首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18952篇
  免费   2656篇
  国内免费   533篇
化学   753篇
晶体学   13篇
力学   1093篇
综合类   324篇
数学   5485篇
物理学   2663篇
无线电   11810篇
  2024年   61篇
  2023年   211篇
  2022年   396篇
  2021年   483篇
  2020年   477篇
  2019年   401篇
  2018年   425篇
  2017年   626篇
  2016年   852篇
  2015年   864篇
  2014年   1384篇
  2013年   1302篇
  2012年   1351篇
  2011年   1487篇
  2010年   1033篇
  2009年   1169篇
  2008年   1302篇
  2007年   1362篇
  2006年   1136篇
  2005年   948篇
  2004年   803篇
  2003年   700篇
  2002年   599篇
  2001年   463篇
  2000年   420篇
  1999年   312篇
  1998年   292篇
  1997年   246篇
  1996年   217篇
  1995年   153篇
  1994年   103篇
  1993年   113篇
  1992年   98篇
  1991年   43篇
  1990年   55篇
  1989年   34篇
  1988年   39篇
  1987年   23篇
  1986年   30篇
  1985年   33篇
  1984年   30篇
  1983年   10篇
  1982年   18篇
  1981年   5篇
  1980年   5篇
  1979年   5篇
  1978年   3篇
  1977年   5篇
  1959年   5篇
  1957年   2篇
排序方式: 共有10000条查询结果,搜索用时 174 毫秒
141.
In a seminal paper, Martin Clark (Communications Systems and Random Process Theory, Darlington, 1977, pp. 721–734, 1978) showed how the filtered dynamics giving the optimal estimate of a Markov chain observed in Gaussian noise can be expressed using an ordinary differential equation. These results offer substantial benefits in filtering and in control, often simplifying the analysis and an in some settings providing numerical benefits, see, for example Malcolm et al. (J. Appl. Math. Stoch. Anal., 2007, to appear). Clark’s method uses a gauge transformation and, in effect, solves the Wonham-Zakai equation using variation of constants. In this article, we consider the optimal control of a partially observed Markov chain. This problem is discussed in Elliott et al. (Hidden Markov Models Estimation and Control, Applications of Mathematics Series, vol. 29, 1995). The innovation in our results is that the robust dynamics of Clark are used to compute forward in time dynamics for a simplified adjoint process. A stochastic minimum principle is established.  相似文献   
142.
设E是Banach空间,T∶E→2E*是极大单调算子,T-10≠ф.令x0∈E,yn=(J λnT)-1xn en,xn 1=J-1(αnJxn (1-αn)Jyn),n0,λn>0,αn∈[0,1],文章研究了{xn}收敛性.  相似文献   
143.
This paper has two objectives. We introduce a new global optimization algorithm reformulating optimization problems in terms of boundary-value problems. Then, we apply this algorithm to a pointwise control problem of the viscous Burgers equation, where the control weight coefficient is progressively decreased. The results are compared with those obtained with a genetic algorithm and an LM-BFGS algorithm in order to check the efficiency of our method and the necessity of using global optimization techniques.  相似文献   
144.
In this paper, continuous wave Yb3+-doped double-clad fiber lasers (DCFLs) with linear-cavity are investigated theoretically and numerically using the rate equations. Under the steady state conditions, the simplified analytic solutions of Yb3+-doped DCFLs under considering the scattering loss are deduced in the strongly pump condition. Compared with the known analytic solutions in published literatures, our analytic solutions are more accurate, especially, at higher reflectivity of output mirror. In addition, a fast and stable algorithm based on the Newton-Raphson method is proposed to simulate numerically Yb3+-doped DCFLs. The results by simplified analytic solutions are in good agreement with those by the numerical simulation. Moreover, we have performed the optimization of an Yb3+-doped DCFL using the simplified analytic solutions and the numerical simulations, respectively.  相似文献   
145.
An energy-dependent partitioning scheme is explored for extracting a small number of eigenvalues of a real symmetric matrix with the help of genetic algorithm. The proposed method is tested with matrices of different sizes (30 × 30 to 1000 × 1000). Comparison is made with Löwdin’s strategy for solving the problem. The relative advantages and disadvantages of the GA-based method are analyzed  相似文献   
146.
We give a competitive algorithm to identify all d defective edges in a hypergraph with d unknown. Damaschke did the d=1 case for 2-graphs, Triesch extended the d=1 case to r-graphs, and Johann did the general d case for 2-graphs. So ours is the first attempt to solve the searching for defective edges problem in its full generality. Further, all the above three papers assumed d known. We give a competitive algorithm where d is unknown.  相似文献   
147.
We consider a trader who wants to direct his or her portfolio towards a set of acceptable wealths given by a convex risk measure. We propose a Monte Carlo algorithm, whose inputs are the joint law of stock prices and the convex risk measure, and whose outputs are the numerical values of initial capital requirement and the functional form of a trading strategy for achieving acceptability. We also prove optimality of the capital obtained. Explicit theoretical evaluations of hedging strategies are extremely difficult, and we avoid the problem by resorting to such computational methods. The main idea is to utilize the finite Vapnik–C?ervonenkis dimension of a class of possible strategies.  相似文献   
148.
周叔子  陈娟 《应用数学》2006,19(4):771-775
本文讨论HJB方程上、下解的几个性质,并讨论了从上解出发的一个迭代法的收敛性.  相似文献   
149.
Multi-dimensional asymptotically quasi-Toeplitz Markov chains with discrete and continuous time are introduced. Ergodicity and non-ergodicity conditions are proven. Numerically stable algorithm to calculate the stationary distribution is presented. An application of such chains in retrial queueing models with Batch Markovian Arrival Process is briefly illustrated. AMS Subject Classifications Primary 60K25 · 60K20  相似文献   
150.
数据库加密技术   总被引:2,自引:0,他引:2  
介绍了信息数据安全中数据库加密技术的功能和特点、数据库加密算法,以及数据库加密系统的实现方式和体系结构。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号