首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6187篇
  免费   758篇
  国内免费   60篇
化学   14篇
力学   5篇
综合类   25篇
数学   61篇
物理学   274篇
无线电   6626篇
  2024年   19篇
  2023年   93篇
  2022年   84篇
  2021年   124篇
  2020年   217篇
  2019年   108篇
  2018年   105篇
  2017年   196篇
  2016年   264篇
  2015年   361篇
  2014年   589篇
  2013年   491篇
  2012年   640篇
  2011年   581篇
  2010年   396篇
  2009年   356篇
  2008年   385篇
  2007年   403篇
  2006年   368篇
  2005年   266篇
  2004年   225篇
  2003年   222篇
  2002年   181篇
  2001年   134篇
  2000年   66篇
  1999年   46篇
  1998年   19篇
  1997年   16篇
  1996年   21篇
  1995年   19篇
  1994年   6篇
  1992年   3篇
  1991年   1篇
排序方式: 共有7005条查询结果,搜索用时 15 毫秒
21.
重点讨论了现代无线通信中关键元器件之一滤波器的发展进程,中、高频及微波滤波器的主要类型及性能特点。低损耗、高介电常数陶瓷在RF和IF滤波器中的应用,能够实现无线设备的微型化。对制备滤波器的介质陶瓷材料的要求是:在所使用的波段内,相对介电常数r要大,可缩小介质元件的尺寸;品质因数Q要高,可获得良好的滤波特性及通讯质量;谐振频率的温度系数f接近于零或可调节,以达到整机电子回路的要求。  相似文献   
22.
A Review of Wavelets for Digital Wireless Communication   总被引:2,自引:1,他引:1  
Wavelets have been favorably applied in almost all aspects of digital wireless communication systems including data compression, source and channel coding, signal denoising, channel modeling and design of transceivers. The main property of wavelets in these applications is in their flexibility and ability to characterize signals accurately. In this paper recent trends and developments in the use of wavelets in wireless communications are reviewed. Major applications of wavelets in wireless channel modeling, interference mitigation, denoising, OFDM modulation, multiple access, Ultra Wideband communications, cognitive radio and wireless networks are surveyed. The confluence of information and communication technologies and the possibility of ubiquitous connectivity have posed a challenge to developing technologies and architectures capable of handling large volumes of data under severe resource constraints such as power and bandwidth. Wavelets are uniquely qualified to address this challenge. The flexibility and adaptation provided by wavelets have made wavelet technology a strong candidate for future wireless communication. Madan Kumar Lakshmanan was born in Chennai, India, in 1979. He received the B.E. (with distinction) in electrical engineering from the University of Madras, Chennai, India, in 2000. He joined the Indian Software firm, Polaris Software Labs Ltd., in 2000 where he wrote software for Telecommunication applications. At Polaris, he was awarded the “On The Spot Of Excellence Award” for his efforts. In 2003, he moved to the Indian Institute of Technology-Madras, to develop and establish a wireless communications network for rural connectivity. In 2004, he was awarded the Royal Dutch/Shell Chevning scholarship to pursue a Master degree in Telecommunications at the Delft University of Technology (TUDelft). At TUDelft he is affiliated to the International Research Center for Telecommunications-Transmission and Radar (IRCTR) where he is undertaking research in the field of wavelets applications in Wireless Communications. Homayoun Nikookar received his Ph.D. in Electrical Engineering from Delft University of Technology (TUDelft), The Netherlands, in 1995. From 1995 to 1998 he was a postdoc researcher at the International Research Center for Telecommunications-Transmission and Radar, TUDelft, where since 1999 he has been an Assistant Professor. Dr. Nikookar has done research on different areas of wireless communications, including wireless channel modeling, UWB, MIMO, multicarrier transmission, Wavelet-based OFDM and CDMA. He is a senior member of the IEEE.  相似文献   
23.
