首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21995篇
  免费   3071篇
  国内免费   634篇
化学   1025篇
晶体学   17篇
力学   1322篇
综合类   384篇
数学   6081篇
物理学   3411篇
无线电   13460篇
  2024年   79篇
  2023年   279篇
  2022年   471篇
  2021年   562篇
  2020年   582篇
  2019年   494篇
  2018年   512篇
  2017年   753篇
  2016年   972篇
  2015年   1011篇
  2014年   1574篇
  2013年   1500篇
  2012年   1575篇
  2011年   1677篇
  2010年   1151篇
  2009年   1286篇
  2008年   1453篇
  2007年   1521篇
  2006年   1292篇
  2005年   1100篇
  2004年   948篇
  2003年   834篇
  2002年   699篇
  2001年   553篇
  2000年   484篇
  1999年   383篇
  1998年   359篇
  1997年   311篇
  1996年   255篇
  1995年   194篇
  1994年   138篇
  1993年   148篇
  1992年   129篇
  1991年   55篇
  1990年   60篇
  1989年   45篇
  1988年   51篇
  1987年   28篇
  1986年   34篇
  1985年   39篇
  1984年   39篇
  1983年   11篇
  1982年   18篇
  1981年   6篇
  1980年   7篇
  1979年   6篇
  1978年   3篇
  1977年   5篇
  1959年   5篇
  1957年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
851.
Numerical simulation of a two-dimensional probe–object system for photon scanning tunneling microscope is presented. The R-matrix propagation algorithm incorporated into the Fourier modal method was used to achieve an extended capability for modeling of a realistic system consisting of both a probe and a sample. The type of the mode guided through the dielectric probe and the coupling of the near-field to fundamental guiding mode in the probe are discussed. The influence of the probe parameters on the near-field images is investigated. Three different probe shapes were simulated in the constant height scanning mode. The transmitted flux intensity through the probe was found to be strongly dependent on the tip shape. The analysis shows a good agreement of the obtained results with the available theoretical works and confirming experimental results. The proposed numerical scheme can find applications for near-field probe characterization and provides an understanding of the degree of perturbation introduced by a probe tip in the experiment.  相似文献   
852.
In this paper, we present the parallelization of tabu search on a network of workstations using PVM. Two parallelization strategies are integrated: functional decomposition strategy and multi-search threads strategy. In addition, domain decomposition strategy is implemented probabilistically. The performance of each strategy is observed and analyzed. The goal of parallelization is to speedup the search in finding better quality solutions. Observations support that both parallelization strategies are beneficial, with functional decomposition producing slightly better results. Experiments were conducted for the VLSI cell placement, an NP-hard problem, and the objective was to achieve the best possible solution in terms of interconnection length, timing performance (circuit speed), and area. The multiobjective nature of this problem is addressed using a fuzzy goal-based cost computation.  相似文献   
853.
Neighboring extremals of dynamic optimization problems with path equality constraints and with an unknown parameter vector are considered in this paper. With some simplifications, the problem is reduced to solving a linear, time-varying two-point boundary-value problem with integral path equality constraints. A modified backward sweep method is used to solve this problem. Two example problems are solved to illustrate the validity and usefulness of the solution technique. This research was supported in part by the National Aeronautics and Space Administration under NASA Grant No. NCC-2-106. The author is indebted to Professor A. E. Bryson, Jr., Department of Aeronautics and Astronautics, Stanford University, for many stimulating discussions.  相似文献   
854.
Technical details are given on how to use Fourier acceleration with iterative processes such as relaxation and conjugate gradient methods. These methods are often used to solve large linear systems of equations, but become hopelessly slow very rapidly as the size of the set of equations to be solved increases. Fourier acceleration is a method designed to alleviate these problems and result in a very fast algorithm. The method is explained for the Jacobi relaxation and conjugate gradient methods and is applied to two models: the random resistor network and the random central-force network. In the first model, acceleration works very well; in the second, little is gained. We discuss reasons for this. We also include a discussion of stopping criteria.  相似文献   
855.
