首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6866篇
  免费   852篇
  国内免费   94篇
化学   73篇
力学   27篇
综合类   40篇
数学   168篇
物理学   353篇
无线电   7151篇
  2024年   13篇
  2023年   103篇
  2022年   94篇
  2021年   131篇
  2020年   225篇
  2019年   131篇
  2018年   128篇
  2017年   210篇
  2016年   280篇
  2015年   398篇
  2014年   627篇
  2013年   545篇
  2012年   683篇
  2011年   615篇
  2010年   409篇
  2009年   396篇
  2008年   450篇
  2007年   461篇
  2006年   396篇
  2005年   308篇
  2004年   272篇
  2003年   263篇
  2002年   212篇
  2001年   160篇
  2000年   92篇
  1999年   69篇
  1998年   26篇
  1997年   33篇
  1996年   35篇
  1995年   21篇
  1994年   10篇
  1993年   2篇
  1991年   3篇
  1990年   1篇
  1989年   1篇
  1988年   6篇
  1986年   1篇
  1985年   1篇
  1957年   1篇
排序方式: 共有7812条查询结果,搜索用时 265 毫秒
71.
The technological innovations and wide use of Wireless Sensor Network (WSN) applications need to handle diverse data. These huge data possess network security issues as intrusions that cannot be neglected or ignored. An effective strategy to counteract security issues in WSN can be achieved through the Intrusion Detection System (IDS). IDS ensures network integrity, availability, and confidentiality by detecting different attacks. Regardless of efforts by various researchers, the domain is still open to obtain an IDS with improved detection accuracy with minimum false alarms to detect intrusions. Machine learning models are deployed as IDS, but their potential solutions need to be improved in terms of detection accuracy. The neural network performance depends on feature selection, and hence, it is essential to bring an efficient feature selection model for better performance. An optimized deep learning model has been presented to detect different types of attacks in WSN. Instead of the conventional parameter selection procedure for Convolutional Neural Network (CNN) architecture, a nature-inspired whale optimization algorithm is included to optimize the CNN parameters such as kernel size, feature map count, padding, and pooling type. These optimized features greatly improved the intrusion detection accuracy compared to Deep Neural network (DNN), Random Forest (RF), and Decision Tree (DT) models.  相似文献   
72.
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy.  相似文献   
73.
The use of rechargeable sensors is a promising solution for wireless sensor networks. On this type of network, mobile charging vehicles (MC) are used for charging sensors using wireless energy transfer (WET) technology. In on-demand charging, a sensor transmits a charging request to the service station, and the MC visits the sensor to transfer energy. The key disadvantages of utilizing MC-based WET are its high energy expenditure rate due to mobility, long service time, and slow charging rate. Because of these reasons, sensors deplete their energy and become dead before the MC reaches the requesting nodes to recharge. We have adapted a genetic algorithm-based partial charging scheme to serve the charging requests. Our objective is to improve the survival ratio of the network. Using comprehensive simulations, we analyze the performance of our proposed method and compare it to two other existing approaches. The simulation results demonstrate that our proposed algorithm improves the survival ratio by up to 20 % by developing a dynamic energy threshold function for transmitting charging requests from the sensors and a partial charging schedule using a genetic algorithm.  相似文献   
74.
In the area of wireless communication technologies, 6LoWPAN leverages the extensive capabilities of IPv6, even within the constraints imposed by resource-limited devices, particularly within wireless sensor networks (WSNs). The integration of 6LoWPAN into modern solutions for implementing the IPv6-based Internet of Things (IoT) is becoming increasingly important. In this paper, a sensor monitoring and notification system specifically designed for deployment over 6LoWPAN has been proposed. Multipurpose capability, scalability, and ease of deployability are the main features of the proposed system. Its architecture reflects the highest degree of flexibility and allows for a variety of use cases encountered in practical scenarios. In addition, a web interface has been developed as part of the comprehensive system architecture. This interface enables efficient management of the entire system and facilitates connection for new users and seamless integration of additional sensors. By encapsulating complex functions in a user-friendly interface, the system promotes accessibility, convenience, and an enhanced user experience. The proposed system overcomes the limitations of current approaches, thereby creating new opportunities. The flexibility of the proposed system allows it to be applied to various use cases.  相似文献   
75.
