首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   306篇
  免费   11篇
  国内免费   14篇
化学   15篇
晶体学   1篇
力学   21篇
综合类   3篇
数学   222篇
物理学   69篇
  2024年   1篇
  2023年   3篇
  2022年   9篇
  2021年   9篇
  2020年   6篇
  2019年   2篇
  2018年   7篇
  2017年   5篇
  2016年   3篇
  2015年   6篇
  2014年   10篇
  2013年   35篇
  2012年   14篇
  2011年   17篇
  2010年   12篇
  2009年   15篇
  2008年   20篇
  2007年   23篇
  2006年   15篇
  2005年   9篇
  2004年   14篇
  2003年   9篇
  2002年   6篇
  2001年   4篇
  2000年   5篇
  1999年   4篇
  1998年   10篇
  1997年   14篇
  1996年   7篇
  1995年   3篇
  1994年   6篇
  1993年   5篇
  1992年   8篇
  1991年   1篇
  1990年   4篇
  1988年   1篇
  1986年   1篇
  1984年   1篇
  1982年   1篇
  1981年   1篇
  1978年   1篇
  1977年   2篇
  1975年   1篇
  1971年   1篇
排序方式: 共有331条查询结果,搜索用时 15 毫秒
1.
We derive a test problem for evaluating the ability of time-steppingmethods to preserve the statistical properties of systems inmolecular dynamics. We consider a family of deterministic systemsconsisting of a finite number of particles interacting on acompact interval. The particles are given random initial conditionsand interact through instantaneous energy- and momentum-conservingcollisions. As the number of particles, the particle density,and the mean particle speed go to infinity, the trajectory ofa tracer particle is shown to converge to a stationary Gaussianstochastic process. We approximate this system by one describedby a system of ordinary differential equations and provide numericalevidence that it converges to the same stochastic process. Wesimulate the latter system with a variety of numerical integrators,including the symplectic Euler method, a fourth-order Runge-Kuttamethod, and an energyconserving step-and-project method. Weassess the methods' ability to recapture the system's limitingstatistics and observe that symplectic Euler performs significantlybetter than the others for comparable computational expense.  相似文献   
2.
3.
There is a recursive set of natural numbers which is the difference set of some recursively enumerable set but which is not the difference set of any recursive set.  相似文献   
4.
This work presents an analysis of the existing dependencies between the tests of the FIPS 140-2 battery. Two main analytical approaches are utilized, the first being a study of correlations through the Pearson’s correlation coefficient that detects linear dependencies, and the second one being a novel application of the mutual information measure that allows detecting possible non-linear relationships. In order to carry out this study, the FIPS 140-2 battery is reimplemented to allow the user to obtain p-values and statistics that are essential for more rigorous end-user analysis of random number generators (RNG).  相似文献   
5.
The area of randomness extraction has seen interesting advances in recent years, with rapid progress on many longstanding open problems, along with the introduction of many new notions that played a key role in this development. We survey this progress and highlight new definitions and notions that have been the subject of intense study in recent work.  相似文献   
6.
An algorithm for stabilizing linear iterative schemes is developed in this study. The recursive projection method is applied in order to stabilize divergent numerical algorithms. A criterion for selecting the divergent subspace of the iteration matrix with an approximate eigenvalue problem is introduced. The performance of the present algorithm is investigated in terms of storage requirements and CPU costs and is compared to the original Krylov criterion. Theoretical results on the divergent subspace selection accuracy are established. The method is then applied to the resolution of the linear advection–diffusion equation and to a sensitivity analysis for a turbulent transonic flow in the context of aerodynamic shape optimization. Numerical experiments demonstrate better robustness and faster convergence properties of the stabilization algorithm with the new criterion based on the approximate eigenvalue problem. This criterion requires only slight additional operations and memory which vanish in the limit of large linear systems.  相似文献   
7.
The recursive network design used in this paper to monitor traffic flow ensures accurate anomaly identification. The suggested method enhances the effectiveness of cyber attacks in SDN. The suggested model achieves a remarkable attack detection performance in the case of distributed denial-of-service (DDoS) attacks by preventing network forwarding performance degradation. The suggested methodology is designed to teach users how to match traffic flows in ways that increase granularity while proactively protecting the SDN data plane from overload. The application of a learnt traffic flow matching control policy makes it possible to obtain the best traffic data for detecting abnormalities obtained during runtime, improving the performance of cyber-attack detection. The accuracy of the suggested model is superior to the MMOS, FMS, DATA, Q-DATA, and DEEP-MC by 19.23%, 16.25%, 47.61%, 16.25%, and 12.04%.  相似文献   
8.
This paper presents a new parameter and state estimation algorithm for single-input single-output systems based on canonical state space models from the given input–output data. Difficulties of identification for state space models lie in that there exist unknown noise terms in the formation vector and unknown state variables. By means of the hierarchical identification principle, those noise terms in the information vector are replaced with the estimated residuals and a new least squares algorithm is proposed for parameter estimation and the system states are computed by using the estimated parameters. Finally, an example is provided.  相似文献   
9.
Let X i, 1 i N, be N independent random variables (i.r.v.) with distribution functions (d.f.) F i(x,), 1 i N, respectively, where is a real parameter. Assume furthermore that F i(·,0) = F(·) for 1 i N. Let R = (R 1,R N) and R +,...,R N + be the rank vectors of X = (X 1,X N) and |X|=(|X 1|,...,|X N|), respectively, and let V = (V 1,V N) be the sign vector of X. The locally most powerful rank tests (LMPRT) S = S(R) and the locally most powerful signed rank tests (LMPSRT) S = S(R +, V) will be found for testing = 0 against > 0 or < 0 with F being arbitrary and with F symmetric, respectively.  相似文献   
10.
Economic theory, game theory and mathematical statistics have all increasingly become algorithmic sciences. Computable Economics, Algorithmic Game Theory[Noam Nisan, Tim Roiughgarden, Éva Tardos, Vijay V. Vazirani (Eds.), Algorithmic Game Theory, Cambridge University Press, Cambridge, 2007] and Algorithmic Statistics[Péter Gács, John T. Tromp, Paul M.B. Vitányi, Algorithmic statistics, IEEE Transactions on Information Theory 47 (6) (2001) 2443-2463] are frontier research subjects. All of them, each in its own way, are underpinned by (classical) recursion theory - and its applied branches, say computational complexity theory or algorithmic information theory - and, occasionally, proof theory. These research paradigms have posed new mathematical and metamathematical questions and, inadvertently, undermined the traditional mathematical foundations of economic theory. A concise, but partial, pathway into these new frontiers is the subject matter of this paper. Interpreting the core of mathematical economic theory to be defined by General Equilibrium Theory and Game Theory, a general - but concise - analysis of the computable and decidable content of the implications of these two areas are discussed. Issues at the frontiers of macroeconomics, now dominated by Recursive Macroeconomic Theory (The qualification ‘recursive’ here has nothing to do with ‘recursion theory’. Instead, this is a reference to the mathematical formalizations of the rational economic agent’s intertemporal optimization problems, in terms of Markov Decision Processes, (Kalman) Filtering and Dynamic Programming, where a kind of ‘recursion’ is invoked in the solution methods. The metaphor of the rational economic agent as a ‘signal processor’ underpins the recursive macroeconomic paradigm.), are also tackled, albeit ultra briefly. The point of view adopted is that of classical recursion theory and varieties of constructive mathematics.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号