Dinic has shown that the classic maximum flow problem on a graph of n vertices and m edges can be reduced to a sequence of at most n ? 1 so-called ‘blocking flow’ problems on acyclic graphs. For dense graphs, the best time bound known for the blocking flow problems is O(n2). Karzanov devised the first O(n2)-time blocking flow algorithm, which unfortunately is rather complicated. Later Malhotra, Kumar and Maheshwari devise another O(n2)-time algorithm, which is conceptually very simple but has some other drawbacks. In this paper we propose a simplification of Karzanov's algorithm that is easier to implement than Malhotra, Kumar and Maheshwari's method.  相似文献   
856.
A dynamic model for a nuclear power plant steam generator (vertical, preheated, U-tube recirculation-type) is formulated as a sixth-order nonlinear system. The model integrates nodal mass and energy balances for the primary water, the U-tube metal and the secondary water and steam. The downcomer flow is determined by a static balance of momentum. The mathematical system is solved using transient input data from the Philippsburg 2 (FRG) nuclear power plant. The results of the calculation are compared with actual measured values. The proposed model provides a low-cost tool for the automatic control and simulation of the steam generating process. The “parity-space” algorithm is used to demonstrate the applicability of the mathematical model for sensor fault detection and identification purposes. This technique provides a powerful means of generating temporal analytic redundancy between sensor signals. It demonstrates good detection rates of sensor errors using relatively few steps of scanning time and allows the reconfiguration of faulty signals.  相似文献   
857.
The generalized assignment problem can be viewed as the following problem of scheduling parallel machines with costs. Each job is to be processed by exactly one machine; processing jobj on machinei requires timep ij and incurs a cost ofc ij ; each machinei is available forT i time units, and the objective is to minimize the total cost incurred. Our main result is as follows. There is a polynomial-time algorithm that, given a valueC, either proves that no feasible schedule of costC exists, or else finds a schedule of cost at mostC where each machinei is used for at most 2T i time units.We also extend this result to a variant of the problem where, instead of a fixed processing timep ij , there is a range of possible processing times for each machine—job pair, and the cost linearly increases as the processing time decreases. We show that these results imply a polynomial-time 2-approximation algorithm to minimize a weighted sum of the cost and the makespan, i.e., the maximum job completion time. We also consider the objective of minimizing the mean job completion time. We show that there is a polynomial-time algorithm that, given valuesM andT, either proves that no schedule of mean job completion timeM and makespanT exists, or else finds a schedule of mean job completion time at mostM and makespan at most 2T. Research partially supported by an NSF PYI award CCR-89-96272 with matching support from UPS, and Sun Microsystems, and by the National Science Foundation, the Air Force Office of Scientific Research, and the Office of Naval Research, through NSF grant DMS-8920550.Research supported in part by a Packard Fellowship, a Sloan Fellowship, an NSF PYI award, and by the National Science Foundation, the Air Force Office of Scientific Research, and the Office of Naval Research, through NSF grant DMS-8920550.  相似文献   
858.
ATM网络中突发业务的漏桶算法分析   总被引:11,自引:0,他引:11  
统计复用可以使突发业务获得较高的频带利用率,但必须对输入的业务量进行恰当的控制,否则会造成严重的网络拥塞,漏桶法是ATM网络基于速率调节进行业务量控制的一种重要的方法,本文对突发业务的漏桶算法进行了分析,得出了突发业务的漏桶性能与输入业务统计参数和漏桶参数之间关系的解析式,计算机模拟结果表明它与理论分析的一致性。  相似文献   
859.
码率控制是恒定码率视频压缩编码系统的一个关键研究课题。本文提出了一种基于频域活动性的修正的TM5码率控制算法。该算法以TM5为基础,同时采用了一些有效的措施.诸如:频域括动性分析、场景变化分析、码字利用映像和强制缓存控制等。对所提出的修正的TM5码率控制算法.本文进行了计算机模拟实验,实验结果证明了本文所提出的算法可以有效地弥补现有的码率控制算法的不足,可适用于多种视频压缩的应用领域。  相似文献   
860.
本文提出了共享与分布式存储计算机上任意长—维DFT的MIMD并行算法,若N=O(p,q),则算法需要次算术运算。其中,P与N可为任意自然数,分别表示处理机台数与DFT长度.本文算法具有很高的并行效率.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号