全文获取类型
收费全文 | 1488篇 |
免费 | 85篇 |
国内免费 | 37篇 |
专业分类
化学 | 233篇 |
晶体学 | 9篇 |
力学 | 42篇 |
综合类 | 58篇 |
数学 | 708篇 |
物理学 | 560篇 |
出版年
2024年 | 1篇 |
2023年 | 40篇 |
2022年 | 55篇 |
2021年 | 59篇 |
2020年 | 34篇 |
2019年 | 38篇 |
2018年 | 24篇 |
2017年 | 61篇 |
2016年 | 53篇 |
2015年 | 44篇 |
2014年 | 82篇 |
2013年 | 128篇 |
2012年 | 83篇 |
2011年 | 79篇 |
2010年 | 94篇 |
2009年 | 98篇 |
2008年 | 108篇 |
2007年 | 95篇 |
2006年 | 81篇 |
2005年 | 45篇 |
2004年 | 42篇 |
2003年 | 38篇 |
2002年 | 33篇 |
2001年 | 23篇 |
2000年 | 13篇 |
1999年 | 15篇 |
1998年 | 15篇 |
1997年 | 14篇 |
1996年 | 20篇 |
1995年 | 9篇 |
1994年 | 16篇 |
1993年 | 4篇 |
1992年 | 7篇 |
1991年 | 10篇 |
1990年 | 2篇 |
1989年 | 5篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1986年 | 3篇 |
1985年 | 4篇 |
1984年 | 7篇 |
1983年 | 8篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1978年 | 5篇 |
1977年 | 2篇 |
1969年 | 1篇 |
排序方式: 共有1610条查询结果,搜索用时 15 毫秒
71.
邓汉鼎 《高校应用数学学报(A辑)》1996,(4):485-490
为了解决三角债问题,银行给出一笔贷款,应该如何分配这笔贷款,使清理的债务达到最大。本文建立这个问题的数学模型,并且给出一个解法。 相似文献
72.
The network model approach for rigid and multi-rigid body systems developed recently [1,2] can also be used conveniently in formulating system equations or equations of motion of three-dimensional mechanical systems of interconnected rigid bodies. In this article, this method is further elaborated for establishing only the kinematics of spatial robotic bevel-gear trains. However the dynamic analysis of such systems using the same method is also possible and will be taken up in a future publication. 相似文献
73.
Reza H. Ahmadi 《Journal of Global Optimization》1996,9(3-4):293-320
We consider the general problem of static scheduling of a set of jobs in a network flow shop. In network flow shops, the scheduler not only has to sequence and schedule but also must concurrently determine the process routing of the jobs through the shop. In this paper, we establish the computational complexity of this new class of scheduling problem and propose a general purpose heuristic procedure. The performance of the heuristic is analyzed when makespan, cycle time and average flow time are the desired objectives.This research has been supported by the UCLA Academic Senate Grant #95. 相似文献
74.
A. A. Akhmetov S. S. Ivanov I. O. Shchegolev 《Physica C: Superconductivity and its Applications》1998,310(1-4):382-386
The matrix method was used to investigate the process of current decay in the samples of flat two-layer superconducting cables. The discrete spectrum of eigen-frequencies has been obtained. Each of these frequencies determines the rate of decay of the correspondent eigen-current. Despite of the increasing of the number of eigen-frequencies with the enlargement of the sample dimensions the spectrum remains finite, as the maximum and minimum frequencies tend to finite limits. An analysis made for the lowest eigen-frequencies showed the corresponding eigen-currents to be slowly decaying long current loops. Within the range of high frequencies the sinusoidal distribution of eigen-currents in the rows of the cable was observed. 相似文献
75.
Recently, linear programming problems with special structures have assumed growing importance in mathematical programming.
It is well known that exploiting network structures within linear programs can lead to considerable improvement of the computational
solution of large-scale linear programming problems. A linear program is said to contain an embedded network structure provided
that some subset of its constraints can be interpreted as specifying conservation of flow. If a column of the constraint matrix
has at most two non-zeros, then it leads to embedded generalized network structure and if these non-zeros are unit elements
and of opposite signs, then it leads to embedded pure network structure.
In this paper, we are concerned with algorithms for detecting embedded pure network structures within linear programs. The
network extraction methods are presented in two groups. The first group covers deletion and addition based algorithms and
the second group covers GUB based algorithms. We have extended the GUB based algorithm appearing in the second group by introducing
Markowitz merit count approach for exploiting matrix non zeros. A set of well known test problems has been used to carry out
computational experiments which show that our extensions to the GUB based algorithms give better results than the algorithms
reported earlier. 相似文献
76.
R. R. Meyer 《Mathematical Programming》1983,26(1):21-39
Recursive separable programming algorithms based on local, two-segment approximations are described for the solution of separable
convex programs. Details are also given for the computation of lower bounds on the optimal value by both a primal and a dual
approach, and these approaches are compared. Computational comparisons of the methods are provided for a variety of test problems,
including a water supply application (with more than 600 constraints and more than 900 variables) and an econometric modelling
problem (with more than 200 variables).
Research supported by National Science Foundation Grants MCS74-20584 A02 and MCS-7901066. 相似文献
77.
Colin McDiarmid 《Mathematical Programming》1983,25(2):183-198
We say that a polyhedronP satisfies weak integral decomposition if whenever an integral vector is the sum ofk vectors inP it is also the sum ofk integral vectors inP. This property is related to rounding results for packing and covering problems. We study the property and two related properties,
and give results concerning integral polymatroids, totally unimodular matrices and network flows, pairs of strongly-base-orderable
matroids, and branchings in directed graphs. 相似文献
78.
In this paper two new architectures for optical image verification are proposed. Both architectures are based on conventional joint transform correlators (JTCs) adopting a Fourier hologram and can significantly improve the recovered image quality. First, an input phase-only function is Fourier transformed and then interferes with a reference wave that is diffracted from a plane wave incident on another random phase mask. Second, two phase-only functions are placed at the two input sides of a beamsplitter such that the interference pattern of their Fourier transforms can be detected. To obtain a predefined target image in the output plane, one of the input phase functions is iteratively retrieved by the use of the projection onto constraint sets algorithm. Simulation results show that the less mean squared error and better image quality are obtained for both the binary and grayscale images. 相似文献
79.
俞亚东 《宁波大学学报(理工版)》2001,14(3):72-75
采用Lotus Domino/Notes文档数据库 Oracle关系数据库的独特结构模式,集成了Microsoft Office Outlook系统软件,主要功能通过浏览器/服务器(B/S)方式实现,系统设计采用了组件化、模块化的思想,为工作流程的定制和公文流转过程的控制提供了强大功能. 相似文献
80.
The shift-tolerance property of the encrypted image or the Fourier decrypting key in the Fourier space is proposed based on a phase-encoded virtual image. The encrypted data is obtained by the Fourier transform of the product of a phase-encoded virtual image to camouflage the original one and a random phase image. Therefore, even if unauthorized users analyze the encrypted image, they cannot reconstruct the required image. This virtual image protects the original one from being counterfeited and from unauthorized access. We demonstrate the robustness to data loss and shift of the encrypted data or the Fourier decrypting key in the proposed decryption technique using an interferometer. 相似文献