首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1063篇
  免费   38篇
  国内免费   72篇
化学   12篇
力学   26篇
综合类   11篇
数学   449篇
物理学   81篇
综合类   594篇
  2024年   3篇
  2023年   4篇
  2022年   9篇
  2021年   10篇
  2020年   13篇
  2019年   14篇
  2018年   8篇
  2017年   9篇
  2016年   19篇
  2015年   11篇
  2014年   31篇
  2013年   48篇
  2012年   39篇
  2011年   33篇
  2010年   32篇
  2009年   56篇
  2008年   52篇
  2007年   92篇
  2006年   89篇
  2005年   94篇
  2004年   89篇
  2003年   87篇
  2002年   65篇
  2001年   53篇
  2000年   45篇
  1999年   28篇
  1998年   22篇
  1997年   20篇
  1996年   18篇
  1995年   16篇
  1994年   18篇
  1993年   10篇
  1992年   10篇
  1991年   4篇
  1990年   2篇
  1989年   1篇
  1988年   1篇
  1987年   4篇
  1984年   4篇
  1982年   1篇
  1979年   1篇
  1978年   3篇
  1976年   1篇
  1972年   1篇
  1971年   1篇
  1969年   1篇
  1959年   1篇
排序方式: 共有1173条查询结果,搜索用时 0 毫秒
81.
In this paper, we consider the computation of a rigorous lower error bound for the optimal value of convex optimization problems. A discussion of large-scale problems, degenerate problems, and quadratic programming problems is included. It is allowed that parameters, whichdefine the convex constraints and the convex objective functions, may be uncertain and may vary between given lower and upper bounds. The error bound is verified for the family of convex optimization problems which correspond to these uncertainties. It can be used to perform a rigorous sensitivity analysis in convex programming, provided the width of the uncertainties is not too large. Branch and bound algorithms can be made reliable by using such rigorous lower bounds.  相似文献   
82.
For each sN define the constant θs with the following properties: if an entire function g(z) of type t(g)<θs satisfies then g is a polynomial; conversely, for any δ>0 there exists an entire transcendental function g(z) satisfying the display conditin and t(g)<θs+δ. The result θ1=log2 is known due to Hardy and Pólya. We provide the upper bound θsπs/3 and improve earlier lower bounds due to Gelfond (1929) and Selberg (1941).  相似文献   
83.
In general, the sup-min convolution has been used for fuzzy arithmetic to analyze fuzzy system reliability, where the reliability of each system component is represented by fuzzy numbers. It is well known that Tω-based addition preserves the shape of L-R type fuzzy numbers. In this paper, we show Tω-based multiplication also preserves the shape of L-R type fuzzy numbers. We then apply Tω-based arithmetic operations to fuzzy system reliability analysis. In fact, we show that we can simplify fuzzy arithmetic operations and even get the exact solutions for L-R type fuzzy system reliability, while others [Singer, Fuzzy Sets Syst. 34 (1990) 145; Cheng and Mon, Fuzzy Sets Syst. 56 (1993) 29; Chen, Fuzzy Sets Syst. 64 (1994) 31] have got the approximate solutions using sup-min convolution for evaluating fuzzy system reliability.  相似文献   
84.
We present more general forms of the mean-value theorems established before for multiplicative functions on additive arithmetic semigroups and prove, on the basis of these new theorems, extensions of the Elliott-Daboussi theorem. Let be an additive arithmetic semigroup with a generating set ℘ of primes p. Assume that the number G(m) of elements a in with “degree” (a)=m satisfies
with constants q>1, ρ 1<ρ 2<⋅⋅⋅<ρ r =ρ, ρ≥1, γ>1+ρ. For the main result, let α,τ,η be positive constants such that α>1,τ ρ≥1, and τ α ρ≥1. Then for a multiplicative function f(a) on the following two conditions (A) and (B) are equivalent. These are (A) All four series
converge and
and (B) The order τ ρ mean-value
exists with m f ≠0 and the limit
exists with M v (α)>0.   相似文献   
85.
Greg Oman  Adam Salminen 《代数通讯》2018,46(5):2109-2122
In Oman and Salminen [19 Oman, G., Salminen, A. Residually small commutative rings. J. Commut. Algebra (17 pages as a preprint, to appear). [Google Scholar]], the authors introduce and study residually small rings, defined as follows: an infinite commutative ring R with identity is residually smallif for every rR?{0}, there exists an ideal Ir of R such that r?Ir and |RIr|<|R|. The purpose of this note is to extend our study. In particular, we continue our investigation of residually small rings and then generalize this notion to modules.  相似文献   
86.
神经网络在工程爆破应力波规律探讨中的应用   总被引:2,自引:0,他引:2  
采用BP(Back Propagation)前馈人工神经网络模型,对工程爆破中柱状震源的自由场应力波传播规律进行了探讨。结果表明:利用人神经网络模型的非线性映射功能,可以较好地给出工程爆破引起的近区自由场力学规律,对于同类型问题的研究,也有着很重要的意义。  相似文献   
87.
给出了Toader型平均T[A(a,b),G(a,b)]关于调和平均H(a,b)与算术平均A(a,b)组合的精确界.作为应用,发现了几个关于第二类完全椭圆积分的精确不等式.  相似文献   
88.
《Mathematische Nachrichten》2017,290(17-18):3029-3037
In this note, we show that any projective subspace arrangement can be realized as a generalized star configuration variety. This type of interpolation result may be useful in designing linear codes with prescribed codewords of minimum weight, as well as in answering a couple of questions about the number of equations needed to define a generalized star configuration variety.  相似文献   
89.
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号