首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5798篇
  免费   769篇
  国内免费   76篇
化学   145篇
晶体学   1篇
力学   20篇
综合类   26篇
数学   42篇
物理学   331篇
无线电   6078篇
  2024年   19篇
  2023年   97篇
  2022年   89篇
  2021年   113篇
  2020年   201篇
  2019年   116篇
  2018年   111篇
  2017年   182篇
  2016年   249篇
  2015年   362篇
  2014年   555篇
  2013年   475篇
  2012年   597篇
  2011年   533篇
  2010年   369篇
  2009年   327篇
  2008年   356篇
  2007年   378篇
  2006年   333篇
  2005年   260篇
  2004年   217篇
  2003年   202篇
  2002年   173篇
  2001年   131篇
  2000年   68篇
  1999年   42篇
  1998年   20篇
  1997年   19篇
  1996年   21篇
  1995年   18篇
  1994年   4篇
  1993年   2篇
  1992年   1篇
  1988年   1篇
  1985年   1篇
  1982年   1篇
排序方式: 共有6643条查询结果,搜索用时 31 毫秒
51.
丁青锋  王松 《电信科学》2023,39(4):31-42
针对高铁场景下封闭车厢带来的高信号穿透损耗导致传输速率下降问题,提出一种分布式智能全表面(intelligent omni-surface,IOS)辅助空间调制(spatial modulation,SM)的传输方案。首先,采用SM技术保证索引信息部分不受穿透损耗的影响;然后,为了减小远距离IOS车窗的高路径损耗和功率损耗,根据最大化接收信噪比原则对分布式IOS遍历选择,激活最佳IOS车窗传输SM调制信息。最后,为了减小缺失直视路径增益对系统容量性能的影响,基于功率损耗模型,采用天线移除原则和排序选择方式,对接收天线和IOS单元进行动态选择激活。仿真结果表明,相比于传统中继转发和可重构智能超表面-空间调制(reconfigurable intelligence surface-SM,RIS-SM)方案,所提方案更适合高铁通信场景。并且在功率损耗模型下,联合天线与IOS单元选择的分布式IOS-SM方案仍能够保证系统高性能传输。  相似文献   
52.
针对电力线通信(PLC)和射频(RF)无线通信混合传输的室内通信场景,提出了一种基于角度信息的信道状态信息(AI-CSI)的能效优先传输方案。首先,Wi-Fi无线网络和PLC网络分别作为主网络和次级网络,并且采用认知无线电技术来提高频谱效率的情况下,建立次级网络总能效最大化为目标函数的优化问题。其次,为了求解该问题,通过基于AI-CSI的迫零波束成形方法,获得波束成形权矢量,并进一步提出Dinkelbach与拉格朗日乘子法相结合的优化方法,进行最优的功率分配。最后,计算机仿真结果不仅验证了所提方案的有效性和优越性,而且分析了中继天线数和用户个数等典型参数对系统能效带来的影响,从而为实际系统设计提供了参考和依据。  相似文献   
53.
The technological innovations and wide use of Wireless Sensor Network (WSN) applications need to handle diverse data. These huge data possess network security issues as intrusions that cannot be neglected or ignored. An effective strategy to counteract security issues in WSN can be achieved through the Intrusion Detection System (IDS). IDS ensures network integrity, availability, and confidentiality by detecting different attacks. Regardless of efforts by various researchers, the domain is still open to obtain an IDS with improved detection accuracy with minimum false alarms to detect intrusions. Machine learning models are deployed as IDS, but their potential solutions need to be improved in terms of detection accuracy. The neural network performance depends on feature selection, and hence, it is essential to bring an efficient feature selection model for better performance. An optimized deep learning model has been presented to detect different types of attacks in WSN. Instead of the conventional parameter selection procedure for Convolutional Neural Network (CNN) architecture, a nature-inspired whale optimization algorithm is included to optimize the CNN parameters such as kernel size, feature map count, padding, and pooling type. These optimized features greatly improved the intrusion detection accuracy compared to Deep Neural network (DNN), Random Forest (RF), and Decision Tree (DT) models.  相似文献   
54.
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy.  相似文献   
55.
The use of rechargeable sensors is a promising solution for wireless sensor networks. On this type of network, mobile charging vehicles (MC) are used for charging sensors using wireless energy transfer (WET) technology. In on-demand charging, a sensor transmits a charging request to the service station, and the MC visits the sensor to transfer energy. The key disadvantages of utilizing MC-based WET are its high energy expenditure rate due to mobility, long service time, and slow charging rate. Because of these reasons, sensors deplete their energy and become dead before the MC reaches the requesting nodes to recharge. We have adapted a genetic algorithm-based partial charging scheme to serve the charging requests. Our objective is to improve the survival ratio of the network. Using comprehensive simulations, we analyze the performance of our proposed method and compare it to two other existing approaches. The simulation results demonstrate that our proposed algorithm improves the survival ratio by up to 20 % by developing a dynamic energy threshold function for transmitting charging requests from the sensors and a partial charging schedule using a genetic algorithm.  相似文献   
56.
