首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1840篇
  免费   80篇
  国内免费   71篇
化学   102篇
力学   86篇
综合类   8篇
数学   1499篇
物理学   296篇
  2023年   25篇
  2022年   21篇
  2021年   26篇
  2020年   32篇
  2019年   34篇
  2018年   39篇
  2017年   36篇
  2016年   58篇
  2015年   31篇
  2014年   77篇
  2013年   134篇
  2012年   73篇
  2011年   111篇
  2010年   91篇
  2009年   144篇
  2008年   123篇
  2007年   130篇
  2006年   117篇
  2005年   71篇
  2004年   63篇
  2003年   54篇
  2002年   66篇
  2001年   43篇
  2000年   55篇
  1999年   42篇
  1998年   35篇
  1997年   39篇
  1996年   29篇
  1995年   27篇
  1994年   25篇
  1993年   15篇
  1992年   11篇
  1991年   14篇
  1990年   9篇
  1989年   8篇
  1988年   8篇
  1987年   6篇
  1986年   4篇
  1985年   18篇
  1984年   4篇
  1983年   2篇
  1982年   5篇
  1981年   5篇
  1980年   4篇
  1979年   8篇
  1978年   4篇
  1977年   4篇
  1976年   3篇
  1971年   3篇
  1957年   1篇
排序方式: 共有1991条查询结果,搜索用时 0 毫秒
11.
概率罐子模型中一种最优设计   总被引:3,自引:0,他引:3       下载免费PDF全文
基于错误概率达到最小的原则,该文在罐子模型序贯试验中构造了一种渐近最优设计。在这种设计下,不仅能使病员以较多机会分配到较好的处理,而且能使估计量的统计效率在一定意义下达到最优。  相似文献   
12.
13.
Meta-learning, or “learning to learn”, refers to techniques that infer an inductive bias from data corresponding to multiple related tasks with the goal of improving the sample efficiency for new, previously unobserved, tasks. A key performance measure for meta-learning is the meta-generalization gap, that is, the difference between the average loss measured on the meta-training data and on a new, randomly selected task. This paper presents novel information-theoretic upper bounds on the meta-generalization gap. Two broad classes of meta-learning algorithms are considered that use either separate within-task training and test sets, like model agnostic meta-learning (MAML), or joint within-task training and test sets, like reptile. Extending the existing work for conventional learning, an upper bound on the meta-generalization gap is derived for the former class that depends on the mutual information (MI) between the output of the meta-learning algorithm and its input meta-training data. For the latter, the derived bound includes an additional MI between the output of the per-task learning procedure and corresponding data set to capture within-task uncertainty. Tighter bounds are then developed for the two classes via novel individual task MI (ITMI) bounds. Applications of the derived bounds are finally discussed, including a broad class of noisy iterative algorithms for meta-learning.  相似文献   
14.
Bounded knapsack sharing   总被引:1,自引:0,他引:1  
A bounded knapsack sharing problem is a maximin or minimax mathematical programming problem with one or more linear inequality constraints, an objective function composed of single variable continuous functions called tradeoff functions, and lower and upper bounds on the variables. A single constraint problem which can have negative or positive constraint coefficients and any type of continuous tradeoff functions (including multi-modal, multiple-valued and staircase functions) is considered first. Limiting conditions where the optimal value of a variable may be plus or minus infinity are explicitly considered. A preprocessor procedure to transform any single constraint problem to a finite form problem (an optimal feasible solution exists with finite variable values) is developed. Optimality conditions and three algorithms are then developed for the finite form problem. For piecewise linear tradeoff functions, the preprocessor and algorithms are polynomially bounded. The preprocessor is then modified to handle bounded knapsack sharing problems with multiple constraints. An optimality condition and algorithm is developed for the multiple constraint finite form problem. For multiple constraints, the time needed for the multiple constraint finite form algorithm is the time needed to solve a single constraint finite form problem multiplied by the number of constraints. Some multiple constraint problems cannot be transformed to multiple constraint finite form problems.  相似文献   
15.
Many processes in the sciences and in engineering are modelled by dynamical systems and—in discretized version—by nonlinear maps. To understand the often complicated dynamical behaviour it is a well established tool to use the concept of invariant manifolds of the system. In this way it is often possible to reduce the dimension of the system considerably. In this paper we propose a new method to calculate numerically invariant manifolds near fixed points of maps. We prove convergence of our procedure and provide an error estimation. Finally, the application of the method is illustrated by examples.  相似文献   
16.
When solving linear algebraic equations with large and sparse coefficient matrices, arising, for instance, from the discretization of partial differential equations, it is quite common to use preconditioning to accelerate the convergence of a basic iterative scheme. Incomplete factorizations and sparse approximate inverses can provide efficient preconditioning methods but their existence and convergence theory is based mostly on M-matrices (H-matrices). In some application areas, however, the arising coefficient matrices are not H-matrices. This is the case, for instance, when higher-order finite element approximations are used, which is typical for structural mechanics problems. We show that modification of a symmetric, positive definite matrix by reduction of positive offdiagonal entries and diagonal compensation of them leads to an M-matrix. This diagonally compensated reduction can take place in the whole matrix or only at the current pivot block in a recursive incomplete factorization method. Applications for constructing preconditioning matrices for finite element matrices are described.  相似文献   
17.
本文我们讨论了矩形域上带连续边界条件的一类多元散乱数据最优插值。给出了某些情形插值的误差估计,误差估计表明在某些点上还具有超收敛性。  相似文献   
18.
Summary In this paper we obtain asymptotic expansions for the distribution function and the density function of a linear combination of the MLE in a GMANOVA model, and for the density function of the MLE itself. We also obtain certain error bounds for the asymptotic expansions.  相似文献   
19.
考虑强衰减激光脉冲技术实现的准单光子源和量子信道损耗以及窃听者Eve窃听能力有限等实际情况, 提出了一种窃听装置;同时对扩展BB84协议的各种窃听做了全面分析,计算得出发送者Alice/窃听者Eve所获得的交互信息量和发送者Alice/接收者Bob所能容忍的误码率上限,以此作为检测量子信道安全性的标准,同时得出Breidbart基/分束攻击相结合的方法是比截取/重发更为有效的窃听方案.  相似文献   
20.
通过理论推导和试验分析研究了安装偏差对光纤应变测量的影响,得到安装误差所带来测量误差的计算公式.发现光纤的轴向与预定安装方向的角偏差越大,测量误差也越大.用光纤光栅进行应变测量时,必须考虑光纤的安装偏差,它直接关系到测量结果的准确性.实际测量中要尽量确保传感器安装方位的准确.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号