White LED is considered as a strong candidate for the future lighting technology. We have proposed an optical wireless communication system that employs white LEDs for indoor wireless networks. In this system, LED is used not only as a lighting device, but also as a communication device. The transmitter has large optical power and large emission characteristics to function as lighting device. And the system has specific wireless channel impulse response differing from infrared wireless communication. In this paper, we discuss about shadowing effect on the system utilizing plural LED lightings including the performance of ISI based on the impulse response. We consider the downlink transmission based on TDMA and evaluate the shadowing effect caused by pedestrians with computer simulation. When the shadowing often occurs at 800 Mb/s, the performance of outage call duration rate and blocking rate are improved by using 3 LED lightings compared with 1 or 2 LED lightings. And, we show that the system with the optimal number of the LED lighting is robust against shadowing and can accommodate more calls. Toshihiko Komine was born in Shizuoka, Japan, on November 17, 1978. He received the B.E. and M.E. degrees in Information and Computer Science from Keio University, Yokohama, Japan, in 2001 and 2003 respectively. He is currently studying for the Ph.D. degree at Department of Information and Computer Science, Keio University. His current research interests are optical wireless communications and LED communications. Shinichiro Haruyama is a professor at Department of Information and Computer Science, Faculty of Science and Technology, Keio University, Yokohama, Japan. He received an M.S. in engineering science from University of California at Berkeley in 1983 and a Ph.D. in computer science from the University of Texas at Austin in 1990. He worked for Bell Laboratories of AT{&}T and Lucent Technologies, U.S.A from 1991 to 1996, and for Sony Computer Science Laboratories, Inc. from 1998 to 2002. His research interests include reconfigurable system, system design automation, wireless communication, and visible light communication. Masao Nakagawa was born in Tokyo, Japan in 1946. He received the B.E., M.E. and Ph.D. degrees in electrical engineering from Keio University, Yokohama, Japan, in 1969, 1971 and 1974 respectively. Since 1973, he has been with the Department of Electrical Engineering, Keio University, where he is now a Professor. His research interests are in CDMA, consumer Communications, Mobile communications, ITS (Intelligent Transport Systems), Wireless Home Networks, and Visible light Communication. He received 1989 IEEE Consumer Electronics Society Paper Award, 1999-Fall Best Paper Award in IEEE VTC, IEICE Achievement Award in 2000, IEICE Fellow Award in 2001. He was the executive committee chairman on International Symposium on Spread Spectrum Techniques and Applications in 1992 and the technical program committee chairman of ISITA (International Symposium on Spread Spectrum Techniques and Applications) in 1994. He is an editor of Wireless Personal Communications and was a guest editor of the special issues on “CDMA Networks I, II, III and IV” published in IEEE JSAC in 1994 (I and II) and 1996 (III and IV). He chairs the Wireless Home Link sub-committee in MMAC (Multimedia Mobile Access Communication Promotion Committee).  相似文献   
24.
CDMA2000 1xEV-DO中的分组调度算法   总被引:1,自引:0,他引:1  
移动通信系统需要更好地支持分组数据业务,并满足高速分组数据业务的服务质置要求。这可以通过采用好的调度算法提高平均业务速率和系统整体稳定性实现。针对CDMA2000 1x EV-DO系统的有代表性的调度算法有3种:正比公平算法、速率受限的最大载干比算法、加权公平排队-正比公平(WFQ-PF)联合算法。正比公平调度算法是一种算法简单实用的调度方案,但不能满足用户的服务质景保证;速率受限的最大载干比算法具有比正比公平算法更高的平均吞吐量,可方便地在吞吐量和公平性之间获得很好的折衷;WFQ-PF联合算法具有良好的综合性能,但算法较复杂。  相似文献   
25.
Some New Results on Key Distribution Patterns and Broadcast Encryption   总被引:1,自引:0,他引:1  
This paper concerns methods by which a trusted authority can distribute keys and/or broadcast a message over a network, so that each member of a privileged subset of users can compute a specified key or decrypt the broadcast message. Moreover, this is done in such a way that no coalition is able to recover any information on a key or broadcast message they are not supposed to know. The problems are studied using the tools of information theory, so the security provided is unconditional (i.e., not based on any computational assumption).In a recent paper st95a, Stinson described a method of constructing key predistribution schemes by combining Mitchell-Piper key distribution patterns with resilient functions; and also presented a construction method for broadcast encryption schemes that combines Fiat-Naor key predistribution schemes with ideal secret sharing schemes. In this paper, we further pursue these two themes, providing several nice applications of these techniques by using combinatorial structures such as orthogonal arrays, perpendicular arrays, Steiner systems and universal hash families.  相似文献   
26.
