首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5173篇
  免费   335篇
  国内免费   501篇
化学   405篇
晶体学   4篇
力学   284篇
综合类   120篇
数学   4869篇
物理学   327篇
  2024年   5篇
  2023年   60篇
  2022年   83篇
  2021年   100篇
  2020年   108篇
  2019年   113篇
  2018年   130篇
  2017年   130篇
  2016年   133篇
  2015年   102篇
  2014年   202篇
  2013年   356篇
  2012年   225篇
  2011年   287篇
  2010年   258篇
  2009年   353篇
  2008年   346篇
  2007年   326篇
  2006年   325篇
  2005年   259篇
  2004年   225篇
  2003年   262篇
  2002年   223篇
  2001年   204篇
  2000年   173篇
  1999年   171篇
  1998年   176篇
  1997年   153篇
  1996年   91篇
  1995年   68篇
  1994年   55篇
  1993年   48篇
  1992年   36篇
  1991年   25篇
  1990年   19篇
  1989年   13篇
  1988年   13篇
  1987年   11篇
  1986年   9篇
  1985年   24篇
  1984年   20篇
  1983年   12篇
  1982年   21篇
  1981年   16篇
  1980年   18篇
  1979年   5篇
  1978年   6篇
  1977年   2篇
  1976年   4篇
  1974年   3篇
排序方式: 共有6009条查询结果,搜索用时 15 毫秒
21.
In a previous paper by the second author, two Markov chain Monte Carlo perfect sampling algorithms—one called coupling from the past (CFTP) and the other (FMMR) based on rejection sampling—are compared using as a case study the move‐to‐front (MTF) self‐organizing list chain. Here we revisit that case study and, in particular, exploit the dependence of FMMR on the user‐chosen initial state. We give a stochastic monotonicity result for the running time of FMMR applied to MTF and thus identify the initial state that gives the stochastically smallest running time; by contrast, the initial state used in the previous study gives the stochastically largest running time. By changing from worst choice to best choice of initial state we achieve remarkable speedup of FMMR for MTF; for example, we reduce the running time (as measured in Markov chain steps) from exponential in the length n of the list nearly down to n when the items in the list are requested according to a geometric distribution. For this same example, the running time for CFTP grows exponentially in n. © 2003 Wiley Periodicals, Inc. Random Struct. Alg., 2003  相似文献   
22.
In this note we show that the characterization results for P-matrices due to K.G. Murty and A. Tamir which state that a given square matrixM of ordern is a P-matrix if and only if the linear complementarity problem (q, M) has a unique solution for allq in a specified finite subset of n depending onM are incorrect whenn > 3.Research supported by Dr. K.S. Krishnan (DAE) fellowship for research in Mathematics and Computer Science, Bombay, India.  相似文献   
23.
丁承杰  刘文安 《数学季刊》1992,7(4):106-110
In this paper,we research general Defective Cion Problem under the model S,i.e,the number d of Defective cions is not fixed. For d=O,1,or 2. we get some good results.  相似文献   
24.
As shown in a companion-paper,1 binary and multinary coherent systems can be studied with unified arguments, through monotone binary coherent systems. These are binary coherent systems submitted to some monotone constraint and generalize the classic theory of free binary coherent systems. By considering the unified point of view thus obtained, this paper gives what is perhaps the most suggestive representation for multinary coherent systems, since this extends the definition of binary coherent systems in terms of series-parallel (parallel-series) structures. Then, this paper examines the special case of multinary systems that can be studied directly with the classic theory of free binary coherent systems. It thus enlarges and complements, in a shorter unified manner, the particular cases considered in earlier studies.  相似文献   
25.
For a coanalytic-complete or -complete subspace of a Polish space we prove that there exists a continuous bijection of onto the Hilbert cube . This extends results of Pytkeev. As an application of our main theorem we give an answer to some questions of Arkhangelskii and Christensen.

Under the assumption of Projective Determinacy we also give some generalizations of these results to higher projective classes.

