首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2587篇
  免费   901篇
  国内免费   26篇
化学   13篇
力学   144篇
综合类   19篇
数学   336篇
物理学   1167篇
无线电   1835篇
  2024年   8篇
  2023年   32篇
  2022年   45篇
  2021年   60篇
  2020年   58篇
  2019年   36篇
  2018年   47篇
  2017年   78篇
  2016年   110篇
  2015年   106篇
  2014年   206篇
  2013年   211篇
  2012年   287篇
  2011年   285篇
  2010年   247篇
  2009年   205篇
  2008年   270篇
  2007年   253篇
  2006年   198篇
  2005年   159篇
  2004年   128篇
  2003年   128篇
  2002年   92篇
  2001年   67篇
  2000年   37篇
  1999年   36篇
  1998年   26篇
  1997年   27篇
  1996年   20篇
  1995年   11篇
  1994年   9篇
  1993年   6篇
  1992年   3篇
  1991年   6篇
  1990年   3篇
  1988年   4篇
  1987年   3篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1979年   1篇
  1972年   1篇
排序方式: 共有3514条查询结果,搜索用时 15 毫秒
1.
多媒体业务对无线通信的带宽与品质提出了更高的要求,OFDM和MIMO由于满足了这一需求被越来越多的无线通信标准采用所为底层的调制和传输技术。频率同步问题是OFDM—MIMO物理层设计中正确解调的前提和基础,本文介绍了OFDM—MIMO的原理、特点和频率同步问题的研究现状。  相似文献   
2.
Punctured languages are languages whose words are partial words in the sense that the letters at some positions are unknown. We investigate to which extent restoration of punctured languages is possible if the number of unknown positions or the proportion of unknown positions per word, respectively, is bounded, and we study their relationships for different boundings. The considered restoration classes coincide with similarity classes according to some kind of similarity for languages. Thus all results we can also formulate in the language of similarity. We show some hierarchies of similarity classes for each class from the Chomsky hierarchy and prove the existence of linear languages which are not δ ‐similar to any regular language for any δ < ½. For δ ≥ ½ this is unknown but it could only be possible in the case of non‐slender linear languages. (© 2006 WILEY‐VCH Verlag GmbH & Co. KGaA, Weinheim)  相似文献   
3.
本文叙述对混沌电路实现同步控制的实验研究之初步结果。所用的电路为蔡氏电路和锁相环电路。这项研究工作在通信系统中有应用前景。  相似文献   
4.
一种基于DBF的双基地雷达系统的性能分析与实验研究   总被引:1,自引:0,他引:1  
讨论了一种基于数字波束形成的脉冲追赶式双基地雷达系统的构成和基本工作原理.对该双基地雷达的性能进行了理论分析,并通过实验结果进行了验证。  相似文献   
5.
We present two different approaches to detect and quantify phase synchronization in the case of coupled non-phase coherent oscillators. The first one is based on the general idea of curvature of an arbitrary curve. The second one is based on recurrences of the trajectory in phase space. We illustrate both methods in the paradigmatic example of the R?ssler system in the funnel regime. We show that the second method is applicable even in the case of noisy data. Furthermore, we extend the second approach to the application of chains of coupled systems, which allows us to detect easily clusters of synchronized oscillators. In order to illustrate the applicability of this approach, we show the results of the algorithm applied to experimental data from a population of 64 electrochemical oscillators.  相似文献   
6.
This paper presents a simple chaotic circuit consisting of two capacitors, one linear two-port VCCS and one time-state-controlled impulsive switch. The impulsive switch causes rich chaotic and periodic behavior. The circuit dynamics can be simplified into a one-dimensional return map that is piecewise linear and piecewise monotone. Using the return map, we clarify parameter conditions for existence of chaotic and periodic attractors and coexistence state of attractors.  相似文献   
7.
State-of-the-art speech watermarking techniques enable speech signals to be authenticated and protected against any malicious attack to ensure secure speech communication. In general, reliable speech watermarking methods must satisfy four requirements: inaudibility, robustness, blind-detectability, and confidentiality. We previously proposed a method of non-blind speech watermarking based on direct spread spectrum (DSS) using a linear prediction (LP) scheme to solve the first two issues (inaudibility and robustness) due to distortion by spread spectrum. This method not only effectively embeds watermarks with small distortion but also has the same robustness as the DSS method. There are, however, two remaining issues with blind-detectability and confidentiality. In this work, we attempt to resolve these issues by developing an approach called the LP-DSS scheme, which takes two forms of data embedding for blind detection and frame synchronization. We incorporate blind detection with frame synchronization into the scheme to satisfy blind-detectability and incorporate two forms of data embedding process, front-side and back-side embedding for blind detection and frame synchronization, to satisfy confidentiality. We evaluated these improved processes by carrying out four objective tests (PESQ, LSD, Bit-error-rate, and accuracy of frame synchronization) to determine whether inaudibility and blind-detectability could be satisfied. We also evaluated all combinations with the two forms of data embedding for blind detection with frame synchronization by carrying out BER tests to determine whether confidentiality could be satisfied. Finally, we comparatively evaluated the proposed method by carrying out ten robustness tests against various processing and attacks. Our findings showed that an inaudible, robust, blindly detectable, and confidential speech watermarking method based on the proposed LP-DSS scheme could be achieved.  相似文献   
8.
提出了一种在非全局时钟光正交频分复用通信系统中的符号定时同步的高速并行算法,并阐述了该算法在现场可编程门阵列(FPGA)上的实现过程,分析频偏对系统性能的影响,并提出了补偿方法。在25km标准单模光纤通信系统中,运用该同步算法实现了2.667Gb/s数据实时传输。  相似文献   
9.
介绍了一种用数字锁相环对QPSK信号解调的方法,并将该算法在FPGA硬件中实现,给出了硬件实现FPGA的解调效果及解调的性能指标。通过解调算法和原理上的分析对QPSK信号解调全过程进行了详细说明。  相似文献   
10.
基于RSA算法和超混沌的复合加密方案   总被引:2,自引:0,他引:2  
结合RSA公钥算法和超混沌加密信号两者的优缺点,提出了一种基于RSA算法和超混沌的复合加密方案.理论分析和仿真结果表明,RSA算法抵抗选择密文攻击、公共模数攻击和低指数攻击的能力得到了提高,同时也不存在混沌加密方法在密钥空间设计上的问题.该方案充分利用了两种加密方法的优点,而克服了各自的缺点,因此其安全性能明显优于单独使用任一加密方法的安全性能.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号