首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1230篇
  免费   166篇
  国内免费   56篇
化学   107篇
力学   66篇
综合类   39篇
数学   772篇
物理学   468篇
  2024年   2篇
  2023年   29篇
  2022年   40篇
  2021年   46篇
  2020年   62篇
  2019年   44篇
  2018年   44篇
  2017年   48篇
  2016年   53篇
  2015年   27篇
  2014年   67篇
  2013年   96篇
  2012年   43篇
  2011年   58篇
  2010年   43篇
  2009年   80篇
  2008年   90篇
  2007年   82篇
  2006年   82篇
  2005年   62篇
  2004年   66篇
  2003年   34篇
  2002年   38篇
  2001年   46篇
  2000年   26篇
  1999年   37篇
  1998年   25篇
  1997年   18篇
  1996年   11篇
  1995年   10篇
  1994年   10篇
  1993年   6篇
  1992年   2篇
  1991年   4篇
  1990年   5篇
  1989年   3篇
  1988年   5篇
  1987年   1篇
  1986年   2篇
  1985年   1篇
  1983年   1篇
  1971年   2篇
  1969年   1篇
排序方式: 共有1452条查询结果,搜索用时 328 毫秒
91.
本文从符号学的角度来分析城市家具的设计,是对设计如何满足现代社会发展需求的探索,从功能到符号,从符号到设计,设计不再是绘画的附属,而是建立符号系统的过程.  相似文献   
92.
樊恽  刘宏伟 《数学进展》2004,33(4):467-470
整表代数是群代数的推广,它的理想是群代数码的推广.本文给出了整表代数的单边理想是自正交理想的必要充分条件.  相似文献   
93.
A greedy 1-subcode is a one-dimensional subcode of minimum (support) weight. A greedy r-subcode is an r-dimensional subcode with minimum support weight under the constraint that it contain a greedy (r - 1)-subcode. The r-th greedy weight e r is the support weight of a greedy r-subcode. The greedy weights are related to the weight hierarchy. We use recent results on the weight hierarchy of product codes to develop a lower bound on the greedy weights of product codes.  相似文献   
94.
In this paper, codes over F5 with parameters [36, 18, 12], [48, 24, 15], [60, 30, 18], [64, 32, 18] and [76, 38, 21] which improve the previously known bounds on the minimum weight for linear codes over F5 are constructed from conference matrices. Through shortening and truncating, the above codes give numerous new codes over F5 which improve the previously known bounds on minimum weights.  相似文献   
95.
Reliability is a major concern in the design of large disk arrays. In this paper, we examine the effect of encountering more failures than that for which the RAID array was initially designed. Erasure codes are incorporated to enable system recovery from a specified number of disk erasures, and strive beyond that threshold to recover the system as frequently, and as thoroughly, as is possible. Erasure codes for tolerating two disk failures are examined. For these double erasure codes, we establish a correspondence between system operation and acyclicity of its graph model. For the most compact double erasure code, the full 2-code, this underlies an efficient algorithm for the computation of system operation probability (all disks operating or recoverable).When the system has failed, some disks are nonetheless recoverable. We extend the graph model to determine the probability that d disks have failed, a of which are recoverable by solving one linear equation, b of which are further recoverable by solving systems of linear equations, and dab of which cannot be recovered. These statistics are efficiently calculated for the full 2-code by developing a three variable ordinary generating function whose coefficients give the specified values. Finally, examples are given to illustrate the probability that an individual disk can be recovered, even when the system is in a failed state.  相似文献   
96.
A computer code is described for the calculation of light-scattering properties of randomly oriented, axially symmetric coated particles, in the framework of the T-matrix theory. The underlying mathematical background is outlined briefly and convergence procedures are discussed. After outlining the input-output interaction between user and code, benchmark results are presented for two distinct shapes: coated, centered spheroids and offset coated spheres.  相似文献   
97.
本设计为一种便携式条形码阅读译码器(简称阅读器),它采用INTEL8031CPU微处理器为主芯片,辅以其它大规模集成电路芯片,构成一智能化系统,阅读及识别采用Code39码编制的条形码,并能完成条形码信息的存储、数目统计及与微机进行串行通信功能。  相似文献   
98.
Kerdock codes (Kerdock, Inform Control 20:182–187, 1972) are a well-known family of non-linear binary codes with good parameters admitting a linear presentation in terms of codes over the ring (see Nechaev, Diskret Mat 1:123–139, 1989; Hammons et al., IEEE Trans Inform Theory 40:301–319, 1994). These codes have been generalized in different directions: in Calderbank et al. (Proc Lond Math Soc 75:436–480, 1997) a symplectic construction of non-linear binary codes with the same parameters of the Kerdock codes has been given. Such codes are not necessarily equivalent. On the other hand, in Kuzmin and Nechaev (Russ Math Surv 49(5), 1994) the authors give a family of non-linear codes over the finite field F of q = 2 l elements, all of them admitting a linear presentation over the Galois Ring R of cardinality q 2 and characteristic 22. The aim of this article is to merge both approaches, obtaining in this way new families of non-linear codes over F that can be presented as linear codes over the Galois Ring R. The construction uses symplectic spreads.   相似文献   
99.
《Discrete Mathematics》2023,346(1):113168
We present a simple algorithm that generates a cyclic 2-Gray code for ballot sequences. The algorithm generates each ballot sequence in constant amortized time using a linear amount of space. This is the first known cyclic 2-Gray code for ballot sequences that achieves this time bound. In addition, the algorithm can be easily modified to output ballot sequences in binary reflected Gray code order in constant amortized time per string using a linear amount of space.  相似文献   
100.
讨论了无线扩频定位系统的关键技术之一——扩频码的设计与实现。首先从实验的角度基于Logistic映射,分析了其所生成的混沌序列的部分相关特性及平衡性,给出了计算机仿真结果;最后从工程角度给出了易于实现的平衡Gold码的设计方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号