A Practical Cross-Layer Mechanism For Fairness in 802.11 Networks   总被引:2,自引:0,他引:2  
Many companies, organizations and communities are providing wireless hotspots that provide networking access using 802.11b wireless networks. Since wireless networks are more sensitive to variations in bandwidth and environmental interference than wired networks, most networks support a number of transmission rates that have different error and bandwidth properties. Access points can communicate with multiple clients running at different rates, but this leads to unfair bandwidth allocation. If an access point communicates with a mix of clients using both 1 Mb/s and 11 Mb/s transmission rates, the faster clients are effectively throttled to 1 Mb/s as well. This happens because the 802.11 MAC protocol approximate “station fairness”, with each station given an equal chance to access the media. We provide a solution to provide “rate proportional fairness”, where the 11 Mb/s stations receive more bandwidth than the 1 Mb/s stations. Unlike previous solutions to this problem, our mechanism is easy to implement, works with common operating systems and requires no change to the MAC protocol or the stations. Joseph Dunn received an M.S. in computer science from the University of Colorado at Boulder in 2003, and B. S. in coputer science and mathematics from the University of Arizona in 2001. His research interests are in the general area of computer systems, primarily focusing on security and scalability in distributed systems. He is currently working on his Ph.D. in computer science from the University of Colorado at Boulder. Michael Neufeld received a Ph.D. in Computer Science from the University of Colorado at Boulder in December of 2004, having previously received an M.S. in Computer Science from the University of Colorado at Boulder in 2000 and an A.B. in Computer Science from Princeton University in 1993. His research interests are in the general area of computer system, specifically concentrating on wireless networking, software defind/cognitive radio, and streerable antennas. He is currently a postdoc in the Computer Science department at the University of Calorado at Boulder pursuing research related to software defined radio and new MAC protocols for steerable phase array antennas. Anmol Sheth is a Ph.D. student in Computer Science at the University of Colorado at Boulder. He received his B.S. in Computer Science from the University of Pune, India in 2001. He has been co-leading the development of the MANTIS operating system. He has co-authored three papers include MAC layer protocol design, energy-efficient wireless communication, and adapting communications to mobility. Dirk Grunwald received his Ph.D. from the University of Illinois in 1989 and joined the University of Colorado the same year. His work addresses research and teaching in the broad area of “computer systems”, which includes computer architecture, operating systems, networks, and storage systems. His interests also include issues in pervasive computing, novel computing models, and enjoying the mountains. He is currently an Associate Professor in the Department of Computer Science and in Electrical and Computer Engineering and is also the Director of the Colorado Center for Information Storage. John Bennett is a Professor of Computer Science with a joint appointment in Electrical and Computer Engineering at the University of Colorado at Boulder. He also serves as Associate Dean for Education in the College of Engineering and Applied Science. He joined the CU-Boulder faculty in 2000, after serving on the faculty of Rice University for 11 years. While at Rice, Bennett pioneered a course in engineering design for both engineering and non-engineering students that has been emulated at several universities and high schools. In addition to other teaching awards, Bennett received the Keck Foundation National Award for Engineering Teaching Excellence for his work on this course. Bennett received his Ph.D. in 1988 from the University of Washington. Prior to completing his doctoral studies, he was a U.S. Naval Officer for several years and founded and served as President of Pacific Mountain Research, Inc., where he supervised the design and development of a number of commercial computing systems. Bennett's primary research interests are broadly focused in the area of distributed systems, and more narrowly in distributed information management and distributed robotic macrosensors.  相似文献   
27.
