首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2717篇
  免费   121篇
  国内免费   66篇
化学   174篇
晶体学   2篇
力学   137篇
综合类   27篇
数学   2263篇
物理学   301篇
  2023年   28篇
  2022年   27篇
  2021年   38篇
  2020年   35篇
  2019年   33篇
  2018年   35篇
  2017年   34篇
  2016年   48篇
  2015年   48篇
  2014年   86篇
  2013年   125篇
  2012年   96篇
  2011年   107篇
  2010年   126篇
  2009年   180篇
  2008年   207篇
  2007年   234篇
  2006年   163篇
  2005年   134篇
  2004年   119篇
  2003年   113篇
  2002年   112篇
  2001年   80篇
  2000年   71篇
  1999年   61篇
  1998年   78篇
  1997年   56篇
  1996年   59篇
  1995年   39篇
  1994年   39篇
  1993年   41篇
  1992年   27篇
  1991年   25篇
  1990年   19篇
  1989年   19篇
  1988年   25篇
  1987年   15篇
  1986年   16篇
  1985年   18篇
  1984年   23篇
  1983年   4篇
  1982年   12篇
  1981年   8篇
  1980年   9篇
  1979年   6篇
  1978年   8篇
  1977年   7篇
  1976年   6篇
  1975年   2篇
  1969年   1篇
排序方式: 共有2904条查询结果,搜索用时 15 毫秒
1.
2.
3.
4.
We introduce a Virtual Studio Technology (VST) 2 audio effect plugin that performs convolution reverb using synthetic Room Impulse Responses (RIRs) generated via a Genetic Algorithm (GA). The parameters of the plugin include some of those defined under the ISO 3382-1 standard (e.g., reverberation time, early decay time, and clarity), which are used to determine the fitness values of potential RIRs so that the user has some control over the shape of the resulting RIRs. In the GA, these RIRs are initially generated via a custom Gaussian noise method, and then evolve via truncation selection, random weighted average crossover, and mutation via Gaussian multiplication in order to produce RIRs that resemble real-world, recorded ones. Binaural Room Impulse Responses (BRIRs) can also be generated by assigning two different RIRs to the left and right stereo channels. With the proposed audio effect, new RIRs that represent virtual rooms, some of which may even be impossible to replicate in the physical world, can be generated and stored. Objective evaluation of the GA shows that contradictory combinations of parameter values will produce RIRs with low fitness. Additionally, through subjective evaluation, it was determined that RIRs generated by the GA were still perceptually distinguishable from similar real-world RIRs, but the perceptual differences were reduced when longer execution times were used for generating the RIRs or the unprocessed audio signals were comprised of only speech.  相似文献   
5.
This work investigates the detection of binary neutron stars gravitational wave based on convolutional neural network(CNN).To promote the detection performance and efficiency,we proposed a scheme based on wavelet packet(WP)decomposition and CNN.The WP decomposition is a time-frequency method and can enhance the discriminant features between gravitational wave signal and noise before detection.The CNN conducts the gravitational wave detection by learning a function mapping relation from the data under being processed to the space of detection results.This function-mapping-relation style detection scheme can detection efficiency significantly.In this work,instrument effects are con-sidered,and the noise are computed from a power spectral density(PSD)equivalent to the Advanced LIGO design sensitivity.The quantitative evaluations and comparisons with the state-of-art method matched filtering show the excellent performances for BNS gravitational wave detection.On efficiency,the current experiments show that this WP-CNN-based scheme is more than 960 times faster than the matched filtering.  相似文献   
6.
Truemper configurations (thetas, pyramids, prisms, and wheels) have played an important role in the study of complex hereditary graph classes (eg, the class of perfect graphs and the class of even-hole-free graphs), appearing both as excluded configurations, and as configurations around which graphs can be decomposed. In this paper, we study the structure of graphs that contain (as induced subgraphs) no Truemper configurations other than (possibly) universal wheels and twin wheels. We also study several subclasses of this class. We use our structural results to analyze the complexity of the recognition, maximum weight clique, maximum weight stable set, and optimal vertex coloring problems for these classes. Furthermore, we obtain polynomial -bounding functions for these classes.  相似文献   
7.
