首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10464篇
  免费   720篇
  国内免费   280篇
化学   1363篇
晶体学   38篇
力学   1489篇
综合类   148篇
数学   6857篇
物理学   1569篇
  2024年   14篇
  2023年   99篇
  2022年   202篇
  2021年   337篇
  2020年   206篇
  2019年   226篇
  2018年   243篇
  2017年   337篇
  2016年   331篇
  2015年   253篇
  2014年   490篇
  2013年   598篇
  2012年   626篇
  2011年   551篇
  2010年   500篇
  2009年   632篇
  2008年   620篇
  2007年   669篇
  2006年   534篇
  2005年   456篇
  2004年   389篇
  2003年   345篇
  2002年   311篇
  2001年   269篇
  2000年   268篇
  1999年   205篇
  1998年   214篇
  1997年   196篇
  1996年   137篇
  1995年   165篇
  1994年   141篇
  1993年   116篇
  1992年   109篇
  1991年   91篇
  1990年   78篇
  1989年   65篇
  1988年   51篇
  1987年   43篇
  1986年   40篇
  1985年   54篇
  1984年   51篇
  1983年   14篇
  1982年   25篇
  1981年   23篇
  1980年   19篇
  1979年   31篇
  1978年   23篇
  1977年   29篇
  1976年   18篇
  1974年   6篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
In this paper we consider minimizers of the functionalmin{λ1(Ω)++λk(Ω)+Λ|Ω|,:ΩD open} where DRd is a bounded open set and where 0<λ1(Ω)λk(Ω) are the first k eigenvalues on Ω of an operator in divergence form with Dirichlet boundary condition and with Hölder continuous coefficients. We prove that the optimal sets Ω have finite perimeter and that their free boundary ΩD is composed of a regular part, which is locally the graph of a C1,α-regular function, and a singular part, which is empty if d<d, discrete if d=d and of Hausdorff dimension at most dd if d>d, for some d{5,6,7}.  相似文献   
2.
Profiling engineered data with robust mining methods continues attracting attention in knowledge engineering systems. The purpose of this article is to propose a simple technique that deals with non-linear multi-factorial multi-characteristic screening suitable for knowledge discovery studies. The method is designed to proactively seek and quantify significant information content in engineered mini-datasets. This is achieved by deploying replicated fractional-factorial sampling schemes. Compiled multi-response data are converted to a single master-response effectuated by a series of distribution-free transformations and multi-compressed data fusions. The resulting amalgamated master response is deciphered by non-linear multi-factorial stealth stochastics intended for saturated schemes. The stealth properties of our method target processing datasets which might be overwhelmed by a lack of knowledge about the nature of reference distributions at play. Stealth features are triggered to overcome restrictions regarding the data normality conformance, the effect sparsity assumption and the inherent collapse of the ‘unexplainable error’ connotation in saturated arrays. The technique is showcased by profiling four ordinary controlling factors that influence webpage content performance by collecting data from a commercial browser monitoring service on a large scale web host. The examined effects are: (1) the number of Cascading Style Sheets files, (2) the number of JavaScript files, (3) the number of Image files, and (4) the Domain Name System Aliasing. The webpage performance level was screened against three popular characteristics: (1) the time to first visual, (2) the total loading time, and (3) the customer satisfaction. Our robust multi-response data mining technique is elucidated for a ten-replicate run study dictated by an L9(34) orthogonal array scheme where any uncontrolled noise embedded contribution has not been necessarily excluded.  相似文献   
3.
In this study, the combination of parameters required for optimal extraction of anti-oxidative components from the Chinese lotus (CLR) and Malaysian lotus (MLR) roots were carefully investigated. Box–Behnken design was employed to optimize the pH (X1: 2–3), extraction time (X2: 0.5–1.5 h) and solvent-to-sample ratio (X3: 20–40 mL/g) to obtain a high flavonoid yield with high % DPPHsc free radical scavenging and Ferric-reducing power assay (FRAP). The analysis of variance clearly showed the significant contribution of quadratic model for all responses. The optimal conditions for both Chinese lotus (CLR) and Malaysian lotus (MLR) roots were obtained as: CLR: X1 = 2.5; X2 = 0.5 h; X3 = 40 mL/g; MLR: X1 = 2.4; X2 = 0.5 h; X3 = 40 mL/g. These optimum conditions gave (a) Total flavonoid content (TFC) of 0.599 mg PCE/g sample and 0.549 mg PCE/g sample, respectively; (b) % DPPHsc of 48.36% and 29.11%, respectively; (c) FRAP value of 2.07 mM FeSO4 and 1.89 mM FeSO4, respectively. A close agreement between predicted and experimental values was found. The result obtained succinctly revealed that the Chinese lotus exhibited higher antioxidant and total flavonoid content when compared with the Malaysia lotus root at optimum extraction condition.  相似文献   
4.
5.
In this paper we propose a class of merit functions for variational inequality problems (VI). Through these merit functions, the variational inequality problem is cast as unconstrained minimization problem. We estimate the growth rate of these merit functions and give conditions under which the stationary points of these functions are the solutions of VI. This work was supported by the state key project “Scientific and Engineering Computing”.  相似文献   
6.
一个图的最小填充问题是寻求边数最少的弦母图,一个图的树宽问题是寻求团数最小的弦母图,这两个问题分别在稀疏矩阵计算及图的算法设计中有非常重要的作用.一个k-树G的补图G称为k-补树.本文给出了k-补树G的最小填充数f(G) 及树宽TW(G).  相似文献   
7.
Well-Posedness by Perturbations of Variational Problems   总被引:3,自引:0,他引:3  
In this paper, we consider the extension of the notion of well-posedness by perturbations, introduced by Zolezzi for optimization problems, to other related variational problems like inclusion problems and fixed-point problems. Then, we study the conditions under which there is equivalence of the well-posedness in the above sense between different problems. Relations with the so-called diagonal well-posedness are also given. Finally, an application to staircase iteration methods is presented.  相似文献   
8.
This paper presents an adaptive memory-based method for solving the Capacitated Vehicle Routing Problem (CVRP), called BoneRoute. The CVRP deals with the problem of finding the optimal sequence of deliveries conducted by a fleet of homogeneous vehicles, based at one depot, to serve a set of customers. The computational performance of the BoneRoute was found to be very efficient, producing high quality solutions over two sets of well known case studies examined.  相似文献   
9.
In this paper, we will propose algorithms for calculating a minimal ellipsoid circumscribing a polytope defined by a system of linear inequalities. If we know all vertices of the polytope and its cardinality is not very large, we can solve the problem in an efficient manner by a number of existent algorithms. However, when the polytope is defined by linear inequalities, these algorithms may not work since the cardinality of vertices may be huge. Based on a fact that vertices determining an ellipsoid are only a fraction of these vertices, we propose algorithms which iteratively calculate an ellipsoid which covers a subset of vertices. Numerical experiment shows that these algorithms perform well for polytopes of dimension up to seven.  相似文献   
10.
We consider applications of disjunctive programming to global optimization and problems with equilibrium constraints. We propose a modification of the algorithm of F. Beaumont for disjunctive programming problems and show its numerical efficiency.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号