首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   345篇
  免费   10篇
  国内免费   26篇
综合类   6篇
数学   140篇
物理学   20篇
综合类   215篇
  2023年   2篇
  2022年   11篇
  2021年   3篇
  2020年   6篇
  2019年   2篇
  2018年   4篇
  2017年   4篇
  2016年   4篇
  2015年   4篇
  2014年   16篇
  2013年   17篇
  2012年   20篇
  2011年   25篇
  2010年   13篇
  2009年   22篇
  2008年   23篇
  2007年   28篇
  2006年   32篇
  2005年   29篇
  2004年   14篇
  2003年   21篇
  2002年   10篇
  2001年   11篇
  2000年   5篇
  1999年   4篇
  1998年   2篇
  1997年   5篇
  1996年   4篇
  1995年   5篇
  1994年   8篇
  1993年   1篇
  1992年   6篇
  1991年   1篇
  1990年   2篇
  1989年   2篇
  1988年   1篇
  1986年   1篇
  1985年   2篇
  1984年   1篇
  1983年   2篇
  1982年   1篇
  1981年   1篇
  1979年   2篇
  1978年   3篇
  1977年   1篇
排序方式: 共有381条查询结果,搜索用时 15 毫秒
51.
The Thief Orienteering Problem (ThOP) is a multi-component problem that combines features of two classic combinatorial optimization problems: Orienteering Problem and Knapsack Problem. The ThOP is challenging due to the given time constraint and the interaction between its components. We propose an Ant Colony Optimization algorithm together with a new packing heuristic to deal individually and interactively with problem components. Our approach outperforms existing work on more than 90% of the benchmarking instances, with an average improvement of over 300%.  相似文献   
52.
In this paper, we solve instances of the multiobjective multiconstraint (or multidimensional) knapsack problem (MOMCKP) from the literature, with three objective functions and three constraints. We use exact as well as approximate algorithms. The exact algorithm is a properly modified version of the multicriteria branch and bound (MCBB) algorithm, which is further customized by suitable heuristics. Three branching heuristics and a more general purpose composite branching and construction heuristic are devised. Comparison is made to the published results from another exact algorithm, the adaptive ε-constraint method [Laumanns, M., Thiele, L., Zitzler, E., 2006. An efficient, adaptive parameter variation scheme for Metaheuristics based on the epsilon-constraint method. European Journal of Operational Research 169, 932–942], using the same data sets. Furthermore, the same problems are solved using standard multiobjective evolutionary algorithms (MOEA), namely, the SPEA2 and the NSGAII. The results from the exact case show that the branching heuristics greatly improve the performance of the MCBB algorithm, which becomes faster than the adaptive ε -constraint. Regarding the performance of the MOEA algorithms in the specific problems, SPEA2 outperforms NSGAII in the degree of approximation of the Pareto front, as measured by the coverage metric (especially for the largest instance).  相似文献   
53.
We propose an exact method based on a multi-level search strategy for solving the 0-1 Multidimensional Knapsack Problem. Our search strategy is primarily based on the reduced costs of the non-basic variables of the LP-relaxation solution. Considering that the variables are sorted in decreasing order of their absolute reduced cost value, the top level branches of the search tree are enumerated following Resolution Search strategy, the middle level branches are enumerated following Branch & Bound strategy and the lower level branches are enumerated according to a simple Depth First Search enumeration strategy. Experimentally, this cooperative scheme is able to solve optimally large-scale strongly correlated 0-1 Multidimensional Knapsack Problem instances. The optimal values of all the 10 constraint, 500 variable instances and some of the 30 constraint, 250 variable instances of the OR-Library were found. These values were previously unknown.  相似文献   
54.
Chris Monico 《代数通讯》2013,41(1):218-227
We cryptanalyze a recently proposed matrix-based MOR cryptosystem. The security of the system depends on the difficulty of solving the following discrete logarithm problem: given an inner automorphism φ of SL(d, 𝔽 q ) and φ a (each given in terms of their images on generators of SL(d, 𝔽 q )), find a. We show that this problem can be reduced to a small number of similar problems in quotients of polynomial rings and solved in subexponential-time.  相似文献   
55.
56.
标量乘是椭圆曲线密码体制(ECC)的基本运算,也是最耗时和极易受到攻击的运算之一。针对利用重编码和R-L技术实现2w-ary快速标量乘算法的不足,对该算法进行了改进。在保持抗SPA的前提下,改进算法使用绝对值,避免了负数做数组下标的使用,减少了50%的存储量,节约了赋值后的消除操作。理论分析表明,改进算法优于原算法,算法的运算量降低2w次。数字验证表明,改进算法比原算法快约17%。  相似文献   
57.
Knapsack problems with setups find their application in many concrete industrial and financial problems. Moreover, they also arise as subproblems in a Dantzig–Wolfe decomposition approach to more complex combinatorial optimization problems, where they need to be solved repeatedly and therefore efficiently. Here, we consider the multiple-class integer knapsack problem with setups. Items are partitioned into classes whose use implies a setup cost and associated capacity consumption. Item weights are assumed to be a multiple of their class weight. The total weight of selected items and setups is bounded. The objective is to maximize the difference between the profits of selected items and the fixed costs incurred for setting-up classes. A special case is the bounded integer knapsack problem with setups where each class holds a single item and its continuous version where a fraction of an item can be selected while incurring a full setup. The paper shows the extent to which classical results for the knapsack problem can be generalized to these variants with setups. In particular, an extension of the branch-and-bound algorithm of Horowitz and Sahni is developed for problems with positive setup costs. Our direct approach is compared experimentally with the approach proposed in the literature consisting in converting the problem into a multiple choice knapsack with pseudo-polynomial size.  相似文献   
58.
提出了一种适用于无线传感器网络的基于椭圆曲线密码体制的对偶密钥管理方案,引入了证书服务,可以实现密钥的分配、更新、撤销以及新加入节点时的密钥生成.分析结果表明,与现有的密钥更新方案比较,基于椭圆曲线密码体制的无线传感器密钥更新方案有效地减少了密钥的存储空间;在密钥更新阶段中加入保密和认证功能,增加了网络攻击的难度.  相似文献   
59.
利用具有顺序和并行执行的特点的VHDL语言,设计并实现了基于神经网络混沌吸引子的公钥加密算法,在编解码器设计中采用专用的控制模块来控制加密和解密操作;同时,在RAM模块中自主设计了具有并行读写功能的子模块,以进一步提高算法的数据加密速度;整个系统在DE2实验平台中经过反复实验测试和试运行,结果表明该算法是可以硬件实现的,并且具有较高的数据加密速度,时钟频率可达50 MHz以上.  相似文献   
60.
李喆  韩益亮  李鱼 《科学技术与工程》2020,20(13):5198-5204
为了促进抗量子密码方案的实用化,在Mostafa Esmaeili方案的基础上,利用Polar码的极化性质改进抗量子密码方案,把信息比特作为原方案中的明文,把冻结比特作为原方案中的随机比特串。改进后的方案没有改变原方案的结构,可以抵御目前已知的信息集译码攻击,达到了IND-CPA(indistinguishability chosen ciphertext attacks)安全。选择合理的参数,使得改进方案的整体密钥尺寸比McEliece的整体密钥尺寸减少了70%,提高了方案的实用性,为即将来临的5G时代提供了一种新型抗量子密码方案。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号