首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1510篇
  免费   194篇
  国内免费   60篇
化学   117篇
力学   76篇
综合类   47篇
数学   953篇
物理学   571篇
  2024年   6篇
  2023年   39篇
  2022年   81篇
  2021年   85篇
  2020年   86篇
  2019年   54篇
  2018年   47篇
  2017年   55篇
  2016年   63篇
  2015年   32篇
  2014年   77篇
  2013年   156篇
  2012年   48篇
  2011年   72篇
  2010年   46篇
  2009年   91篇
  2008年   104篇
  2007年   92篇
  2006年   87篇
  2005年   67篇
  2004年   71篇
  2003年   35篇
  2002年   40篇
  2001年   46篇
  2000年   28篇
  1999年   39篇
  1998年   26篇
  1997年   17篇
  1996年   14篇
  1995年   10篇
  1994年   11篇
  1993年   8篇
  1992年   2篇
  1991年   4篇
  1990年   5篇
  1989年   3篇
  1988年   5篇
  1987年   1篇
  1986年   2篇
  1985年   1篇
  1984年   2篇
  1983年   1篇
  1971年   2篇
  1969年   1篇
  1959年   2篇
排序方式: 共有1764条查询结果,搜索用时 406 毫秒
121.
樊恽  刘宏伟 《数学进展》2004,33(4):467-470
整表代数是群代数的推广,它的理想是群代数码的推广.本文给出了整表代数的单边理想是自正交理想的必要充分条件.  相似文献   
122.
A greedy 1-subcode is a one-dimensional subcode of minimum (support) weight. A greedy r-subcode is an r-dimensional subcode with minimum support weight under the constraint that it contain a greedy (r - 1)-subcode. The r-th greedy weight e r is the support weight of a greedy r-subcode. The greedy weights are related to the weight hierarchy. We use recent results on the weight hierarchy of product codes to develop a lower bound on the greedy weights of product codes.  相似文献   
123.
In this paper, codes over F5 with parameters [36, 18, 12], [48, 24, 15], [60, 30, 18], [64, 32, 18] and [76, 38, 21] which improve the previously known bounds on the minimum weight for linear codes over F5 are constructed from conference matrices. Through shortening and truncating, the above codes give numerous new codes over F5 which improve the previously known bounds on minimum weights.  相似文献   
124.
Reliability is a major concern in the design of large disk arrays. In this paper, we examine the effect of encountering more failures than that for which the RAID array was initially designed. Erasure codes are incorporated to enable system recovery from a specified number of disk erasures, and strive beyond that threshold to recover the system as frequently, and as thoroughly, as is possible. Erasure codes for tolerating two disk failures are examined. For these double erasure codes, we establish a correspondence between system operation and acyclicity of its graph model. For the most compact double erasure code, the full 2-code, this underlies an efficient algorithm for the computation of system operation probability (all disks operating or recoverable).When the system has failed, some disks are nonetheless recoverable. We extend the graph model to determine the probability that d disks have failed, a of which are recoverable by solving one linear equation, b of which are further recoverable by solving systems of linear equations, and dab of which cannot be recovered. These statistics are efficiently calculated for the full 2-code by developing a three variable ordinary generating function whose coefficients give the specified values. Finally, examples are given to illustrate the probability that an individual disk can be recovered, even when the system is in a failed state.  相似文献   
125.
A computer code is described for the calculation of light-scattering properties of randomly oriented, axially symmetric coated particles, in the framework of the T-matrix theory. The underlying mathematical background is outlined briefly and convergence procedures are discussed. After outlining the input-output interaction between user and code, benchmark results are presented for two distinct shapes: coated, centered spheroids and offset coated spheres.  相似文献   
126.
本设计为一种便携式条形码阅读译码器(简称阅读器),它采用INTEL8031CPU微处理器为主芯片,辅以其它大规模集成电路芯片,构成一智能化系统,阅读及识别采用Code39码编制的条形码,并能完成条形码信息的存储、数目统计及与微机进行串行通信功能。  相似文献   
127.
Kerdock codes (Kerdock, Inform Control 20:182–187, 1972) are a well-known family of non-linear binary codes with good parameters admitting a linear presentation in terms of codes over the ring (see Nechaev, Diskret Mat 1:123–139, 1989; Hammons et al., IEEE Trans Inform Theory 40:301–319, 1994). These codes have been generalized in different directions: in Calderbank et al. (Proc Lond Math Soc 75:436–480, 1997) a symplectic construction of non-linear binary codes with the same parameters of the Kerdock codes has been given. Such codes are not necessarily equivalent. On the other hand, in Kuzmin and Nechaev (Russ Math Surv 49(5), 1994) the authors give a family of non-linear codes over the finite field F of q = 2 l elements, all of them admitting a linear presentation over the Galois Ring R of cardinality q 2 and characteristic 22. The aim of this article is to merge both approaches, obtaining in this way new families of non-linear codes over F that can be presented as linear codes over the Galois Ring R. The construction uses symplectic spreads.   相似文献   
128.
《Discrete Mathematics》2023,346(1):113168
We present a simple algorithm that generates a cyclic 2-Gray code for ballot sequences. The algorithm generates each ballot sequence in constant amortized time using a linear amount of space. This is the first known cyclic 2-Gray code for ballot sequences that achieves this time bound. In addition, the algorithm can be easily modified to output ballot sequences in binary reflected Gray code order in constant amortized time per string using a linear amount of space.  相似文献   
129.
何翔 《应用光学》2023,44(2):314-322
针对半片光伏组件电致发光(electroluminescence,EL)缺陷自动识别过程中训练用样本不足导致模型过拟合的问题,采用深度卷积生成对抗网络(deep convolutional generative adversarial networks,DCGANs)生成可控制属性的半片光伏组件EL图像,再采用多尺度结构相似性(multiscale structural similarity,MS-SSIM)指标对生成的EL图像与拍摄的EL图像之间的相似程度进行了评估。评估结果得到,使用DCGANs生成的所有类型半片光伏组件的EL图像与拍摄的EL图像的MS-SSIM指标都大于0.55,大部分的MS-SSIM值在0.7附近。在分类模型的训练过程中,测试集准确率随着训练集中生成图像数量的增加而升高,当生成图像数量达到6 000张时,测试集准确率达到97.92%。实验结果表明,采用DCGANs能够生成高质量且可控制属性的半片光伏组件EL图像,较好地解决因缺少训练样本而导致的模型过拟合问题。  相似文献   
130.
讨论了无线扩频定位系统的关键技术之一——扩频码的设计与实现。首先从实验的角度基于Logistic映射,分析了其所生成的混沌序列的部分相关特性及平衡性,给出了计算机仿真结果;最后从工程角度给出了易于实现的平衡Gold码的设计方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号