首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19423篇
  免费   2630篇
  国内免费   550篇
化学   760篇
晶体学   14篇
力学   1033篇
综合类   324篇
数学   5512篇
物理学   2818篇
无线电   12142篇
  2024年   75篇
  2023年   255篇
  2022年   443篇
  2021年   522篇
  2020年   519篇
  2019年   446篇
  2018年   460篇
  2017年   657篇
  2016年   872篇
  2015年   888篇
  2014年   1423篇
  2013年   1333篇
  2012年   1371篇
  2011年   1495篇
  2010年   1037篇
  2009年   1177篇
  2008年   1312篇
  2007年   1360篇
  2006年   1144篇
  2005年   949篇
  2004年   799篇
  2003年   698篇
  2002年   601篇
  2001年   466篇
  2000年   419篇
  1999年   310篇
  1998年   294篇
  1997年   243篇
  1996年   216篇
  1995年   149篇
  1994年   104篇
  1993年   113篇
  1992年   98篇
  1991年   43篇
  1990年   55篇
  1989年   35篇
  1988年   39篇
  1987年   23篇
  1986年   30篇
  1985年   34篇
  1984年   30篇
  1983年   10篇
  1982年   18篇
  1981年   5篇
  1980年   6篇
  1979年   5篇
  1978年   3篇
  1977年   5篇
  1959年   5篇
  1957年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
收敛共轭梯度方法参数βk的条件   总被引:2,自引:0,他引:2  
本文给出确定共轭梯度方法中参数βk范围的两个条件-条件Ⅰ和条件Ⅱ,它们都确保方法的全局收敛.在条件Ⅰ和Gilbert&Nocedal(1992)引入的性质(*)下及在条件Ⅱ和Wolfe条件下,分别建立了共轭梯度算法的收敛性定理.  相似文献   
992.
孟香惠 《应用数学》1999,12(4):117-120
本文将极大熵逼近方法和不动点计算方法有机地结合,提出了一种不可微规划计算方法.该方法同样也适用于求解可微规划,而后给出了该方法的收敛性  相似文献   
993.
The convergence properties for reinforcement learning approaches, such as temporal differences and Q-learning, have been established under moderate assumptions for discrete state and action spaces. In practice, however, many systems have either continuous action spaces or a large number of discrete elements. This paper presents an approximate dynamic programming approach to reinforcement learning for continuous action set-point regulator problems, which learns near-optimal control policies based on scalar performance measures. The continuous-action space (CAS) algorithm uses derivative-free line search methods to obtain the optimal action in the continuous space. The theoretical convergence properties of the algorithm are presented. Several heuristic stopping criteria are investigated and practical application is illustrated by two example problems—the inverted pendulum balancing problem and the power system stabilization problem.  相似文献   
994.
We consider a ship subject to kinematic, dynamic, and moment equations and steered via rudder under the assumptions that the rudder angle and rudder angle time rate are subject to upper and lower bounds. We formulate and solve four Chebyshev problems of optimal control, the optimization criterion being the maximization with respect to the state and control history of the minimum value with respect to time of the distance between two identical ships, one maneuvering and one moving in a predetermined way.Problems P1 and P2 deal with collision avoidance maneuvers without cooperation, while Problems P3 and P4 deal with collision avoidance maneuvers with cooperation. In Problems P1 and P3, the maneuvering ship must reach the final point with a given lateral distance, zero yaw angle, and zero yaw angle time rate. In Problems P2 and P4, the additional requirement of quasi-steady state is imposed at the final point.The above Chebyshev problems, transformed into Bolza problems via suitable transformations, are solved via the sequential gradient-restoration algorithm in conjunction with a new singularity avoiding transformation which accounts automatically for the bounds on rudder angle and rudder angle time rate.The optimal control histories involve multiple subarcs along which either the rudder angle is kept at one of the extreme positions or the rudder angle time rate is held at one of the extreme values. In problems where quasi-steady state is imposed at the final point, there is a higher number of subarcs than in problems where quasi-steady state is not imposed; the higher number of subarcs is due to the additional requirement that the lateral velocity and rudder angle vanish at the final point.  相似文献   
995.
In this paper we describe a Newton-type algorithm model for solving smooth constrained optimization problems with nonlinear objective function, general linear constraints and bounded variables. The algorithm model is based on the definition of a continuously differentiable exact merit function that follows an exact penalty approach for the box constraints and an exact augmented Lagrangian approach for the general linear constraints. Under very mild assumptions and without requiring the strict complementarity assumption, the algorithm model produces a sequence of pairs converging quadratically to a pair where satisfies the first order necessary conditions and is a KKT multipliers vector associated to the linear constraints. As regards the behaviour of the sequence x k alone, it is guaranteed that it converges at least superlinearly. At each iteration, the algorithm requires only the solution of a linear system that can be performed by means of conjugate gradient methods. Numerical experiments and comparison are reported.  相似文献   
996.
A Dehn twist automorphism of a group G is an automorphism which can be given (as specified below) in terms of a graph-of-groups decomposition of G with infinite cyclic edge groups. The classic example is that of an automorphism of the fundamental group of a surface which is induced by a Dehn twist homeomorphism of the surface. For , a non-abelian free group of finite rank n, a normal form for Dehn twist is developed, and it is shown that this can be used to solve the conjugacy problem for Dehn twist automorphisms of . Received: February 12, 1996.  相似文献   
997.
Schemata, Distributions and Graphical Models in Evolutionary Optimization   总被引:9,自引:0,他引:9  
In this paper the optimization of additively decomposed discrete functions is investigated. For these functions genetic algorithms have exhibited a poor performance. First the schema theory of genetic algorithms is reformulated in probability theory terms. A schema defines the structure of a marginal distribution. Then the conceptual algorithm BEDA is introduced. BEDA uses a Boltzmann distribution to generate search points. From BEDA a new algorithm, FDA, is derived. FDA uses a factorization of the distribution. The factorization captures the structure of the given function. The factorization problem is closely connected to the theory of conditional independence graphs. For the test functions considered, the performance of FDA—in number of generations till convergence—is similar to that of a genetic algorithm for the OneMax function. This result is theoretically explained.  相似文献   
998.
Transfer algorithms are usually used to optimize an objective function that is defined on the set of partitions of a finite set X. In this paper we define an equivalence relation ? on the set of fuzzy equivalence relations on X and establish a bijection from the set of hierarchies on X to the set of equivalence classes with respect to ?. Thus, hierarchies can be identified with fuzzy equivalence relations and the transfer algorithm can be modified in order to optimize an objective function that is defined on the set of hierarchies on X.  相似文献   
999.
The complexity of linear programming is discussed in the “integer” and “real number” models of computation. Even though the integer model is widely used in theoretical computer science, the real number model is more useful for estimating an algorithm's running time in actual computation.Although the ellipsoid algorithm is a polynomial-time algorithm in the integer model, we prove that it has unbounded complexity in the real number model. We conjecture that there exists no polynomial-time algorithm for the linear inequalities problem in the real number model. We also conjecture that linear inequalities are strictly harder than linear equalities in all “reasonable” models of computation.  相似文献   
1000.
指针的安全性是C语言程序中的常见问题,它严重影响到系统的安全性.针对指针静态分析中的精度问题,比较分析了目前常见的5种指针分析算法的优缺点,提出了一种基于流不敏感的改进指针静态分析算法.该算法是在Steensgaard算法的基础上,对程序的控制流图进行改进,通过该算法可以得到比常见的数据流不敏感算法更为精确的指针分析结果.在实验室开发的国内首款商用编译器中实现了该算法,实验结果表明该算法可以提高指针分析的精度.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号