首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   262篇
  免费   3篇
化学   57篇
力学   5篇
数学   174篇
物理学   29篇
  2022年   3篇
  2021年   2篇
  2020年   3篇
  2019年   1篇
  2018年   12篇
  2017年   11篇
  2016年   7篇
  2015年   7篇
  2014年   19篇
  2013年   15篇
  2012年   18篇
  2011年   3篇
  2010年   15篇
  2009年   16篇
  2008年   13篇
  2007年   18篇
  2006年   14篇
  2005年   11篇
  2004年   5篇
  2003年   6篇
  2002年   5篇
  2001年   7篇
  2000年   3篇
  1997年   4篇
  1996年   4篇
  1995年   5篇
  1994年   8篇
  1993年   6篇
  1992年   8篇
  1991年   3篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
  1987年   1篇
  1986年   1篇
  1983年   1篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1979年   1篇
  1975年   1篇
  1973年   1篇
排序方式: 共有265条查询结果,搜索用时 0 毫秒
221.
We establish the convergence of a stochastic global optimization algorithm for general non-convex, smooth functions. The algorithm follows the trajectory of an appropriately defined stochastic differential equation (SDE). In order to achieve feasibility of the trajectory we introduce information from the Lagrange multipliers into the SDE. The analysis is performed in two steps. We first give a characterization of a probability measure (Π) that is defined on the set of global minima of the problem. We then study the transition density associated with the augmented diffusion process and show that its weak limit is given by Π.  相似文献   
222.
We present a continuous, bilinear formulation for the fixed charge network flow problem. This formulation is used to derive an exact algorithm for the fixed charge network flow problem converging in a finite number of steps. Some preliminary computational experiments are reported to show the performance of the algorithm.  相似文献   
223.
224.
225.
We approximate the objective function of the fixed charge network flow problem (FCNF) by a piecewise linear one, and construct a concave piecewise linear network flow problem (CPLNF). A proper choice of parameters in the CPLNF problem guarantees the equivalence between those two problems. We propose a heuristic algorithm for solving the FCNF problem, which requires solving a sequence of CPLNF problems. The algorithm employs the dynamic cost updating procedure (DCUP) to find a solution to the CPLNF problems. Preliminary numerical experiments show the effectiveness of the proposed algorithm. In particular, it provides a better solution than the dynamic slope scaling procedure in less CPU time. Research was partially supported by NSF and Air Force grants.  相似文献   
226.
Nanoelectrospray ionization (nESI) coupled online with high‐field asymmetric waveform ion mobility spectrometry (FAIMS) for small molecule analysis in a discovery pharmaceutical setting was examined. A conventional capillary pump, autosampler and nESI source were used to introduce samples directly into the FAIMS device. The FAIMS device was used to separate gas‐phase ions on a timescale that was compatible with the mass spectrometer. The capability of the nESI‐FAIMS combination to efficiently remove metabolite interferences from the parent drug, and reduce ion suppression effects, was demonstrated. On average, 85% of the signal intensity obtained from a neat sample was preserved in the extracted plasma samples. Standard curves were prepared for several compounds. Linearity was obtained over approximately 3 to 4 orders of magnitude. Comparison of results from nESI‐FAIMS with those from conventional LC/MS for a mouse pharmacokinetic study yielded concentration values differing by no more than 30%. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
227.
Jamming communication networks under complete uncertainty   总被引:1,自引:0,他引:1  
This paper describes a problem of interdicting/jamming wireless communication networks in uncertain environments. Jamming communication networks is an important problem with many applications, but has received relatively little attention in the literature. Most of the work on network interdiction is focused on preventing jamming and analyzing network vulnerabilities. Here, we consider the case where there is no information about the network to be jammed. Thus, the problem is reduced to jamming all points in the area of interest. The optimal solution will determine the locations of the minimum number of jamming devices required to suppress the network. We consider a subproblem which places jamming devices on the nodes of a uniform grid over the area of interest. The objective here is to determine the maximum grid step size. We derive upper and lower bounds for this problem and provide a convergence result. Further, we prove that due to the cumulative effect of the jamming devices, the proposed method produces better solutions than the classical technique of covering the region with uniform circles.  相似文献   
228.
Decomposition of multidisciplinary engineering system design problems into smaller subproblems is desirable because it enhances robustness and understanding of the numerical results. Moreover, subproblems can be solved in parallel using the optimization technique most suitable for the underlying mathematical form of the subproblem. Hierarchical overlapping coordination (HOC) is an interesting strategy for solving decomposed problems. It simultaneously uses two or more design problem decompositions, each of them associated with different partitions of the design variables and constraints. Coordination is achieved by the exchange of information between decompositions. This article presents the HOC algorithm and several new sufficient conditions for convergence of the algorithm to the optimum in the case of convex problems with linear constraints. One of these equivalent conditions involves the rank of the constraint matrix that is computationally efficient to verify. Computational results obtained by applying the HOC algorithm to quadratic programming problems of various sizes are included for illustration.  相似文献   
229.
230.
We study tolerance and topology of random scale-free networks under attack and defense strategies that depend on the degree k of the nodes. This situation occurs, for example, when the robustness of a node depends on its degree or in an intentional attack with insufficient knowledge of the network. We determine, for all strategies, the critical fraction p(c) of nodes that must be removed for disintegrating the network. We find that, for an intentional attack, little knowledge of the well-connected sites is sufficient to strongly reduce p(c). At criticality, the topology of the network depends on the removal strategy, implying that different strategies may lead to different kinds of percolation transitions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号