
  2018年   290篇
  2017年   343篇
  2016年   381篇
  2015年   252篇
  2014年   572篇
  2013年   831篇
  2012年   694篇
  2011年   673篇
  2010年   649篇
  2009年   831篇
  2008年   913篇
  2007年   938篇
  2006年   743篇
  2005年   678篇
  2004年   556篇
  2003年   520篇
  2002年   530篇
  2001年   409篇
  2000年   455篇
  1999年   364篇
  1998年   321篇
  1997年   304篇
  1996年   289篇
  1995年   295篇
  1994年   199篇
  1993年   212篇
  1992年   193篇
  1991年   157篇
  1990年   153篇
  1989年   96篇
  1988年   106篇
  1987年   73篇
  1986年   105篇
  1985年   123篇
  1984年   94篇
  1983年   28篇
  1982年   59篇
  1981年   45篇
  1980年   42篇
  1979年   35篇
  1978年   58篇
  1977年   60篇
  1976年   30篇
  1975年   16篇
  1974年   19篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
A Modified SQP Method and Its Global Convergence   总被引:6,自引:0,他引:6  
The sequential quadratic programming method developed by Wilson, Han andPowell may fail if the quadratic programming subproblems become infeasibleor if the associated sequence of search directions is unbounded. In [1], Hanand Burke give a modification to this method wherein the QP subproblem isaltered in a way which guarantees that the associated constraint region isnonempty and for which a robust convergence theory is established. In thispaper, we give a modification to the QP subproblem and provide a modifiedSQP method. Under some conditions, we prove that the algorithm eitherterminates at a Kuhn–Tucker point within finite steps or generates aninfinite sequence whose every cluster is a Kuhn–Tucker point.Finally, we give some numerical examples.  相似文献   
72.
The equivalent geometrical configurations of linear ordered orthogonal arrays are determined when their strengths are 3 and 4. Existence of such geometrical configurations is investigated. They are also useful in the study of (T, M, S)-nets.  相似文献   
73.
This paper considers a problem of nonlinear programming in which the objective function is the ratio of two linear functions and the constraints define a bounded and connected feasible region. Using a coordinate transformation, this problem is transformed into a simpler one, whose geometric interpretation is of particular significance. The transformation leads to a characterization of some special vertices of the feasible region from both the theoretical and operational points of view.  相似文献   
74.
甘师信 《数学杂志》1993,13(3):289-297
本文引进了广义极限鞅的概念,证明了 L~1有界的广义极限鞅 a.s.收敛于—可积随机变量。这样推广了通常极限鞅的相应收敛定理,并回答了 Stout 提出的问题:L~1有界的弱鞅在一定的条件下是 a.s.收敛的。  相似文献   
75.
朱来义 《数学进展》1995,24(4):327-334
有界单连通区域G,其边界θG=Г∈(1,α),α〉0。本计算节以广义Faber多项式φn(z)的零点为插值结点的Lagrange插值多项式的逼近性质,得到了它对A(G↑-)中的函数的一致逼近阶和平均逼近阶的估计,并且得到了它对E^p(G)中函数的平均逼近阶的估计,还指出关于平均逼近阶的估计是不可改进的。  相似文献   
76.
This paper describes a method and the corresponding algorithms for simplification of large-scale linear programming models. It consists of the elimination of the balance constraints (i.e. constraints with zero RHS term). The idea is to apply some linear transformations to the original problem in order to nullify the balance constraints. These transformations are able to simultaneously eliminate more balance rows. The core of this contribution is the introduction of the reduction matrix and the associated theorems on the equivalent linear programs (original and reduced). The numerical experiments with this method of simplification proved this approach to be beneficial for a large class of LP problems.This research work was done while the first author was at Duisburg University, Mess-, Steuer und Regelungstechnik, Germany, under the greatly appreciated financial assistance given by the Alexander-von-Humboldt Foundation.  相似文献   
77.
Previous researchers have designed shared control schemes with a view to minimising the likelihood that participants will conspire to perform an unauthorised act. But, human nature being what it is, systems inevitably fail; so shared control schemes should also be designed so that the police can identify conspirators after the fact. This requirement leads us to search for schemes with sparse access structures. We show how this can be done using ideas from coding theory. In particular, secret sharing schemes based on geometric codes whose dual [n,k,d] codes have d and n as their only nonzero weights are suitable. We determine their access structures and analyse their properties. We have found almost all of them, and established some relations among codes, designs and secret-sharing schemes.  相似文献   
78.
In this paper, we extend the classical convergence and rate of convergence results for the method of multipliers for equality constrained problems to general inequality constrained problems, without assuming the strict complementarity hypothesis at the local optimal solution. Instead, we consider an alternative second-order sufficient condition for a strict local minimum, which coincides with the standard one in the case of strict complementary slackness. As a consequence, new stopping rules are derived in order to guarantee a local linear rate of convergence for the method, even if the current Lagrangian is only asymptotically minimized in this more general setting. These extended results allow us to broaden the scope of applicability of the method of multipliers, in order to cover all those problems admitting loosely binding constraints at some optimal solution. This fact is not meaningless, since in practice this kind of problem seems to be more the rule rather than the exception.In proving the different results, we follow the classical primaldual approach to the method of multipliers, considering the approximate minimizers for the original augmented Lagrangian as the exact solutions for some adequate approximate augmented Lagrangian. In particular, we prove a general uniform continuity property concerning both their primal and their dual optimal solution set maps, a property that could be useful beyond the scope of this paper. This approach leads to very simple proofs of the preliminary results and to a straight-forward proof of the main results.The author gratefully acknowledges the referees for their helpful comments and remarks. This research was supported by FONDECYT (Fondo Nacional de Desarrollo Científico y Technológico de Chile).  相似文献   
79.
This paper presents an analysis of a portfolio model which can be used to assist a property-liability insurance company in determining the optimal composition of the insurance and investment portfolios. By introducing insurer's threshold risk and relaxing some non-realistic assumptions made in traditional chance constraint insurance and investment portfolio models, we propose a method for an insurer to maximize his return threshold for a given threshold risk level. This proposed model can be used to optimize the composition of underwriting and investment portfolios regarding the insurer's threshold risk level, as well as to generate the efficient frontier by adjusting insurer's threshold risk levels. A numerical example is given based on the industry's aggregated data for a sixteen year period.  相似文献   
80.
We prove that RANDOM EDGE, the simplex algorithm that always chooses a random improving edge to proceed on, can take a mildly exponential number of steps in the model of abstract objective functions (introduced by Williamson Hoke [Completely unimodal numberings of a simple polytope, Discrete Appl. Math. 20 (1988) 69-81.] and by Kalai [A simple way to tell a simple polytope from its graph, J. Combin. Theory Ser. A 49(2) (1988) 381-383.] under different names). We define an abstract objective function on the n-dimensional cube for which the algorithm, started at a random vertex, needs at least exp(const·n1/3) steps with high probability. The best previous lower bound was quadratic. So in order for RANDOM EDGE to succeed in polynomial time, geometry must help.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号