首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7730篇
  免费   980篇
  国内免费   87篇
化学   67篇
晶体学   4篇
力学   51篇
综合类   47篇
数学   727篇
物理学   450篇
无线电   7451篇
  2024年   19篇
  2023年   98篇
  2022年   114篇
  2021年   143篇
  2020年   237篇
  2019年   146篇
  2018年   143篇
  2017年   236篇
  2016年   314篇
  2015年   448篇
  2014年   720篇
  2013年   606篇
  2012年   736篇
  2011年   685篇
  2010年   471篇
  2009年   443篇
  2008年   493篇
  2007年   547篇
  2006年   446篇
  2005年   367篇
  2004年   294篇
  2003年   278篇
  2002年   246篇
  2001年   170篇
  2000年   92篇
  1999年   63篇
  1998年   41篇
  1997年   36篇
  1996年   38篇
  1995年   20篇
  1994年   13篇
  1993年   8篇
  1992年   9篇
  1991年   5篇
  1990年   7篇
  1989年   5篇
  1988年   5篇
  1987年   4篇
  1986年   9篇
  1985年   13篇
  1984年   4篇
  1983年   3篇
  1982年   4篇
  1981年   8篇
  1979年   5篇
  1978年   1篇
  1977年   1篇
  1975年   1篇
  1974年   1篇
  1972年   1篇
排序方式: 共有8797条查询结果,搜索用时 927 毫秒
111.
This paper presents a distributed and adaptive fluctuation control scheme for many-to-one routing(FCM) in wireless sensor networks.Unlike well-known topology control schemes,the primary design objective is to reduce the fluctuation which happens due to overload of sensors in a data collection tree.More specifically,an estimation model of a sensor available capacity based on the number of its neighbors is proposed.In addition,this paper proposes a parent selection mechanism by three-way handshake.With such model and the selection mechanism,it is ensured that the load of a sensor does not exceed its available capacity.Finally,an adaptive maintenance mechanism is proposed to adjust the estimation of a sensor available capacity as the network environment changes.Simulation results demonstrate the effectiveness of the scheme.  相似文献   
112.
The link quality was vulnerable to the complexity environment in wireless sensor network.Obtaining link quality information in advance could reduce energy consumption of nodes.After analyzing the existing link quality prediction methods,AdaBoost-based link quality prediction mechanism was put forward.Link quality samples in deferent scenarios were collected.Density-based unsupervised clustering algorithm was employed to classify training samples into deferent link quality levels.The AdaBoost with SVM-based component classifiers was adopted to build link quality prediction mechanism.Experimental results show that the proposed mechanism has better prediction precision.  相似文献   
113.
From a complex network perspective, this study sets out two aims around the US airport network (USAN) which is built from en-route location information of domestic flights in the US. First, we analyze the structural properties of the USAN with respect to its binary and weighted graphs, and second we explore the airport patterns, which have wide-ranging implications. Results from the two graphs indicate the following. (1) The USAN exhibits scale-free, small-world and disassortative mixing properties, which are consistent with the mainstream perspectives. Besides, we find (2) a remarkable power relationship between the structural measurements in the binary graph and the traffic measurements in the weighted counterpart, namely degree versus capacity and attraction versus volume. On the other hand, investigation of the airport patterns suggests (3) that all the airports can be classified into four categories based on multiple network metrics, which shows a complete typology of the airports. And it further indicates (4) that there is a subtle relationship between the airport traffic and the geographical constraints as well as the regional socioeconomic indicators.  相似文献   
114.
Cooperative caching can be an effective mechanism for reducing electronic content provisioning cost in Social Wireless Networks (SWNETs). These networks are formed by a collection of mobile data enabled devices physically gathering in settings such as university campus, malls, airport and other public places. In this paper, we first propose an optimal collaborative object caching policy in order to minimize the object provisioning cost in SWNETs with homogenous user requests and a peer-rebate model for promoting collaboration. Then using an analytical model we study the impacts of user selfishness on the provisioning cost and the earned rebate when certain nodes in an SWNET selfishly deviate from the optimal policy. User selfishness is motivated in order to either increase individually earned rebate or to reduce content provisioning cost. The analytical model is validated by experimental results from simulated SWNETs using the network simulator ns2.  相似文献   
115.
Closed‐loop transmit diversity is considered an important technique for improving the link budget in the third generation and future wireless communication standards. This paper proposes several transmit diversity algorithms suitable for small wireless terminals and presents performance assessment in terms of average signal‐to‐noise ratio (SNR) and outage improvement, convergence, and complexity of operations. The algorithms presented herein are verified using data from measured indoor channels with variable antenna spacing and the results explained using measured radiation patterns for a two‐element array. It is shown that for a two‐element array, the best among the proposed techniques provides SNR improvement of about 3 dB in a tightly spaced array (inter‐element spacing of 0.1 wavelength at 2 GHz) typical of small wireless devices. Additionally, these techniques are shown to perform significantly better than a single antenna device in an indoor channel considering realistic values of latency and propagation errors.  相似文献   
116.
Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of weB-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors.  相似文献   
117.
The objective of this study was to assess the response to location-based services (LBS) by three key demographic groups within the United Kingdom. This study took the form of a survey of relevant demographics, attitudes and consumer behaviour undertaken via a web-based survey. Results are based on over 1200 respondents, filtered and segmented into three demographic groups who are typically early adopters of new technology. There were positive attitudes towards a range of LBS, with the major exception being location-based advertising. There were mixed views towards location-based gaming and safety camera information. There were low levels of awareness of many services. The levels of use were typically under 20% for all types of LBS.  相似文献   
118.
随着无线技术的发展和移动智能终端的普及,医疗行业对无线网络的需求也越来越多,建设医院无线局域网,能提高工作效率和服务质量。文章提出了以无线控制器和AP为架构形式的无线局域网的解决方案,能克服传统无线网络漫游、无法统一管理等的问题,同时给出了安全防护的措施,从而为医院建立一个稳定安全的无线网络环境。  相似文献   
119.
There has been much research and speculation recently on the nature of radiation induced defects in zirconium and its alloys, and in particular on the absence of voids at high fluences and temperatures in the range 0.3 to 0.5 T m (T m is the absolute melting temperature). Wolfenden and Farrell1 have reviewed the evidence and suggest that α-Zr has so far resisted void formation during neutron irradiation because of: (a) the absence of a dislocation (loop or tangle) structure and/or (b) a low insoluble gas (e.g. helium) content.  相似文献   
120.
The traditional deployment strategy of static chargers in wireless rechargeable sensor networks (WRSN) covers all the area.The basic idea is to cover all the positions of nodes.A mathematical model of distance between a charger and the farthest node was established,the relationship between the number of nodes and the mathematical expectation of minimum radius of charging was analyzed,and deployment strategy for static chargers was proposed.The method based on the locations of all nodes that need to be charged in the area,used the smallest enclosing circle (SEC) algorithm and finds the optimal location of the charger through Euclidean delivery boy algorithm.It will decrease charging radius,reduce the minimum required transmitted power,thereby saving the average charging energy consumption.The experimental results demonstrated that the less the number locations that the nodes existed,the more energy will be saved.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号