首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19962篇
  免费   2818篇
  国内免费   587篇
化学   891篇
晶体学   16篇
力学   1101篇
综合类   330篇
数学   5597篇
物理学   3014篇
无线电   12418篇
  2024年   78篇
  2023年   269篇
  2022年   465篇
  2021年   558篇
  2020年   542篇
  2019年   470篇
  2018年   488篇
  2017年   691篇
  2016年   905篇
  2015年   916篇
  2014年   1474篇
  2013年   1394篇
  2012年   1413篇
  2011年   1533篇
  2010年   1071篇
  2009年   1214篇
  2008年   1358篇
  2007年   1402篇
  2006年   1159篇
  2005年   973篇
  2004年   824篇
  2003年   716篇
  2002年   607篇
  2001年   483篇
  2000年   428篇
  1999年   322篇
  1998年   303篇
  1997年   256篇
  1996年   217篇
  1995年   155篇
  1994年   106篇
  1993年   113篇
  1992年   101篇
  1991年   43篇
  1990年   57篇
  1989年   34篇
  1988年   41篇
  1987年   23篇
  1986年   31篇
  1985年   33篇
  1984年   31篇
  1983年   10篇
  1982年   18篇
  1981年   7篇
  1980年   5篇
  1979年   7篇
  1978年   4篇
  1977年   5篇
  1959年   5篇
  1957年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
141.
In a seminal paper, Martin Clark (Communications Systems and Random Process Theory, Darlington, 1977, pp. 721–734, 1978) showed how the filtered dynamics giving the optimal estimate of a Markov chain observed in Gaussian noise can be expressed using an ordinary differential equation. These results offer substantial benefits in filtering and in control, often simplifying the analysis and an in some settings providing numerical benefits, see, for example Malcolm et al. (J. Appl. Math. Stoch. Anal., 2007, to appear). Clark’s method uses a gauge transformation and, in effect, solves the Wonham-Zakai equation using variation of constants. In this article, we consider the optimal control of a partially observed Markov chain. This problem is discussed in Elliott et al. (Hidden Markov Models Estimation and Control, Applications of Mathematics Series, vol. 29, 1995). The innovation in our results is that the robust dynamics of Clark are used to compute forward in time dynamics for a simplified adjoint process. A stochastic minimum principle is established.  相似文献   
142.
设E是Banach空间,T∶E→2E*是极大单调算子,T-10≠ф.令x0∈E,yn=(J λnT)-1xn en,xn 1=J-1(αnJxn (1-αn)Jyn),n0,λn>0,αn∈[0,1],文章研究了{xn}收敛性.  相似文献   
143.
This paper has two objectives. We introduce a new global optimization algorithm reformulating optimization problems in terms of boundary-value problems. Then, we apply this algorithm to a pointwise control problem of the viscous Burgers equation, where the control weight coefficient is progressively decreased. The results are compared with those obtained with a genetic algorithm and an LM-BFGS algorithm in order to check the efficiency of our method and the necessity of using global optimization techniques.  相似文献   
144.
In this paper, continuous wave Yb3+-doped double-clad fiber lasers (DCFLs) with linear-cavity are investigated theoretically and numerically using the rate equations. Under the steady state conditions, the simplified analytic solutions of Yb3+-doped DCFLs under considering the scattering loss are deduced in the strongly pump condition. Compared with the known analytic solutions in published literatures, our analytic solutions are more accurate, especially, at higher reflectivity of output mirror. In addition, a fast and stable algorithm based on the Newton-Raphson method is proposed to simulate numerically Yb3+-doped DCFLs. The results by simplified analytic solutions are in good agreement with those by the numerical simulation. Moreover, we have performed the optimization of an Yb3+-doped DCFL using the simplified analytic solutions and the numerical simulations, respectively.  相似文献   
145.
An energy-dependent partitioning scheme is explored for extracting a small number of eigenvalues of a real symmetric matrix with the help of genetic algorithm. The proposed method is tested with matrices of different sizes (30 × 30 to 1000 × 1000). Comparison is made with Löwdin’s strategy for solving the problem. The relative advantages and disadvantages of the GA-based method are analyzed  相似文献   
146.
We give a competitive algorithm to identify all d defective edges in a hypergraph with d unknown. Damaschke did the d=1 case for 2-graphs, Triesch extended the d=1 case to r-graphs, and Johann did the general d case for 2-graphs. So ours is the first attempt to solve the searching for defective edges problem in its full generality. Further, all the above three papers assumed d known. We give a competitive algorithm where d is unknown.  相似文献   
147.
We consider a trader who wants to direct his or her portfolio towards a set of acceptable wealths given by a convex risk measure. We propose a Monte Carlo algorithm, whose inputs are the joint law of stock prices and the convex risk measure, and whose outputs are the numerical values of initial capital requirement and the functional form of a trading strategy for achieving acceptability. We also prove optimality of the capital obtained. Explicit theoretical evaluations of hedging strategies are extremely difficult, and we avoid the problem by resorting to such computational methods. The main idea is to utilize the finite Vapnik–C?ervonenkis dimension of a class of possible strategies.  相似文献   
148.
周叔子  陈娟 《应用数学》2006,19(4):771-775
本文讨论HJB方程上、下解的几个性质,并讨论了从上解出发的一个迭代法的收敛性.  相似文献   
149.
Multi-dimensional asymptotically quasi-Toeplitz Markov chains with discrete and continuous time are introduced. Ergodicity and non-ergodicity conditions are proven. Numerically stable algorithm to calculate the stationary distribution is presented. An application of such chains in retrial queueing models with Batch Markovian Arrival Process is briefly illustrated. AMS Subject Classifications Primary 60K25 · 60K20  相似文献   
150.
数据库加密技术   总被引:2,自引:0,他引:2  
介绍了信息数据安全中数据库加密技术的功能和特点、数据库加密算法,以及数据库加密系统的实现方式和体系结构。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号