In the area of wireless communication technologies, 6LoWPAN leverages the extensive capabilities of IPv6, even within the constraints imposed by resource-limited devices, particularly within wireless sensor networks (WSNs). The integration of 6LoWPAN into modern solutions for implementing the IPv6-based Internet of Things (IoT) is becoming increasingly important. In this paper, a sensor monitoring and notification system specifically designed for deployment over 6LoWPAN has been proposed. Multipurpose capability, scalability, and ease of deployability are the main features of the proposed system. Its architecture reflects the highest degree of flexibility and allows for a variety of use cases encountered in practical scenarios. In addition, a web interface has been developed as part of the comprehensive system architecture. This interface enables efficient management of the entire system and facilitates connection for new users and seamless integration of additional sensors. By encapsulating complex functions in a user-friendly interface, the system promotes accessibility, convenience, and an enhanced user experience. The proposed system overcomes the limitations of current approaches, thereby creating new opportunities. The flexibility of the proposed system allows it to be applied to various use cases.  相似文献   
57.
Activating Wireless Power Transfer (WPT) in Radio-Frequency (RF) to provide on-demand energy supply to widely deployed Internet of Everything devices is a key to the next-generation energy self-sustainable 6G network. However, Simultaneous Wireless Information and Power Transfer (SWIPT) in the same RF bands is challenging. The majority of previous studies compared SWIPT performance to Gaussian signaling with an infinite alphabet, which is impossible to implement in any realistic communication system. In contrast, we study the SWIPT system in a well-known Nakagami-m wireless fading channel using practical modulation techniques with finite alphabet. The attainable rate-energy-reliability tradeoff and the corresponding rationale are revealed for fixed modulation schemes. Furthermore, an adaptive modulation-based transceiver is provided for further expanding the attainable rate-energy-reliability region based on various SWIPT performances of different modulation schemes. The modulation switching thresholds and transmit power allocation at the SWIPT transmitter and the power splitting ratios at the SWIPT receiver are jointly optimized to maximize the attainable spectrum efficiency of wireless information transfer while satisfying the WPT requirement and the instantaneous and average BER constraints. Numerical results demonstrate the SWIPT performance of various fixed modulation schemes in different fading conditions. The advantage of the adaptive modulation-based SWIPT transceiver is validated.  相似文献   
58.
针对胶囊网络(capsule network,CapsNet)特 征提取结构单一和数据处理中参数量过大的问题,提出 多尺度混合注意力胶囊网络 模型。首先,在网络初始端添加不同尺度的卷积核来多角度提取 特征,并引 入混合注意力机制,通过聚焦更具分辨性的特征区域来降低复杂背景干扰。其次,采用局部 剪枝算法优 化动态路由,减少参数量,缩短模型训练时间。最后,在海洋鱼类数据集F4K(Fish4Knowled ge)上验证, 结果表明,与传统残差网络(residual network50,ResNet-50)、双线性网络(bilinear convo l utional neural network,B-CNN)、分层精简双线性注意力网络(spatial transformation netw ork and hierarchical compact bilinear pooling,STN-H-CBP)以及CapsNet模型相比,该算法 识别精度为98.65%,比ResNet-50模型提升 了5.92%;训练时间为2.2 h,相比于CapsNet 缩短了近40 min,验证了该算法的可行性。  相似文献   
59.
随着移动互联网的发展,智能手机的快速普及,无线网络迅速融入当代人的主流生活,逐渐成为人们工作、学习与生活的基本需求。为了提高用户满意度,进一步提高网络覆盖面积,实现园区室外无线覆盖,文章提出了一种园区室外无线覆盖解决方案,有效解决了用户室外无线上网的需求。  相似文献   
60.
In many wireless sensor network (WSN) applications, the location of a sensor node is crucial for determining where the event or situation of interest occurred. Therefore, localization is one of the critical challenges in WSNs. Mobile anchor node assisted localization (MANAL) is one of the promising solutions for the localization of statically deployed sensors. The main problem in MANAL localization is that the path planning of the mobile anchor (MA) node should be done so that the localization error in the network will be minimal and that all unknown nodes in the network are covered. This paper proposes a new path planning approach called nested hexagons curves (NHexCurves) for MANAL. NHexCurves guarantees that it will receive messages from at least three non-collinear anchors to locate all unknown nodes in the network. The proposed model has compared six different path planning schemes in the literature using weighted centroid localization (WCL). In these comparisons, first of all, localization errors of the models are compared using some statistical concepts. Second, the variation of the localization error according to parameters such as resolution (R) and the standard deviation of noise (σ) is observed. Then, with similar approaches, the standard deviation of errors, localization ratio, scalability performances, and finally, path lengths of the models are examined. The simulation results show that the NHexCurves static path planning model proposed in this study stands out compared to other models with high localization error and localization ratio performance, especially at low resolutions, due to its path design. At the same time, the lowest error values according to σ are obtained with the proposed model among all models considered.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号