首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   674篇
  免费   15篇
  国内免费   81篇
化学   500篇
晶体学   3篇
力学   12篇
综合类   3篇
数学   157篇
物理学   95篇
  2023年   15篇
  2022年   13篇
  2021年   11篇
  2020年   12篇
  2019年   14篇
  2018年   10篇
  2017年   17篇
  2016年   14篇
  2015年   13篇
  2014年   35篇
  2013年   50篇
  2012年   42篇
  2011年   48篇
  2010年   30篇
  2009年   59篇
  2008年   50篇
  2007年   59篇
  2006年   35篇
  2005年   25篇
  2004年   34篇
  2003年   17篇
  2002年   26篇
  2001年   18篇
  2000年   13篇
  1999年   13篇
  1998年   12篇
  1997年   9篇
  1996年   14篇
  1995年   9篇
  1994年   9篇
  1993年   7篇
  1992年   6篇
  1991年   3篇
  1990年   3篇
  1989年   5篇
  1988年   1篇
  1987年   3篇
  1986年   4篇
  1985年   1篇
  1984年   2篇
  1983年   2篇
  1982年   3篇
  1981年   2篇
  1979年   1篇
  1978年   1篇
排序方式: 共有770条查询结果,搜索用时 12 毫秒
81.
In this paper, a simultaneous canonical form of a pair of rectangular complex matrices is developed. Using this new tool we give a necessary and sufficient condition to assure that the reverse order law is valid for the weighted Moore–Penrose inverse. Additionally, we characterize matrices ordered by the weighted star partial order and adjacent matrices as applications.  相似文献   
82.
《Mathematische Nachrichten》2017,290(14-15):2185-2197
The rate of change of the sharp constant in the Sobolev–Poincaré or Friedrichs inequality is estimated for a Euclidean domain that moves outward. The key ingredients are a Hadamard variation formula and an inequality that reverses the usual Hölder inequality.  相似文献   
83.
84.
We explore M/G/∞ systems ‘fed’ by Poissonian inflows with infinite arrival rates. Three processes – corresponding to the system's state, workload, and queue-size – are studied and analyzed. Closed form formulae characterizing the system's stationary structure and correlation structure are derived. And, the issues of queue finiteness, workload summability, and Long Range Dependence are investigated. We then turn to devise a ‘reverse engineering’ scheme for the design of the system's correlation structure. Namely: how to construct an M/G/∞ system with a pre-desired ‘target’ workload/queue auto-covariance function. The ‘reverse engineering’ scheme is applied to various examples, including ones with infinite queues and non-summable workloads. AMS Subject Classifications Primary: 60K25; Secondary: 60G55, 60G10  相似文献   
85.
We study two deterministic scheduling problems that combine batching and deterioration features. In both problems, there is a certain demand for identical good quality items to be produced in batches. In the first problem, each batch is assigned an individual machine that requires a cost and a time to be activated. All the machines are identical, work in parallel, and always produce good quality items. All the items are available at time zero and they deteriorate while waiting for production. Deterioration results in a linear increase of time and cost of production. In the second problem, there is a single machine that produces good quality as well as defective items in batches. Each batch is preceded by a setup time and requires a setup cost. Defective items have to be reworked on the same machine. They deteriorate while waiting for rework. At a time to be decided, the machine switches from production to rework defective items of the current batch. After rework, every defective item has the required good quality. In both problems, the objective is to find batch partitioning such that a linear combination of the production cost and production completion time is minimized. The two problems are observed at computer service providers and also reverse logistics. In computer service providers, machines and items correspond to communication service channels and information transfer tasks, respectively. We reduce both problems to minimizing a function of one variable representing the number of batches. In an optimal solution of either problem, there are at most two different batch sizes. Linear time algorithms are proposed for both problems.  相似文献   
86.
本文首先将文[1]中的BLD映射推广为弱(L1,L2)-BLD映射,并证明了如下正则性结果:存在两个可积指数 P1=P1(n,L1,L2)<n<q1=q1(n,L1,L2),使得对任意弱(L1,L2)-BLD映射f∈(Ω,Rn),都有f∈(Ω,Rn),即f为(L1,L2)-BLD映射.  相似文献   
87.
反求工程在工业设计中的应用   总被引:1,自引:0,他引:1  
介绍了反求工程全新的逆向思维设计方法在制造业中的应用,表明了反求工程技术在工业设计中存在着巨大的应用潜力,尤其是工业设计中三维造型设计技术的广泛应用,为反求工程技术的应用奠定了良好的基础。  相似文献   
88.
For 0≤kn, let be the entries in Euler’s difference table and let . Dumont and Randrianarivony showed equals the number of permutations on [n] whose fixed points are contained in {1,2,…,k}. Rakotondrajao found a combinatorial interpretation of the number in terms of k-fixed-points-permutations of [n]. We show that for any n≥1, the sequence is essentially 2-log-concave and reverse ultra log-concave.  相似文献   
89.
The control of flow in a tundish is important for improving the quality of the steel. Dams, Wiers and Pouring chamber are some of the devices used for controlling the flow in the tundish. The investigation about the role of electromagnetic forces as a replacement for these devices is an objective for the present work. Thus, 3-D MHD simulation was performed to study the effect of electromagnetic forces on flow behaviour in the tundish. The MHD model developed for carrying out the simulation was validated with the analytical solution of the Hartman problem. The results obtained shows improvement in the desired characteristics for inclusion flotataion with magnetic flow modifier of optimum strength of magnetic field.  相似文献   
90.
Complex network theory is a useful way to study many real systems. In this paper, an anti-attack model based on complex network theory is introduced. The mechanism of this model is based on a dynamic compensation process and a reverse percolation process in P2P networks. The main purpose of the paper is: (i) a dynamic compensation process can turn an attacked P2P network into a power-law (PL) network with exponential cutoff; (ii) a local healing process can restore the maximum degree of peers in an attacked P2P network to a normal level; (iii) a restoring process based on reverse percolation theory connects the fragmentary peers of an attacked P2P network together into a giant connected component. In this way, the model based on complex network theory can be effectively utilized for anti-attack and protection purposes in P2P networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号