首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1488篇
  免费   85篇
  国内免费   37篇
化学   233篇
晶体学   9篇
力学   42篇
综合类   58篇
数学   708篇
物理学   560篇
  2024年   1篇
  2023年   40篇
  2022年   55篇
  2021年   59篇
  2020年   34篇
  2019年   38篇
  2018年   24篇
  2017年   61篇
  2016年   53篇
  2015年   44篇
  2014年   82篇
  2013年   128篇
  2012年   83篇
  2011年   79篇
  2010年   94篇
  2009年   98篇
  2008年   108篇
  2007年   95篇
  2006年   81篇
  2005年   45篇
  2004年   42篇
  2003年   38篇
  2002年   33篇
  2001年   23篇
  2000年   13篇
  1999年   15篇
  1998年   15篇
  1997年   14篇
  1996年   20篇
  1995年   9篇
  1994年   16篇
  1993年   4篇
  1992年   7篇
  1991年   10篇
  1990年   2篇
  1989年   5篇
  1988年   3篇
  1987年   3篇
  1986年   3篇
  1985年   4篇
  1984年   7篇
  1983年   8篇
  1982年   3篇
  1981年   3篇
  1978年   5篇
  1977年   2篇
  1969年   1篇
排序方式: 共有1610条查询结果,搜索用时 15 毫秒
71.
为了解决三角债问题,银行给出一笔贷款,应该如何分配这笔贷款,使清理的债务达到最大。本文建立这个问题的数学模型,并且给出一个解法。  相似文献   
72.
Uyguroğlu  M.  Tokad  Y. 《Meccanica》1998,33(2):177-194
The network model approach for rigid and multi-rigid body systems developed recently [1,2] can also be used conveniently in formulating system equations or equations of motion of three-dimensional mechanical systems of interconnected rigid bodies. In this article, this method is further elaborated for establishing only the kinematics of spatial robotic bevel-gear trains. However the dynamic analysis of such systems using the same method is also possible and will be taken up in a future publication.  相似文献   
73.
We consider the general problem of static scheduling of a set of jobs in a network flow shop. In network flow shops, the scheduler not only has to sequence and schedule but also must concurrently determine the process routing of the jobs through the shop. In this paper, we establish the computational complexity of this new class of scheduling problem and propose a general purpose heuristic procedure. The performance of the heuristic is analyzed when makespan, cycle time and average flow time are the desired objectives.This research has been supported by the UCLA Academic Senate Grant #95.  相似文献   
74.
The matrix method was used to investigate the process of current decay in the samples of flat two-layer superconducting cables. The discrete spectrum of eigen-frequencies has been obtained. Each of these frequencies determines the rate of decay of the correspondent eigen-current. Despite of the increasing of the number of eigen-frequencies with the enlargement of the sample dimensions the spectrum remains finite, as the maximum and minimum frequencies tend to finite limits. An analysis made for the lowest eigen-frequencies showed the corresponding eigen-currents to be slowly decaying long current loops. Within the range of high frequencies the sinusoidal distribution of eigen-currents in the rows of the cable was observed.  相似文献   
75.
Recently, linear programming problems with special structures have assumed growing importance in mathematical programming. It is well known that exploiting network structures within linear programs can lead to considerable improvement of the computational solution of large-scale linear programming problems. A linear program is said to contain an embedded network structure provided that some subset of its constraints can be interpreted as specifying conservation of flow. If a column of the constraint matrix has at most two non-zeros, then it leads to embedded generalized network structure and if these non-zeros are unit elements and of opposite signs, then it leads to embedded pure network structure. In this paper, we are concerned with algorithms for detecting embedded pure network structures within linear programs. The network extraction methods are presented in two groups. The first group covers deletion and addition based algorithms and the second group covers GUB based algorithms. We have extended the GUB based algorithm appearing in the second group by introducing Markowitz merit count approach for exploiting matrix non zeros. A set of well known test problems has been used to carry out computational experiments which show that our extensions to the GUB based algorithms give better results than the algorithms reported earlier.  相似文献   
76.
Recursive separable programming algorithms based on local, two-segment approximations are described for the solution of separable convex programs. Details are also given for the computation of lower bounds on the optimal value by both a primal and a dual approach, and these approaches are compared. Computational comparisons of the methods are provided for a variety of test problems, including a water supply application (with more than 600 constraints and more than 900 variables) and an econometric modelling problem (with more than 200 variables). Research supported by National Science Foundation Grants MCS74-20584 A02 and MCS-7901066.  相似文献   
77.
We say that a polyhedronP satisfies weak integral decomposition if whenever an integral vector is the sum ofk vectors inP it is also the sum ofk integral vectors inP. This property is related to rounding results for packing and covering problems. We study the property and two related properties, and give results concerning integral polymatroids, totally unimodular matrices and network flows, pairs of strongly-base-orderable matroids, and branchings in directed graphs.  相似文献   
78.
In this paper two new architectures for optical image verification are proposed. Both architectures are based on conventional joint transform correlators (JTCs) adopting a Fourier hologram and can significantly improve the recovered image quality. First, an input phase-only function is Fourier transformed and then interferes with a reference wave that is diffracted from a plane wave incident on another random phase mask. Second, two phase-only functions are placed at the two input sides of a beamsplitter such that the interference pattern of their Fourier transforms can be detected. To obtain a predefined target image in the output plane, one of the input phase functions is iteratively retrieved by the use of the projection onto constraint sets algorithm. Simulation results show that the less mean squared error and better image quality are obtained for both the binary and grayscale images.  相似文献   
79.
采用Lotus Domino/Notes文档数据库 Oracle关系数据库的独特结构模式,集成了Microsoft Office Outlook系统软件,主要功能通过浏览器/服务器(B/S)方式实现,系统设计采用了组件化、模块化的思想,为工作流程的定制和公文流转过程的控制提供了强大功能.  相似文献   
80.
The shift-tolerance property of the encrypted image or the Fourier decrypting key in the Fourier space is proposed based on a phase-encoded virtual image. The encrypted data is obtained by the Fourier transform of the product of a phase-encoded virtual image to camouflage the original one and a random phase image. Therefore, even if unauthorized users analyze the encrypted image, they cannot reconstruct the required image. This virtual image protects the original one from being counterfeited and from unauthorized access. We demonstrate the robustness to data loss and shift of the encrypted data or the Fourier decrypting key in the proposed decryption technique using an interferometer.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号