近年来,随着各国侦查卫星系统的不断完善,有效根据观测数据预测卫星的轨迹,同时建立适当的规避防范措施变得尤为重要·通过研究地面监测站监测的卫星数据及地理信息,提出了一种基于三维坐标系变换的卫星轨迹求解模型,具体建立模型的方法为:建立4种不同的坐标系,通过卫星坐标在4种坐标系中的变换,将地面检测站检测到的卫星数据进行处理,拟合出卫星的六个运动参数,得出卫星运动轨迹方程,并较为精准的预测卫星被观测站观测到的情况,以及任意时刻星下点的经纬度坐标.针对卫星的运动情况,为满足我方军事目标的运动需求,根据新疆地图建立军队行军路线的有向图,然后,在考虑卫星规避的情况下对每条路线进行模拟分析,最终,通过每条路线模拟分析的结果进行比对,得出最优的行军路线.  相似文献   
8.
We study the problem of reconstructing a low‐rank matrix, where the input is an n × m matrix M over a field and the goal is to reconstruct a (near‐optimal) matrix that is low‐rank and close to M under some distance function Δ. Furthermore, the reconstruction must be local, i.e., provides access to any desired entry of by reading only a few entries of the input M (ideally, independent of the matrix dimensions n and m). Our formulation of this problem is inspired by the local reconstruction framework of Saks and Seshadhri (SICOMP, 2010). Our main result is a local reconstruction algorithm for the case where Δ is the normalized Hamming distance (between matrices). Given M that is ‐close to a matrix of rank (together with d and ), this algorithm computes with high probability a rank‐d matrix that is ‐close to M. This is a local algorithm that proceeds in two phases. The preprocessing phase reads only random entries of M, and stores a small data structure. The query phase deterministically outputs a desired entry by reading only the data structure and 2d additional entries of M. We also consider local reconstruction in an easier setting, where the algorithm can read an entire matrix column in a single operation. When Δ is the normalized Hamming distance between vectors, we derive an algorithm that runs in polynomial time by applying our main result for matrix reconstruction. For comparison, when Δ is the truncated Euclidean distance and , we analyze sampling algorithms by using statistical learning tools. A preliminary version of this paper appears appears in ECCC, see: http://eccc.hpi-web.de/report/2015/128/ © 2017 Wiley Periodicals, Inc. Random Struct. Alg., 51, 607–630, 2017  相似文献   
9.
Constructing a spanning tree of a graph is one of the most basic tasks in graph theory. Motivated by several recent studies of local graph algorithms, we consider the following variant of this problem. Let G be a connected bounded‐degree graph. Given an edge e in G we would like to decide whether e belongs to a connected subgraph consisting of edges (for a prespecified constant ), where the decision for different edges should be consistent with the same subgraph . Can this task be performed by inspecting only a constant number of edges in G ? Our main results are:
  • We show that if every t‐vertex subgraph of G has expansion then one can (deterministically) construct a sparse spanning subgraph of G using few inspections. To this end we analyze a “local” version of a famous minimum‐weight spanning tree algorithm.
  • We show that the above expansion requirement is sharp even when allowing randomization. To this end we construct a family of 3‐regular graphs of high girth, in which every t‐vertex subgraph has expansion . We prove that for this family of graphs, any local algorithm for the sparse spanning graph problem requires inspecting a number of edges which is proportional to the girth.
© 2016 Wiley Periodicals, Inc. Random Struct. Alg., 50, 183–200, 2017  相似文献   
10.
We investigate algorithms to find the first vertex in large trees generated by either the uniform attachment or preferential attachment model. We require the algorithm to output a set of K vertices, such that, with probability at least , the first vertex is in this set. We show that for any ε, there exist such algorithms with K independent of the size of the input tree. Moreover, we provide almost tight bounds for the best value of K as a function of ε. In the uniform attachment case we show that the optimal K is subpolynomial in , and that it has to be at least superpolylogarithmic. On the other hand, the preferential attachment case is exponentially harder, as we prove that the best K is polynomial in . We conclude the paper with several open problems. © 2016 Wiley Periodicals, Inc. Random Struct. Alg., 50, 158–172, 2017  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号