全文获取类型
收费全文 | 1088篇 |
免费 | 23篇 |
国内免费 | 32篇 |
专业分类
化学 | 218篇 |
晶体学 | 8篇 |
力学 | 35篇 |
综合类 | 12篇 |
数学 | 557篇 |
物理学 | 313篇 |
出版年
2024年 | 1篇 |
2023年 | 29篇 |
2022年 | 24篇 |
2021年 | 29篇 |
2020年 | 23篇 |
2019年 | 25篇 |
2018年 | 16篇 |
2017年 | 29篇 |
2016年 | 35篇 |
2015年 | 32篇 |
2014年 | 57篇 |
2013年 | 109篇 |
2012年 | 62篇 |
2011年 | 68篇 |
2010年 | 78篇 |
2009年 | 71篇 |
2008年 | 70篇 |
2007年 | 70篇 |
2006年 | 53篇 |
2005年 | 23篇 |
2004年 | 28篇 |
2003年 | 18篇 |
2002年 | 26篇 |
2001年 | 14篇 |
2000年 | 11篇 |
1999年 | 12篇 |
1998年 | 13篇 |
1997年 | 14篇 |
1996年 | 16篇 |
1995年 | 8篇 |
1994年 | 15篇 |
1993年 | 4篇 |
1992年 | 7篇 |
1991年 | 7篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1986年 | 3篇 |
1985年 | 4篇 |
1984年 | 5篇 |
1983年 | 7篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1978年 | 5篇 |
1977年 | 2篇 |
1969年 | 1篇 |
排序方式: 共有1143条查询结果,搜索用时 15 毫秒
91.
This paper investigates the important infrastructure design and expansion problem for broadband wireless access networks subject to user demand constraints and system capacity constraints. For the problem, an integer program is derived and a heuristic solution procedure is proposed based on Lagrangean relaxation. In the computational experiments, our Lagrangean relaxation based algorithm can solve this complex design and expansion problem quickly and near optimally. Based on the test results, it is suggested that the proposed algorithm may be practically used for the infrastructure design and expansion problem for broadband wireless access networks. 相似文献
92.
In this paper, we consider the network improvement problem for multicut by upgrading nodes in a directed tree T = (V, E) with multiple sources and multiple terminals. In a node based upgrading model, a node v can be upgraded at the expense of c(v) and such an upgrade reduces weights on all edges incident to v. The objective is to upgrade a minimum cost subset S ⊆ V of nodes such that the resulting network has a multicut in which no edge has weight larger than a given value D. We first obtain a minimum cardinality node multicut Vc for tree T, then find the minimum cost upgrading set based on the upgrading sets for the subtrees rooted at the nodes in Vc. We show that our algorithm is polynomial when the number of source–terminal pairs is upper bounded by a given value. 相似文献
93.
In this paper, we present an efficient implementation of theO(mn + n
2 logn) time algorithm originally proposed by Nagamochi and Ibaraki (1992) for computing the minimum capacity cut of an undirected network. To enhance computation, various ideas are added so that it can contract as many edges as possible in each iteration. To evaluate the performance of the resulting implementation, we conducted extensive computational experiments, and compared the results with that of Padberg and Rinaldi's algorithm (1990), which is currently known as one of the practically fastest programs for this problem. The results indicate that our program is considerably faster than Padberg and Rinaldi's program, and its running time is not significantly affected by the types of the networks being solved.Corresponding author. 相似文献
94.
This paper aims to develop models to optimally manage costs associated with resources that can be downgraded. These resources are reused a number of times before becoming unsuitable for their original purpose, and then they are assigned for some other purpose. The typical decisions are the quantity of resources to purchase, to downgrade and to hold in the inventory. A network-based model is developed to formulate the problem and to investigate several special cases. As the model becomes an integer program due to some side constraints, several heuristics are developed here to overcome the challenges associated with solving the resulting integer program. A semiconductor industry application for test wafer management is presented using real-life data. 相似文献
95.
Damage spreading(DS) of the random graph networks with power-law degree distributions is investigated using Glauber dynamics. Various subgraphs defined by the probability of acquaintance show distinct features in DS as measured by Hamming distance. A heuristic understanding of the long-time value of damage is achieved through an analysis of the survivor statistics. All survivors are dynamical, flipping in unison for the controlled sample and the damaged sample. Verification of these dynamic survivors is achieved through the introduction of a new measure of self-damage. 相似文献
96.
97.
度量空间的k-映射像 总被引:2,自引:0,他引:2
E.Halfar([6])引入了k-映射概念,本文给出了度量空间k-映像的一个内在刻划,并由此得到一些度量化定理。 相似文献
98.
99.
针对水下小目标信息量有限而难以提取有效特征导致的检测性能不佳问题,提出了一种结合区域提取和融合Hu矩特征的改进卷积神经网络水下小目标检测方法。该方法包含区域提取和分类两个步骤。首先以马尔可夫随机场分割算法为基础进行区域提取,对潜在目标定位的同时降低伪目标对后续分类的干扰;然后提取潜在目标区域的Hu矩特征并融入卷积神经网络,形成一种形状特征表征能力更强的改进卷积神经网络用于分类。声呐实测数据处理结果表明,该方法可以有效提升对水下小目标的发现概率和正确报警率,与其他目标检测方法相比,该方法具有更好的检测性能和泛化性。 相似文献
100.
In this paper, we consider a cache-enable device-to-device (D2D) communication network with user mobility and design a mobility-aware coded caching scheme to exploit multicasting opportunities for reducing network traffic. In addition to the static cache memory that can be used to reap coded caching gains, we assign a dynamic cache memory to mobile users such that users who never meet can still exchange contents via relaying. We consider content exchange as an information flow among dynamic cache memories of mobile users and leverage network coding to reduce network traffic. Specifically, we transfer our storage and broadcast problem into a network coding problem. By solving the formulated network coding problem, we obtain a dynamic content replacement and broadcast strategy. Numerical results verify that our algorithm significantly outperforms the random and greedy algorithms in terms of the amount of broadcasting data, and the standard Ford–Fulkerson algorithm in terms of the successful decoding ratio. 相似文献