首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7730篇
  免费   980篇
  国内免费   87篇
化学   67篇
晶体学   4篇
力学   51篇
综合类   47篇
数学   727篇
物理学   450篇
无线电   7451篇
  2024年   19篇
  2023年   98篇
  2022年   114篇
  2021年   143篇
  2020年   237篇
  2019年   146篇
  2018年   143篇
  2017年   236篇
  2016年   314篇
  2015年   448篇
  2014年   720篇
  2013年   606篇
  2012年   736篇
  2011年   685篇
  2010年   471篇
  2009年   443篇
  2008年   493篇
  2007年   547篇
  2006年   446篇
  2005年   367篇
  2004年   294篇
  2003年   278篇
  2002年   246篇
  2001年   170篇
  2000年   92篇
  1999年   63篇
  1998年   41篇
  1997年   36篇
  1996年   38篇
  1995年   20篇
  1994年   13篇
  1993年   8篇
  1992年   9篇
  1991年   5篇
  1990年   7篇
  1989年   5篇
  1988年   5篇
  1987年   4篇
  1986年   9篇
  1985年   13篇
  1984年   4篇
  1983年   3篇
  1982年   4篇
  1981年   8篇
  1979年   5篇
  1978年   1篇
  1977年   1篇
  1975年   1篇
  1974年   1篇
  1972年   1篇
排序方式: 共有8797条查询结果,搜索用时 593 毫秒
951.
For the redundancy coverage of nodes leads to the phenomenon of low energy efficiency,Non-cooperative game theory was used to solve it.A revenue function was proposed,which considering the coverage of nodes and the residual energy.The lifetime of the node and network path gain were applied to revenue function.The network topology was built by nodes with the appropriate work strategy.Control algorithm coverage in wireless sensor network was proposed based on Non-cooperative game theory.A Nash equilibrium between the coverage rate and the residual energy was proved,and the return function converged to the Pareto optimal.Experiments show that the algorithm can provide reasonable coverage of network nodes and ensure energy efficiency.  相似文献   
952.
Recently, Packet scheduling plays a vital role in Wireless Sensor Networks (WSNs). The major key challenges include delay, packet dropping, energy consumption and lifetime due to constraints in energy and computing resources. All the research works on packet scheduling scheme in WSN uses only First Come First Served (FCFS) and Dynamic Multilevel Priority (DMP) schemes. FCFS works based on packet arrival time, it leads to starvation and high processing overhead for real-time packets. DMP works in multilevel with dynamic priority reduces the transmission overhead and bandwidth; it consumes more resources for real-time task leads to deadlock. To solve these problems, this work presents Multilevel Dynamic Feedback Scheduling (MDFS) algorithm. The sensor node classifies the emergency and normal data into three different ready queues named as high, medium and low priority, respectively. The queues are connected with a feedback mechanism; each packet from the sensor node has its own time quantum value based on the deadline. The updated time quantum value is compared with the boundary value of the queues, depends on the updated value the data packets are moved between queues with help of feedback mechanism. The simulation result proves that the projected MDFS outperforms in WSN environment.  相似文献   
953.
A highly flexible, stretchable, and mechanically robust low‐cost soft composite consisting of silicone polymers and water (or hydrogels) is reported. When combined with conventional acoustic transducers, the materials reported enable high performance real‐time monitoring of heart and respiratory patterns over layers of clothing (or furry skin of animals) without the need for direct contact with the skin. The approach enables an entirely new method of fabrication that involves encapsulation of water and hydrogels with silicones and exploits the ability of sound waves to travel through the body. The system proposed outperforms commercial, metal‐based stethoscopes for the auscultation of the heart when worn over clothing and is less susceptible to motion artefacts. The system both with human and furry animal subjects (i.e., dogs), primarily focusing on monitoring the heart, is tested; however, initial results on monitoring breathing are also presented. This work is especially important because it is the first demonstration of a stretchable sensor that is suitable for use with furry animals and does not require shaving of the animal for data acquisition.  相似文献   
954.
具有AEI结构的SSZ-39分子筛的骨架外阳离子落位和铝分布对其催化性能影响显著.AEI笼中有三个结晶学不等价位,且铝取代T位具有一定的倾向性.本文结合固体核磁共振(NMR)技术(27Al/23Na MQ MAS NMR),以及密度泛函理论(DFT)计算,研究了不同硅铝比Na-SSZ-39分子筛中的Na+落位和铝分布.在孤立铝分布的情况下,铝原子优先占据于T3位,Na+主要落位于AEI笼中的SIIa0和SIII'a0位点上,其中SIII'a0位点的优先度较高,此外少部分Na+还落位于六棱柱内部的SIa0.当铝对存在时,AlSiSiAl分布的铝对占据六元环的对位(T3-T3),对应的Na+分别落位于SIIa1和SⅢ'a1位点.随着分子筛结构的部分破坏,游离的Na+可能形成明显的SIII'b位点.本文可加深对SSZ-39分子筛构效关系的理解,为更好地调控催化性能奠定基础.  相似文献   
955.
