首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1409篇
  免费   68篇
  国内免费   64篇
化学   8篇
晶体学   3篇
力学   11篇
综合类   20篇
数学   1282篇
物理学   217篇
  2024年   2篇
  2023年   41篇
  2022年   57篇
  2021年   59篇
  2020年   59篇
  2019年   44篇
  2018年   30篇
  2017年   34篇
  2016年   40篇
  2015年   31篇
  2014年   56篇
  2013年   88篇
  2012年   26篇
  2011年   53篇
  2010年   37篇
  2009年   91篇
  2008年   108篇
  2007年   81篇
  2006年   93篇
  2005年   46篇
  2004年   44篇
  2003年   54篇
  2002年   72篇
  2001年   55篇
  2000年   50篇
  1999年   63篇
  1998年   44篇
  1997年   37篇
  1996年   21篇
  1995年   6篇
  1994年   2篇
  1993年   5篇
  1992年   5篇
  1991年   1篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1979年   1篇
  1977年   1篇
  1974年   1篇
排序方式: 共有1541条查询结果,搜索用时 821 毫秒
111.
A code C F n is s-regular provided, forevery vertex x F n, if x is atdistance at most s from C then thenumber of codewords y C at distance ifrom x depends only on i and the distancefrom x to C. If denotesthe covering radius of C and C is -regular,then C is said to be completely regular. SupposeC is a code with minimum distance d,strength t as an orthogonal array, and dual degrees *. We prove that d 2t + 1 whenC is completely regular (with the exception of binaryrepetition codes). The same bound holds when C is(t + 1)-regular. For unrestricted codes, we show thatd s * + t unless C is a binary repetitioncode.  相似文献   
112.
In this review article, we review the recent development of quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) which both are used to transmit secret message, including the criteria for QSDC, some interesting QSDC protocols, the DSQC protocols and QSDC network, etc. The difference between these two branches of quantum communication is that DSQC requires the two parties exchange at least one bit of classical information for reading out the message in each qubit, and QSDC does not. They are attractive because they are deterministic, in particular, the QSDC protocol is fully quantum mechanical. With sophisticated quantum technology in the future, the QSDC may become more and more popular. For ensuring the safety of QSDC with single photons and quantum information sharing of single qubit in a noisy channel, a quantum privacy amplification protocol has been proposed. It involves very simple CHC operations and reduces the information leakage to a negligible small level. Moreover, with the one-party quantum error correction, a relation has been established between classical linear codes and quantum one-party codes, hence it is convenient to transfer many good classical error correction codes to the quantum world. The one-party quantum error correction codes are especially designed for quantum dense coding and related QSDC protocols based on dense coding.   相似文献   
113.
114.
D.S. Krotov   《Discrete Mathematics》2008,308(14):3104-3114
From cosets of binary Hamming codes we construct diameter perfect constant-weight ternary codes with weight n-1 (where n is the code length) and distances 3 and 5. The class of distance 5 codes has parameters unknown before.  相似文献   
115.
Jon-Lark Kim  Judy Walker   《Discrete Mathematics》2008,308(14):3115-3124
We give a new exposition and proof of a generalized CSS construction for nonbinary quantum error-correcting codes. Using this we construct nonbinary quantum stabilizer codes with various lengths, dimensions, and minimum distances from algebraic curves. We also give asymptotically good nonbinary quantum codes from a Garcia–Stichtenoth tower of function fields which are constructible in polynomial time.  相似文献   
116.
Let D be a division ring with an involution-,H2(D) be the set of 2 × 2 Hermitian matrices over D. Let ad(A,B) = rank(A-B) be the arithmetic distance between A,B ∈ H2(D) . In this paper,the fundamental theorem of the geometry of 2 × 2 Hermitian matrices over D(char(D) = 2) is proved:if  :H2(D) → H2(D) is the adjacency preserving bijective map,then  is of the form (X) = tP XσP +(0) ,where P ∈ GL2(D) ,σ is a quasi-automorphism of D. The quasi-automorphism of D is studied,and further results are obtained.  相似文献   
117.
There is remarkable and distinctive structure among Hermitian matrices, whose graph is a given tree T and that have an eigenvalue of multiplicity that is a maximum for T. Among such structure, we give several new results: (1) no vertex of T may be “neutral”; (2) neutral vertices may occur if the largest multiplicity is less than the maximum; (3) every Parter vertex has at least two downer branches; (4) removal of a Parter vertex changes the status of no other vertex; and (5) every set of Parter vertices forms a Parter set. Statements (3), (4) and (5) are also not generally true when the multiplicity is less than the maximum. Some of our results are used to give further insights into prior results, and both the review of necessary background and the development of new structural lemmas may be of independent interest.  相似文献   
118.
For a positive integer k, the rank-k numerical range Λk(A) of an operator A acting on a Hilbert space H of dimension at least k is the set of scalars λ such that PAP=λP for some rank k orthogonal projection P. In this paper, a close connection between low rank perturbation of an operator A and Λk(A) is established. In particular, for 1?r<k it is shown that Λk(A)⊆Λkr(A+F) for any operator F with rank(F)?r. In quantum computing, this result implies that a quantum channel with a k-dimensional error correcting code under a perturbation of rank at most r will still have a (kr)-dimensional error correcting code. Moreover, it is shown that if A is normal or if the dimension of A is finite, then Λk(A) can be obtained as the intersection of Λkr(A+F) for a collection of rank r operators F. Examples are given to show that the result fails if A is a general operator. The closure and the interior of the convex set Λk(A) are completely determined. Analogous results are obtained for Λ(A) defined as the set of scalars λ such that PAP=λP for an infinite rank orthogonal projection P. It is shown that Λ(A) is the intersection of all Λk(A) for k=1,2,…. If AμI is not compact for all μC, then the closure and the interior of Λ(A) coincide with those of the essential numerical range of A. The situation for the special case when AμI is compact for some μC is also studied.  相似文献   
119.
Most of the literature on coded excitation describes the signal-to-noise ratio gain of a coded waveform in terms of the time-bandwidth product. We have shown that in the context of ultrasound imaging, the expression for the SNR gain provided by matched filtering a coded waveform, can be reduced to the total number of chips in the transmit signal. Hence, the SNR gain is independent of both the bandwidth and the duration of a single-chip. This concept is described in detail, clarifying this seeming contradiction. The impact of bandwidth and pulse duration on the SNR, SNR gain and axial resolution is described. Bandwidth requirements and the impact of regulatory peak-power limitations are also addressed.  相似文献   
120.
In this contribution the Riemann hypothesis analogue presented by Iwan Duursma is considered. Whether the analogue for a given selfdual code holds depends on its Hamming weight enumerator. A necessary and sufficient condition is provided in the case of genus less than 3 for the homogeneous polynomials in two variables invariant under the MacWilliams transform. Also the case of half integral genus is studied and similar results are obtained.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号