首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   968篇
  免费   43篇
  国内免费   28篇
化学   7篇
晶体学   3篇
力学   6篇
综合类   18篇
数学   822篇
物理学   183篇
  2024年   1篇
  2023年   33篇
  2022年   44篇
  2021年   51篇
  2020年   46篇
  2019年   26篇
  2018年   19篇
  2017年   24篇
  2016年   31篇
  2015年   18篇
  2014年   35篇
  2013年   39篇
  2012年   13篇
  2011年   32篇
  2010年   22篇
  2009年   62篇
  2008年   75篇
  2007年   54篇
  2006年   61篇
  2005年   26篇
  2004年   29篇
  2003年   36篇
  2002年   53篇
  2001年   41篇
  2000年   33篇
  1999年   53篇
  1998年   29篇
  1997年   24篇
  1996年   15篇
  1995年   3篇
  1994年   1篇
  1993年   1篇
  1992年   3篇
  1991年   1篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1979年   1篇
  1977年   1篇
排序方式: 共有1039条查询结果,搜索用时 250 毫秒
71.
The current paper presents results of a quantum-chemical study of the surface structure of nanoparticles of both rutile and anatase crystallographic modifications. Different stages of the surface relaxation are discussed. Water adsorption is considered. The calculations were performed in the spd-basis by using semi-empirical quantum-chemical codes, both sequential and parallel. The results are mainly addressed to the study of the interface formed by titania nanoparticles and a set of carboxylated species, namely, benzoic, bi-isonicotinic acids as well as tris-(2,2′-dcbipyridine) Fe(II) complex placed on the surface of either rutile or anatase polymorphs.This revised version was published online in August 2005 with a corrected issue number.  相似文献   
72.
We study (generalized) designs supported by words of given composition. We characterize them in terms of orthogonality relations with Specht modules; we define some zonal functions for the symmetric group and we give a closed formula for them, indexed on ordered pair of semi-standard generalized tableaux: Hahn polynomials are a particular case. We derive an algorithm to test if a set is a design. We use it to search designs in some ternary self-dual codes.  相似文献   
73.
superconformal algebra is algebra with two Virasoro operators. The Kac determinant is calculated and the complete list of unitary representations is determined. Two types of extensions of algebra are discussed. A new approach to construction of algebras from rational conformal field theories is proposed.  相似文献   
74.
In this paper explicit expressions ofm + 1 idempotents in the ring are given. Cyclic codes of length 2 m over the finite fieldF q, of odd characteristic, are defined in terms of their generator polynomials. The exact minimum distance and the dimension of the codes are obtained.  相似文献   
75.
In this paper, we classify all optimal linear[n, n/2] codes up to length 12. We show that thereis a unique optimal [10, 5, 5] code up to equivalence.  相似文献   
76.
In this paper, new codes of dimension 8 are presented which give improved bounds on the maximum possible minimum distance of ternary linear codes. These codes belong to the class of quasi-twisted (QT) codes, and have been constructed using a stochastic optimization algorithm, tabu search. Twenty three codes are given which improve or establish the bounds for ternary codes. In addition, a table of upper and lower bounds for d 3(n, 8) is presented for n 200.  相似文献   
77.
One of the most important problems of coding theory is to constructcodes with best possible minimum distances. In this paper, we generalize the method introduced by [8] and obtain new codes which improve the best known minimum distance bounds of some linear codes. We have found a new linear ternary code and 8 new linear codes over with improved minimumdistances. First we introduce a generalized version of Gray map,then we give definition of quasi cyclic codes and introduce nearlyquasi cyclic codes. Next, we give the parameters of new codeswith their generator matrices. Finally, we have included twotables which give Hamming weight enumerators of these new codes.  相似文献   
78.
A code C F n is s-regular provided, forevery vertex x F n, if x is atdistance at most s from C then thenumber of codewords y C at distance ifrom x depends only on i and the distancefrom x to C. If denotesthe covering radius of C and C is -regular,then C is said to be completely regular. SupposeC is a code with minimum distance d,strength t as an orthogonal array, and dual degrees *. We prove that d 2t + 1 whenC is completely regular (with the exception of binaryrepetition codes). The same bound holds when C is(t + 1)-regular. For unrestricted codes, we show thatd s * + t unless C is a binary repetitioncode.  相似文献   
79.
In this review article, we review the recent development of quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) which both are used to transmit secret message, including the criteria for QSDC, some interesting QSDC protocols, the DSQC protocols and QSDC network, etc. The difference between these two branches of quantum communication is that DSQC requires the two parties exchange at least one bit of classical information for reading out the message in each qubit, and QSDC does not. They are attractive because they are deterministic, in particular, the QSDC protocol is fully quantum mechanical. With sophisticated quantum technology in the future, the QSDC may become more and more popular. For ensuring the safety of QSDC with single photons and quantum information sharing of single qubit in a noisy channel, a quantum privacy amplification protocol has been proposed. It involves very simple CHC operations and reduces the information leakage to a negligible small level. Moreover, with the one-party quantum error correction, a relation has been established between classical linear codes and quantum one-party codes, hence it is convenient to transfer many good classical error correction codes to the quantum world. The one-party quantum error correction codes are especially designed for quantum dense coding and related QSDC protocols based on dense coding.   相似文献   
80.
D.S. Krotov   《Discrete Mathematics》2008,308(14):3104-3114
From cosets of binary Hamming codes we construct diameter perfect constant-weight ternary codes with weight n-1 (where n is the code length) and distances 3 and 5. The class of distance 5 codes has parameters unknown before.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号