首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12340篇
  免费   274篇
  国内免费   61篇
化学   6261篇
晶体学   169篇
力学   308篇
数学   848篇
物理学   3284篇
无线电   1805篇
  2023年   140篇
  2022年   299篇
  2021年   279篇
  2020年   309篇
  2019年   332篇
  2018年   317篇
  2017年   309篇
  2016年   413篇
  2015年   252篇
  2014年   488篇
  2013年   933篇
  2012年   667篇
  2011年   734篇
  2010年   478篇
  2009年   469篇
  2008年   544篇
  2007年   539篇
  2006年   427篇
  2005年   373篇
  2004年   283篇
  2003年   244篇
  2002年   225篇
  2001年   156篇
  2000年   152篇
  1999年   110篇
  1998年   84篇
  1997年   90篇
  1996年   131篇
  1995年   134篇
  1994年   139篇
  1993年   130篇
  1992年   150篇
  1991年   114篇
  1990年   107篇
  1989年   110篇
  1988年   106篇
  1987年   106篇
  1986年   80篇
  1985年   125篇
  1984年   142篇
  1983年   110篇
  1982年   112篇
  1981年   110篇
  1980年   127篇
  1979年   97篇
  1978年   105篇
  1977年   89篇
  1976年   65篇
  1975年   67篇
  1974年   84篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
Wireless Personal Communications - The efficient management of resource sharing plays a crucial role in the cloud execution environment. The constraints such as heterogeneity and dynamic nature of...  相似文献   
92.
In this paper, a comparative study of co-planar gap coupled rectangular and elliptical microstrip patch antenna is presented. It is analyzed by using circuit theory concept. The proposed antennas show ultra wideband operations which depend on dimensions of the patches, gap between them as well as air gap thickness. It is observed that the performance of gap coupled elliptical patch antenna is better than that of rectangular patch antenna while the area of rectangular and elliptical patches is same. The bandwidth of proposed rectangular patch antenna is found to be 50.7 % with average gain of 6.5 dBi while for elliptical patch antenna the bandwidth and gain further improves up to 57.6 % and 9.5 dBi respectively. The theoretical results are in good agreement with the simulated results obtained from IE3D simulation software.  相似文献   
93.
Worldwide Interoperability for Microwave Access (WiMAX) is the broadband wireless access technique that provides rapid broadband services to domestic and enterprise users. Owing to the broadcast characteristic of the WiMAX system, transmitted data security is crucial, particularly when the messages are confidential. In this work, exploiting of WiMAX to convey sensitive secret information is presented. In the first phase, we exploited conventional WiMAX (fast Fourier transform [FFT]‐WiMAX), and in the second phase, we propose a wavelet packet transform (WPT)–based WiMAX for covert communication. The quality evaluation of both covert transmission models (FFT‐WiMAX and WPT‐WiMAX) over the fading channel is done in this work. The experimental outcomes of the proposed WPT‐WiMAX covert transmission system reveal a significant enhancement in error rate (bit error rate) and peak signal‐to‐noise ratio for a given signal‐to‐noise ratio.  相似文献   
94.
Wireless Personal Communications - Wireless body area network (WBAN) is the subfield of Wireless Sensor Network, employs in the area of monitoring the health of the patient. WBAN is also known as...  相似文献   
95.
Wireless Personal Communications - Biometric traits are frequently used by security agencies for automatic recognition of a person. There are numerous biometric traits used for person...  相似文献   
96.
Sensor networks comprise of sensor nodes with limited battery power that are deployed at different geographical locations to monitor physical events. Information gathering is a typical but an important operation in many applications of wireless sensor networks (WSNs). It is necessary to operate the sensor network for longer period of time in an energy efficient manner for gathering information. One of the popular WSN protocol, named low energy adaptive clustering hierarchy (LEACH) and its variants, aim to prolong the network lifetime using energy efficient clustering approach. These protocols increase the network lifetime at the expense of reduced stability period (the time span before the first node dies). The reduction in stability period is because of the high energy variance of nodes. Stability period is an essential aspect to preserve coverage properties of the network. Higher is the stability period, more reliable is the network. Higher energy variance of nodes leads to load unbalancing among nodes and therefore lowers the stability period. Hence, it is perpetually attractive to design clustering algorithms that provides higher stability, lower energy variance and are energy efficient. In this paper to overcome the shortcomings of existing clustering protocols, a protocol named stable energy efficient clustering protocol is proposed. It balances the load among nodes using energy-aware heuristics and hence ensures higher stability period. The results demonstrate that the proposed protocol significantly outperforms LEACH and its variants in terms of energy variance and stability period.  相似文献   
97.

Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for such modern-day systems. An intrusion detection system (IDS) is a solution that has recently gained the researcher’s attention with the application of deep learning techniques in IDS. In this paper, we propose an IDS model that uses a deep learning algorithm, conditional generative adversarial network (CGAN), enabling unsupervised learning in the model and adding an eXtreme gradient boosting (XGBoost) classifier for faster comparison and visualization of results. The proposed method can reduce the need to deploy extra sensors to generate fake data to fool the intruder 1.2–2.6%, as the proposed system generates this fake data. The parameters were selected to give optimal results to our model without significant alterations and complications. The model learns from its dataset samples with the multiple-layer network for a refined training process. We aimed that the proposed model could improve the accuracy and thus, decrease the false detection rate and obtain good precision in the cases of both the datasets, NSL-KDD and the CICIDS2017, which can be used as a detector for cyber intrusions. The false alarm rate of the proposed model decreases by about 1.827%.

  相似文献   
98.
Wireless Personal Communications - Distributed denial of service (DDoS) attacks disrupt the availability of cloud services. The detection of these attacks is a major challenge in the cloud...  相似文献   
99.
Wireless Personal Communications - A Greedy Perimeter Coordinator Routing and Mobility Awareness (GPCR-MA) vehicular routing is a widely accepted routing protocol for VANET (Vehicular Ad hoc...  相似文献   
100.
Wireless Personal Communications - This paper proposes an combined method for manifold preservation and Subspace Eigenvectors(SE) based regression in high dimensional (HD) images. We studied...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号