全文获取类型
收费全文 | 2427篇 |
免费 | 351篇 |
国内免费 | 30篇 |
专业分类
化学 | 16篇 |
力学 | 6篇 |
综合类 | 18篇 |
数学 | 33篇 |
物理学 | 159篇 |
无线电 | 2576篇 |
出版年
2024年 | 4篇 |
2023年 | 15篇 |
2022年 | 25篇 |
2021年 | 36篇 |
2020年 | 38篇 |
2019年 | 46篇 |
2018年 | 59篇 |
2017年 | 72篇 |
2016年 | 93篇 |
2015年 | 129篇 |
2014年 | 206篇 |
2013年 | 137篇 |
2012年 | 261篇 |
2011年 | 234篇 |
2010年 | 202篇 |
2009年 | 163篇 |
2008年 | 173篇 |
2007年 | 209篇 |
2006年 | 172篇 |
2005年 | 137篇 |
2004年 | 109篇 |
2003年 | 82篇 |
2002年 | 67篇 |
2001年 | 32篇 |
2000年 | 36篇 |
1999年 | 19篇 |
1998年 | 15篇 |
1997年 | 15篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1994年 | 8篇 |
1992年 | 3篇 |
1989年 | 2篇 |
1987年 | 1篇 |
1986年 | 1篇 |
排序方式: 共有2808条查询结果,搜索用时 265 毫秒
911.
准连续波雷达是一种低截获概率雷达,结合了脉冲雷达收发隔离和连续波雷达截获概率低的优点,但其检测性能的优劣很大程度依赖于信号形式,普通的编码信号和线性调频信号已经不能满足其对目标探测的要求。为解决这个问题,设计了一种三频段信号和与之相应的收发系统,对系统结构及三频段信号的参数选择原则、目标检测原理、模糊函数、抗近距离盲区性能做了详细分析,并指出了三频段信号相对于相位编码信号和分时发射信号的优势所在,最后通过仿真证明,将三频段信号应用于准连续波体制雷达中时能准确探测目标,得到目标的各个参数并且能有效消除近距离盲区。 相似文献
912.
针对敌我识别系统在现代战争中的保密要求,提出一种将马尔科夫系统识别技术应用于敌我识别的新方法,每个发射机按照系统分配的转移矩阵发射随机码,接收机利用已知的不同我方作战单元的转移矩阵,判断码序列所属,实现我方目标的识别。与传统方法相比,发射机每次按照一定的转移概率发射服从马尔科夫分布的随机编码,大大提高了敌方截获和破译的难度,提升了系统的抗欺骗干扰性能。仿真结果表明,该方法在发射序列比较长的情况下,可以获得准确的识别结果。 相似文献
913.
914.
针对经典FastICA不能对含噪盲信号进行较好的分离,提出了一种基于偏移FastICA及支持向量机(SVM)的含噪通信盲信号分离与调制方式识别的方法.其核心思想是首先对接收到的含有高斯白噪声的盲信号运用偏移FastICA进行分离,然后对分离出的信号分别提取5种特征参数,利用SVM对其数字调制方式识别,理论研究和仿真结果证明:偏移FastICA对含噪盲信号分离效果好,在信噪比不低于10 dB时,调制识别率可以达到93%以上,能够较好地识别2ASK,4ASK,2FSK,4FSK,2PSK,4PSK,16QAM信号,具有一定的可行性. 相似文献
915.
In blind quantum computation (BQC), a client with weak quantum computation capabilities is allowed to delegate its quantum computation tasks to a server with powerful quantum computation capabilities, and the inputs, algorithms and outputs of the quantum computation are confidential to the server. Verifiability refers to the ability of the client to verify with a certain probability whether the server has executed the protocol correctly and can be realized by introducing trap qubits into the computation graph state to detect server deception. The existing verifiable universal BQC protocols are analyzed and compared in detail. The XTH protocol (proposed by Xu Q S, Tan X Q, Huang R in 2020), a recent improvement protocol of verifiable universal BQC, uses a sandglass-like graph state to further decrease resource expenditure and enhance verification capability. However, the XTH protocol has two shortcomings: limitations in the coloring scheme and a high probability of accepting an incorrect computation result. In this paper, we present an improved version of the XTH protocol, which revises the limitations of the original coloring scheme and further improves the verification ability. The analysis demonstrates that the resource expenditure is the same as for the XTH protocol, while the probability of accepting the wrong computation result is reduced from the original minimum (0.866)d* to (0.819)d*, where d* is the number of repeated executions of the protocol. 相似文献
916.
This paper focuses on the separation for time–frequency (TF) overlapped communication signals received by the sensors. A novel blind separation strategy is proposed to improve the poor performance of signal separation by traditional algorithms for convolutional mixtures in underdetermined cases. Firstly, the number of sources and cluster centers are obtained in the sparse domain by combining the density peak clustering (DPC) with fuzzy c-means (FCM) clustering algorithm; Then the GMM clustering algorithm is applied to calculate the membership degree of the source signal in the mixed signals, so as to construct a TF soft mask matrix to more precisely carry out separation for TF overlapped signals. In this paper, the separation simulations are conducted with the digital modulation signals of 2ASK, BPSK, QPSK, etc. The results show that the algorithm proposed in this paper has better anti-aliasing and anti-noise performance than the comparison algorithms. 相似文献
917.
A multiple jammer localization algorithm in multi-hop wireless networks was proposed. The proposed algo-rithm contained three steps, packet delivery ratio (PDR) valley point determination based on gradient descent algorithm, received jamming signal strength (RJSS) peak point determination based on gradient ascent algorithm and cluster analysis. Firstly, the algorithm started from a few initial nodes and moved along the gradient descent direction of PDR to approach the jammers until reaches the PDR valley point. Then, the algorithm moved toward the jammers using power adaptation technique based on RJSS gradient ascent process until it reached the RJSS peak point. Finally, through applying cluster analysis on the neighbour nodes which fail to communicate with RJSS peak points, the number and positions of the jam-mers can be estimated. Experimental results have verified that the proposed algorithm can improve the accuracy of local-ization compared with existed localization algorithms. Furthermore, the performance of the proposed algorithm is promi-nent when the distance of jammers accords with constraint condition. 相似文献
918.
919.
为了实现非协作环境下的通信信号信噪比估计,本文在功率谱分析的基础上,提出了一种基于功率谱差分的信噪比盲估计算法,并将其与传统的基于奇异值分解的信噪比盲估计算法进行了比较。理论与仿真结果表明,与传统方法相比,本文提出的算法不但复杂度低,而且在低信噪比情形下仍具有较高的估计精确度和稳健性。 相似文献
920.
针对导弹在飞行中段实现突防的电子干扰要求,提出了采用分布式星载有源干扰的方法来实现。为了有效计算各干扰机对目标雷达的干扰功率,巧妙利用空间两条直线的夹角公式,求得干扰机主瓣方向与该干扰机到雷达连线方向的夹角和雷达主瓣方向与雷达到各干扰机连线方向的夹角,从而将该方法从二维推广到三维。提出了有干扰和无干扰情况下,雷达探测区的通用公式。所提方法不仅适用于单干扰机对单雷达,也可用于多干扰机对多雷达场景。最后进行了详细的仿真分析,验证了理论分析的正确性和有效性。 相似文献