首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1510篇
  免费   194篇
  国内免费   60篇
化学   117篇
力学   76篇
综合类   47篇
数学   953篇
物理学   571篇
  2024年   6篇
  2023年   39篇
  2022年   81篇
  2021年   85篇
  2020年   86篇
  2019年   54篇
  2018年   47篇
  2017年   55篇
  2016年   63篇
  2015年   32篇
  2014年   77篇
  2013年   156篇
  2012年   48篇
  2011年   72篇
  2010年   46篇
  2009年   91篇
  2008年   104篇
  2007年   92篇
  2006年   87篇
  2005年   67篇
  2004年   71篇
  2003年   35篇
  2002年   40篇
  2001年   46篇
  2000年   28篇
  1999年   39篇
  1998年   26篇
  1997年   17篇
  1996年   14篇
  1995年   10篇
  1994年   11篇
  1993年   8篇
  1992年   2篇
  1991年   4篇
  1990年   5篇
  1989年   3篇
  1988年   5篇
  1987年   1篇
  1986年   2篇
  1985年   1篇
  1984年   2篇
  1983年   1篇
  1971年   2篇
  1969年   1篇
  1959年   2篇
排序方式: 共有1764条查询结果,搜索用时 15 毫秒
91.
In this paper we show that two skew diagrams λ/μ and α/β can represent the same multiplicity free skew character [λ/μ]=[α/β] only in the the trivial cases when λ/μ and α/β are the same up to translation or rotation or if λ=α is a staircase partition λ=(l,l−1,…,2,1) and λ/μ and α/β are conjugate of each other.  相似文献   
92.
We discuss some new and old results about skew partitions in perfect graphs.  相似文献   
93.
提出利用光学符号代换法则实现POST代数和GALOIS代数两种基本的多值逻辑函数,并给出了Max(x,y)运算、Min(x,y)运算以及数字加法和乘法运算的实验结果。  相似文献   
94.
Abstract. The trace representation of the dual of quaternary Goethals code δ(m) is given . It isproved that the shortened code of δ(m) is cyclic and its generators are shown.  相似文献   
95.
This paper proposes a new type of encoding methods to encrypt hidden (covert) information in host images. The encrypted information can be plot, fax, word, or network data, and it must be encoded with binary codes. All the pixels in an encoded (overt) image modulated from a host image are classified into three groups. The first group of pixels is called identification codes, used to judge whether the overt image is encoded by a method proposed in this paper or not. The second group of pixels is called type codes, used to judge the encoding type. The third group of pixels is called information codes, used to decode the encoded information. Applying the proposed encoding methods is quite convenient, and host images are not needed for decoding. Decoding covert information from overt images is rather difficult for un-authorized persons, whereas it is very easy for designers or authorized persons. Therefore, the proposed methods are very useful.  相似文献   
96.
E.J. Cheon  T. Kato  S.J. Kim   《Discrete Mathematics》2008,308(14):3082-3089
In this paper, we shall prove that there is no [3q4-q3-q2-3q-1,5,3q4-4q3-2q+1]q code over the finite field for q11. Thus, we conclude the nonexistence of a [gq(5,d),5,d]q code for 3q4-4q3-2q+1d3q4-4q3-q.  相似文献   
97.
Recently T. Terlaky has proposed a new pivoting rule for the criss-cross simplex method for linear programming and he proved that his rule is convergent. In this note we show that the required number of iterations may be exponential in the number of variables and constraints of the problem.  相似文献   
98.
We present a new Multiple-Observations (MO) helper data scheme for secret-key binding to an SRAM-PUF. This MO scheme binds a single key to multiple enrollment observations of the SRAM-PUF. Performance is improved in comparison to classic schemes which generate helper data based on a single enrollment observation. The performance increase can be explained by the fact that the reliabilities of the different SRAM cells are modeled (implicitly) in the helper data. We prove that the scheme achieves secret-key capacity for any number of enrollment observations, and, therefore, it is optimal. We evaluate performance of the scheme using Monte Carlo simulations, where an off-the-shelf LDPC code is used to implement the linear error-correcting code. Another scheme that models the reliabilities of the SRAM cells is the so-called Soft-Decision (SD) helper data scheme. The SD scheme considers the one-probabilities of the SRAM cells as an input, which in practice are not observable. We present a new strategy for the SD scheme that considers the binary SRAM-PUF observations as an input instead and show that the new strategy is optimal and achieves the same reconstruction performance as the MO scheme. Finally, we present a variation on the MO helper data scheme that updates the helper data sequentially after each successful reconstruction of the key. As a result, the error-correcting performance of the scheme is improved over time.  相似文献   
99.
The thousand grain weight is an index of size, fullness and quality in crop seed detection and is an important basis for field yield prediction. To detect the thousand grain weight of rice requires the accurate counting of rice. We collected a total of 5670 images of three different types of rice seeds with different qualities to construct a model. Considering the different shapes of different types of rice, this study used an adaptive Gaussian kernel to convolve with the rice coordinate function to obtain a more accurate density map, which was used as an important basis for determining the results of subsequent experiments. A Multi-Column Convolutional Neural Network was used to extract the features of different sizes of rice, and the features were fused by the fusion network to learn the mapping relationship from the original map features to the density map features. An advanced prior step was added to the original algorithm to estimate the density level of the image, which weakened the effect of the rice adhesion condition on the counting results. Extensive comparison experiments show that the proposed method is more accurate than the original MCNN algorithm.  相似文献   
100.
Typical random codes (TRCs) in a communication scenario of source coding with side information in the decoder is the main subject of this work. We study the semi-deterministic code ensemble, which is a certain variant of the ordinary random binning code ensemble. In this code ensemble, the relatively small type classes of the source are deterministically partitioned into the available bins in a one-to-one manner. As a consequence, the error probability decreases dramatically. The random binning error exponent and the error exponent of the TRCs are derived and proved to be equal to one another in a few important special cases. We show that the performance under optimal decoding can be attained also by certain universal decoders, e.g., the stochastic likelihood decoder with an empirical entropy metric. Moreover, we discuss the trade-offs between the error exponent and the excess-rate exponent for the typical random semi-deterministic code and characterize its optimal rate function. We show that for any pair of correlated information sources, both error and excess-rate probabilities exponential vanish when the blocklength tends to infinity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号