全文获取类型
收费全文 | 1510篇 |
免费 | 194篇 |
国内免费 | 60篇 |
专业分类
化学 | 117篇 |
力学 | 76篇 |
综合类 | 47篇 |
数学 | 953篇 |
物理学 | 571篇 |
出版年
2024年 | 6篇 |
2023年 | 39篇 |
2022年 | 81篇 |
2021年 | 85篇 |
2020年 | 86篇 |
2019年 | 54篇 |
2018年 | 47篇 |
2017年 | 55篇 |
2016年 | 63篇 |
2015年 | 32篇 |
2014年 | 77篇 |
2013年 | 156篇 |
2012年 | 48篇 |
2011年 | 72篇 |
2010年 | 46篇 |
2009年 | 91篇 |
2008年 | 104篇 |
2007年 | 92篇 |
2006年 | 87篇 |
2005年 | 67篇 |
2004年 | 71篇 |
2003年 | 35篇 |
2002年 | 40篇 |
2001年 | 46篇 |
2000年 | 28篇 |
1999年 | 39篇 |
1998年 | 26篇 |
1997年 | 17篇 |
1996年 | 14篇 |
1995年 | 10篇 |
1994年 | 11篇 |
1993年 | 8篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1990年 | 5篇 |
1989年 | 3篇 |
1988年 | 5篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1971年 | 2篇 |
1969年 | 1篇 |
1959年 | 2篇 |
排序方式: 共有1764条查询结果,搜索用时 15 毫秒
71.
提出了一种新结构的高功率径向强流速调管振荡器,该器件利用折叠式同轴谐振腔的微波场与接近空间电荷限制电流的径向电子束强烈相互作用产生高功率微波。首先对这种器件的实现机理进行了初步的分析,提出了有间隙电压情况时的径向同轴间隙的空间电荷限制电流1维近似估计模型。分析表明:对于电子束直流接近但小于直流空间限制电流的径向速调管,当有调制间隙电压时,空间限制电流要小于无调制间隙电压情况下的直流空间限制电流,径向强流电子束电流接近和超过空间电荷限制电流时会出现强烈的调制。然后用PIC程序对其特性进行了粒子模拟,在二极管输入电压500 kV、电子束电流为30 kA条件下,最终得到了峰值功率6 GW、频率1.3 GHz的微波输出。 相似文献
72.
Iwan M. Duursma 《Transactions of the American Mathematical Society》1999,351(9):3609-3639
The in general hard problem of computing weight distributions of linear codes is considered for the special class of algebraic-geometric codes, defined by Goppa in the early eighties. Known results restrict to codes from elliptic curves. We obtain results for curves of higher genus by expressing the weight distributions in terms of -series. The results include general properties of weight distributions, a method to describe and compute weight distributions, and worked out examples for curves of genus two and three.
73.
A Uniquely Decodable (UD) Code is a code such that any vector of the ambient space has a unique closest codeword. In this paper we begin a study of the structure of UD codes and identify perfect subcodes. In particular we determine all linear UD codes of covering radius 2. 相似文献
74.
An ordered list of binary words of length n is called a distance-preserving m, n-code, if the list distance between two words is equal to their Hamming distance, for distances up to m. A technique for constructing cyclic m, n-codes is presented, based on the standard Gray code and on some simple tools from linear algebra. 相似文献
75.
Salvatore Sessa 《Fuzzy Sets and Systems》1984,13(1):95-100
In this communication, we explicitly point out that the principal results of Liu 1982 basically deduced from the definition of binary operation ° on the set F(X) of all fuzzy subsets of X, also hold if one uses the weaker definition of product under triangular norm °t. Fuzzy ideals with respect to the triangular norms are also defined. 相似文献
76.
Zhi-Hui Geng Pu-Kun Liu 《International Journal of Infrared and Millimeter Waves》2004,25(7):1133-1142
The beam-wave interaction in a Ka-band, two-cavity fundamental gyroklystron amplifier is studied by using a self-consistent nonlinear simulation code. The electron efficiency for this gyroklystron amplifier is calculated, and the effect of various parameters, such as beam voltage, beam current, electron guiding center radius, velocity pitch ratio and drift tube length on the electron efficiency is discussed in detail. 相似文献
77.
Xin?YangEmail author Mali?Gong Lei?Huang Ping?Yan Haitao?Zhang 《Optical and Quantum Electronics》2004,36(12):1079-1088
In this paper, the authors investigate the performance of recently presented run-length limited (4, 18) code for high density optical storage systems. The construction of the code is described simply. The code has code rate R = 1/3 and density ratio (DR) = 1.67. The bit error rate (BER) performance for decision feedback equalizer (DFE) and partial response maximum likelihood (PRML) detector are simulated, considering signal-to-noise ratio (SNR) and optical channel jitter. The result shows that the performance of the code is acceptable. The encoder and decoder of the code are implemented by complex programmable logic device (CPLD) chip and the hardware resources required for encoder and decoder arelow. 相似文献
78.
Generalized Steiner systems GS(2, 4, v, g) were first introduced by Etzion and were used to construct optimal constant weight codes over an alphabet of size g + 1 with minimum Hamming distance 5, in which each codeword has length v and weight 4. Etzion conjectured that the necessary conditions v 1 (mod 3) and v ; 7 are also sufficient for the existence of a GS(2,4,v,2). Except for the example of a GS(2,4,10,2) and some recursive constructions given by Etzion, nothing else is known about this conjecture. In this paper, Weil's theorem on character sum estimates is used to show that the conjecture is true for any prime power v 7 (mod 12) except v = 7, for which there does not exist a GS(2,4,7,2). 相似文献
79.
Todd D. Vance 《Designs, Codes and Cryptography》2000,19(1):27-43
The weight distribution of GRM (generalized Reed-Muller) codes is unknown in general. This article describes and applies some new techniques to the codes over F3. Specifically, we decompose GRM codewords into words from smaller codes and use this decomposition, along with a projective geometry technique, to relate weights occurring in one code with weights occurring in simpler codes. In doing so, we discover a new gap in the weight distribution of many codes. In particular, we show there is no word of weight 3m–2 in GRM3(4,m) for m>6, and for even-order codes over the ternary field, we show that under certain conditions, there is no word of weight d+, where d is the minimum distance and is the largest integer dividing all weights occurring in the code. 相似文献
80.
Let V and W be n-dimensional vector spaces over GF(2). A function Q : V W is called crooked (a notion introduced by Bending and Fon-Der-Flaass) if it satisfies the following three properties:
We show that crooked functions can be used to construct distance regular graphs with parameters of a Kasami distance regular graph, symmetric 5-class association schemes similar to those recently constructed by de Caen and van Dam from Kasami graphs, and uniformly packed codes with the same parameters as the double error-correcting BCH codes and Preparata codes. 相似文献