全文获取类型
收费全文 | 8407篇 |
免费 | 910篇 |
国内免费 | 260篇 |
专业分类
化学 | 1047篇 |
晶体学 | 7篇 |
力学 | 630篇 |
综合类 | 87篇 |
数学 | 2643篇 |
物理学 | 1361篇 |
无线电 | 3802篇 |
出版年
2024年 | 26篇 |
2023年 | 125篇 |
2022年 | 239篇 |
2021年 | 267篇 |
2020年 | 235篇 |
2019年 | 167篇 |
2018年 | 194篇 |
2017年 | 280篇 |
2016年 | 280篇 |
2015年 | 294篇 |
2014年 | 519篇 |
2013年 | 510篇 |
2012年 | 496篇 |
2011年 | 526篇 |
2010年 | 410篇 |
2009年 | 518篇 |
2008年 | 561篇 |
2007年 | 594篇 |
2006年 | 489篇 |
2005年 | 398篇 |
2004年 | 344篇 |
2003年 | 312篇 |
2002年 | 258篇 |
2001年 | 199篇 |
2000年 | 171篇 |
1999年 | 160篇 |
1998年 | 161篇 |
1997年 | 110篇 |
1996年 | 114篇 |
1995年 | 76篇 |
1994年 | 75篇 |
1993年 | 73篇 |
1992年 | 58篇 |
1991年 | 44篇 |
1990年 | 38篇 |
1989年 | 26篇 |
1988年 | 37篇 |
1987年 | 22篇 |
1986年 | 25篇 |
1985年 | 24篇 |
1984年 | 33篇 |
1983年 | 9篇 |
1982年 | 16篇 |
1981年 | 14篇 |
1980年 | 10篇 |
1979年 | 10篇 |
1978年 | 9篇 |
1977年 | 10篇 |
1976年 | 6篇 |
1974年 | 2篇 |
排序方式: 共有9577条查询结果,搜索用时 733 毫秒
91.
A hybrid technique using constraint programming and linear programming is applied to the problem of scheduling with earliness and tardiness costs. The linear model maintains a set of relaxed optimal start times which are used to guide the constraint programming search heuristic. In addition, the constraint programming problem model employs the strong constraint propagation techniques responsible for many of the advances in constraint programming for scheduling in the past few years. Empirical results validate our approach and show, in particular, that creating and solving a subproblem containing only the activities with direct impact on the cost function and then using this solution in the main search, significantly increases the number of problems that can be solved to optimality while significantly decreasing the search time. 相似文献
92.
Applications of electronic speckle interferometry (ESI) techniques for spacecraft structural components 总被引:1,自引:0,他引:1
Laser-based electronic speckle interferometry (ESI) techniques, viz., electronic speckle pattern interferometry (ESPI) and electronic speckle shearographic interferometry (ESSI) are used for testing of spacecraft structural components. The combined ESPI and ESSI system developed in house was successfully used for the non-destructive evaluation (NDE) of honeycomb sandwich panels and propellant tanks of Indian Space Research Organization (ISRO). Debonds between face sheet and the honeycomb core were identified using (i) thermal and (ii) dual vacuum stressing methods. On-line NDE of the propellant tanks under internal pressure loading for identification of the minute cracks and thickness reduction areas were successfully implemented by ESI. 相似文献
93.
无向网络K终端可靠度的分解算法中,包括多边形→链简化在内的等可靠度简化和分解定理结合,可以降低算法的复杂度。本文完善了边随机无向网络和混合随机无向网络的4#,6#,7#型多边形→链简化定理。计算机编程验证了其正确性。 相似文献
94.
In the paper, the behaviour of interior point algorithms is analyzed by using a variable metric method approach. A class of
polynomial variable metric algorithms is given achieving O ((n/β)L) iterations for solving a canonical form linear optimization problem with respect to a wide class of Riemannian metrics,
wheren is the number of dimensions and β a fixed value. It is shown that the vector fields of several interior point algorithms
for linear optimization is the negative Riemannian gradient vector field of a linear a potential or a logarithmic barrier
function for suitable Riemannian metrics.
