全文获取类型
收费全文 | 978篇 |
免费 | 42篇 |
国内免费 | 30篇 |
专业分类
化学 | 7篇 |
晶体学 | 3篇 |
力学 | 6篇 |
综合类 | 18篇 |
数学 | 822篇 |
物理学 | 194篇 |
出版年
2024年 | 1篇 |
2023年 | 33篇 |
2022年 | 52篇 |
2021年 | 51篇 |
2020年 | 46篇 |
2019年 | 26篇 |
2018年 | 19篇 |
2017年 | 24篇 |
2016年 | 31篇 |
2015年 | 18篇 |
2014年 | 35篇 |
2013年 | 39篇 |
2012年 | 14篇 |
2011年 | 32篇 |
2010年 | 22篇 |
2009年 | 64篇 |
2008年 | 75篇 |
2007年 | 54篇 |
2006年 | 61篇 |
2005年 | 26篇 |
2004年 | 29篇 |
2003年 | 36篇 |
2002年 | 53篇 |
2001年 | 41篇 |
2000年 | 33篇 |
1999年 | 53篇 |
1998年 | 29篇 |
1997年 | 24篇 |
1996年 | 15篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有1050条查询结果,搜索用时 15 毫秒
71.
科学计算在激光聚变研究中发挥着重要的作用.经过长期的努力,中国已形成了以LARED系列程序为核心的分段模拟激光聚变主要环节和关键问题的二维数值模拟能力.文章首先介绍了激光聚变的主要物理过程、主要物理过程的特征以及对科学计算的要求.其次,介绍了LARED系列程序的主要功能以及在激光聚变物理研究中的应用,介绍了正在研制和发展的模拟激光聚变全过程的新一代高性能并行应用程序的思路.最后,介绍了激光聚变科学计算中面临的一些挑战性问题. 相似文献
72.
The intersections of q-ary perfect codes are under study. We prove that there exist two q-ary perfect codes C 1 and C 2 of length N = qn + 1 such that |C 1 ? C 2| = k · |P i |/p for each k ∈ {0,..., p · K ? 2, p · K}, where q = p r , p is prime, r ≥ 1, $n = \tfrac{{q^{m - 1} - 1}}{{q - 1}}$ , m ≥ 2, |P i | = p nr(q?2)+n , and K = p n(2r?1)?r(m?1). We show also that there exist two q-ary perfect codes of length N which are intersected by p nr(q?3)+n codewords. 相似文献
73.
In this paper we generalize the notion of cyclic code and construct codes as ideals in finite quotients of non-commutative
polynomial rings, so called skew polynomial rings of automorphism type. We propose a method to construct block codes of prescribed
rank and a method to construct block codes of prescribed distance. Since there is no unique factorization in skew polynomial
rings, there are much more ideals and therefore much more codes than in the commutative case. In particular we obtain a [40,
23, 10]4 code by imposing a distance and a [42,14,21]8 code by imposing a rank, which both improve by one the minimum distance of the previously best known linear codes of equal
length and dimension over those fields. There is a strong connection with linear difference operators and with linearized
polynomials (or q-polynomials) reviewed in the first section.
相似文献
74.
Jong Yoon Hyun 《Designs, Codes and Cryptography》2009,50(2):173-185
We present generalized MacWilliams identities for binary codes. These identities naturally lead to the concepts of the local
weight distribution of a binary code with respect to a word u and its MacWilliams u-transform. In the case that u is the all-one word, these ones correspond to the weight distribution of a binary code and its MacWilliams transform, respectively.
We identify a word v with its support, and consider v as a subset of {1, 2,..., n}. For two words u,w of length n such that their intersection is the empty set, define the u-face centered at w to be the set . A connection between our MacWilliams u-transform and the weight distribution of a binary code in the u-face centered at the zero word is presented. As their applications, we also investigate the properties of a perfect binary
code. For a perfect binary code C, the main results are as follows: first, it is proved that our local weight distribution of C is uniquely determined by the number of codewords of C in the orthogonal u-face centered at the zero word. Next, we give a direct proof for the known result, concerning the weight distribution of
a coset of C in the u-face centered at the zero word, by A. Y. Vasil’eva without using induction. Finally, it is proved that the weight distribution
of C in the orthogonal u-face centered at w is uniquely determined by the codewords of C in the u-face centered at the zero word.
