首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   117335篇
  免费   8374篇
  国内免费   7070篇
化学   54152篇
晶体学   1427篇
力学   9133篇
综合类   486篇
数学   36435篇
物理学   31146篇
  2024年   41篇
  2023年   753篇
  2022年   1067篇
  2021年   1405篇
  2020年   1706篇
  2019年   1749篇
  2018年   11642篇
  2017年   11529篇
  2016年   7904篇
  2015年   3078篇
  2014年   2971篇
  2013年   3659篇
  2012年   7698篇
  2011年   14470篇
  2010年   8626篇
  2009年   8959篇
  2008年   9802篇
  2007年   11429篇
  2006年   2794篇
  2005年   3369篇
  2004年   3106篇
  2003年   3309篇
  2002年   2442篇
  2001年   1354篇
  2000年   1128篇
  1999年   864篇
  1998年   688篇
  1997年   587篇
  1996年   606篇
  1995年   464篇
  1994年   409篇
  1993年   346篇
  1992年   263篇
  1991年   235篇
  1990年   224篇
  1989年   166篇
  1988年   149篇
  1987年   128篇
  1986年   132篇
  1985年   106篇
  1984年   73篇
  1983年   70篇
  1982年   56篇
  1981年   55篇
  1980年   55篇
  1979年   62篇
  1978年   41篇
  1914年   46篇
  1912年   41篇
  1909年   42篇
排序方式: 共有10000条查询结果,搜索用时 19 毫秒
991.
We give a concrete sufficient condition for a simply-connected domain to be the image of the unit disk under a nonexpansive conformal map. This class of domains is also characterized by having sufficiently dense harmonic measure. The relation with the harmonic measure provides a natural higher-dimensional analogue of this problem, which is also addressed.  相似文献   
992.
We study the Dirichlet problem for non-homogeneous equations involving the fractional p-Laplacian. We apply Perron’s method and prove Wiener’s resolutivity theorem.  相似文献   
993.
We study Sobolev inequalities on doubling metric measure spaces. We investigate the relation between Sobolev embeddings and lower bound for measure. In particular, we prove that if the Sobolev inequality holds, then the measure μ satisfies the lower bound, i.e. there exists b such that μ(B(x,r))≥b r α for r∈(0,1] and any point x from metric space.  相似文献   
994.
Linear codes with a few weights have been widely investigated in recent years. In this paper, we mainly use Gauss sums to represent the Hamming weights of a class of q-ary linear codes under some certain conditions, where q is a power of a prime. The lower bound of its minimum Hamming distance is obtained. In some special cases, we evaluate the weight distributions of the linear codes by semi-primitive Gauss sums and obtain some one-weight, two-weight linear codes. It is quite interesting that we find new optimal codes achieving some bounds on linear codes. The linear codes in this paper can be used in secret sharing schemes, authentication codes and data storage systems.  相似文献   
995.
In this work, we completely characterize (1) permutation binomials of the form \(x^{{{2^n -1}\over {2^t-1}}+1}+ ax \in \mathbb {F}_{2^n}[x], n = 2^st, a \in \mathbb {F}_{2^{2t}}^{*}\), and (2) permutation trinomials of the form \(x^{2^s+1}+x^{2^{s-1}+1}+\alpha x \in \mathbb {F}_{2^t}[x]\), where st are positive integers. The first result, which was our primary motivation, is a consequence of the second result. The second result may be of independent interest.  相似文献   
996.
In recent work, we constructed a new near octagon \(\mathcal {G}\) from certain involutions of the finite simple group \(G_2(4)\) and showed a correspondence between the Suzuki tower of finite simple groups, \(L_3(2)< U_3(3)< J_2< G_2(4) < Suz\), and the tower of near polygons, \(\mathrm {H}(2,1) \subset \mathrm {H}(2)^D \subset \mathsf {HJ} \subset \mathcal {G}\). Here we characterize each of these near polygons (except for the first one) as the unique near polygon of the given order and diameter containing an isometrically embedded copy of the previous near polygon of the tower. In particular, our characterization of the Hall–Janko near octagon \(\mathsf {HJ}\) is similar to an earlier characterization due to Cohen and Tits who proved that it is the unique regular near octagon with parameters (2, 4; 0, 3), but instead of regularity we assume existence of an isometrically embedded dual split Cayley hexagon, \(\mathrm {H}(2)^D\). We also give a complete classification of near hexagons of order (2, 2) and use it to prove the uniqueness result for \(\mathrm {H}(2)^D\).  相似文献   
997.
Permutation polynomials over finite fields constitute an active research area and have applications in many areas of science and engineering. In this paper, four classes of monomial complete permutation polynomials and one class of trinomial complete permutation polynomials are presented, one of which confirms a conjecture proposed by Wu et al. (Sci China Math 58:2081–2094, 2015). Furthermore, we give two classes of permutation trinomial, and make some progress on a conjecture about the differential uniformity of power permutation polynomials proposed by Blondeau et al. (Int J Inf Coding Theory 1:149–170, 2010).  相似文献   
998.
In this paper, we consider the multi-bit Differential Power Analysis (DPA) in the Hamming weight model. In this regard, we revisit the definition of Transparency Order (\(\mathsf {TO}\)) from the work of Prouff (FSE 2005) and find that the definition has certain limitations. Although this work has been quite well referred in the literature, surprisingly, these limitations remained unexplored for almost a decade. We analyse the definition from scratch, modify it and finally provide a definition with better insight that can theoretically capture DPA in Hamming weight model for hardware implementation with precharge logic. At the end, we confront the notion of (revised) transparency order with attack simulations in order to study to what extent the low transparency order of an s-box impacts the efficiency of a side channel attack against its processing. To the best of our knowledge, this is the first time that such a critical analysis is conducted (even considering the original notion of Prouff). It practically confirms that the transparency order is indeed related to the resistance of the s-box against side-channel attacks, but it also shows that it is not sufficient alone to directly achieve a satisfying level of security. Regarding this point, our conclusion is that the (revised) transparency order is a valuable criterion to consider when designing a cryptographic algorithm, and even if it does not preclude to also use classical countermeasures like masking or shuffling, it enables to improve their effectiveness.  相似文献   
999.
For a few decades the smallest known non-Schurian coherent configuration was the association scheme on 15 points, coming from a doubly regular tournament. Last year the second author, using a computer, enumerated all coherent configurations of order up to 15. A consequence of the enumeration is that all coherent configurations up to 13 points are Schurian and a unique non-Schurian rank 11 coherent configuration of order 14 exists. This coherent configuration has two fibers of sizes 6 and 8, and an automorphism group of order 24 isomorphic to SL(2, 3). We provide a computer free interpretation of this new object, relying on some simple interplay between group theoretical and combinatorial arguments.  相似文献   
1000.
We develop the technique of reduced word manipulation to give a range of results concerning reduced words and permutations more generally. We prove a broad connection between pattern containment and reduced words, which specializes to our previous work for vexillary permutations. We also analyze general tilings of Elnitsky’s polygon and demonstrate that these are closely related to the patterns in a permutation. Building on previous work for commutation classes, we show that reduced word enumeration is monotonically increasing with respect to pattern containment. Finally, we give several applications of this work. We show that a permutation and a pattern have equally many reduced words if and only if they have the same length (equivalently, the same number of 21-patterns) and that they have equally many commutation classes if and only if they have the same number of 321-patterns. We also apply our techniques to enumeration problems of pattern avoidance and give a bijection between 132-avoiding permutations of a given length and partitions of that same size, as well as refinements of these data and a connection to the Catalan numbers.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号