首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1464篇
  免费   81篇
  国内免费   25篇
化学   132篇
晶体学   1篇
力学   47篇
综合类   13篇
数学   948篇
物理学   429篇
  2024年   2篇
  2023年   36篇
  2022年   51篇
  2021年   75篇
  2020年   48篇
  2019年   51篇
  2018年   30篇
  2017年   32篇
  2016年   69篇
  2015年   39篇
  2014年   72篇
  2013年   186篇
  2012年   63篇
  2011年   70篇
  2010年   73篇
  2009年   75篇
  2008年   88篇
  2007年   91篇
  2006年   67篇
  2005年   39篇
  2004年   23篇
  2003年   33篇
  2002年   26篇
  2001年   23篇
  2000年   20篇
  1999年   16篇
  1998年   23篇
  1997年   11篇
  1996年   10篇
  1995年   11篇
  1994年   13篇
  1993年   9篇
  1992年   9篇
  1991年   7篇
  1990年   7篇
  1989年   4篇
  1988年   10篇
  1987年   11篇
  1986年   5篇
  1985年   11篇
  1984年   8篇
  1983年   4篇
  1982年   5篇
  1981年   1篇
  1980年   2篇
  1979年   4篇
  1978年   1篇
  1977年   3篇
  1976年   1篇
  1973年   2篇
排序方式: 共有1570条查询结果,搜索用时 15 毫秒
1.
一种新的WDM光网中的共享链路保护策略   总被引:2,自引:2,他引:0  
王云  曾庆济  刘继民 《光子学报》2003,32(7):798-802
研究了WDM光网中的链路保护问题.提出了一种新的共享链路保护策略--基于SRLG的共享链路保护策略(SRLG-SLP).SRLG(共享风险链路组)定义了对一条工作光通道分配保护资源时的资源可用性的约束.它规定任意两条有着同样故障风险或者说处于同一个SRLG的工作光通道不能利用同样的保护资源.另外,还提出了一种更加符合实际的单链路故障模型,其中链路故障间隔时间和链路故障保持时间被考虑作为两个独立的变量.基于该链路故障模型,通过大量的仿真试验,比较了专用链路保护(DLP)、共享链路保护(SLP)和提出的SRLG-SLP保护策略的资源利用率、保护效率以及业务中断率.结果显示,我们提出的SRLG-SLP在保护效率和业务中断率方面的保护性能远好于DLP和SLP,但会牺牲一些资源利用率.  相似文献   
2.
This paper develops a mathematical model for project time compression problems in CPM/PERT type networks. It is noted this formulation of the problem will be an adequate approximation for solving the time compression problem with any continuous and non-increasing time-cost curve. The kind of this model is Mixed Integer Linear Program (MILP) with zero-one variables, and the Benders' decomposition procedure for analyzing this model has been developed. Then this paper proposes a new approach based on the surrogating method for solving these problems. In addition, the required computer programs have been prepared by the author to execute the algorithm. An illustrative example solved by the new algorithm, and two methods are compared by several numerical examples. Computational experience with these data shows the superiority of the new approach.  相似文献   
3.
According to Fortunato and Barthélemy, modularity-based community detection algorithms have a resolution threshold such that small communities in a large network are invisible. Here we generalize their work and show that the q-state Potts community detection method introduced by Reichardt and Bornholdt also has a resolution threshold. The model contains a parameter by which this threshold can be tuned, but no a priori principle is known to select the proper value. Single global optimization criteria do not seem capable for detecting all communities if their size distribution is broad.  相似文献   
4.
神经网络在工程爆破应力波规律探讨中的应用   总被引:2,自引:0,他引:2  
采用BP(Back Propagation)前馈人工神经网络模型,对工程爆破中柱状震源的自由场应力波传播规律进行了探讨。结果表明:利用人神经网络模型的非线性映射功能,可以较好地给出工程爆破引起的近区自由场力学规律,对于同类型问题的研究,也有着很重要的意义。  相似文献   
5.
We attempt a justification of a generalisation of the consistent histories programme using a notion of probability that is valid for all complete sets of history propositions. This consists of introducing Cox's axioms of probability theory and showing that our candidate notion of probability obeys them. We also give a generalisation of Bayes' theorem and comment upon how Bayesianism should be useful for the quantum gravity/cosmology programmes. PACS: 02.50.Cw;03.65.Ta;04.60.-m.  相似文献   
6.
We present a Bayesian theory of object identification. Here, identifying an object means selecting a particular observation from a group of observations (variants), this observation (the regular variant) being characterized by a distributional model. In this sense, object identification means assigning a given model to one of several observations. Often, it is the statistical model of the regular variant, only, that is known. We study an estimator which relies essentially on this model and not on the characteristics of the “irregular” variants. In particular, we investigate under what conditions this variant selector is optimal. It turns out that there is a close relationship with exchangeability and Markovian reversibility. We finally apply our theory to the case of irregular variants generated from the regular variant by a Gaussian linear model.  相似文献   
7.
A sequential Bayesian method for finding the maximum of a function based on myopically minimizing the expected dispersion of conditional probabilities is described. It is shown by example that an algorithm that generates a dense set of observations need not converge to the correct answer for some priors on continuous functions on the unit interval. For the Brownian motion prior the myopic algorithm is consistent; for any continuous function, the conditional probabilities converge weakly to a point mass at the true maximum.  相似文献   
8.
本文通过模拟研究,讨论了最大似然方法和Bayes方法在分析结构方程模型中的相似点和不同之处。  相似文献   
9.
Reference analysis is one of the most successful general methods to derive noninformative prior distributions. In practice, however, reference priors are often difficult to obtain. Recently developed theory for conditionally reducible natural exponential families identifies an attractive reparameterization which allows one, among other things, to construct an enriched conjugate prior. In this paper, under the assumption that the variance function is simple quadratic, the order-invariant group reference prior for the above parameter is found. Furthermore, group reference priors for the mean- and natural parameter of the families are obtained. A brief discussion of the frequentist coverage properties is also presented. The theory is illustrated for the multinomial and negative-multinomial family. Posterior computations are especially straightforward due to the fact that the resulting reference distributions belong to the corresponding enriched conjugate family. A substantive application of the theory relates to the construction of reference priors for the Bayesian analysis of two-way contingency tables with respect to two alternative parameterizations.  相似文献   
10.
无失效数据的Bayes和多层Bayes分析   总被引:3,自引:0,他引:3  
本文推广了文献[6]的结果,对指数分布无失效数据的失效率,给出了Bayes估计、Bayes置信上限以及多层Bayes估计,从而可以得到无失效数据可靠度的估计,最后,结合实际问题进行了计算。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号