In this paper, we present a performance analysis of large-scale multi-input multi-output (MIMO) systems for wireless backhaul networks. We focus on fully connected N nodes in a wireless meshed and multi-hop network topology. We also consider a large number of antennas at both the receiver and transmitter. We investigate the transmission schemes to support fully connected N nodes for half-duplex and full-duplex transmission, analyze the achievable ergodic sum rate among N nodes, and propose a closed-form expression of the achievable ergodic sum rate for each scheme. Furthermore, we present numerical evaluation results and compare the resuts with closed-form expressions.  相似文献   
956.
采用液相离子交换法制备了不同Ce含量的CeUSY分子筛,并通过Mitchell等体积浸渍法对其进行Ni污染,运用ICP-AES、XRD和N2吸附等温线等方法对其织构性质进行表征,并利用微反应活性评价装置考察了其抗镍性能。结果表明,不同Ce含量改性的USY样品其抗镍效果存在差异,CeUSY分子筛的抗镍效果与Ce含量的关系呈现火山型变化。结合Ni污染前后CeUSY分子筛的H2-TPR和Py-FTIR表征结果探讨了Ce物种的抗镍机制,证实了Ce物种形态的变化是不同Ce含量的CeUSY分子筛具有不同抗镍效果的重要成因,其中,SOD笼中的Ce(OH)2+在高温条件下可与Ni(OH)+相互作用,脱去一分子H2O形成Ce3+-O-Ni2+的稳定结构,阻碍了Ni物种与骨架铝的结合导致CeUSY分子筛中B酸中心的破坏,同时有效抑制了易还原NiO物种的生成。而Ce含量过高使得SOD笼内的Ce物种变成二聚以及三聚物,与Ni(OH)+作用减弱,使其抗镍性能减弱。  相似文献   
957.
张煦 《电信快报》1998,(10):3-5
本文简单介绍国际天空电台公司向国际通信联盟提出的“同温层通信业务”新建议。在地面上空 2 3km高度安放固定位置的气球 ,载荷空中无线电台 ,一个国家上空布置若干个气球和电台 ,组成通信平台 ,可以覆盖全国 ,为固定终端和移动个人提供通信业务。有城市、市郊和乡村三种覆盖地区 ,各划分为 70 0个蜂窝区。利用 47GHz毫米波 ,足以容纳电话、音视通信、数字电视、国际互联网和各种局域网通信。文中最后指出这样的通信系统有很多特点比卫星通信优越。  相似文献   
958.
Wireless body area networks (WBANs) are a network designed to gather critical information about the physical conditions of patients and to exchange this information. WBANs are prone to attacks, more than other networks, because of their mobility and the public channel they use. Therefore, mutual authentication and privacy protection are critical for WBANs to prevent attackers from accessing confidential information of patients and executing undetectable physical attacks. In addition, in the authentication and key agreement process, messages should be transferred anonymously such that they are not linkable. In this paper, we first indicate that one of the most recently introduced authentication protocol is vulnerable to the wrong session key agreement attack and desynchronization attack. Second, we propose a lightweight authentication and key agreement protocol, which can withstand the well‐known attacks and provide the anonymity feature. Eventually, we analyze the security of our proposed protocol using both Automated Validation of Internet Security Protocols and Applications (AVISPA) and random oracle model and compare its performance with the related works. The results demonstrate the superiority of our proposed protocol in comparison with the other protocols.  相似文献   
959.
The aim of wireless sensor networks (WSNs) is to gather sensor data from a monitored environment. However, the collected or reported information might be falsified by faults or malicious nodes. Hence, identifying malicious nodes in an effective and timely manner is essential for the network to function properly and reliably. Maliciously behaving nodes are usually detected and isolated by reputation and trust‐based schemes before they can damage the network. In this paper, we propose an efficient weighted trust‐based malicious node detection (WT‐MND) scheme that can detect malicious nodes in a clustered WSN. The node behaviors are realistically treated by accounting for false‐positive and false‐negative instances. The simulation results confirm the timely identification and isolation of maliciously behaving nodes by the WT‐MND scheme. The effectiveness of the proposed scheme is afforded by the adaptive trust‐update process, which implicitly performs trust recovery of temporarily malfunctioning nodes and computes a different trust‐update factor for each node depending on its behavior. The proposed scheme is more effective and scalable than the related schemes in the literature, as evidenced by its higher detection ratio (DR) and lower misdetection ratio (MDR), which only slightly vary with the network's size. Moreover, the scheme sustains its efficient characteristics without significant power consumption overheads.  相似文献   
960.
This paper improves the performance of 60‐GHz wireless optical system including radio over fibre (RoF) and radio over free space optics (RoFSO), based on novel reverse‐parallel (RP) hybrid modulation scheme. This scheme combines the chromatic dispersion compensation technique of parallel modulation with energy efficiency manipulation technique of reverse modulation. Superior functioning of RoFSO is provided with reverse modulation compared with normal modulation. Comparative investigations are performed by loading 60‐GHz RF signal with 2.5 and 10‐Gbps data and modulating it with both reverse and hybrid modulators. Hybrid modulation performed better with improved BER of 10?23 at distance of 51 km for 2.5‐Gbps data compared with reverse modulation with BER of 10?7.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号