全文获取类型
收费全文 | 117335篇 |
免费 | 8374篇 |
国内免费 | 7070篇 |
专业分类
化学 | 54152篇 |
晶体学 | 1427篇 |
力学 | 9133篇 |
综合类 | 486篇 |
数学 | 36435篇 |
物理学 | 31146篇 |
出版年
2024年 | 41篇 |
2023年 | 753篇 |
2022年 | 1067篇 |
2021年 | 1405篇 |
2020年 | 1706篇 |
2019年 | 1749篇 |
2018年 | 11642篇 |
2017年 | 11529篇 |
2016年 | 7904篇 |
2015年 | 3078篇 |
2014年 | 2971篇 |
2013年 | 3659篇 |
2012年 | 7698篇 |
2011年 | 14470篇 |
2010年 | 8626篇 |
2009年 | 8959篇 |
2008年 | 9802篇 |
2007年 | 11429篇 |
2006年 | 2794篇 |
2005年 | 3369篇 |
2004年 | 3106篇 |
2003年 | 3309篇 |
2002年 | 2442篇 |
2001年 | 1354篇 |
2000年 | 1128篇 |
1999年 | 864篇 |
1998年 | 688篇 |
1997年 | 587篇 |
1996年 | 606篇 |
1995年 | 464篇 |
1994年 | 409篇 |
1993年 | 346篇 |
1992年 | 263篇 |
1991年 | 235篇 |
1990年 | 224篇 |
1989年 | 166篇 |
1988年 | 149篇 |
1987年 | 128篇 |
1986年 | 132篇 |
1985年 | 106篇 |
1984年 | 73篇 |
1983年 | 70篇 |
1982年 | 56篇 |
1981年 | 55篇 |
1980年 | 55篇 |
1979年 | 62篇 |
1978年 | 41篇 |
1914年 | 46篇 |
1912年 | 41篇 |
1909年 | 42篇 |
排序方式: 共有10000条查询结果,搜索用时 19 毫秒
991.
Leonid V. Kovalev 《Potential Analysis》2017,46(2):385-391
We give a concrete sufficient condition for a simply-connected domain to be the image of the unit disk under a nonexpansive conformal map. This class of domains is also characterized by having sufficiently dense harmonic measure. The relation with the harmonic measure provides a natural higher-dimensional analogue of this problem, which is also addressed. 相似文献
992.
We study the Dirichlet problem for non-homogeneous equations involving the fractional p-Laplacian. We apply Perron’s method and prove Wiener’s resolutivity theorem. 相似文献
993.
Przemysław Górka 《Potential Analysis》2017,47(1):13-19
We study Sobolev inequalities on doubling metric measure spaces. We investigate the relation between Sobolev embeddings and lower bound for measure. In particular, we prove that if the Sobolev inequality holds, then the measure μ satisfies the lower bound, i.e. there exists b such that μ(B(x,r))≥b r α for r∈(0,1] and any point x from metric space. 相似文献
994.
Linear codes with a few weights have been widely investigated in recent years. In this paper, we mainly use Gauss sums to represent the Hamming weights of a class of q-ary linear codes under some certain conditions, where q is a power of a prime. The lower bound of its minimum Hamming distance is obtained. In some special cases, we evaluate the weight distributions of the linear codes by semi-primitive Gauss sums and obtain some one-weight, two-weight linear codes. It is quite interesting that we find new optimal codes achieving some bounds on linear codes. The linear codes in this paper can be used in secret sharing schemes, authentication codes and data storage systems. 相似文献
995.
In this work, we completely characterize (1) permutation binomials of the form \(x^{{{2^n -1}\over {2^t-1}}+1}+ ax \in \mathbb {F}_{2^n}[x], n = 2^st, a \in \mathbb {F}_{2^{2t}}^{*}\), and (2) permutation trinomials of the form \(x^{2^s+1}+x^{2^{s-1}+1}+\alpha x \in \mathbb {F}_{2^t}[x]\), where s, t are positive integers. The first result, which was our primary motivation, is a consequence of the second result. The second result may be of independent interest. 相似文献
996.
