首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1233篇
  免费   166篇
  国内免费   56篇
化学   107篇
力学   67篇
综合类   39篇
数学   772篇
物理学   470篇
  2024年   3篇
  2023年   29篇
  2022年   42篇
  2021年   46篇
  2020年   62篇
  2019年   44篇
  2018年   44篇
  2017年   48篇
  2016年   53篇
  2015年   27篇
  2014年   67篇
  2013年   96篇
  2012年   43篇
  2011年   58篇
  2010年   43篇
  2009年   80篇
  2008年   90篇
  2007年   82篇
  2006年   82篇
  2005年   62篇
  2004年   66篇
  2003年   34篇
  2002年   38篇
  2001年   46篇
  2000年   26篇
  1999年   37篇
  1998年   25篇
  1997年   18篇
  1996年   11篇
  1995年   10篇
  1994年   10篇
  1993年   6篇
  1992年   2篇
  1991年   4篇
  1990年   5篇
  1989年   3篇
  1988年   5篇
  1987年   1篇
  1986年   2篇
  1985年   1篇
  1983年   1篇
  1971年   2篇
  1969年   1篇
排序方式: 共有1455条查询结果,搜索用时 15 毫秒
91.
In this paper, codes over F5 with parameters [36, 18, 12], [48, 24, 15], [60, 30, 18], [64, 32, 18] and [76, 38, 21] which improve the previously known bounds on the minimum weight for linear codes over F5 are constructed from conference matrices. Through shortening and truncating, the above codes give numerous new codes over F5 which improve the previously known bounds on minimum weights.  相似文献   
92.
Reliability is a major concern in the design of large disk arrays. In this paper, we examine the effect of encountering more failures than that for which the RAID array was initially designed. Erasure codes are incorporated to enable system recovery from a specified number of disk erasures, and strive beyond that threshold to recover the system as frequently, and as thoroughly, as is possible. Erasure codes for tolerating two disk failures are examined. For these double erasure codes, we establish a correspondence between system operation and acyclicity of its graph model. For the most compact double erasure code, the full 2-code, this underlies an efficient algorithm for the computation of system operation probability (all disks operating or recoverable).When the system has failed, some disks are nonetheless recoverable. We extend the graph model to determine the probability that d disks have failed, a of which are recoverable by solving one linear equation, b of which are further recoverable by solving systems of linear equations, and dab of which cannot be recovered. These statistics are efficiently calculated for the full 2-code by developing a three variable ordinary generating function whose coefficients give the specified values. Finally, examples are given to illustrate the probability that an individual disk can be recovered, even when the system is in a failed state.  相似文献   
93.
A computer code is described for the calculation of light-scattering properties of randomly oriented, axially symmetric coated particles, in the framework of the T-matrix theory. The underlying mathematical background is outlined briefly and convergence procedures are discussed. After outlining the input-output interaction between user and code, benchmark results are presented for two distinct shapes: coated, centered spheroids and offset coated spheres.  相似文献   
94.
本设计为一种便携式条形码阅读译码器(简称阅读器),它采用INTEL8031CPU微处理器为主芯片,辅以其它大规模集成电路芯片,构成一智能化系统,阅读及识别采用Code39码编制的条形码,并能完成条形码信息的存储、数目统计及与微机进行串行通信功能。  相似文献   
95.
Kerdock codes (Kerdock, Inform Control 20:182–187, 1972) are a well-known family of non-linear binary codes with good parameters admitting a linear presentation in terms of codes over the ring (see Nechaev, Diskret Mat 1:123–139, 1989; Hammons et al., IEEE Trans Inform Theory 40:301–319, 1994). These codes have been generalized in different directions: in Calderbank et al. (Proc Lond Math Soc 75:436–480, 1997) a symplectic construction of non-linear binary codes with the same parameters of the Kerdock codes has been given. Such codes are not necessarily equivalent. On the other hand, in Kuzmin and Nechaev (Russ Math Surv 49(5), 1994) the authors give a family of non-linear codes over the finite field F of q = 2 l elements, all of them admitting a linear presentation over the Galois Ring R of cardinality q 2 and characteristic 22. The aim of this article is to merge both approaches, obtaining in this way new families of non-linear codes over F that can be presented as linear codes over the Galois Ring R. The construction uses symplectic spreads.   相似文献   
96.
《Discrete Mathematics》2023,346(1):113168
We present a simple algorithm that generates a cyclic 2-Gray code for ballot sequences. The algorithm generates each ballot sequence in constant amortized time using a linear amount of space. This is the first known cyclic 2-Gray code for ballot sequences that achieves this time bound. In addition, the algorithm can be easily modified to output ballot sequences in binary reflected Gray code order in constant amortized time per string using a linear amount of space.  相似文献   
97.
讨论了无线扩频定位系统的关键技术之一——扩频码的设计与实现。首先从实验的角度基于Logistic映射,分析了其所生成的混沌序列的部分相关特性及平衡性,给出了计算机仿真结果;最后从工程角度给出了易于实现的平衡Gold码的设计方法。  相似文献   
98.
We have changed the amino acid set of the genetic code of Escherichia coli by evolving cultures capable of growing on the synthetic noncanonical amino acid L ‐β‐(thieno[3,2‐b]pyrrolyl)alanine ([3,2]Tpa) as a sole surrogate for the canonical amino acid L ‐tryptophan (Trp). A long‐term cultivation experiment in defined synthetic media resulted in the evolution of cells capable of surviving Trp→[3,2]Tpa substitutions in their proteomes in response to the 20 899 TGG codons of the E. coli W3110 genome. These evolved bacteria with new‐to‐nature amino acid composition showed robust growth in the complete absence of Trp. Our experimental results illustrate an approach for the evolution of synthetic cells with alternative biochemical building blocks.  相似文献   
99.
How the biochemical machinery evolved from simple precursors is an open question. Here we show that ribonucleotides and amino acids condense to peptidyl RNAs in the absence of enzymes under conditions established for genetic copying. Untemplated formation of RNA strands that can encode genetic information, formation of peptidyl chains linked to RNA, and formation of the cofactors NAD+, FAD, and ATP all occur under the same conditions. In the peptidyl RNAs, the peptide chains are phosphoramidate‐linked to a ribonucleotide. Peptidyl RNAs with long peptide chains were selected from an initial pool when a lipophilic phase simulating the interior of membranes was offered, and free peptides were released upon acidification. Our results show that key molecules of genetics, catalysis, and metabolism can emerge under the same conditions, without a mineral surface, without an enzyme, and without the need for chemical pre‐activation.  相似文献   
100.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号