首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13633篇
  免费   1388篇
  国内免费   195篇
化学   1594篇
晶体学   11篇
力学   161篇
综合类   68篇
数学   1728篇
物理学   1863篇
无线电   9791篇
  2024年   28篇
  2023年   190篇
  2022年   289篇
  2021年   334篇
  2020年   349篇
  2019年   227篇
  2018年   280篇
  2017年   354篇
  2016年   426篇
  2015年   434篇
  2014年   749篇
  2013年   910篇
  2012年   841篇
  2011年   743篇
  2010年   721篇
  2009年   835篇
  2008年   871篇
  2007年   939篇
  2006年   768篇
  2005年   721篇
  2004年   642篇
  2003年   654篇
  2002年   572篇
  2001年   495篇
  2000年   386篇
  1999年   296篇
  1998年   181篇
  1997年   184篇
  1996年   173篇
  1995年   137篇
  1994年   108篇
  1993年   78篇
  1992年   66篇
  1991年   47篇
  1990年   29篇
  1989年   38篇
  1988年   29篇
  1987年   15篇
  1986年   12篇
  1985年   21篇
  1984年   17篇
  1983年   3篇
  1982年   8篇
  1981年   6篇
  1980年   3篇
  1979年   2篇
  1975年   1篇
  1974年   1篇
  1971年   1篇
  1969年   1篇
排序方式: 共有10000条查询结果,搜索用时 13 毫秒
151.
The technological innovations and wide use of Wireless Sensor Network (WSN) applications need to handle diverse data. These huge data possess network security issues as intrusions that cannot be neglected or ignored. An effective strategy to counteract security issues in WSN can be achieved through the Intrusion Detection System (IDS). IDS ensures network integrity, availability, and confidentiality by detecting different attacks. Regardless of efforts by various researchers, the domain is still open to obtain an IDS with improved detection accuracy with minimum false alarms to detect intrusions. Machine learning models are deployed as IDS, but their potential solutions need to be improved in terms of detection accuracy. The neural network performance depends on feature selection, and hence, it is essential to bring an efficient feature selection model for better performance. An optimized deep learning model has been presented to detect different types of attacks in WSN. Instead of the conventional parameter selection procedure for Convolutional Neural Network (CNN) architecture, a nature-inspired whale optimization algorithm is included to optimize the CNN parameters such as kernel size, feature map count, padding, and pooling type. These optimized features greatly improved the intrusion detection accuracy compared to Deep Neural network (DNN), Random Forest (RF), and Decision Tree (DT) models.  相似文献   
152.
Liquid crystalline polymers (LCPs), especially liquid crystalline elastomers (LCEs) can generate ultrahigh shape change amplitude but has lower mechanical strength. Although some attempts have been tried to improve the mechanical performance of LCE, there are still limitations including complicated fabrication and high actuation temperature. Here, a versatile method is reported to fabricate light-driven actuator by covalently cross-linking polyurethane (PU) into LCP networks (PULCN). This new scheme is distinct from the previous interpenetrating network strategy, the hydrogen bonds and covalent bonds are used in this study to improve the miscibility of non-liquid-crystalline PU and LCP materials and enhance the stability of the composite system. This material not only possesses the shape memory properties of PU but shows shape-changing behavior of LCPs. With a shrinkage ratio of 20% at the phase transition temperature, the prepared materials reached a maximum mechanical strength of 20 MPa, higher than conventional LCP. Meanwhile, the resulting film shows diverse and programmable initial shapes by constructing crosslinking density gradient across the thickness of the film. By integration of PULCN with near-infrared light-responsive polydopamine, local and sequential light control is achieved. This study may provide a new route for the fabrication of programmable and mechanically robust light-driven soft actuator.  相似文献   
153.
