首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6460篇
  免费   508篇
  国内免费   27篇
化学   155篇
晶体学   2篇
力学   25篇
综合类   41篇
数学   42篇
物理学   367篇
无线电   6363篇
  2025年   25篇
  2024年   111篇
  2023年   129篇
  2022年   113篇
  2021年   135篇
  2020年   219篇
  2019年   146篇
  2018年   122篇
  2017年   190篇
  2016年   258篇
  2015年   376篇
  2014年   569篇
  2013年   487篇
  2012年   612篇
  2011年   537篇
  2010年   380篇
  2009年   330篇
  2008年   363篇
  2007年   378篇
  2006年   333篇
  2005年   260篇
  2004年   217篇
  2003年   202篇
  2002年   173篇
  2001年   131篇
  2000年   68篇
  1999年   42篇
  1998年   20篇
  1997年   19篇
  1996年   21篇
  1995年   18篇
  1994年   4篇
  1993年   2篇
  1992年   1篇
  1988年   1篇
  1985年   1篇
  1982年   2篇
排序方式: 共有6995条查询结果,搜索用时 0 毫秒
51.
Techniques for modeling and simulating channel conditions play an essential role in understanding network protocol and application behavior. In [11], we demonstrated that inaccurate modeling using a traditional analytical model yielded suboptimal error control protocol parameters choices. In this paper, we demonstrate that time-varying effects on wireless channels result in wireless traces which exhibit non-stationary behavior over small window sizes. We then present an algorithm that extracts stationary components from a collected trace in order to provide analytical channel models that, relative to traditional approaches, more accurately represent characteristics such as burstiness, statistical distribution of errors, and packet loss processes. Our algorithm also generates artificial traces with the same statistical characteristics as actual collected network traces. For validation, we develop a channel model for the circuit-switched data service in GSM and show that it: (1) more closely approximates GSM channel characteristics than traditional Markov models and (2) generates artificial traces that closely match collected traces' statistics. Using these traces in a simulator environment enables future protocol and application testing under different controlled and repeatable conditions.  相似文献   
52.
This paper evaluates four mechanisms for providing service differentiation in IEEE 802.11 wireless LANs. The evaluated schemes are the Point Coordinator Function (PCF) of IEEE 802.11, the Enhanced Distributed Coordinator Function (EDCF) of the proposed IEEE 802.11e extension to IEEE 802.11, Distributed Fair Scheduling (DFS), and Blackburst. The evaluation was done using the ns-2 simulator. Furthermore, the impact of some parameter settings on performance has also been investigated. The metrics used in the evaluation are throughput, medium utilization, collision rate, average access delay, and delay distribution for a variable load of real time and background traffic. The simulations show that the best performance is achieved by Blackburst. PCF and EDCF are also able to provide pretty good service differentiation. DFS can give a relative differentiation and consequently avoids starvation of low priority traffic.  相似文献   
53.
An analytical model of TCP (Transport Control Protocol) over an end-to-end path with random abrupt round-trip time (RTT) changes is presented. Modeling the RTT as a stochastic process, we analytically quantify and compare between the degree of degradation of the steady-state average throughput and window size due to spurious retransmissions for the different versions of TCP (Reno/NewReno versus Tahoe). The modeling methodology in this paper is used for evaluating different design alternatives for TCP for highly dynamic networks.  相似文献   
54.
个人通信接入系统(PAS)的关键技术   总被引:1,自引:0,他引:1  
在介绍个人通信接入系统(PAS)的体系结构的基础上,进一步阐述了个人通信接入系统的几点关键技术。  相似文献   
55.
Several protocols have been proposed to mitigate the threat against wireless sensor networks due to an attacker finding vulnerable nodes, compromising them, and using these nodes to eavesdrop or undermine the operation of the network. A more dangerous threat that has received less attention, however, is that of replica node attacks, in which the attacker compromises a node, extracts its keying materials, and produces a large number of replicas to be spread throughout the network. Such attack enables the attacker to leverage the compromise of a single node to create widespread effects on the network. To defend against these attacks, we propose distributed detection schemes to identify and revoke replicas. Our schemes are based on the assumption that nodes are deployed in groups, which is realistic for many deployment scenarios. By taking advantage of group deployment knowledge, the proposed schemes perform replica detection in a distributed, efficient, and secure manner. Through analysis and simulation experiments, we show that our schemes achieve effective and robust replica detection capability with substantially lower communication, computational, and storage overheads than prior work in the literature.  相似文献   
56.
李楠 《光机电信息》2010,27(6):34-38
本文详细介绍了随机编码技术的提出、编码规则及评价,研究了随机编码技术得以在无线网络中实现的关键技术,并总结了随机编码技术相对于传统的以路由为基础的网络理论的特点和优势,为相关研究人员在该领域的研究工作提供一些理论依据。  相似文献   
57.
无线传感器网络的应用一直受能量的制约,因此如何降低系统能耗始终是无线传感器网络的核心问题.研究了一类基于ZigBee的缓变数据监测系统中的数据处理问题,提出了一种改进的数据精简算法.该方法考虑了测量误差,通过综合数字滤波法及改进的数据精简算法,降低了数据通信量,延长无线传感器网络的生命周期.采用三次样条数据插值,对温度数据进行插值,实验结果表明通过该方法得到的温度曲线较为平滑,该方法具有可行性、实用性和推广价值.  相似文献   
58.
随着信息技术的迅猛发展,无线通信成为越来越重要的通信方式之一,从而对信道提出了更严格的要求。回顾并综述了常用的典型无线信道模型,对各种信道的特点和适应场景进行了详细的分析、对比与总结,为实际应用中根据不同环境选择合适的信道模型提供了参考。最后,对其中一些信道模型的优化方向给出了建议,并对信道模型的应用前景进行了概括与展望。  相似文献   
59.
刘强 《电子测试》2016,(10):7-8
本设计通过对小车设计制作整体思路、机械调教、电路设计、算法设计、调试等方面的介绍,详尽地阐述了整个设计过程的思想和创意。具体表现在机械的合理规划、电路的创新设计、算法方面的独特想法。  相似文献   
60.
无线信道安全传输的目的是保证期望用户具有良好的通信质量(高速率、低误码率),同时尽可能地提高窃听者的误码率,从而防止信息被窃听者截获。本文重点讲述无线信息安全传输机制。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号