全文获取类型
收费全文 | 978篇 |
免费 | 42篇 |
国内免费 | 30篇 |
专业分类
化学 | 7篇 |
晶体学 | 3篇 |
力学 | 6篇 |
综合类 | 18篇 |
数学 | 822篇 |
物理学 | 194篇 |
出版年
2024年 | 1篇 |
2023年 | 33篇 |
2022年 | 52篇 |
2021年 | 51篇 |
2020年 | 46篇 |
2019年 | 26篇 |
2018年 | 19篇 |
2017年 | 24篇 |
2016年 | 31篇 |
2015年 | 18篇 |
2014年 | 35篇 |
2013年 | 39篇 |
2012年 | 14篇 |
2011年 | 32篇 |
2010年 | 22篇 |
2009年 | 64篇 |
2008年 | 75篇 |
2007年 | 54篇 |
2006年 | 61篇 |
2005年 | 26篇 |
2004年 | 29篇 |
2003年 | 36篇 |
2002年 | 53篇 |
2001年 | 41篇 |
2000年 | 33篇 |
1999年 | 53篇 |
1998年 | 29篇 |
1997年 | 24篇 |
1996年 | 15篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有1050条查询结果,搜索用时 26 毫秒
31.
Magnetic induction (MI) communication is an effective scheme for underwater wireless communication. In this paper, we aim to design an underwater MI communication system based on Quasi-cyclic LDPC (QC-LDPC) codes. Firstly, for a given QC-LDPC code used in underwater MI communication, we propose a novel algorithm to evaluate its performance, which is named as underwater magnetic induction protograph (UWMIP) extrinsic information transfer algorithm. Furthermore, we present a differential evolution UWMIP (DE-UWMIP) algorithm, which incorporates the differential evolution method and the UWMIP algorithm. By this algorithm, we search the optimized QC-LDPC codes with best distance threshold. Simulation results show that the proposed algorithm is effective and provide a good guidance to design the underwater MI communication system. 相似文献
32.
The polar-coded hybrid automatic repeat request (HARQ) scheme with chase combining (CC) has very low complexity and is easy to combine with other techniques such as the coded-modulation and space–time coding, etc. However, the CC-HARQ scheme usually suffers from error and throughput performance degradation. A multiple decoding CC-HARQ (MDCC-HARQ) scheme is proposed in this paper by providing extra decoding chances when the joint decoding fails. Specifically, new LLR-sequences are constructed from the received signals, which can be utilized for the extra decoding attempts. Simulation results show that the proposed MDCC-HARQ scheme can achieve better error-performance and higher throughput efficiency, while requires less retransmission when compared with the CC-HARQ scheme. 相似文献
33.
卫星振动是影响星间光CDMA通信系统性能的一个重要因素.考虑多用户干扰、背景光噪音、热噪音、接收机噪音和卫星振动,给出了基于PPM信号格式的星间二维光CDMA通信系统的系统模型.采用数值分析的方法,详细分析了卫星振动对该系统误码率性能的影响.结果表明,码速率、通信波长和卫星振动都会影响星间二维光CDMA通信系统的误码率性能.当卫星振动标准偏差σ≤4×10-7时,卫星振动对系统误码率性能的影响较小;当卫星振动标准偏差σ≥1.2×10-6,卫星振动对系统误码率性能的影响很大,得到的误码率难以满足系统的通信要求,需要采用卫星振动抑制或补偿等技术提高星间二维光CDMA通信系统的误码率性能. 相似文献
34.
35.
Cyclic codes are an important class of linear codes, whose weight distribution have been extensively studied. So far, most of previous results obtained were for cyclic codes with no more than three nonzeros. Recently, the authors of [37] constructed a class of cyclic codes with arbitrary number of nonzeros, and computed the weight distribution for several cases. In this paper, we determine the weight distribution for a new family of such codes. This is achieved by introducing certain new methods, such as the theory of Jacobi sums over finite fields and subtle treatment of some complicated combinatorial identities. 相似文献
36.
Anton Skidin Alexey Redyuk Olga Shtyrina Michael Fedoruk Alex Shafarenko 《Optics Communications》2011,284(19):4695-4698
We quantify the error statistics and patterning effects in a 5 × 40 Gbit/s WDM RZ-OOK SMF/DCF fibre link using hybrid Raman/EDFA amplification. By extensive use of a numerical model, we determine how the error statistics change with the transmission distance. This knowledge is used as a basis for a constrained coding technique in order to improve the transmission error rate. We propose an adaptive constrained code for mitigation of the patterning effects and demonstrate that this approach can substantially reduce the bit error rate (BER) even for very large values of the channel BER (BER > 10− 1). The proposed technique can be used in combination with forward error correction schemes (FEC) to extend the range of channel BERs that an FEC scheme is effective over. 相似文献
37.
The Friedberg–Lee (FL) symmetry is generated by a transformation of a fermionic field q to q+ξz. This symmetry puts very restrictive constraints on allowed terms in a Lagrangian. Applying this symmetry to N fermionic fields, we find that the number of independent fields is reduced to N−1 if the fields have gauge interaction or the transformation is a local one. Using this property, we find that a seesaw model originally with three generations of left- and right-handed neutrinos, with the left-handed neutrinos unaffected but the right-handed neutrinos transformed under the local FL translation, is reduced to an effective theory of minimal seesaw which has only two right-handed neutrinos. The symmetry predicts that one of the light neutrino masses must be zero. 相似文献
38.
39.
With the emergence of wireless networks, cooperation for secrecy is recognized as an attractive way to establish secure communications. Departing from cryptographic techniques, secrecy can be provided by exploiting the wireless channel characteristics; that is, some error-correcting codes besides reliability have been shown to achieve information-theoretic security. In this paper, we propose a polar-coding-based technique for the primitive relay wiretap channel and show that this technique is suitable to provide information-theoretic security. Specifically, we integrate at the relay an additional functionality, which allows it to smartly decide whether it will cooperate or not based on the decoding detector result. In the case of cooperation, the relay operates in a decode-and-forward mode and assists the communication by transmitting a complementary message to the destination in order to correctly decode the initial source’s message. Otherwise, the communication is completed with direct transmission from source to the destination. Finally, we first prove that the proposed encoding scheme achieves weak secrecy, then, in order to overcome the obstacle of misaligned bits, we implement a double-chaining construction, which achieves strong secrecy. 相似文献
40.
In this work we present a survey of the main results in the theory of Weierstrass semigroups at several points, with special
attention to the determination of bounds for the cardinality of its set of gaps. We also review results on applications to
the theory of error correcting codes. We then recall a generalization of the concept of Weierstrass semigroup, which is the
Weierstrass set associated to a linear system and several points. We finish by presenting new results on this Weierstrass
set, including some on the cardinality of its set of gaps.
相似文献