首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1344篇
  国内免费   17篇
  完全免费   68篇
  数学   1429篇
  2023年   8篇
  2022年   13篇
  2021年   22篇
  2020年   7篇
  2019年   8篇
  2018年   41篇
  2017年   52篇
  2016年   46篇
  2015年   51篇
  2014年   67篇
  2013年   122篇
  2012年   136篇
  2011年   138篇
  2010年   111篇
  2009年   148篇
  2008年   93篇
  2007年   69篇
  2006年   66篇
  2005年   44篇
  2004年   32篇
  2003年   22篇
  2002年   17篇
  2001年   6篇
  2000年   4篇
  1999年   6篇
  1998年   5篇
  1997年   5篇
  1996年   11篇
  1995年   2篇
  1994年   4篇
  1993年   6篇
  1992年   7篇
  1991年   3篇
  1990年   5篇
  1989年   1篇
  1988年   7篇
  1987年   5篇
  1986年   1篇
  1985年   8篇
  1984年   4篇
  1983年   9篇
  1982年   4篇
  1981年   4篇
  1980年   3篇
  1979年   1篇
  1977年   1篇
  1976年   1篇
  1974年   1篇
  1973年   1篇
  1971年   1篇
排序方式: 共有1429条查询结果,搜索用时 156 毫秒
1.
自抗扰控制纵横谈   总被引:8,自引:2,他引:6  
首先从不确定系统控制的角度,将自抗扰控制与其它一些有关不确定系统控制的理论与方法进行比较和讨论,然后围绕自抗扰控制理论分析方面的进展,以及需要进一步研究的课题进行深入讨论与总结.通过纵横两方面的讨论揭示自抗扰控制对推进不确定系统控制研究的贡献,以及自抗扰控制方法的突出特点.  相似文献
2.
Let be a smooth bounded domain in RN. We prove general uniquenessresults for equations of the form – u = aub(x)f(u) in , subject to u = on . Our uniqueness theorem is establishedin a setting involving Karamata's theory on regularly varyingfunctions, which is used to relate the blow-up behavior of u(x)with f(u) and b(x), where b 0 on and a certain ratio involvingb is bounded near . A key step in our proof of uniqueness usesa modification of an iteration technique due to Safonov. 2000Mathematics Subject Classification 35J25 (primary), 35B40, 35J60(secondary).  相似文献
3.
An implicit method is developed for the numerical solution ofoption pricing models where it is assumed that the underlyingprocess is a jump diffusion. This method can be applied to avariety of contingent claim valuations, including American options,various kinds of exotic options, and models with uncertain volatilityor transaction costs. Proofs of timestepping stability and convergenceof a fixed-point iteration scheme are presented. For typicalmodel parameters, it is shown the error is reduced by two ordersof magnitude at each iteration. The correlation integral iscomputed using a fast Fourier transform method. Numerical testsof convergence for a variety of options are presented.  相似文献
4.
A Tabu-Search Hyperheuristic for Timetabling and Rostering   总被引:4,自引:0,他引:4  
Hyperheuristics can be defined to be heuristics which choose between heuristics in order to solve a given optimisation problem. The main motivation behind the development of such approaches is the goal of developing automated scheduling methods which are not restricted to one problem. In this paper we report the investigation of a hyperheuristic approach and evaluate it on various instances of two distinct timetabling and rostering problems. In the framework of our hyperheuristic approach, heuristics compete using rules based on the principles of reinforcement learning. A tabu list of heuristics is also maintained which prevents certain heuristics from being chosen at certain times during the search. We demonstrate that this tabu-search hyperheuristic is an easily re-usable method which can produce solutions of at least acceptable quality across a variety of problems and instances. In effect the proposed method is capable of producing solutions that are competitive with those obtained using state-of-the-art problem-specific techniques for the problems studied here, but is fundamentally more general than those techniques.  相似文献
5.
6.
The Lanczos algorithm for tridiagonalizing a symmetric matrixis the basis for several methods for solving sets of linearequations as well as for solving the eigenproblem. These methodsare very useful when the matrix is large and sparse. A completerounding error analysis of the algorithm is presented here,giving among other results an important expression for the lossof orthogonality of the computed vectors. The results here canbe used to analyze the many methods which are basedon the Lanczosalgorithm.  相似文献
7.
A New Characterization of Semi-bent and Bent Functions on Finite Fields*   总被引:3,自引:0,他引:3  
We present a new characterization of semi-bent and bent quadratic functions on finite fields. First, we determine when a GF(2)-linear combination of Gold functions Tr(x2i+1) is semi-bent over GF(2n), n odd, by a polynomial GCD computation. By analyzing this GCD condition, we provide simpler characterizations of semi-bent functions. For example, we deduce that all linear combinations of Gold functions give rise to semi-bent functions over GF(2p) when p belongs to a certain class of primes. Second, we generalize our results to fields GF(pn) where p is an odd prime and n is odd. In that case, we can determine whether a GF(p)-linear combination of Gold functions Tr(xpi+1) is (generalized) semi-bent or bent by a polynomial GCD computation. Similar to the binary case, simple characterizations of these p-ary semi-bent and bent functions are provided. Parts of this paper were presented at the 2002 IEEE International Symposium on Information Theory [10]  相似文献
8.
The Inverse Resonance Problem for Jacobi Operators   总被引:3,自引:0,他引:3  
It is proved in this paper that super-exponentially decaying,possibly non-selfadjoint perturbations of the free Jacobi operatorare uniquely determined by the location of all their eigenvaluesand resonances. 2000 Mathematics Subject Classification 39A70,34K29.  相似文献
9.
The pricing equations derived from uncertain volatility modelsin finance are often cast in the form of nonlinear partial differentialequations. Implicit timestepping leads to a set of nonlinearalgebraic equations which must be solved at each timestep. Tosolve these equations, an iterative approach is employed. Inthis paper, we prove the convergence of a particular iterativescheme for one factor uncertain volatility models. We also demonstratehow non-monotone discretization schemes (such as standard Crank–Nicolsontimestepping) can converge to incorrect solutions, or lead toinstability. Numerical examples are provided.  相似文献
10.
The purpose of this study is not only to build a group decision making structure model of risk in software development but also to propose two algorithms to tackle the rate of aggregative risk in a fuzzy environment by fuzzy sets theory during any phase of the life cycle. While evaluating the rate of aggregative risk, one may adjust or improve the weights or grades of the factors until she/he can accept it. Moreover, our result will be more objective and unbiased since it is generated by a group of evaluators.  相似文献
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号