In this study, we introduce a loosely coupled relative position estimation method that utilizes a decentralized ultrawideband (UWB), Global Navigation Support System and inertial navigation system for flight controllers (FCs). Key obstacles to multidrone collaboration include relative position errors and the absence of communication devices. To address this, we provide an extended Kalman filter-based algorithm and module that correct distance errors by fusing UWB data acquired through random communications. Via simulations, we confirm the feasibility of the algorithm and verify its distance error correction performance according to the amount of communications. Real-world tests confirm the algorithm's effectiveness on FCs and the potential for multidrone collaboration in real environments. This method can be used to correct relative multidrone positions during collaborative transportation and simultaneous localization and mapping applications.  相似文献   
154.
Heterogeneous Networks (HetNets) and cell densification represent promising solutions for the surging data traffic demand in wireless networks. In dense HetNets, user traffic is steered toward the Low-Power Node (LPN) when possible to enhance the user throughput and system capacity by increasing the area spectral efficiency. However, because of the transmit power differences in different tiers of HetNets and irregular service demand, a load imbalance typically exists among different serving nodes. To offload more traffic to LPNs and coordinate the Inter-Cell Interference (ICI), Third-Generation Partnership Project (3GPP) has facilitated the development of the Cell Range Expansion (CRE), enhanced Inter-Cell Interference Coordination (eICIC) and Further enhanced ICIC (FeICIC). In this paper, we develop a cell clustering-based load-aware offsetting and an adaptive Low-Power Subframe (LPS) approach. Our solution allows the separation of User Association (UA) functions at the User Equipment (UE) and network server such that users can make a simple cell-selection decision similar to that in the maximum Received Signal Strength (max-RSS) based UA scheme, where the network server computes the load-aware offsetting and required LPS periods based on the load conditions of the system. The proposed solution is evaluated using system-level simulations wherein the results correspond to performance changes in different service regions. Results show that our method effectively solves the offloading and interference coordination problems in dense HetNets.  相似文献   
155.
Identifying an unfamiliar caller's profession is important to protect citizens' personal safety and property. Owing to the limited data protection of various popular online services in some countries, such as taxi hailing and ordering takeouts, many users presently encounter an increasing number of phone calls from strangers. The situation may be aggravated when criminals pretend to be such service delivery staff, threatening the user individuals as well as the society. In addition, numerous people experience excessive digital marketing and fraudulent phone calls because of personal information leakage. However, previous works on malicious call detection only focused on binary classification, which does not work for the identification of multiple professions. We observed that web service requests issued from users' mobile phones might exhibit their application preferences, spatial and temporal patterns, and other profession-related information. This offers researchers and engineers a hint to identify unfamiliar callers. In fact, some previous works already leveraged raw data from mobile phones (which includes sensitive information) for personality studies. However, accessing users' mobile phone raw data may violate the more and more strict private data protection policies and regulations (e.g., General Data Protection Regulation). We observe that appropriate statistical methods can offer an effective means to eliminate private information and preserve personal characteristics, thus enabling the identification of the types of mobile phone callers without privacy concerns. In this paper, we develop CPFinder —- a system that exploits privacy-preserving mobile data to automatically identify callers who are divided into four categories of users: taxi drivers, delivery and takeouts staffs, telemarketers and fraudsters, and normal users (other professions). Our evaluation of an anonymized dataset of 1,282 users over a period of 3 months in Shanghai City shows that the CPFinder can achieve accuracies of more than 75.0% and 92.4% for multiclass and binary classifications, respectively.  相似文献   
156.
With the rapid development of mobile devices and deep learning, mobile smart applications using deep learning technology have sprung up. It satisfies multiple needs of users, network operators and service providers, and rapidly becomes a main research focus. In recent years, deep learning has achieved tremendous success in image processing, natural language processing, language analysis and other research fields. Despite the task performance has been greatly improved, the resources required to run these models have increased significantly. This poses a major challenge for deploying such applications on resource-restricted mobile devices. Mobile intelligence needs faster mobile processors, more storage space, smaller but more accurate models, and even the assistance of other network nodes. To help the readers establish a global concept of the entire research direction concisely, we classify the latest works in this field into two categories, which are local optimization on mobile devices and distributed optimization based on the computational position of machine learning tasks. We also list a few typical scenarios to make readers realize the importance and indispensability of mobile deep learning applications. Finally, we conjecture what the future may hold for deploying deep learning applications on mobile devices research, which may help to stimulate new ideas.  相似文献   
157.
