首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3731篇
  免费   471篇
  国内免费   156篇
化学   285篇
晶体学   2篇
力学   352篇
综合类   96篇
数学   2674篇
物理学   949篇
  2024年   7篇
  2023年   48篇
  2022年   60篇
  2021年   118篇
  2020年   94篇
  2019年   89篇
  2018年   74篇
  2017年   147篇
  2016年   169篇
  2015年   91篇
  2014年   247篇
  2013年   340篇
  2012年   180篇
  2011年   195篇
  2010年   181篇
  2009年   215篇
  2008年   234篇
  2007年   214篇
  2006年   178篇
  2005年   181篇
  2004年   137篇
  2003年   109篇
  2002年   108篇
  2001年   113篇
  2000年   103篇
  1999年   94篇
  1998年   95篇
  1997年   66篇
  1996年   65篇
  1995年   57篇
  1994年   35篇
  1993年   35篇
  1992年   22篇
  1991年   22篇
  1990年   35篇
  1989年   19篇
  1988年   12篇
  1987年   25篇
  1986年   11篇
  1985年   38篇
  1984年   11篇
  1983年   12篇
  1982年   12篇
  1981年   12篇
  1980年   9篇
  1979年   14篇
  1978年   4篇
  1976年   4篇
  1974年   3篇
  1973年   4篇
排序方式: 共有4358条查询结果,搜索用时 250 毫秒
41.
主成分分析方法是在经济管理中经常使用的多元统计分析方法,在变量降维方面扮演着很重要的角色,是进行多变量综合评价的有力工具。但传统的主成分分析对于异常值十分敏感,计算结果很容易受到异常值影响,而实际数据常包含异常情况,通常分析很少考虑它们的作用。本文基于MCD估计提出一种稳健的主成分分析方法,模拟和实证分析结果表明,该方法对于抵抗异常值有很好的效果。  相似文献   
42.
In a secret sharing scheme, some participants can lie about the value of their shares when reconstructing the secret in order to obtain some illicit benefit. We present in this paper two methods to modify any linear secret sharing scheme in order to obtain schemes that are unconditionally secure against that kind of attack. The schemes obtained by the first method are robust, that is, cheaters are detected with high probability even if they know the value of the secret. The second method provides secure schemes, in which cheaters that do not know the secret are detected with high probability. When applied to ideal linear secret sharing schemes, our methods provide robust and secure schemes whose relation between the probability of cheating and the information rate is almost optimal. Besides, those methods make it possible to construct robust and secure schemes for any access structure.  相似文献   
43.
介绍了一种检验定性指标的有效方法,可用于确定产品的合格率和评价检验人员的检验水平。用该方法分析了某厂产品的一项实际指标,合格率为91 4%,还对该厂10名检验员的检验水平作了客观的评价。  相似文献   
44.
本文考虑损失函数的估计问题,分别对于球对称分布和均匀分布情形给出了其参数的J-S型估计量的损失之估计,它们满足[1]中提出的条件(Ⅰ)和(Ⅱ).  相似文献   
45.
本文通过模拟研究,讨论了最大似然方法和Bayes方法在分析结构方程模型中的相似点和不同之处。  相似文献   
46.
In this paper, we present a new algorithm to estimate a regression function in a fixed design regression model, by piecewise (standard and trigonometric) polynomials computed with an automatic choice of the knots of the subdivision and of the degrees of the polynomials on each sub-interval. First we give the theoretical background underlying the method: the theoretical performances of our penalized least-squares estimator are based on non-asymptotic evaluations of a mean-square type risk. Then we explain how the algorithm is built and possibly accelerated (to face the case when the number of observations is great), how the penalty term is chosen and why it contains some constants requiring an empirical calibration. Lastly, a comparison with some well-known or recent wavelet methods is made: this brings out that our algorithm behaves in a very competitive way in term of denoising and of compression.  相似文献   
47.
Correlated multivariate processes have a dependence structure which must be taken into account when estimating the covariance matrix. The natural estimator of the covariance matrix is introduced and is shown that to be biased under the dependence structure. This bias is studied under two different asymptotic models, namely increasing the domain by increasing the number of observations, and increasing the number of observations in the fixed domain. Using the first asymptotic model, we quantify the convergence rate of the bias and of the covariance between the components of the estimated covariance matrix. The second asymptotic model serves to derive a fast and accurate bias correction. As shown, under mild hypotheses, the asymptotic normality of the estimated covariance matrix holds and can be used to test whether the bias is significant, for example, in the sense that the eigenvectors of the estimated and true covariance matrices are significantly different.  相似文献   
48.
Shaping command input or preshaping is used for reducing system oscillation in motion control. Desired systems inputs are altered so that the system finishes the requested move without residual oscillation. This technique, developed by N.C. Singer and W.P. Seering, is used for example in the aerospace field, in particular in flexible structure control. This paper presents the study of ZV shaper for explicit fractional derivative systems (generalized derivative systems). A robustness study of ZV shaper is then presented and applied to improve second generation CRONE control response time. Results from simulation and from a DC motor bench are also given.  相似文献   
49.
The best-r-point-average (BRPA) estimator of the maximizer of a regression function, proposed in Changchien (in: M.T. Chao, P.E. Cheng (Eds.), Proceedings of the 1990 Taipei Symposium in Statistics, June 28–30, 1990, pp. 63–78) has certain merits over the estimators derived through the estimation of the regression function. Some of the properties of the BRPA estimator have been studied in Chen et al. (J. Multivariate Anal. 57 (1996) 191) and Bai and Huang (Sankhya: Indian J. Statist. Ser. A. 61 (Pt. 2) (1999) 208–217). In this article, we further study the properties of the BRPA estimator and give its convergence rate under some quite general conditions. Simulation results are presented for the illustration of the convergence rate. Some comparisons with existing estimators such as the Müller estimator are provided.  相似文献   
50.
We derive results on the asymptotic behavior of tails and quantiles of quadratic forms of Gaussian vectors. They appear in particular in delta–gamma models in financial risk management approximating portfolio returns. Quantile estimation corresponds to the estimation of the Value-at-Risk, which is a serious problem in high dimension.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号