In recent work, we constructed a new near octagon \(\mathcal {G}\) from certain involutions of the finite simple group \(G_2(4)\) and showed a correspondence between the Suzuki tower of finite simple groups, \(L_3(2)< U_3(3)< J_2< G_2(4) < Suz\), and the tower of near polygons, \(\mathrm {H}(2,1) \subset \mathrm {H}(2)^D \subset \mathsf {HJ} \subset \mathcal {G}\). Here we characterize each of these near polygons (except for the first one) as the unique near polygon of the given order and diameter containing an isometrically embedded copy of the previous near polygon of the tower. In particular, our characterization of the Hall–Janko near octagon \(\mathsf {HJ}\) is similar to an earlier characterization due to Cohen and Tits who proved that it is the unique regular near octagon with parameters (2, 4; 0, 3), but instead of regularity we assume existence of an isometrically embedded dual split Cayley hexagon, \(\mathrm {H}(2)^D\). We also give a complete classification of near hexagons of order (2, 2) and use it to prove the uniqueness result for \(\mathrm {H}(2)^D\). 相似文献
997.
Permutation polynomials over finite fields constitute an active research area and have applications in many areas of science and engineering. In this paper, four classes of monomial complete permutation polynomials and one class of trinomial complete permutation polynomials are presented, one of which confirms a conjecture proposed by Wu et al. (Sci China Math 58:2081–2094, 2015). Furthermore, we give two classes of permutation trinomial, and make some progress on a conjecture about the differential uniformity of power permutation polynomials proposed by Blondeau et al. (Int J Inf Coding Theory 1:149–170, 2010). 相似文献
998.
Kaushik Chakraborty Sumanta Sarkar Subhamoy Maitra Bodhisatwa Mazumdar Debdeep Mukhopadhyay Emmanuel Prouff 《Designs, Codes and Cryptography》2017,82(1-2):95-115
In this paper, we consider the multi-bit Differential Power Analysis (DPA) in the Hamming weight model. In this regard, we revisit the definition of Transparency Order (\(\mathsf {TO}\)) from the work of Prouff (FSE 2005) and find that the definition has certain limitations. Although this work has been quite well referred in the literature, surprisingly, these limitations remained unexplored for almost a decade. We analyse the definition from scratch, modify it and finally provide a definition with better insight that can theoretically capture DPA in Hamming weight model for hardware implementation with precharge logic. At the end, we confront the notion of (revised) transparency order with attack simulations in order to study to what extent the low transparency order of an s-box impacts the efficiency of a side channel attack against its processing. To the best of our knowledge, this is the first time that such a critical analysis is conducted (even considering the original notion of Prouff). It practically confirms that the transparency order is indeed related to the resistance of the s-box against side-channel attacks, but it also shows that it is not sufficient alone to directly achieve a satisfying level of security. Regarding this point, our conclusion is that the (revised) transparency order is a valuable criterion to consider when designing a cryptographic algorithm, and even if it does not preclude to also use classical countermeasures like masking or shuffling, it enables to improve their effectiveness. 相似文献
999.
For a few decades the smallest known non-Schurian coherent configuration was the association scheme on 15 points, coming from a doubly regular tournament. Last year the second author, using a computer, enumerated all coherent configurations of order up to 15. A consequence of the enumeration is that all coherent configurations up to 13 points are Schurian and a unique non-Schurian rank 11 coherent configuration of order 14 exists. This coherent configuration has two fibers of sizes 6 and 8, and an automorphism group of order 24 isomorphic to SL(2, 3). We provide a computer free interpretation of this new object, relying on some simple interplay between group theoretical and combinatorial arguments. 相似文献
1000.
Bridget Eileen Tenner 《Journal of Algebraic Combinatorics》2017,46(1):189-217
We develop the technique of reduced word manipulation to give a range of results concerning reduced words and permutations more generally. We prove a broad connection between pattern containment and reduced words, which specializes to our previous work for vexillary permutations. We also analyze general tilings of Elnitsky’s polygon and demonstrate that these are closely related to the patterns in a permutation. Building on previous work for commutation classes, we show that reduced word enumeration is monotonically increasing with respect to pattern containment. Finally, we give several applications of this work. We show that a permutation and a pattern have equally many reduced words if and only if they have the same length (equivalently, the same number of 21-patterns) and that they have equally many commutation classes if and only if they have the same number of 321-patterns. We also apply our techniques to enumeration problems of pattern avoidance and give a bijection between 132-avoiding permutations of a given length and partitions of that same size, as well as refinements of these data and a connection to the Catalan numbers. 相似文献