微波波束形成器是相控阵雷达、5G通信基站等射频发射系统中的核心器件。近年来硅基微波光子波束形成器以其带宽大、尺寸紧凑、重量轻、损耗低、抗电磁干扰等优势成为微波光子学中的研究热点之一。文章从微波光子波束形成的基本原理和性能指标出发,总结了近年来应用于微波光子波束形成器的多种集成可调光学真延迟线结构和波束形成网络架构,并介绍了微波光子波束形成系统集成芯片和自动化控制的最新进展,最后对硅基微波光子波束形成器的未来发展进行了展望。  相似文献   
158.
传统雷达系统在当今日益复杂的电磁环境中面临严重挑战,而集成微波光子学技术可突破传统雷达的技术瓶颈,具有大带宽、高分辨率、高复用度、高集成化等技术优势。本文基于集成微波光子技术,研制了一款硅基集成二维光控多波束形成系统样机,提出了一种基于二氧化硅平面光波导的片上集成二维光控多波束形成系统架构,结合流片加工平台完成了关键光芯片的设计流片和封装测试,最终完成系统样机整机联调测试,并对实验结果进行理论计算处理,验证了硅基集成波束形成系统的关键性能指标。系统具有大瞬时带宽、二维同时多波束、各波束多波位独立扫描的能力,与此同时兼具硅基光子集成技术的小型化、轻量化、低成本等优势,试验结果验证了集成微波光子技术应用于雷达系统的先进性和应用潜力。  相似文献   
159.
In many wireless sensor network (WSN) applications, the location of a sensor node is crucial for determining where the event or situation of interest occurred. Therefore, localization is one of the critical challenges in WSNs. Mobile anchor node assisted localization (MANAL) is one of the promising solutions for the localization of statically deployed sensors. The main problem in MANAL localization is that the path planning of the mobile anchor (MA) node should be done so that the localization error in the network will be minimal and that all unknown nodes in the network are covered. This paper proposes a new path planning approach called nested hexagons curves (NHexCurves) for MANAL. NHexCurves guarantees that it will receive messages from at least three non-collinear anchors to locate all unknown nodes in the network. The proposed model has compared six different path planning schemes in the literature using weighted centroid localization (WCL). In these comparisons, first of all, localization errors of the models are compared using some statistical concepts. Second, the variation of the localization error according to parameters such as resolution (R) and the standard deviation of noise (σ) is observed. Then, with similar approaches, the standard deviation of errors, localization ratio, scalability performances, and finally, path lengths of the models are examined. The simulation results show that the NHexCurves static path planning model proposed in this study stands out compared to other models with high localization error and localization ratio performance, especially at low resolutions, due to its path design. At the same time, the lowest error values according to σ are obtained with the proposed model among all models considered.  相似文献   
160.
Learning-based shadow detection methods have achieved an impressive performance, while these works still struggle on complex scenes, especially ambiguous soft shadows. To tackle this issue, this work proposes an efficient shadow detection network (ESDNet) and then applies uncertainty analysis and graph convolutional networks for detection refinement. Specifically, we first aggregate global information from high-level features and harvest shadow details in low-level features for obtaining an initial prediction. Secondly, we analyze the uncertainty of our ESDNet for an input shadow image and then take its intensity, expectation, and entropy into account to formulate a semi-supervised graph learning problem. Finally, we solve this problem by training a graph convolution network to obtain the refined detection result for every training image. To evaluate our method, we conduct extensive experiments on several benchmark datasets, i.e., SBU, UCF, ISTD, and even on soft shadow scenes. Experimental results demonstrate that our strategy can improve shadow detection performance by suppressing the uncertainties of false positive and false negative regions, achieving state-of-the-art results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号