首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4222篇
  免费   516篇
  国内免费   14篇
化学   33篇
力学   23篇
综合类   74篇
数学   686篇
物理学   60篇
无线电   3876篇
  2024年   4篇
  2023年   26篇
  2022年   93篇
  2021年   110篇
  2020年   138篇
  2019年   81篇
  2018年   92篇
  2017年   126篇
  2016年   137篇
  2015年   184篇
  2014年   327篇
  2013年   303篇
  2012年   318篇
  2011年   315篇
  2010年   231篇
  2009年   216篇
  2008年   258篇
  2007年   230篇
  2006年   256篇
  2005年   252篇
  2004年   194篇
  2003年   194篇
  2002年   155篇
  2001年   106篇
  2000年   120篇
  1999年   63篇
  1998年   41篇
  1997年   30篇
  1996年   32篇
  1995年   21篇
  1994年   34篇
  1993年   10篇
  1992年   9篇
  1991年   5篇
  1990年   8篇
  1989年   7篇
  1988年   5篇
  1987年   8篇
  1986年   1篇
  1985年   4篇
  1984年   3篇
  1983年   2篇
  1978年   1篇
  1977年   1篇
  1959年   1篇
排序方式: 共有4752条查询结果,搜索用时 140 毫秒
51.
近年来,随着ATM主干网络的建设和发展,研究ATM对现有通信业务的支持方式和适配技术是目前ATM技术研究的热点之一。话音ATM交换在降低话音通信成本和简化网络操作环境等方面提供了大量的技术手段,并且支持在单一网络环境中的多种综合业务传输。ATM论坛制定了电路仿真系列建议,话音ATM交换的技术已经基本成熟。文章通过对话音ATM交换在实现和优化方面的技术进行分析,并提出一种基于NativeModeATM的话音通信方式。  相似文献   
52.
A Practical Cross-Layer Mechanism For Fairness in 802.11 Networks   总被引:2,自引:0,他引:2  
Many companies, organizations and communities are providing wireless hotspots that provide networking access using 802.11b wireless networks. Since wireless networks are more sensitive to variations in bandwidth and environmental interference than wired networks, most networks support a number of transmission rates that have different error and bandwidth properties. Access points can communicate with multiple clients running at different rates, but this leads to unfair bandwidth allocation. If an access point communicates with a mix of clients using both 1 Mb/s and 11 Mb/s transmission rates, the faster clients are effectively throttled to 1 Mb/s as well. This happens because the 802.11 MAC protocol approximate “station fairness”, with each station given an equal chance to access the media. We provide a solution to provide “rate proportional fairness”, where the 11 Mb/s stations receive more bandwidth than the 1 Mb/s stations. Unlike previous solutions to this problem, our mechanism is easy to implement, works with common operating systems and requires no change to the MAC protocol or the stations. Joseph Dunn received an M.S. in computer science from the University of Colorado at Boulder in 2003, and B. S. in coputer science and mathematics from the University of Arizona in 2001. His research interests are in the general area of computer systems, primarily focusing on security and scalability in distributed systems. He is currently working on his Ph.D. in computer science from the University of Colorado at Boulder. Michael Neufeld received a Ph.D. in Computer Science from the University of Colorado at Boulder in December of 2004, having previously received an M.S. in Computer Science from the University of Colorado at Boulder in 2000 and an A.B. in Computer Science from Princeton University in 1993. His research interests are in the general area of computer system, specifically concentrating on wireless networking, software defind/cognitive radio, and streerable antennas. He is currently a postdoc in the Computer Science department at the University of Calorado at Boulder pursuing research related to software defined radio and new MAC protocols for steerable phase array antennas. Anmol Sheth is a Ph.D. student in Computer Science at the University of Colorado at Boulder. He received his B.S. in Computer Science from the University of Pune, India in 2001. He has been co-leading the development of the MANTIS operating system. He has co-authored three papers include MAC layer protocol design, energy-efficient wireless communication, and adapting communications to mobility. Dirk Grunwald received his Ph.D. from the University of Illinois in 1989 and joined the University of Colorado the same year. His work addresses research and teaching in the broad area of “computer systems”, which includes computer architecture, operating systems, networks, and storage systems. His interests also include issues in pervasive computing, novel computing models, and enjoying the mountains. He is currently an Associate Professor in the Department of Computer Science and in Electrical and Computer Engineering and is also the Director of the Colorado Center for Information Storage. John Bennett is a Professor of Computer Science with a joint appointment in Electrical and Computer Engineering at the University of Colorado at Boulder. He also serves as Associate Dean for Education in the College of Engineering and Applied Science. He joined the CU-Boulder faculty in 2000, after serving on the faculty of Rice University for 11 years. While at Rice, Bennett pioneered a course in engineering design for both engineering and non-engineering students that has been emulated at several universities and high schools. In addition to other teaching awards, Bennett received the Keck Foundation National Award for Engineering Teaching Excellence for his work on this course. Bennett received his Ph.D. in 1988 from the University of Washington. Prior to completing his doctoral studies, he was a U.S. Naval Officer for several years and founded and served as President of Pacific Mountain Research, Inc., where he supervised the design and development of a number of commercial computing systems. Bennett's primary research interests are broadly focused in the area of distributed systems, and more narrowly in distributed information management and distributed robotic macrosensors.  相似文献   
53.
