首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2695篇
  免费   484篇
  国内免费   42篇
化学   21篇
力学   78篇
综合类   44篇
数学   692篇
物理学   505篇
无线电   1881篇
  2024年   5篇
  2023年   28篇
  2022年   51篇
  2021年   65篇
  2020年   87篇
  2019年   56篇
  2018年   63篇
  2017年   94篇
  2016年   110篇
  2015年   112篇
  2014年   209篇
  2013年   202篇
  2012年   220篇
  2011年   202篇
  2010年   150篇
  2009年   177篇
  2008年   179篇
  2007年   167篇
  2006年   153篇
  2005年   138篇
  2004年   110篇
  2003年   106篇
  2002年   104篇
  2001年   99篇
  2000年   64篇
  1999年   47篇
  1998年   42篇
  1997年   44篇
  1996年   24篇
  1995年   22篇
  1994年   22篇
  1993年   14篇
  1992年   9篇
  1991年   7篇
  1990年   5篇
  1989年   3篇
  1988年   5篇
  1987年   6篇
  1986年   4篇
  1985年   5篇
  1984年   5篇
  1983年   2篇
  1980年   1篇
  1979年   1篇
  1974年   2篇
排序方式: 共有3221条查询结果,搜索用时 15 毫秒
111.
A directed balanced incomplete block design (or D B(k,;v)) (X,) is called self-converse if there is an isomorphic mapping f from (X,) to (X,–1), where –1={B –1:B} and B –1=(x k ,x k –1,,x 2,x 1) for B=(x 1,x 2,,x k –1,x k ). In this paper, we give the existence spectrum for self-converse D B(4,1;v). AMS Classification:05BResearch supported in part by NSFC Grant 10071002 and SRFDP under No. 20010004001  相似文献   
112.
We address the problem of finding the worst possible traffic a user of a telecommunications network can send. We take worst to mean having the highest effective bandwidth, a concept that arises in the Large Deviation theory of queueing networks. The traffic is assumed to be stationary and to satisfy leaky bucket constraints, which represent the a priori knowledge the network operator has concerning the traffic. Firstly, we show that this optimization problem may be reduced to an optimization over periodic traffic sources. Then, using convexity methods, we show that the realizations of a worst case source must have the following properties: at each instant the transmission rate must be either zero, the peak rate, or the leaky bucket rate; it may only be the latter when the leaky bucket is empty or full; each burst of activity must either start with the leaky bucket empty or end with it full.  相似文献   
113.
We introduce and analyze a simple probabilistic cellular automaton which emulates the flow of cars along a highway. Our Traffic CA captures the essential features of several more complicated algorithms, studied numerically by K. Nagel and others over the past decade as prototypes for the emergence of traffic jams. By simplifying the dynamics, we are able to identify and precisely formulate the self-organized critical evolution of our system. We focus here on the Cruise Control case, in which well-spaced cars move deterministically at maximal speed, and we obtain rigorous results for several special cases. Then we introduce a symmetry assumption that leads to a two-parameter model, described in terms of acceleration () and braking () probabilities. Based on the results of simulations, we map out the (, ) phase diagram, identifying three qualitatively distinct varieties of traffic which arise, and we derive rigorous bounds to establish the existence of a phase transition from free flow to jams. Many other results and conjectures are presented. From a mathematical perspective, Traffic CA provides local, particle-conserving, one-dimensional dynamics which cluster, and converge to a mixture of two distinct equilibria.  相似文献   
114.
For the stationary loss systems M/M/m/K and GI/M/m/K, we study two quantities: the number of lost customers during the time interval (0,t] (the first system only), and the number of lost customers among the first n customers to arrive (both systems). We derive explicit bounds for the total variation distances between the distributions of these quantities and compound Poisson–geometric distributions. The bounds are small in the light traffic case, i.e., when the loss of a customer is a rare event. To prove our results, we show that the studied quantities can be interpreted as accumulated rewards of stationary renewal reward processes, embedded into the queue length process or the process of queue lengths immediately before arrivals of new customers, and apply general results by Erhardsson on compound Poisson approximation for renewal reward processes.  相似文献   
115.
Núñez-Queija  R. 《Queueing Systems》2000,34(1-4):351-386
We study the sojourn times of customers in an M/M/1 queue with the processor sharing service discipline and a server that is subject to breakdowns. The lengths of the breakdowns have a general distribution, whereas the on-periods are exponentially distributed. A branching process approach leads to a decomposition of the sojourn time, in which the components are independent of each other and can be investigated separately. We derive the Laplace–Stieltjes transform of the sojourn-time distribution in steady state, and show that the expected sojourn time is not proportional to the service requirement. In the heavy-traffic limit, the sojourn time conditioned on the service requirement and scaled by the traffic load is shown to be exponentially distributed. The results can be used for the performance analysis of elastic traffic in communication networks, in particular, the ABR service class in ATM networks, and best-effort services in IP networks.  相似文献   
116.
Gautam  N.  Kulkarni  V.G. 《Queueing Systems》2000,36(4):351-379
In this paper, we consider the stochastic fluid-flow model of a single node in a high-speed telecommunication network handling multi-class traffic. The node has multiple buffers, one for each class of traffic. The contents of these buffers are multiplexed onto a single output channel using one of the service scheduling policies: the Timed Round Robin Policy or the Static Priority Service Policy. The Quality of Service requirements for each class are based on cell loss probabilities. Using effective bandwidth methodologies and the recently developed bounds for semi-Markov modulated traffic, we solve call admission control problems for the two service scheduling policies at this node. We compare the performance of the effective bandwidth methodologies and the SMP bounds technique. We also numerically compare the performance of the two service scheduling policies.  相似文献   
117.
低噪声通过特性的测量仿真研究   总被引:1,自引:0,他引:1       下载免费PDF全文
本文研究运用组合传感器和声压、振速联合信息处理技术进行低品声通过特性的测量。通过特性的背景噪声出非相干的各向同性白噪声和相干的交通干扰组成,交通干扰又分为平稳与非平稳两种,用平均声强器来抗非相干干扰;用交通干扰能量流中心方位抑制技术来抗平稳的相干干扰;对于非平稳的相干干扰而能量流中心方位抑制技术。仿真试验表明效果良好。  相似文献   
118.
车辆的长度和速度对单车道混合交通流的影响   总被引:4,自引:0,他引:4       下载免费PDF全文
在NaSch交通流模型的基础上,建立了单车道上由两种长度不一样、可分别以不同最大速度行驶的车辆构成的混合交通流模型.在周期性边界条件下,通过计算机模拟研究了车辆的长度、最大速度和混合比例系数对混合交通流的影响. 关键词: 元胞自动机 混合交通流 计算机模拟  相似文献   
119.
许毅  潘浩  范戈 《光通信研究》2007,33(5):11-14
文章给出了基于通用多协议标签交换(GMPLS)的光突发交换(OBS)对等体系(GLOBS)的功能结构和分层视图.在此范畴内,针对标签空间减小和流量工程两方面,结合国内外最新的研究动态,比较了各种已有技术的优缺点,并提出了适合于GLOBS体系的可能的解决方案以及今后工作的重要技术问题.  相似文献   
120.
蔡超  金翊 《微电子学与计算机》2007,24(6):150-152,155
以对称三进制光学半加器为基础,提出了一个对称三进制光学全加器方案。主要介绍了进位直达并行通道在对称三进制光学全加器中的实现方案和工作原理,从而论证了实现对称三进制光学全加器的可行性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号