  相似文献   

26.
基于粗糙集理论的知识约简及应用实例   总被引:5,自引:0,他引:5  
陈晓红  陈岚 《大学数学》2003,19(4):68-73
在保持分类能力不变的前提下 ,通过利用粗糙集理论中的知识约简方法 ,在保护知识库分类不变的条件下 ,删除其中不相关或不重要的知识 ,从而导出问题的决策 .利用基于决策表的粗糙集模型算法 ,实例分析如何数字化表示决策表 ,并对其进行属性约简和属性值的约简 ,从而提取决策规则 .  相似文献   
27.
HL-2M 装置供电系统研制   总被引:2,自引:0,他引:2  
为满足 HL-2M 装置的供电需求,须配套建设相应的供电系统。通过仿真计算 HL-2M 装置的总体供 电需求,考虑到 HL-2A 装置现有的供电系统设备,提出了兼顾 HL-2A 和 HL-2M 装置供电需求的总体配置方案。介绍了国内首台 300MVA 立式交流脉冲发电机组、磁体电源、高压电源和电源控制系统的研制情况。  相似文献   
28.
The traditional sequential pattern mining method is carried out considering the whole time period and often ignores the sequential patterns that only occur in local time windows, as well as possible periodicity. Therefore, in order to overcome the limitations of traditional methods, this paper proposes status set sequential pattern mining with time windows (SSPMTW). In contrast to traditional methods, the item status is considered, and time windows, minimum confidence, minimum coverage, minimum factor set ratios and other constraints are added to mine more valuable rules in local time windows. The periodicity of these rules is also analyzed. According to the proposed method, this paper improves the Apriori algorithm, proposes the TW-Apriori algorithm, and explains the basic idea of the algorithm. Then, the feasibility, validity and efficiency of the proposed method and algorithm are verified by small-scale and large-scale examples. In a large-scale numerical example solution, the influence of various constraints on the mining results is analyzed. Finally, the solution results of SSPM and SSPMTW are compared and analyzed, and it is suggested that SSPMTW can excavate the laws existing in local time windows and analyze the periodicity of the laws, which solves the problem of SSPM ignoring the laws existing in local time windows and overcomes the limitations of traditional sequential pattern mining algorithms. In addition, the rules mined by SSPMTW reduce the entropy of the system.  相似文献   
29.
The vulnerability of water resources is an important criterion for evaluating the carrying capacity of water resources systems under the influence of climate change and human activities. Moreover, assessment and prediction of river basins’ water resources vulnerability are important means to assess the water resources security state of river basins and identify possible problems in future water resources systems. Based on the constructed indicator system of water resources vulnerability assessment in Song-Liao River Basin, this paper uses the neighborhood rough set (abbreviated as NRS) method to reduce the dimensionality of the original indicator system to remove redundant attributes. Then, assessment indicators’ standard values after dimensionality reduction are taken as the evaluation sample, and the random forest regression (abbreviated as RF) model is used to assess the water resources vulnerability of the river basin. Finally, based on data under three different future climate and socio-economic scenarios, scenario predictions are made on the vulnerability of future water resources. The results show that the overall water resources vulnerability of the Song-Liao River Basin has not improved significantly in the past 18 years, and the overall vulnerability of the Song-Liao River Basin is in the level V of moderate to high vulnerability. In the future scenario 1, the overall water resources vulnerability of the river basin will improve, and it is expected to achieve an improvement to the level III of moderate to low vulnerability. At the same time, the natural vulnerability and vulnerability of carrying capacity will increase significantly in the future, and the man-made vulnerability will increase slowly, which will deteriorate to the level V of moderate to high vulnerability under Scenario 3. Therefore, taking active measures can significantly reduce the vulnerability of nature and carrying capacity, but man-made vulnerability will become a bottleneck restricting the fragility of the overall water resources of the river basin in the future.  相似文献   
30.
The aim of this paper is to show that α-limit sets in Lorenz maps do not have to be completely invariant. This highlights unexpected dynamical behavior in these maps, showing gaps existing in the literature. Similar result is obtained for unimodal maps on [0,1]. On the basis of provided examples, we also present how the performed study on the structure of α-limit sets is closely connected with the calculation of the topological entropy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号