Activating Wireless Power Transfer (WPT) in Radio-Frequency (RF) to provide on-demand energy supply to widely deployed Internet of Everything devices is a key to the next-generation energy self-sustainable 6G network. However, Simultaneous Wireless Information and Power Transfer (SWIPT) in the same RF bands is challenging. The majority of previous studies compared SWIPT performance to Gaussian signaling with an infinite alphabet, which is impossible to implement in any realistic communication system. In contrast, we study the SWIPT system in a well-known Nakagami-m wireless fading channel using practical modulation techniques with finite alphabet. The attainable rate-energy-reliability tradeoff and the corresponding rationale are revealed for fixed modulation schemes. Furthermore, an adaptive modulation-based transceiver is provided for further expanding the attainable rate-energy-reliability region based on various SWIPT performances of different modulation schemes. The modulation switching thresholds and transmit power allocation at the SWIPT transmitter and the power splitting ratios at the SWIPT receiver are jointly optimized to maximize the attainable spectrum efficiency of wireless information transfer while satisfying the WPT requirement and the instantaneous and average BER constraints. Numerical results demonstrate the SWIPT performance of various fixed modulation schemes in different fading conditions. The advantage of the adaptive modulation-based SWIPT transceiver is validated.  相似文献   
76.
随着移动互联网的发展,智能手机的快速普及,无线网络迅速融入当代人的主流生活,逐渐成为人们工作、学习与生活的基本需求。为了提高用户满意度,进一步提高网络覆盖面积,实现园区室外无线覆盖,文章提出了一种园区室外无线覆盖解决方案,有效解决了用户室外无线上网的需求。  相似文献   
77.
In many wireless sensor network (WSN) applications, the location of a sensor node is crucial for determining where the event or situation of interest occurred. Therefore, localization is one of the critical challenges in WSNs. Mobile anchor node assisted localization (MANAL) is one of the promising solutions for the localization of statically deployed sensors. The main problem in MANAL localization is that the path planning of the mobile anchor (MA) node should be done so that the localization error in the network will be minimal and that all unknown nodes in the network are covered. This paper proposes a new path planning approach called nested hexagons curves (NHexCurves) for MANAL. NHexCurves guarantees that it will receive messages from at least three non-collinear anchors to locate all unknown nodes in the network. The proposed model has compared six different path planning schemes in the literature using weighted centroid localization (WCL). In these comparisons, first of all, localization errors of the models are compared using some statistical concepts. Second, the variation of the localization error according to parameters such as resolution (R) and the standard deviation of noise (σ) is observed. Then, with similar approaches, the standard deviation of errors, localization ratio, scalability performances, and finally, path lengths of the models are examined. The simulation results show that the NHexCurves static path planning model proposed in this study stands out compared to other models with high localization error and localization ratio performance, especially at low resolutions, due to its path design. At the same time, the lowest error values according to σ are obtained with the proposed model among all models considered.  相似文献   
78.
We consider a discrete ribbon model for double-stranded polymers where the ribbon is constrained to lie in a three-dimensional lattice. The ribbon can be open or closed, and closed ribbons can be orientable or nonorientable. We prove some results about the asymptotic behavior of the numbers of ribbons withn plaquettes, and a theorem about the frequency of occurrence of certain patterns in these ribbons. We use this to derive results about the frequency of knots in closed ribbons, the linking of the boundary curves of orientable closed ribbons, and the twist and writhe of ribbons. We show that the centerline and boundary of a closed ribbon are both almost surely knotted in the infinite-n limit. For an orientable ribbon, the expectation of the absolute value of the linking number of the two boundary curves increases at least as fast as n, and similar results hold for the twist and writhe.  相似文献   
79.
In order to accomplish practical deployment modelling for system performance evaluation and comparison for possible modulation and equalisation schemes to be used in HIPERLAN, a wide band tapped delay line (WTDL) channel model has been adopted by ETSI to characterise the multipath fading in the indoor radio environment. Based on this statistical channel model, and using Monte Carlo method, this paper evaluates the average probability of error for linear and decision feedback equaliser as a function of signal-to-noise ratio. It also evaluates the matched filter bound for this channel model. The results show the optimum performance levels achievable via the use of any equaliser.The work described in this paper was supported by the UK DTI/EPSRC LINK project: PC2011 High Throughput Radio Modem under EPSRC grant reference GR/K00318 in collaboration with Symbionics Networks limited.  相似文献   
80.
ROK101007蓝牙模块及其在无线火灾自动报警系统中的应用   总被引:1,自引:0,他引:1  
ROK101007是Ericsson公司生产的一种实现蓝牙功能的中短距离通信模块.从应用的角度出发,将ROK101007作为通信模块集成到无线火灾自动报警系统中,对蓝牙技术在火灾报警中的应用进行了探讨和研究,并给出了火灾自动报警系统原理框图和ROK101007与单片机及上位机的接口电路,及相应的主要软件设计方法.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号