丁青锋  王松 《电信科学》2023,39(4):31-42
针对高铁场景下封闭车厢带来的高信号穿透损耗导致传输速率下降问题,提出一种分布式智能全表面(intelligent omni-surface,IOS)辅助空间调制(spatial modulation,SM)的传输方案。首先,采用SM技术保证索引信息部分不受穿透损耗的影响;然后,为了减小远距离IOS车窗的高路径损耗和功率损耗,根据最大化接收信噪比原则对分布式IOS遍历选择,激活最佳IOS车窗传输SM调制信息。最后,为了减小缺失直视路径增益对系统容量性能的影响,基于功率损耗模型,采用天线移除原则和排序选择方式,对接收天线和IOS单元进行动态选择激活。仿真结果表明,相比于传统中继转发和可重构智能超表面-空间调制(reconfigurable intelligence surface-SM,RIS-SM)方案,所提方案更适合高铁通信场景。并且在功率损耗模型下,联合天线与IOS单元选择的分布式IOS-SM方案仍能够保证系统高性能传输。  相似文献   
28.
针对电力线通信(PLC)和射频(RF)无线通信混合传输的室内通信场景,提出了一种基于角度信息的信道状态信息(AI-CSI)的能效优先传输方案。首先,Wi-Fi无线网络和PLC网络分别作为主网络和次级网络,并且采用认知无线电技术来提高频谱效率的情况下,建立次级网络总能效最大化为目标函数的优化问题。其次,为了求解该问题,通过基于AI-CSI的迫零波束成形方法,获得波束成形权矢量,并进一步提出Dinkelbach与拉格朗日乘子法相结合的优化方法,进行最优的功率分配。最后,计算机仿真结果不仅验证了所提方案的有效性和优越性,而且分析了中继天线数和用户个数等典型参数对系统能效带来的影响,从而为实际系统设计提供了参考和依据。  相似文献   
29.
The technological innovations and wide use of Wireless Sensor Network (WSN) applications need to handle diverse data. These huge data possess network security issues as intrusions that cannot be neglected or ignored. An effective strategy to counteract security issues in WSN can be achieved through the Intrusion Detection System (IDS). IDS ensures network integrity, availability, and confidentiality by detecting different attacks. Regardless of efforts by various researchers, the domain is still open to obtain an IDS with improved detection accuracy with minimum false alarms to detect intrusions. Machine learning models are deployed as IDS, but their potential solutions need to be improved in terms of detection accuracy. The neural network performance depends on feature selection, and hence, it is essential to bring an efficient feature selection model for better performance. An optimized deep learning model has been presented to detect different types of attacks in WSN. Instead of the conventional parameter selection procedure for Convolutional Neural Network (CNN) architecture, a nature-inspired whale optimization algorithm is included to optimize the CNN parameters such as kernel size, feature map count, padding, and pooling type. These optimized features greatly improved the intrusion detection accuracy compared to Deep Neural network (DNN), Random Forest (RF), and Decision Tree (DT) models.  相似文献   
30.
Activating Wireless Power Transfer (WPT) in Radio-Frequency (RF) to provide on-demand energy supply to widely deployed Internet of Everything devices is a key to the next-generation energy self-sustainable 6G network. However, Simultaneous Wireless Information and Power Transfer (SWIPT) in the same RF bands is challenging. The majority of previous studies compared SWIPT performance to Gaussian signaling with an infinite alphabet, which is impossible to implement in any realistic communication system. In contrast, we study the SWIPT system in a well-known Nakagami-m wireless fading channel using practical modulation techniques with finite alphabet. The attainable rate-energy-reliability tradeoff and the corresponding rationale are revealed for fixed modulation schemes. Furthermore, an adaptive modulation-based transceiver is provided for further expanding the attainable rate-energy-reliability region based on various SWIPT performances of different modulation schemes. The modulation switching thresholds and transmit power allocation at the SWIPT transmitter and the power splitting ratios at the SWIPT receiver are jointly optimized to maximize the attainable spectrum efficiency of wireless information transfer while satisfying the WPT requirement and the instantaneous and average BER constraints. Numerical results demonstrate the SWIPT performance of various fixed modulation schemes in different fading conditions. The advantage of the adaptive modulation-based SWIPT transceiver is validated.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号