首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8407篇
  免费   910篇
  国内免费   260篇
化学   1047篇
晶体学   7篇
力学   630篇
综合类   87篇
数学   2643篇
物理学   1361篇
无线电   3802篇
  2024年   26篇
  2023年   125篇
  2022年   239篇
  2021年   267篇
  2020年   235篇
  2019年   167篇
  2018年   194篇
  2017年   280篇
  2016年   280篇
  2015年   294篇
  2014年   519篇
  2013年   510篇
  2012年   496篇
  2011年   526篇
  2010年   410篇
  2009年   518篇
  2008年   561篇
  2007年   594篇
  2006年   489篇
  2005年   398篇
  2004年   344篇
  2003年   312篇
  2002年   258篇
  2001年   199篇
  2000年   171篇
  1999年   160篇
  1998年   161篇
  1997年   110篇
  1996年   114篇
  1995年   76篇
  1994年   75篇
  1993年   73篇
  1992年   58篇
  1991年   44篇
  1990年   38篇
  1989年   26篇
  1988年   37篇
  1987年   22篇
  1986年   25篇
  1985年   24篇
  1984年   33篇
  1983年   9篇
  1982年   16篇
  1981年   14篇
  1980年   10篇
  1979年   10篇
  1978年   9篇
  1977年   10篇
  1976年   6篇
  1974年   2篇
排序方式: 共有9577条查询结果,搜索用时 733 毫秒
91.
A Hybrid Approach to Scheduling with Earliness and Tardiness Costs   总被引:9,自引:0,他引:9  
A hybrid technique using constraint programming and linear programming is applied to the problem of scheduling with earliness and tardiness costs. The linear model maintains a set of relaxed optimal start times which are used to guide the constraint programming search heuristic. In addition, the constraint programming problem model employs the strong constraint propagation techniques responsible for many of the advances in constraint programming for scheduling in the past few years. Empirical results validate our approach and show, in particular, that creating and solving a subproblem containing only the activities with direct impact on the cost function and then using this solution in the main search, significantly increases the number of problems that can be solved to optimality while significantly decreasing the search time.  相似文献   
92.
Laser-based electronic speckle interferometry (ESI) techniques, viz., electronic speckle pattern interferometry (ESPI) and electronic speckle shearographic interferometry (ESSI) are used for testing of spacecraft structural components. The combined ESPI and ESSI system developed in house was successfully used for the non-destructive evaluation (NDE) of honeycomb sandwich panels and propellant tanks of Indian Space Research Organization (ISRO). Debonds between face sheet and the honeycomb core were identified using (i) thermal and (ii) dual vacuum stressing methods. On-line NDE of the propellant tanks under internal pressure loading for identification of the minute cracks and thickness reduction areas were successfully implemented by ESI.  相似文献   
93.
无向网络K终端可靠度的分解算法中,包括多边形→链简化在内的等可靠度简化和分解定理结合,可以降低算法的复杂度。本文完善了边随机无向网络和混合随机无向网络的4#,6#,7#型多边形→链简化定理。计算机编程验证了其正确性。  相似文献   
94.
In the paper, the behaviour of interior point algorithms is analyzed by using a variable metric method approach. A class of polynomial variable metric algorithms is given achieving O ((n/β)L) iterations for solving a canonical form linear optimization problem with respect to a wide class of Riemannian metrics, wheren is the number of dimensions and β a fixed value. It is shown that the vector fields of several interior point algorithms for linear optimization is the negative Riemannian gradient vector field of a linear a potential or a logarithmic barrier function for suitable Riemannian metrics. Research Partially supported by the Hungarian National Research Foundation, Grant Nos. OTKA-T016413 and OTKA-2116.  相似文献   
95.
Some New Results on Key Distribution Patterns and Broadcast Encryption   总被引:1,自引:0,他引:1  
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.  相似文献   
96.
第二讲合成孔径声纳成像及其研究进展   总被引:1,自引:0,他引:1  
张春华  刘纪元 《物理》2006,35(5):408-413
文章在介绍了图像声纳的特点、合成孔径声纳(synthetic aperture sonar,SAS)产生背景和发展过程的基础上,对合成孔径声纳的原理、技术难点、成像算法等问题进行了讨论.着重分析了合成孔径声纳成像过程中高分辨率的获取方法、水声信道对成像的影响、多子阵技术及其成像算法、稳定的声纳运动平台和运动监测问题、运动补偿与自聚焦方法等.文章还给出了国内外合成孔径声纳研究的最新进展情况,进而展望了合成孔径声纳的应用前景.  相似文献   
97.
A class of long-range predictive adaptive fuzzy relational controllers is presented. The plant behavior is described over an extended time horizon by a fuzzy relational model which is identified based on input-output closed-loop observations of the plant variables. In this class of adaptive controllers the control law attempts to minimize a quadratic cost over an extended control horizon. When used with linear models, this approach has revealed a significant potential for overcoming the limitations of one-step ahead schemes, such as the stabilization of non-minimum phase plants. Here, a uniform framework is adopted for implementing both the fuzzy model and the fuzzy controller, namely distributed fuzzy relational structures gaining from their massive parallel processing features and from the learning capabilities typical of the connectivist approaches. Issues such as maintenance during the adaptation process of the meaning of linguistic terms used at both fuzzy systems interfaces are addressed, namely by introducing a new design methodology for on-line fuzzy systems interface adaptation. The examples presented reinforce the claim of the usefulness of this new approach.  相似文献   
98.
We present an overview of the author’s Ph.D. thesis, supervised by P. Dejax and N. Bostel, which was defended in February 2006 at école des Mines de Nantes, France. The thesis is written in French, and is available at . It was conducted in the context of a research contract with a water distribution company. In a first section, we define multiperiod routing problems for service technicians. In a second section, we present some heuristics and a memetic algorithm used to solve these problems. The third section introduces optimal and near-optimal approaches based on column generation. Finally, we present some applications to the real-life case. The methods presented in Sects. 2, 3 and 4 were tested over several sets of problems, based on real-life statistics provided by the company.   相似文献   
99.
In this paper we address a two-dimensional (2D) orthogonal packing problem, where a fixed set of small rectangles has to be placed on a larger stock rectangle in such a way that the amount of trim loss is minimized. The algorithm we propose hybridizes a placement procedure with a genetic algorithm based on random keys. The approach is tested on a set of instances taken from the literature and compared with other approaches. The computation results validate the quality of the solutions and the effectiveness of the proposed algorithm.  相似文献   
100.
COSEARCH: A Parallel Cooperative Metaheuristic   总被引:1,自引:0,他引:1  
In order to design a well-balanced metaheuristic for robustness, we propose the COSEARCH approach which manages the cooperation of complementary heuristic methods via an adaptive memory which contains a history of the search already done. In this paper, we present the idiosyncrasies of the COSEARCH approach and its application for solving large scale instances of the quadratic assignment problem (QAP). We propose an original design of the adaptive memory in order to focus on high quality regions of the search and avoid attractive but deceptive areas. For the QAP, we have hybridized three heuristic agents of complementary behaviours: a Tabu Search is used as the main search algorithm, a Genetic Algorithm is in charge of the diversification and a Kick Operator is applied to intensify the search. The evaluations have been executed on large scale network of workstations via a parallel environment which supports fault tolerance and adaptive dynamic scheduling of tasks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号