首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1320篇
  免费   169篇
  国内免费   68篇
化学   109篇
力学   67篇
综合类   39篇
数学   863篇
物理学   479篇
  2024年   3篇
  2023年   29篇
  2022年   51篇
  2021年   49篇
  2020年   64篇
  2019年   44篇
  2018年   49篇
  2017年   49篇
  2016年   53篇
  2015年   29篇
  2014年   69篇
  2013年   105篇
  2012年   44篇
  2011年   60篇
  2010年   47篇
  2009年   87篇
  2008年   96篇
  2007年   91篇
  2006年   84篇
  2005年   68篇
  2004年   73篇
  2003年   38篇
  2002年   40篇
  2001年   52篇
  2000年   29篇
  1999年   37篇
  1998年   26篇
  1997年   21篇
  1996年   12篇
  1995年   12篇
  1994年   10篇
  1993年   7篇
  1992年   2篇
  1991年   4篇
  1990年   6篇
  1989年   3篇
  1988年   5篇
  1987年   1篇
  1986年   2篇
  1985年   1篇
  1983年   1篇
  1982年   1篇
  1971年   2篇
  1969年   1篇
排序方式: 共有1557条查询结果,搜索用时 15 毫秒
71.
72.
In this paper we show that two skew diagrams λ/μ and α/β can represent the same multiplicity free skew character [λ/μ]=[α/β] only in the the trivial cases when λ/μ and α/β are the same up to translation or rotation or if λ=α is a staircase partition λ=(l,l−1,…,2,1) and λ/μ and α/β are conjugate of each other.  相似文献   
73.
提出利用光学符号代换法则实现POST代数和GALOIS代数两种基本的多值逻辑函数,并给出了Max(x,y)运算、Min(x,y)运算以及数字加法和乘法运算的实验结果。  相似文献   
74.
Abstract. The trace representation of the dual of quaternary Goethals code δ(m) is given . It isproved that the shortened code of δ(m) is cyclic and its generators are shown.  相似文献   
75.
This paper proposes a new type of encoding methods to encrypt hidden (covert) information in host images. The encrypted information can be plot, fax, word, or network data, and it must be encoded with binary codes. All the pixels in an encoded (overt) image modulated from a host image are classified into three groups. The first group of pixels is called identification codes, used to judge whether the overt image is encoded by a method proposed in this paper or not. The second group of pixels is called type codes, used to judge the encoding type. The third group of pixels is called information codes, used to decode the encoded information. Applying the proposed encoding methods is quite convenient, and host images are not needed for decoding. Decoding covert information from overt images is rather difficult for un-authorized persons, whereas it is very easy for designers or authorized persons. Therefore, the proposed methods are very useful.  相似文献   
76.
E.J. Cheon  T. Kato  S.J. Kim   《Discrete Mathematics》2008,308(14):3082-3089
In this paper, we shall prove that there is no [3q4-q3-q2-3q-1,5,3q4-4q3-2q+1]q code over the finite field for q11. Thus, we conclude the nonexistence of a [gq(5,d),5,d]q code for 3q4-4q3-2q+1d3q4-4q3-q.  相似文献   
77.
Recently T. Terlaky has proposed a new pivoting rule for the criss-cross simplex method for linear programming and he proved that his rule is convergent. In this note we show that the required number of iterations may be exponential in the number of variables and constraints of the problem.  相似文献   
78.
We present a new Multiple-Observations (MO) helper data scheme for secret-key binding to an SRAM-PUF. This MO scheme binds a single key to multiple enrollment observations of the SRAM-PUF. Performance is improved in comparison to classic schemes which generate helper data based on a single enrollment observation. The performance increase can be explained by the fact that the reliabilities of the different SRAM cells are modeled (implicitly) in the helper data. We prove that the scheme achieves secret-key capacity for any number of enrollment observations, and, therefore, it is optimal. We evaluate performance of the scheme using Monte Carlo simulations, where an off-the-shelf LDPC code is used to implement the linear error-correcting code. Another scheme that models the reliabilities of the SRAM cells is the so-called Soft-Decision (SD) helper data scheme. The SD scheme considers the one-probabilities of the SRAM cells as an input, which in practice are not observable. We present a new strategy for the SD scheme that considers the binary SRAM-PUF observations as an input instead and show that the new strategy is optimal and achieves the same reconstruction performance as the MO scheme. Finally, we present a variation on the MO helper data scheme that updates the helper data sequentially after each successful reconstruction of the key. As a result, the error-correcting performance of the scheme is improved over time.  相似文献   
79.
Typical random codes (TRCs) in a communication scenario of source coding with side information in the decoder is the main subject of this work. We study the semi-deterministic code ensemble, which is a certain variant of the ordinary random binning code ensemble. In this code ensemble, the relatively small type classes of the source are deterministically partitioned into the available bins in a one-to-one manner. As a consequence, the error probability decreases dramatically. The random binning error exponent and the error exponent of the TRCs are derived and proved to be equal to one another in a few important special cases. We show that the performance under optimal decoding can be attained also by certain universal decoders, e.g., the stochastic likelihood decoder with an empirical entropy metric. Moreover, we discuss the trade-offs between the error exponent and the excess-rate exponent for the typical random semi-deterministic code and characterize its optimal rate function. We show that for any pair of correlated information sources, both error and excess-rate probabilities exponential vanish when the blocklength tends to infinity.  相似文献   
80.
This paper describes a coupling framework for parallel execution of different solvers for multi-physics and multi-domain simulations with an arbitrary number of adjacent zones connected by different physical or overlapping interfaces. The coupling architecture is based on the execution of several instances of the same coupling code and relies on the use of smart edges (i.e., separate processes) dedicated to managing the exchange of information between two adjacent regions. The collection of solvers and coupling sessions forms a flexible and modular system, where the data exchange is handled by independent servers that are dedicated to a single interface connecting two solvers’ sessions. Accuracy and performance of the strategy is considered for turbomachinery applications involving Conjugate Heat Transfer (CHT) analysis and Sliding Plane (SP) interfaces.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号