全文获取类型
收费全文 | 978篇 |
免费 | 46篇 |
国内免费 | 28篇 |
专业分类
化学 | 7篇 |
晶体学 | 3篇 |
力学 | 6篇 |
综合类 | 20篇 |
数学 | 828篇 |
物理学 | 188篇 |
出版年
2024年 | 1篇 |
2023年 | 33篇 |
2022年 | 40篇 |
2021年 | 53篇 |
2020年 | 47篇 |
2019年 | 26篇 |
2018年 | 19篇 |
2017年 | 24篇 |
2016年 | 32篇 |
2015年 | 18篇 |
2014年 | 36篇 |
2013年 | 41篇 |
2012年 | 14篇 |
2011年 | 33篇 |
2010年 | 22篇 |
2009年 | 66篇 |
2008年 | 76篇 |
2007年 | 56篇 |
2006年 | 62篇 |
2005年 | 26篇 |
2004年 | 29篇 |
2003年 | 36篇 |
2002年 | 53篇 |
2001年 | 41篇 |
2000年 | 33篇 |
1999年 | 53篇 |
1998年 | 29篇 |
1997年 | 24篇 |
1996年 | 15篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有1052条查询结果,搜索用时 250 毫秒
991.
We study a class of codes with good parameters and their duals explicitly. We give direct constructions of the dual codes and obtain self-orthogonal codes with good parameters. 相似文献
992.
Chinese remainder codes are constructed by applying weak block designs and the Chinese remainder theorem of ring theory. The
new type of linear codes take the congruence class in the congruence class ring R/I
1 ∩ I
2 ∩ ··· ∩ I
n for the information bit, embed R/J
i into R/I
1 ∩ I
2 ∩ ··· ∩ I
n, and assign the cosets of R/J
i as the subring of R/I
1 ∩ I
2 ∩ ··· ∩ I
n and the cosets of R/J
i in R/I
1 ∩ I
2 ∩ ··· ∩ I
n as check lines. Many code classes exist in the Chinese remainder codes that have high code rates. Chinese remainder codes
are the essential generalization of Sun Zi codes.
Selected from Journal of Mathematical Research and Exposition, 2004, 24(2): 347–352 相似文献
993.
二元非线性2—重量码的检错性能 总被引:4,自引:0,他引:4
设C为二元非线性2-重量码(n,2,w1,w2),本文讨论了C的不可检错误概率,首先给出了C成为最佳检错码的一个必要条件,接着我们证明了当n〉2w2时,C一定是不是最佳检错码,然后,对于w1+w2=n的情形,我们找出了其中所有的最佳检错误。 相似文献
994.
研究了选择式频率分集M进制频移键控慢跳频(SFH/MFSK)系统在多径瑞利衰落信道中的性能,分析了部分边带干扰,多径干扰,信道热噪声和调制阶数M对无编码和有编码系统性能的影响.研究结果表明,多径干扰强度和信道热噪声对系统性能影响较大,分集仅能在一定程度上削弱它们对系统性能的影响,只有在分集与编码相结合,并采用适当的调制阶数M时,才能显著地改善系统的性能. 相似文献
995.
A couple of new lower bounds of the minimum distance of Goppa codes is derived, using an extended field code for a Goppa code which contains the Goppa code as its subfield-subcode. Also presented are procedures for both error-only and error-and-erasure decoding for Goppa codes up to the new lower bounds, based on the Berlekamp-Massey algorithm and the Feng-Tzeng multisequence shift-register synthesis algorithms which have been used for decoding cyclic codes up to the BCH and HT(Hartmann-Tzeng) bounds. 相似文献
996.
Fast decoding algorithms for short codes based on modifications of maximum likelihood decoding algorithms of first order Reed-Muller codes are described. Only additions-subtractions, comparisons and absolute value calculations are used in the algorithms. Soft and hard decisions maximum likelihood decoding algorithms for first order Reed-Muller and the Nordstrom-Robinson codes with low complexity are proposed. 相似文献
997.
A new bound for the dimension of binary Goppa codes belonging to a specific subclass is given. This bound improves the well-known lower bound for Goppa codes. 相似文献
998.
We estimate the interval where the distance distribution of a code of length n and of given dual distance is upperbounded
by the binomial distribution. The binomial upper bound is shown to be sharp in this range in the sense that for every subinterval
of size about √n ln n there exists a spectrum component asymptotically achieving the binomial bound. For self-dual codes we
give a better estimate for the interval of binomiality. 相似文献
999.
Fountain codes provide an efficient way to transfer information over erasure channels like the Internet. LT codes are the first codes fully realizing the digital fountain concept. They are asymptotically optimal rateless erasure codes with highly efficient encoding and decoding algorithms. In theory, for each encoding symbol of LT codes, its degree is randomly chosen according to a predetermined degree distribution, and its neighbours used to generate that encoding symbol are chosen uniformly at random. Practical implementation of LT codes usually realizes the randomness through pseudo-randomness number generator like linear congruential method. This paper applies the pseudo-randomness of chaotic sequence in the implementation of LT codes. Two Kent chaotic maps are used to determine the degree and neighbour(s) of each encoding symbol. It is shown that the implemented LT codes based on chaos perform better than the LT codes implemented by the traditional pseudo-randomness number generator. 相似文献
1000.
Two-weight codes and projectivesets having two intersection sizes with hyperplanes are equivalentobjects and they define strongly regular graphs. We construct projective sets in PG(2m – 1,q) that have the sameintersection numbers with hyperplanes as the hyperbolic quadricQ+(2m – 1,q). We investigate these sets; we provethat if q = 2 the corresponding strongly regular graphsare switching equivalent and that they contain subconstituentsthat are point graphs of partial geometries. If m = 4the partial geometries have parameters s = 7, t = 8, = 4 and some of them are embeddable in Steinersystems S(2,8,120). 相似文献