Research Partially supported by the Hungarian National Research Foundation, Grant Nos. OTKA-T016413 and OTKA-2116. 相似文献
95.
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families. 相似文献
96.
第二讲合成孔径声纳成像及其研究进展 总被引:1,自引:0,他引:1
文章在介绍了图像声纳的特点、合成孔径声纳(synthetic aperture sonar,SAS)产生背景和发展过程的基础上,对合成孔径声纳的原理、技术难点、成像算法等问题进行了讨论.着重分析了合成孔径声纳成像过程中高分辨率的获取方法、水声信道对成像的影响、多子阵技术及其成像算法、稳定的声纳运动平台和运动监测问题、运动补偿与自聚焦方法等.文章还给出了国内外合成孔径声纳研究的最新进展情况,进而展望了合成孔径声纳的应用前景. 相似文献
97.
A class of long-range predictive adaptive fuzzy relational controllers is presented. The plant behavior is described over an extended time horizon by a fuzzy relational model which is identified based on input-output closed-loop observations of the plant variables. In this class of adaptive controllers the control law attempts to minimize a quadratic cost over an extended control horizon. When used with linear models, this approach has revealed a significant potential for overcoming the limitations of one-step ahead schemes, such as the stabilization of non-minimum phase plants. Here, a uniform framework is adopted for implementing both the fuzzy model and the fuzzy controller, namely distributed fuzzy relational structures gaining from their massive parallel processing features and from the learning capabilities typical of the connectivist approaches. Issues such as maintenance during the adaptation process of the meaning of linguistic terms used at both fuzzy systems interfaces are addressed, namely by introducing a new design methodology for on-line fuzzy systems interface adaptation. The examples presented reinforce the claim of the usefulness of this new approach. 相似文献
98.
Fabien Tricoire 《4OR: A Quarterly Journal of Operations Research》2007,5(2):165-168
We present an overview of the author’s Ph.D. thesis, supervised by P. Dejax and N. Bostel, which was defended in February
2006 at école des Mines de Nantes, France. The thesis is written in French, and is available at . It was conducted in the context of a research contract with a water distribution company. In a first section, we define
multiperiod routing problems for service technicians. In a second section, we present some heuristics and a memetic algorithm
used to solve these problems. The third section introduces optimal and near-optimal approaches based on column generation.
Finally, we present some applications to the real-life case. The methods presented in Sects. 2, 3 and 4 were tested over several
sets of problems, based on real-life statistics provided by the company.
相似文献
99.
In this paper we address a two-dimensional (2D) orthogonal packing problem, where a fixed set of small rectangles has to be placed on a larger stock rectangle in such a way that the amount of trim loss is minimized. The algorithm we propose hybridizes a placement procedure with a genetic algorithm based on random keys. The approach is tested on a set of instances taken from the literature and compared with other approaches. The computation results validate the quality of the solutions and the effectiveness of the proposed algorithm. 相似文献
100.
COSEARCH: A Parallel Cooperative Metaheuristic 总被引:1,自引:0,他引:1
In order to design a well-balanced metaheuristic for robustness, we propose the COSEARCH approach which manages the cooperation
of complementary heuristic methods via an adaptive memory which contains a history of the search already done. In this paper,
we present the idiosyncrasies of the COSEARCH approach and its application for solving large scale instances of the quadratic
assignment problem (QAP). We propose an original design of the adaptive memory in order to focus on high quality regions of
the search and avoid attractive but deceptive areas. For the QAP, we have hybridized three heuristic agents of complementary
behaviours: a Tabu Search is used as the main search algorithm, a Genetic Algorithm is in charge of the diversification and
a Kick Operator is applied to intensify the search. The evaluations have been executed on large scale network of workstations
via a parallel environment which supports fault tolerance and adaptive dynamic scheduling of tasks. 相似文献