资源共享方式若干问题的研讨   总被引:3,自引:1,他引:2  
社会公用服务系统和工程技术系统,存在共同的资源共享问题。本文通过典例就资源共享方式的若干问题加以探究:讨论广义的多用户系统中人工资源共享方式的分类;阐述常用的共享方式的特点、优缺点;分析系统时间性能及其改进与共享方式的关系等。文章还提出在系统工程范畴里,应对社会公用服务和工程技术两类系统的资源共享方式予以综合研究,并相互借鉴和移植。  相似文献   
54.
本文对宽带综合通信网交换系统几个主要方面技术的发展趋向作了概括介绍,内容包括:电子交换的分布结构、ATM交换的开始应用,个人通信的无线进网,宽带交换引用光子技术和多媒体交换结构分析。  相似文献   
55.
超大型航天结构具有超大柔性、超低固有频率的特点,空间机器人在轨组装时应尽可能避免激起超大型结构的柔性振动.空间机器人组装超大型结构模块的过程分成抓捕阶段、位姿调整与稳定阶段、安装阶段和爬行阶段.通过对安装阶段的动力学与控制研究,提出共线安装的轨迹规划方法,有效避免了柔性结构振动.首先,采用自然坐标法和绝对节点坐标法建立主结构-空间机器人-待组装结构的在轨组装系统动力学模型.然后,将共线安装的要求转化为空间机器人的轨迹规划约束,要求空间机器人质心到主结构/待组装结构的距离保持不变,实现共线安装的轨迹规划.数值仿真表明:提出的组装方法在组装过程中可有效避免超大型结构的横向运动,降低夹持力矩.最后,分析了系统参数对组装过程动力学响应的影响,为超大型航天器的在轨组装提供了参考.  相似文献   
56.
灾害发生后,应急资源的需求预测与应急配送中心的合理选址是实现高效救援的关键。本文通过在网格化管理视角下的信息更新将应急救援过程划分为多个阶段,在开展救援的过程中实现救援信息收集和救援预测的同步开展,建立一种多阶段带时间约束的应急救援物资配送响应-时效性的选址模型。借助遗传算法(NSGA-II),实现了基于编码结构独立、路径相互关联基础上的多目标规划求解。本研究的决策模型及算法有着较好的搜索与寻优能力,对实际救援开展具有指导意义。  相似文献   
57.
针对现有船舶过闸排队规则的欠缺,基于“限时服务规则”,构建复线船闸多目标双层优化调度模型:上层模型用于获得两个闸室安全区域的船舶排布可行方案;下层模型用于获得不同船舶排布可行方案的优化闸次数。下层模型分两个阶段完成:对符合“限时服务规则”的船舶,构建以闸次最少为目标的0-1规划模型,获得此类船舶安排的闸次;对其余船舶按照“先到先服务规则”,构建以闸次最少、闸室利用率最大为目标的多目标决策模型,获得不同船舶排布可行方案应该安排的频次。以位于江苏省干线航道上的某复线船闸某日24小时内过闸船舶的数据为例,计算结果表明:采用本文优化模型获得的优化方案与“经验编排方式”相比,两座船闸各节约2个闸次,两个船闸的平均闸室利用率分别提高了3.66和4.72个百分点。  相似文献   
58.
崔晓  程敏  敦帅 《运筹与管理》2022,31(10):61-67
考虑政府补贴、市场化程度、养老机构服务成本、老年人偏好等因素,构建了完全国有化、公私并存的半市场化和完全市场化三种情形下公办和民办养老机构之间的两阶段博弈模型,比较分析了市场化程度对养老机构服务价格制定和服务水平选择的影响,实证讨论了各参数变化对养老机构收益及社会福利的影响。研究表明:完全市场化机制会降低养老机构服务质量,完全国有化机制会陷入社会福利陷阱,探索公私并存的最佳市场化水平才能更好地提高社会福利;适度推进市场化改革,提高养老机构服务水平,降低民办养老机构服务成本,适度提高对民办养老机构的补贴,将有效缓解公办和民办养老机构的不公平竞争;提高老年人支付能力,推进养老机构供给侧结构性改革,将保障机构养老服务的有效供给,促进养老服务业的健康有序发展。  相似文献   
59.
The low-earth orbit (LEO) satellite network, composed of a large number of satellite nodes, is a hot research topic at present. Due to the characteristics of the large-scale LEO satellite network, such as many satellite nodes, short orbit period, large dynamic change of topology, and unstable link-state, its communication quality of service (QoS) requirements are difficult to meet. Aiming at this problem, various factors that may affect data transmission are first analyzed. The network link selection problem is modeled as a multi-constraint optimization decision problem, a routing mathematical model based on linear programming (LP) is designed, and its solution is solved. Aiming at the problem of limited onboard computing resources, a multi-object optimization Dijkstra algorithm (MOODA) is designed. The MOODA finds the optimal path according to the comprehensive performance of the link. It solves the problems of poor comprehensive QoS performance and the low degree of load balancing of the paths found by the Dijkstra algorithm. The simulation results show that the paths found by the two algorithms have good QoS, robustness, and load balancing performance.  相似文献   
60.
Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable. With the goal of shielding network systems from illegal access in cloud servers and IoT systems, Intrusion Detection Systems (IDSs) and Network-based Intrusion Prevention Systems (NBIPSs) are proposed in this study. An intrusion prevention system is proposed to realize NBIPS to safeguard top to bottom engineering. The proposed NBIPS inspects network activity streams to identify and counteract misuse instances. The NBIPS is usually located specifically behind a firewall, and it provides a reciprocal layer of investigation that adversely chooses unsafe substances. Network-based IPS sensors can be installed either in an inline or a passive model. An inline sensor is installed to monitor the traffic passing through it. The sensors are installed to stop attacks by blocking the traffic using an IoT signature-based protocol.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号