首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1416篇
  免费   68篇
  国内免费   66篇
化学   8篇
晶体学   3篇
力学   11篇
综合类   20篇
数学   1282篇
物理学   226篇
  2024年   2篇
  2023年   41篇
  2022年   63篇
  2021年   59篇
  2020年   59篇
  2019年   44篇
  2018年   30篇
  2017年   34篇
  2016年   40篇
  2015年   31篇
  2014年   56篇
  2013年   88篇
  2012年   27篇
  2011年   53篇
  2010年   37篇
  2009年   93篇
  2008年   108篇
  2007年   81篇
  2006年   93篇
  2005年   46篇
  2004年   44篇
  2003年   54篇
  2002年   72篇
  2001年   55篇
  2000年   50篇
  1999年   63篇
  1998年   44篇
  1997年   37篇
  1996年   21篇
  1995年   6篇
  1994年   2篇
  1993年   5篇
  1992年   5篇
  1991年   1篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1979年   1篇
  1977年   1篇
  1974年   1篇
排序方式: 共有1550条查询结果,搜索用时 15 毫秒
121.
Gennian Ge 《Discrete Mathematics》2008,308(13):2704-2708
In this note, we consider a construction for optimal ternary constant weight codes (CWCs) via Bhaskar Rao designs (BRDs). The known existence results for BRDs are employed to generate many new optimal nonlinear ternary CWCs with constant weight 4 and minimum Hamming distance 5.  相似文献   
122.
This paper extends the concepts from cyclic duadic codes to negacyclic codes over Fq (q an odd prime power) of oddly even length. Generalizations of defining sets, multipliers, splittings, even-like and odd-like codes are given. Necessary and sufficient conditions are given for the existence of self-dual negacyclic codes over Fq and the existence of splittings of 2N, where N is odd. Other negacyclic codes can be extended by two coordinates in a way to create self-dual codes with familiar parameters.  相似文献   
123.
It has been proven that the code lengths of Tardos’s collusion-secure fingerprinting codes are of theoretically minimal order with respect to the number of adversarial users (pirates). However, the code lengths can be further reduced as some preceding studies have revealed. In this article we improve a recent discrete variant of Tardos’s codes, and give a security proof of our codes under an assumption weaker than the original Marking Assumption. Our analysis shows that our codes have significantly shorter lengths than Tardos’s codes. For example, when c = 8, our code length is about 4.94% of Tardos’s code in a practical setting and about 4.62% in a certain limit case. Our code lengths for large c are asymptotically about 5.35% of Tardos’s codes. A part of this work was presented at 17th Applied Algebra, Algebraic Algorithms, and Error Correcting Codes (AAECC-17), Bangalore, India, December 16–20, 2007.  相似文献   
124.
125.
李平  朱士信 《数学杂志》2008,28(2):124-128
本文研究了环F2 uF2上的奇长度的循环码和(1 u)-循环码.运用代数方法,得到了F2 uF2上的循环码和(1 u)-循环码成为自由码的几个充要条件.推广了Bonnecaze(1999)和Aydin(2002)的关于自由码的结果.  相似文献   
126.
Let β(n,M) denote the minimum average Hamming distance of a binary code of length n and cardinality M. In this paper we consider lower bounds on β(n,M). All the known lower bounds on β(n,M) are useful when M is at least of size about 2n−1/n. We derive new lower bounds which give good estimations when size of M is about n. These bounds are obtained using a linear programming approach. In particular, it is proved that limnβ(n,2n)=5/2. We also give a new recursive inequality for β(n,M).  相似文献   
127.
通过对q元线性码广义Hamming重量dr(·)的分析,应用支撑重量ωs(C)的性质,再次分析了q元[n,k]线性码广义Griesmer界n≥dr+sum from i=1 to k-r[(q-1)dr/qi(qr-1)].  相似文献   
128.
H. Weigel   《Nuclear Physics A》2001,690(4):113-609
Within the collective coordinate approach to chiral soliton models we suggest that breaking of SU(3) flavor symmetry mainly resides in the baryon wave-functions while the charge operators maintain a symmetric structure. Sizable symmetry breaking in the wave-functions is required to reproduce the observed spacing in the spectrum of the  baryons. The matrix elements of the flavor symmetric charge operators nevertheless yield gA/gV ratios for hyperon beta-decay which agree with the empirical data approximately as well as the successful F&D parameterization of the Cabibbo scheme. Demanding the strangeness component in the nucleon to vanish in the two flavor limit of the model, determines the structure of the singlet axial charge operator and yields the various quark flavor components of the axial charge of the Λ-hyperon. The suggested picture gains support from calculations in a realistic model using pion and vector meson degrees of freedom to build up the soliton.  相似文献   
129.
We investigate the intersection R of two permutable Hermitian surfaces of PG(3,q2), q odd. We show that R is a determinantal variety. From the combinatorial point of view R comprises a complete (q2+1)-span of the two corresponding Hermitian surfaces.  相似文献   
130.
Partial permutation decoding is shown to apply to the first-order Reed-Muller codes R(1,m), where m>4 by finding s-PD-sets for these codes for 2≤s≤4.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号