首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6932篇
  免费   858篇
  国内免费   100篇
化学   76篇
力学   29篇
综合类   40篇
数学   168篇
物理学   373篇
无线电   7204篇
  2024年   21篇
  2023年   112篇
  2022年   109篇
  2021年   137篇
  2020年   234篇
  2019年   133篇
  2018年   133篇
  2017年   214篇
  2016年   285篇
  2015年   401篇
  2014年   629篇
  2013年   549篇
  2012年   683篇
  2011年   619篇
  2010年   409篇
  2009年   396篇
  2008年   451篇
  2007年   461篇
  2006年   397篇
  2005年   308篇
  2004年   272篇
  2003年   263篇
  2002年   212篇
  2001年   160篇
  2000年   92篇
  1999年   69篇
  1998年   26篇
  1997年   33篇
  1996年   35篇
  1995年   21篇
  1994年   10篇
  1993年   2篇
  1991年   3篇
  1990年   1篇
  1989年   1篇
  1988年   6篇
  1986年   1篇
  1985年   1篇
  1957年   1篇
排序方式: 共有7890条查询结果,搜索用时 31 毫秒
91.
电视播出系统的稳定性与安全性直接关系到电视播出的效果。结合实践经验,对经济型异构播出系统的构建进行介绍。  相似文献   
92.
This paper presents a geocast technique for underwater sensor networks. The model named as Routing and Multicast Tree based Geocasting (RMTG) (TRACE'10, Bhopal, India, 2010; ICWET'10, Mumbai, India, 2010) has been designed for underwater sensor networks. In our previous work (TRACE'10, Bhopal, India, 2010; ICWET'10, Mumbai, India, 2010) we proposed only a theoretical model for underwater geocasting. The RMTG technique uses greedy forwarding and previous hop handshaking to route the packets towards the geocast region and further disseminates the data within the geocast region by creating a multicast shortest path tree. We also presented various link broken scenarios along with their solutions. The proposed model does not use the flooding technique to deliver the packets inside the geocast region that is used in most of the geocasting techniques. In this paper, we present the simulated RMTG model. The simulation results show that the proposed model provides an efficient distribution of data in the geocast region in terms of node mobility handling, packet delivery ratio and a better end‐to‐end latency. Most of the work on geocasting has been done for mobile and vehicular ad hoc networks; hence we present in this paper a novel simulated model for underwater environment. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
93.
Closed‐loop transmit diversity is considered an important technique for improving the link budget in the third generation and future wireless communication standards. This paper proposes several transmit diversity algorithms suitable for small wireless terminals and presents performance assessment in terms of average signal‐to‐noise ratio (SNR) and outage improvement, convergence, and complexity of operations. The algorithms presented herein are verified using data from measured indoor channels with variable antenna spacing and the results explained using measured radiation patterns for a two‐element array. It is shown that for a two‐element array, the best among the proposed techniques provides SNR improvement of about 3 dB in a tightly spaced array (inter‐element spacing of 0.1 wavelength at 2 GHz) typical of small wireless devices. Additionally, these techniques are shown to perform significantly better than a single antenna device in an indoor channel considering realistic values of latency and propagation errors.  相似文献   
94.
Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of weB-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors.  相似文献   
95.
《先进技术聚合物》2018,29(1):216-225
Rubber magnetic composites were prepared by incorporation of strontium ferrite into rubber compounds based on acrylonitrile butadiene rubber and ethylene propylene diene monomer rubber. The sulfur, peroxide, and mixed sulfur/peroxide curing systems were introduced as cross‐linking agents for rubber matrices. The aim was to investigate the influence of curing system composition on curing process and cross‐link density of composite materials. Then, static and dynamic mechanical properties and thermal and magnetic characteristics were investigated in relation to the cross‐link density of rubber magnetic composites and structure of the formed cross‐links. The changes of dynamical and physicomechanical properties were in close correlation with the change of cross‐link density, whereas the tensile strength of magnetic composites showed increasing trend with increasing amount of peroxide in mixed curing systems. On the other hand, thermal conductivity and magnetic characteristics were found not to be dependent on the curing system composition.  相似文献   
96.
随着无线技术的发展和移动智能终端的普及,医疗行业对无线网络的需求也越来越多,建设医院无线局域网,能提高工作效率和服务质量。文章提出了以无线控制器和AP为架构形式的无线局域网的解决方案,能克服传统无线网络漫游、无法统一管理等的问题,同时给出了安全防护的措施,从而为医院建立一个稳定安全的无线网络环境。  相似文献   
97.
The traditional deployment strategy of static chargers in wireless rechargeable sensor networks (WRSN) covers all the area.The basic idea is to cover all the positions of nodes.A mathematical model of distance between a charger and the farthest node was established,the relationship between the number of nodes and the mathematical expectation of minimum radius of charging was analyzed,and deployment strategy for static chargers was proposed.The method based on the locations of all nodes that need to be charged in the area,used the smallest enclosing circle (SEC) algorithm and finds the optimal location of the charger through Euclidean delivery boy algorithm.It will decrease charging radius,reduce the minimum required transmitted power,thereby saving the average charging energy consumption.The experimental results demonstrated that the less the number locations that the nodes existed,the more energy will be saved.  相似文献   
98.
连铸机所配备的专用精确诱导无线位置检测系统必须具备高精度和高可靠性。文章通过对某钢厂实际工程应用,证明诱导无线定位在横移台车上使用,定位准确,误差满足设计要求,不大于10mm。  相似文献   
99.
提出了一种新的带有二元连接函数的广义半参数模型,即二元连接模型(简称为BLM).使用轮廓似然方法估计模型的参数和非参数部分,并给出了计算算法.证明了所得的未知参数的估计量为n~(1/2)-相合,渐近正态且具有渐近最小方差,给出了实际数据分析和模拟研究,最终采用局部功效方法来检验非参数部分的线性性.  相似文献   
100.
差分信号在无线通信系统链路中应用越来越广泛,模拟的差分LC滤波器可以有效抑制射中频电路中的带外谐波和噪声等无用信号。文章提出差分LC滤波器设计途径和单端LC滤波器简单的转换关系,介绍了射中频差分LC滤波器在无线通信系统中的一些应用问题。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号