首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   189篇
  免费   25篇
  国内免费   7篇
化学   7篇
力学   16篇
综合类   1篇
数学   115篇
物理学   82篇
  2024年   1篇
  2023年   1篇
  2022年   5篇
  2021年   7篇
  2020年   11篇
  2019年   6篇
  2018年   6篇
  2017年   7篇
  2016年   5篇
  2015年   2篇
  2014年   8篇
  2013年   10篇
  2012年   6篇
  2011年   11篇
  2010年   9篇
  2009年   7篇
  2008年   9篇
  2007年   8篇
  2006年   12篇
  2005年   7篇
  2004年   2篇
  2003年   5篇
  2002年   4篇
  2001年   7篇
  2000年   8篇
  1999年   8篇
  1998年   5篇
  1997年   5篇
  1996年   4篇
  1995年   2篇
  1994年   8篇
  1993年   4篇
  1992年   3篇
  1991年   3篇
  1990年   3篇
  1989年   1篇
  1988年   3篇
  1987年   2篇
  1986年   3篇
  1985年   1篇
  1983年   1篇
  1978年   1篇
排序方式: 共有221条查询结果,搜索用时 15 毫秒
1.
For the long-range deterministic spin models with glassy behaviour of Marinari, Parisi and Ritort we prove weighted factorization properties of the correlation functions which represent the natural generalization of the factorization rules valid for the Curie–Weiss case.  相似文献   
2.
A general nonlinear programming problem with interval functions is considered. Two reductions of this problem to the deterministic nonlinear programming problem are proposed, and illustrative examples are discussed.  相似文献   
3.
Knessl  Charles 《Queueing Systems》1998,30(3-4):261-272
We consider two queues in tandem, each with an exponential server, and with deterministic arrivals to the first queue. We obtain an explicit solution for the steady state distribution of the process (N1(t), N2(t), Y(t)), where Nj(t) is the queue length in the jth queue and Y(t) measures the time elapsed since the last arrival. Then we obtain the marginal distributions of (N1(t), N2(t)) and of N2(t). We also evaluate the solution in various limiting cases, such as heavy traffic. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   
4.
Noncooperative games of a finite number of persons with interval-valued payoff functions are considered. The concept of an equilibrium situation is introduced. A reduction of such games to deterministic noncooperative games is proposed. Properties of the reduced games are discussed. Interval antagonistic and bimatrix games are examined, and illustrative examples are considered.  相似文献   
5.
6.
Summary The forms of vibrations and displacements of particles in amorphous structures have been investigated. The particles, moving on highly non-linear amplitude, are responsible for the creation of disordered structures of amorphous bodies. The non-linear oscillators, even if 'few' in concentration, are characterized by unpredictable trajectories in phase space. The non-linear oscillators are fully developed in the liquid state above the crossover temperature Tcr and between Tcr and Tg their number decreases. Under Tg they completely disappear. The interconnection between the linear oscillators in blocks plays the most important role in the characteristic time spectra in liquid state. Using the additive properties of elements polarizibilities, the number of acoustical units in individual blocks at Tcr is estimated to be about 600 units. The diameter of blocks at Tcr was estimated to be about 1.8 nm. Even if the non-linear high amplitude motions disappear at solidification, the remnants of structural irregularity remain and the disordered structure of glass is formed.  相似文献   
7.
提出了一种新的能反映决策者满意度的随机变量序关系,并据此研究了随机不等式的确定性等价类,方法被称为满意度方法.最后将其应用于带凹性生产成本运输问题的求解中,并将方法与常用的机会约束方法进行比较,说明满意度法不仅合理可行,而且当决策者对约束条件的要求越高时,它所得最优值越优于机会约束法所得最优值.  相似文献   
8.
求全局最优化问题的填充函数算法被提出以来,参数的选取和调整一直是制约算法有效性的因素.如何在实际的计算过程中选取合适的参数,直接影响和决定了运算速度和效率.因此,构造不含参数的填充函数就显得极为重要.提出一个新的无参数的填充函数,对其理论性质进行了分析,并给出相应的填充函数算法,数值计算验证了算法的有效性.  相似文献   
9.
通过具体实例分析、讨论了高等数学中常微分方程的通解、特解和微分方程的所有解之间的区别与联系,并对高等数学教材中二阶线性微分方程的降阶法与二阶常系数非齐次线性微分方程特解求解过程中的作法进行了说明.  相似文献   
10.
A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit two bits of classical information per cluster state, and its efficiency of the quantum communication is 1/3, which is approximately 1.67 times that of the previous protocol presented by Wang et al [Chin. Phys. Lett. 23 (2006) 2658]. Security analysis shows the present scheme is secure against intercept-resend attack and the impersonator's attack. Furthermore, it is more economic with present-day techniques and easily processed by a one-way quantum computer.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号