相似文献
75.
Zoltán Lóránt Nagy 《Journal of Graph Theory》2017,84(4):566-580
We study the existence and the number of k‐dominating independent sets in certain graph families. While the case namely the case of maximal independent sets—which is originated from Erd?s and Moser—is widely investigated, much less is known in general. In this paper we settle the question for trees and prove that the maximum number of k‐dominating independent sets in n‐vertex graphs is between and if , moreover the maximum number of 2‐dominating independent sets in n‐vertex graphs is between and . Graph constructions containing a large number of k‐dominating independent sets are coming from product graphs, complete bipartite graphs, and finite geometries. The product graph construction is associated with the number of certain Maximum Distance Separable (MDS) codes. 相似文献
76.
The theoretical concept of the computer program is based on the compartment theory for the 3-pool model using single pulse administration of the tracer. The code estimates the model parameters by means of the non-linear method of least squares fit under steady state conditions. Furthermore the parameters of the protein metabolism are calculated. The program works interactively and allows reading and modifying the experimental 15N tracer data via terminal and controlling the program. 相似文献
77.
We reinterpret the state space dimension equations for geometric Goppa codes. An easy consequence is that if deg
then the state complexity of
is equal to the Wolf bound. For deg
, we use Clifford's theorem to give a simple lower bound on the state complexity of
. We then derive two further lower bounds on the state space dimensions of
in terms of the gonality sequence of
. (The gonality sequence is known for many of the function fields of interest for defining geometric Goppa codes.) One of the gonality bounds uses previous results on the generalised weight hierarchy of
and one follows in a straightforward way from first principles; often they are equal. For Hermitian codes both gonality bounds are equal to the DLP lower bound on state space dimensions. We conclude by using these results to calculate the DLP lower bound on state complexity for Hermitian codes. 相似文献
78.
By a T
*(2, k, v)-code we mean a perfect4-deletion-correcting code of length 6 over an alphabet of size v, which is capable of correcting anycombination of up to 4 deletions and/or insertions of letters that occur in transmission of codewords. Thethird author (DCC Vol. 23, No. 1) presented a combinatorial construction for such codes and prove thata T
*(2, 6, v)-code exists for all positive integers v 3 (mod 5), with 12 possible exceptions of v. In this paper, the notion of a directedgroup divisible quasidesign is introduced and used to show that a T
*(2, 6,v)-code exists for all positive integers v 3 (mod 5), except possiblyfor v {173, 178, 203, 208}. The 12 missing cases for T
*(2,6, v)-codes with v 3 (mod 5) are also provided, thereby the existenceproblem for T
*(2, 6, v)-codes is almost complete. 相似文献
79.
The structure of linear codes of constant weight 总被引:1,自引:0,他引:1
Jay A. Wood 《Transactions of the American Mathematical Society》2002,354(3):1007-1026
In this paper we determine completely the structure of linear codes over of constant weight. Namely, we determine exactly which modules underlie linear codes of constant weight, and we describe the coordinate functionals involved. The weight functions considered are: Hamming weight, Lee weight, two forms of Euclidean weight, and pre-homogeneous weights. We prove a general uniqueness theorem for virtual linear codes of constant weight. Existence is settled on a case by case basis.
80.
Tatsuya Maruta 《Geometriae Dedicata》1999,74(3):305-311
Any {f,r- 2+s; r,q}-minihyper includes a hyperplane in PG(r, q) if fr-1 + s 1 + q – 1 for 1 s q – 1, q 3, r 4, where i = (qi + 1 – 1)/ (q – 1 ). A lower bound on f for which an {f, r – 2 + 1; r, q}-minihyper with q 3, r 4 exists is also given. As an application to coding theory, we show the nonexistence of [ n, k, n + 1 – qk – 2 ]q codes for k 5, q 3 for qk – 1 – 2q – 1 < n qk – 1 – q – 1 when k > q –
q - \sqrt q + 2$$
" align="middle" border="0">
and for
when
, which is a generalization of [18, Them. 2.4]. 相似文献