首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   993篇
  免费   43篇
  国内免费   22篇
化学   7篇
晶体学   6篇
力学   6篇
综合类   20篇
数学   824篇
物理学   195篇
  2024年   1篇
  2023年   33篇
  2022年   54篇
  2021年   51篇
  2020年   46篇
  2019年   27篇
  2018年   19篇
  2017年   25篇
  2016年   31篇
  2015年   19篇
  2014年   35篇
  2013年   39篇
  2012年   14篇
  2011年   32篇
  2010年   22篇
  2009年   64篇
  2008年   76篇
  2007年   54篇
  2006年   61篇
  2005年   27篇
  2004年   30篇
  2003年   36篇
  2002年   53篇
  2001年   41篇
  2000年   33篇
  1999年   53篇
  1998年   29篇
  1997年   24篇
  1996年   15篇
  1995年   3篇
  1994年   1篇
  1993年   1篇
  1992年   3篇
  1991年   1篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1979年   1篇
  1977年   1篇
排序方式: 共有1058条查询结果,搜索用时 0 毫秒
21.
Let V = {1, 2, . . . , M} and let be a set of Hadamard matrices with the property that the magnitude of the dot product of any two rows of distinct matrices is bounded above. A Hadamard partition is any partition of the set of all rows of the matrices H i into Hadamard matrices. Such partitions have an application to the security of quasi-synchronous code-division multiple-access radio systems when loosely synchronized (LS) codes are used as spreading codes. A new generation of LS code can be used for each information bit to be spread. For each generation, a Hadamard matrix from some partition is selected for use in the code construction. This code evolution increases security against eavesdropping and jamming. One security aspect requires that the number of Hadamard partitions be large. Thus the number of partitions is studied here. If a Kerdock code construction is used for the set of matrices, the Hadamard partition constructed is shown to be unique. It is also shown here that this is not the case if a Gold (or Gold-like) code construction is used. In this case the number of Hadamard partitions can be enumerated, and is very large.   相似文献   
22.
A 0-1 matrix is d-disjunct if no column is covered by the union of any d other columns. A 0-1 matrix is (d; z)-disjunct if for any column C and any d other columns, there exist at least z rows such that each of them has value 1 at column C and value 0 at all the other d columns. Let t(d, n) and t(d, n; z) denote the minimum number of rows required by a d-disjunct matrix and a (d; z)-disjunct matrix with n columns, respectively. We give a very short proof for the currently best upper bound on t(d, n). We also generalize our method to obtain a new upper bound on t(d, n; z). The work of Y. Cheng and G. Lin is supported by Natural Science and Engineering Research Council (NSERC) of Canada, and the Alberta Ingenuity Center for Machine Learning (AICML) at the University of Alberta. The work of D.-Z. Du is partially supported by National Science Foundation under grant No.CCF0621829.  相似文献   
23.
Let Fq be a finite field and n a positive integer. In this paper, we find a new combinatorial method to determine weight enumerators of reducible cyclic codes and their dual codes of length n over Fq, which just generalize results of Zhu et al. (2015); especially, we also give the weight enumerator of a cyclic code, which is viewed as a partial Melas code. Furthermore, weight enumerators obtained in this paper are all in the form of power of a polynomial.  相似文献   
24.
25.
Two infinite families of two–character sets in PG(5,q) arising from the Veronese surface of PG(5,q) are constructed.  相似文献   
26.
We introduce new classes of 2-weight cyclic codes which are direct sums of 1-weight irreducible cyclic codes   相似文献   
27.
The main results of this paper are in two directions. First, the family of finite local Frobenius non-chain rings of length 4 (hence of nilpotency index 3) is determined. As a by-product all finite local Frobenius non-chain rings with p4 elements, (p a prime) are given. Second, the number and structure of γ-constacyclic codes over finite local Frobenius non-chain rings with nilpotency index 3, of length relatively prime to the characteristic of the residue field of the ring, are determined.  相似文献   
28.
29.
In this paper, we classify all optimal linear[n, n/2] codes up to length 12. We show that thereis a unique optimal [10, 5, 5] code up to equivalence.  相似文献   
30.
利用有限域上2-幂零矩阵构作Cartesian认证码   总被引:2,自引:0,他引:2  
李殿龙  郑宝东 《应用数学》2004,17(3):383-388
给出 2 -幂零矩阵的Jordan标准型在相似变换下的稳定群的结构 ,利用有限域上 2 -幂零矩阵构作了一个Cartesian认证码 ,计算出了该认证码的参数 .在假定编码规则按等概率分布选取的条件下 ,计算出了该认证码被成功的模仿攻击的最大概率PI 及被成功的替换攻击的最大概率PS.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号