首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2188篇
  免费   271篇
  国内免费   6篇
化学   18篇
力学   4篇
综合类   10篇
数学   40篇
物理学   427篇
无线电   1966篇
  2025年   19篇
  2024年   47篇
  2023年   46篇
  2022年   45篇
  2021年   43篇
  2020年   62篇
  2019年   38篇
  2018年   49篇
  2017年   55篇
  2016年   62篇
  2015年   70篇
  2014年   142篇
  2013年   112篇
  2012年   148篇
  2011年   159篇
  2010年   78篇
  2009年   87篇
  2008年   136篇
  2007年   107篇
  2006年   102篇
  2005年   97篇
  2004年   74篇
  2003年   77篇
  2002年   70篇
  2001年   80篇
  2000年   88篇
  1999年   63篇
  1998年   42篇
  1997年   41篇
  1996年   58篇
  1995年   49篇
  1994年   24篇
  1993年   10篇
  1992年   4篇
  1991年   10篇
  1990年   16篇
  1989年   13篇
  1988年   9篇
  1986年   2篇
  1985年   6篇
  1984年   4篇
  1983年   2篇
  1979年   3篇
  1978年   3篇
  1977年   3篇
  1976年   1篇
  1975年   1篇
  1974年   2篇
  1973年   3篇
  1972年   1篇
排序方式: 共有2465条查询结果,搜索用时 15 毫秒
61.
基于自由空间光通讯(FSO)技术和OCDMA编码调制技术实现了自由空间语音异地通讯,具有高速高效、抗干扰能力强、保密性好等优点。系统设计采用双CPU结构,主控CPU单元主要实现语音采集、信号编码、数字调制等功能,辅单片机则为FSO关键技术ATP伺服系统的控制核心,论述了设计要点,并给出了测试结果。  相似文献   
62.
Wireless communication research is evolving towards integration, inter-working and convergence of wireless systems, which will lead to several concepts of simultaneous use. In the present paper, a coherent set of 10 concepts of simultaneous use is identified, and structured into a space of simultaneous use, where services, systems and operators act as building components. A high level analysis is performed, where the pros and cons of the different concepts are identified. Illustrative examples are also provided for some concepts. Several parameters are listed for the evaluation and comparison of simultaneous use concepts (e.g., cost, throughput and complexity), depending on taking either a users or an operators perspective. One of the largest benefits of this systematic identification of simultaneous use concepts is the identification, from the perspective of users and operators, of essential R&D issues on inter-working and integration, which will lead to a promising pervasive wireless communications future.  相似文献   
63.
64.
    
In this paper, we propose an energy‐efficient power control and harvesting time scheduling scheme for resource allocation of the subchannels in a nonorthogonal multiple access (NOMA)–based device‐to‐device (D2D) communications in cellular networks. In these networks, D2D users can communicate by sharing the radio resources assigned to cellular users (CUs). Device‐to‐device users harvest energy from the base station (BS) in the downlink and transmit information to their receivers. Using NOMA, more than one user can access the same frequency‐time resource simultaneously, and the signals of the multiusers can be separated successfully using successive interference cancellation (SIC). In fact, NOMA, unlike orthogonal multiple access (OMA) methods, allows sharing the same frequency resources at the same time by implementing adaptive power allocation. Our aim is to maximize the energy efficiency of the D2D pairs, which is the ratio of the achievable throughput of the D2D pairs to their energy consumption by allocating the proper subchannel of each cell to each device user equipment (DUE), managing their transmission power, and setting the harvesting and transmission time. The constraints of the problem are the quality of service of the CUs, minimum required throughput of the subchannels, and energy harvesting of DUEs. We formulate the problem and propose a low‐complexity iterative algorithm on the basis of the convex optimization method and Karush‐Kuhn‐Tucker conditions to obtain the optimal solution of the problem. Simulation results validate the performance of our proposed algorithm for different values of the system parameters.  相似文献   
65.
    
