全文获取类型
收费全文 | 1230篇 |
免费 | 166篇 |
国内免费 | 56篇 |
专业分类
化学 | 107篇 |
力学 | 66篇 |
综合类 | 39篇 |
数学 | 772篇 |
物理学 | 468篇 |
出版年
2024年 | 2篇 |
2023年 | 29篇 |
2022年 | 40篇 |
2021年 | 46篇 |
2020年 | 62篇 |
2019年 | 44篇 |
2018年 | 44篇 |
2017年 | 48篇 |
2016年 | 53篇 |
2015年 | 27篇 |
2014年 | 67篇 |
2013年 | 96篇 |
2012年 | 43篇 |
2011年 | 58篇 |
2010年 | 43篇 |
2009年 | 80篇 |
2008年 | 90篇 |
2007年 | 82篇 |
2006年 | 82篇 |
2005年 | 62篇 |
2004年 | 66篇 |
2003年 | 34篇 |
2002年 | 38篇 |
2001年 | 46篇 |
2000年 | 26篇 |
1999年 | 37篇 |
1998年 | 25篇 |
1997年 | 18篇 |
1996年 | 11篇 |
1995年 | 10篇 |
1994年 | 10篇 |
1993年 | 6篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1990年 | 5篇 |
1989年 | 3篇 |
1988年 | 5篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 1篇 |
1983年 | 1篇 |
1971年 | 2篇 |
1969年 | 1篇 |
排序方式: 共有1452条查询结果,搜索用时 328 毫秒
91.
本文从符号学的角度来分析城市家具的设计,是对设计如何满足现代社会发展需求的探索,从功能到符号,从符号到设计,设计不再是绘画的附属,而是建立符号系统的过程. 相似文献
92.
整表代数是群代数的推广,它的理想是群代数码的推广.本文给出了整表代数的单边理想是自正交理想的必要充分条件. 相似文献
93.
Hans Georg Schaathun 《Designs, Codes and Cryptography》2004,31(1):27-42
A greedy 1-subcode is a one-dimensional subcode of minimum (support) weight. A greedy r-subcode is an r-dimensional subcode with minimum support weight under the constraint that it contain a greedy (r - 1)-subcode. The r-th greedy weight e
r is the support weight of a greedy r-subcode. The greedy weights are related to the weight hierarchy. We use recent results on the weight hierarchy of product codes to develop a lower bound on the greedy weights of product codes. 相似文献
94.
In this paper, codes over F5 with parameters [36, 18, 12], [48, 24, 15], [60, 30, 18], [64, 32, 18] and [76, 38, 21] which improve the previously known bounds on the minimum weight for linear codes over F5 are constructed from conference matrices. Through shortening and truncating, the above codes give numerous new codes over F5 which improve the previously known bounds on minimum weights. 相似文献
95.
Reliability is a major concern in the design of large disk arrays. In this paper, we examine the effect of encountering more failures than that for which the RAID array was initially designed. Erasure codes are incorporated to enable system recovery from a specified number of disk erasures, and strive beyond that threshold to recover the system as frequently, and as thoroughly, as is possible. Erasure codes for tolerating two disk failures are examined. For these double erasure codes, we establish a correspondence between system operation and acyclicity of its graph model. For the most compact double erasure code, the full 2-code, this underlies an efficient algorithm for the computation of system operation probability (all disks operating or recoverable).When the system has failed, some disks are nonetheless recoverable. We extend the graph model to determine the probability that d disks have failed, a of which are recoverable by solving one linear equation, b of which are further recoverable by solving systems of linear equations, and d−a−b of which cannot be recovered. These statistics are efficiently calculated for the full 2-code by developing a three variable ordinary generating function whose coefficients give the specified values. Finally, examples are given to illustrate the probability that an individual disk can be recovered, even when the system is in a failed state. 相似文献
96.
Arturo Quirantes 《Journal of Quantitative Spectroscopy & Radiative Transfer》2005,92(3):373-381
A computer code is described for the calculation of light-scattering properties of randomly oriented, axially symmetric coated particles, in the framework of the T-matrix theory. The underlying mathematical background is outlined briefly and convergence procedures are discussed. After outlining the input-output interaction between user and code, benchmark results are presented for two distinct shapes: coated, centered spheroids and offset coated spheres. 相似文献
97.
本设计为一种便携式条形码阅读译码器(简称阅读器),它采用INTEL8031CPU微处理器为主芯片,辅以其它大规模集成电路芯片,构成一智能化系统,阅读及识别采用Code39码编制的条形码,并能完成条形码信息的存储、数目统计及与微机进行串行通信功能。 相似文献
98.
Kerdock codes (Kerdock, Inform Control 20:182–187, 1972) are a well-known family of non-linear binary codes with good parameters
admitting a linear presentation in terms of codes over the ring (see Nechaev, Diskret Mat 1:123–139, 1989; Hammons et al., IEEE Trans Inform Theory 40:301–319, 1994). These codes have been
generalized in different directions: in Calderbank et al. (Proc Lond Math Soc 75:436–480, 1997) a symplectic construction
of non-linear binary codes with the same parameters of the Kerdock codes has been given. Such codes are not necessarily equivalent.
On the other hand, in Kuzmin and Nechaev (Russ Math Surv 49(5), 1994) the authors give a family of non-linear codes over the
finite field F of q = 2
l
elements, all of them admitting a linear presentation over the Galois Ring R of cardinality q
2 and characteristic 22. The aim of this article is to merge both approaches, obtaining in this way new families of non-linear codes over F that can be presented as linear codes over the Galois Ring R. The construction uses symplectic spreads.
相似文献
99.
《Discrete Mathematics》2023,346(1):113168
We present a simple algorithm that generates a cyclic 2-Gray code for ballot sequences. The algorithm generates each ballot sequence in constant amortized time using a linear amount of space. This is the first known cyclic 2-Gray code for ballot sequences that achieves this time bound. In addition, the algorithm can be easily modified to output ballot sequences in binary reflected Gray code order in constant amortized time per string using a linear amount of space. 相似文献
100.
讨论了无线扩频定位系统的关键技术之一——扩频码的设计与实现。首先从实验的角度基于Logistic映射,分析了其所生成的混沌序列的部分相关特性及平衡性,给出了计算机仿真结果;最后从工程角度给出了易于实现的平衡Gold码的设计方法。 相似文献