全文获取类型
收费全文 | 262篇 |
免费 | 3篇 |
专业分类
化学 | 57篇 |
力学 | 5篇 |
数学 | 174篇 |
物理学 | 29篇 |
出版年
2022年 | 3篇 |
2021年 | 2篇 |
2020年 | 3篇 |
2019年 | 1篇 |
2018年 | 12篇 |
2017年 | 11篇 |
2016年 | 7篇 |
2015年 | 7篇 |
2014年 | 19篇 |
2013年 | 15篇 |
2012年 | 18篇 |
2011年 | 3篇 |
2010年 | 15篇 |
2009年 | 16篇 |
2008年 | 13篇 |
2007年 | 18篇 |
2006年 | 14篇 |
2005年 | 11篇 |
2004年 | 5篇 |
2003年 | 6篇 |
2002年 | 5篇 |
2001年 | 7篇 |
2000年 | 3篇 |
1997年 | 4篇 |
1996年 | 4篇 |
1995年 | 5篇 |
1994年 | 8篇 |
1993年 | 6篇 |
1992年 | 8篇 |
1991年 | 3篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1975年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有265条查询结果,搜索用时 0 毫秒
221.
We establish the convergence of a stochastic global optimization algorithm for general non-convex, smooth functions. The algorithm
follows the trajectory of an appropriately defined stochastic differential equation (SDE). In order to achieve feasibility
of the trajectory we introduce information from the Lagrange multipliers into the SDE. The analysis is performed in two steps.
We first give a characterization of a probability measure (Π) that is defined on the set of global minima of the problem.
We then study the transition density associated with the augmented diffusion process and show that its weak limit is given
by Π. 相似文献
222.
We present a continuous, bilinear formulation for the fixed charge network flow problem. This formulation is used to derive
an exact algorithm for the fixed charge network flow problem converging in a finite number of steps. Some preliminary computational
experiments are reported to show the performance of the algorithm. 相似文献
223.
224.
225.
We approximate the objective function of the fixed charge network flow problem (FCNF) by a piecewise linear one, and construct
a concave piecewise linear network flow problem (CPLNF). A proper choice of parameters in the CPLNF problem guarantees the
equivalence between those two problems. We propose a heuristic algorithm for solving the FCNF problem, which requires solving
a sequence of CPLNF problems. The algorithm employs the dynamic cost updating procedure (DCUP) to find a solution to the CPLNF
problems. Preliminary numerical experiments show the effectiveness of the proposed algorithm. In particular, it provides a
better solution than the dynamic slope scaling procedure in less CPU time.
Research was partially supported by NSF and Air Force grants. 相似文献
226.
Panos Hatsis Gary Valaskovic Jing‐Tao Wu 《Rapid communications in mass spectrometry : RCM》2009,23(23):3736-3742
Nanoelectrospray ionization (nESI) coupled online with high‐field asymmetric waveform ion mobility spectrometry (FAIMS) for small molecule analysis in a discovery pharmaceutical setting was examined. A conventional capillary pump, autosampler and nESI source were used to introduce samples directly into the FAIMS device. The FAIMS device was used to separate gas‐phase ions on a timescale that was compatible with the mass spectrometer. The capability of the nESI‐FAIMS combination to efficiently remove metabolite interferences from the parent drug, and reduce ion suppression effects, was demonstrated. On average, 85% of the signal intensity obtained from a neat sample was preserved in the extracted plasma samples. Standard curves were prepared for several compounds. Linearity was obtained over approximately 3 to 4 orders of magnitude. Comparison of results from nESI‐FAIMS with those from conventional LC/MS for a mouse pharmacokinetic study yielded concentration values differing by no more than 30%. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
227.
Jamming communication networks under complete uncertainty 总被引:1,自引:0,他引:1
Clayton W. Commander Panos M. Pardalos Valeriy Ryabchenko Oleg Shylo Stan Uryasev Grigoriy Zrazhevsky 《Optimization Letters》2008,2(1):53-70
This paper describes a problem of interdicting/jamming wireless communication networks in uncertain environments. Jamming
communication networks is an important problem with many applications, but has received relatively little attention in the
literature. Most of the work on network interdiction is focused on preventing jamming and analyzing network vulnerabilities.
Here, we consider the case where there is no information about the network to be jammed. Thus, the problem is reduced to jamming
all points in the area of interest. The optimal solution will determine the locations of the minimum number of jamming devices
required to suppress the network. We consider a subproblem which places jamming devices on the nodes of a uniform grid over
the area of interest. The objective here is to determine the maximum grid step size. We derive upper and lower bounds for
this problem and provide a convergence result. Further, we prove that due to the cumulative effect of the jamming devices,
the proposed method produces better solutions than the classical technique of covering the region with uniform circles. 相似文献
228.
Hyungju Park Nestor Michelena Devadatta Kulkarni Panos Papalambros 《Computational Optimization and Applications》2001,18(3):273-293
Decomposition of multidisciplinary engineering system design problems into smaller subproblems is desirable because it enhances robustness and understanding of the numerical results. Moreover, subproblems can be solved in parallel using the optimization technique most suitable for the underlying mathematical form of the subproblem. Hierarchical overlapping coordination (HOC) is an interesting strategy for solving decomposed problems. It simultaneously uses two or more design problem decompositions, each of them associated with different partitions of the design variables and constraints. Coordination is achieved by the exchange of information between decompositions. This article presents the HOC algorithm and several new sufficient conditions for convergence of the algorithm to the optimum in the case of convex problems with linear constraints. One of these equivalent conditions involves the rank of the constraint matrix that is computationally efficient to verify. Computational results obtained by applying the HOC algorithm to quadratic programming problems of various sizes are included for illustration. 相似文献
229.
230.
We study tolerance and topology of random scale-free networks under attack and defense strategies that depend on the degree k of the nodes. This situation occurs, for example, when the robustness of a node depends on its degree or in an intentional attack with insufficient knowledge of the network. We determine, for all strategies, the critical fraction p(c) of nodes that must be removed for disintegrating the network. We find that, for an intentional attack, little knowledge of the well-connected sites is sufficient to strongly reduce p(c). At criticality, the topology of the network depends on the removal strategy, implying that different strategies may lead to different kinds of percolation transitions. 相似文献