Content sharing via device‐to‐device (D2D) communications has become a promising method to increase system throughput and reduce traffic load. Due to the characteristic of spectrum sharing in D2D network, confidentiality is becoming a key issue in content transmission. Secure communication in D2D networks is generally guaranteed by a physical‐layer security mechanism. However, this method sacrifices the system transmission rate while ensuring security. Since mobile devices are carried by humans, we can leverage their trust relations to enhance the security of communications. As much, considering the psychology structure and social attributes of mobile users, we build a multidimensional trust evaluation mechanism to evaluate the trust relationship between users, and we pick out the trusted users based on the decision‐theoretic rough sets. By sharing content only between trust users, we can enhance the security of content transmissions without relying on physical‐layer security measures. Meanwhile, content caching is now widely used to improve accessing efficiency and reduce traffic load on cellular networks. However, caching content for other users incurs additional cost, which results in selfish and noncooperative behavior in users. Considering such selfishness, we introduce a cooperative caching game based on multidimensional trust relations to motivate users to cache contents for other devices. In this game, the trust relations and physical distance between two users are considered to formulate the cost function. Furthermore, we introduce an incentive caching algorithm based on social trust to minimize the total cost in the D2D network.  相似文献   
66.
    
Digital marketing has been extensively researched and developed remarkably rapidly over the last decade. Within this field, hundreds of scientific publications and patents have been produced, but the accuracy of prediction technologies leaves much to be desired. Conversion prediction remains a problem for most marketing professionals. In this article, the authors, using a dataset containing landing pages content and their conversions, show that a detailed analysis of text readability is capable of predicting conversion rates. They identify specific features that directly affect conversion and show how marketing professionals can use the results of this work. In their experiments, the authors show that the applied machine learning approach can predict landing page conversion. They built five machine learning models. The accuracy of the built machine learning model using the SVM algorithm is promising for its implementation. Additionally, the interpretation of the results of this model was conducted using the SHAP package. Approximately 60% of purchases are made by nonmembers, and this paper may be suitable for the cold-start problem.  相似文献   
67.
Based on the Left Perfect Shuffle (LPS) optical communication network constructed by cascade multi-stage LPS interconnection, using Looping algorithm, any arbitrary sequence of the input signals can be realized. However, instead of obtaining the simultaneous state codes of the same level node switches through mathematical analytical expressions directly, only routing tags of each channel can be obtained through mathematical analytical expressions so as to draw out topological chart of the network to obtain the state codes implied in the chart. Thus, the states of the switches cannot be directly programmed and controlled by computer in practical application. In this paper, based on the Looping algorithm, a method of stage code matrixes is presented to resolve this problem. By using the method, the simultaneous state codes of the same level’s four node switches can be directly obtained, which is convenient for the computer to provide controlled signals needed to finish the permutation for each node switch. The method of stage code matrixes provides further theoretical basis for the realization of optical switching by integration of Perfect Shuffle and high-speed optical switches.  相似文献   
68.
分析了现有的突发汇聚算法,同时针对现有汇聚算法的一些特点,提出了一种新型突发包汇聚算法,可以实现在不同网络负载的情况下,根据到达边缘节点的速率同时结合网络的性能(丢包率),动态的调整突发包汇聚的门限值,从而实现了智能组包,克服了原有算法简单,不灵活的缺点.通过仿真结果可以得知,该算法可以明显改善光突发交换网络的丢包率和时延性能,能够很好地支持实时性要求很高的数据业务.  相似文献   
69.
We investigate a new parallel all-optical clock recovery scheme based on heterodyne beats of an optical sideband-filtered signal. The oscillating clock signal is recovered when the filtered sideband is combined with a stable local oscillator. The filtering is performed with an optical resonator, which by nature provides possibility for multiwavelength operation. The local oscillator could be realized by a multiwavelength laser, whose emission wavelengths are injection seeded with carrier wavelengths of the input data. The output signal of such a configuration benefits from a reduced bit-pattern effect and a stable offset level. The sideband filtering is demonstrated for 23 simultaneous channels at 100 GHz DWDM grid, each hosting a data stream of 10 Gbit/s.  相似文献   
70.
In this paper, the effects of atmospheric turbulence on the intensity distribution of a tilted Rectangular Partially Coherent Flat-Topped (RPCFT) beam were studied. An analytical formula for the intensity distribution was derived. POWER In Bucket (PIB) value is calculated numerically. The effects of source parameters – such as correlation length, order of flatness and tilt coefficient – on the intensity were analyzed. Detailed analysis demonstrates that these parameters have an influence on beam propagation properties. The analyses are illustrated by numerical examples and graphs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号