首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9031篇
  免费   983篇
  国内免费   79篇
化学   46篇
力学   27篇
综合类   64篇
数学   53篇
物理学   444篇
无线电   9459篇
  2024年   21篇
  2023年   114篇
  2022年   105篇
  2021年   172篇
  2020年   264篇
  2019年   136篇
  2018年   141篇
  2017年   269篇
  2016年   349篇
  2015年   535篇
  2014年   814篇
  2013年   690篇
  2012年   816篇
  2011年   787篇
  2010年   527篇
  2009年   496篇
  2008年   558篇
  2007年   579篇
  2006年   541篇
  2005年   467篇
  2004年   389篇
  2003年   379篇
  2002年   278篇
  2001年   204篇
  2000年   132篇
  1999年   85篇
  1998年   62篇
  1997年   48篇
  1996年   45篇
  1995年   34篇
  1994年   12篇
  1993年   11篇
  1992年   10篇
  1991年   11篇
  1990年   7篇
  1989年   1篇
  1988年   2篇
  1982年   1篇
  1981年   1篇
排序方式: 共有10000条查询结果,搜索用时 19 毫秒
81.
White LED is considered as a strong candidate for the future lighting technology. We have proposed an optical wireless communication system that employs white LEDs for indoor wireless networks. In this system, LED is used not only as a lighting device, but also as a communication device. The transmitter has large optical power and large emission characteristics to function as lighting device. And the system has specific wireless channel impulse response differing from infrared wireless communication. In this paper, we discuss about shadowing effect on the system utilizing plural LED lightings including the performance of ISI based on the impulse response. We consider the downlink transmission based on TDMA and evaluate the shadowing effect caused by pedestrians with computer simulation. When the shadowing often occurs at 800 Mb/s, the performance of outage call duration rate and blocking rate are improved by using 3 LED lightings compared with 1 or 2 LED lightings. And, we show that the system with the optimal number of the LED lighting is robust against shadowing and can accommodate more calls. Toshihiko Komine was born in Shizuoka, Japan, on November 17, 1978. He received the B.E. and M.E. degrees in Information and Computer Science from Keio University, Yokohama, Japan, in 2001 and 2003 respectively. He is currently studying for the Ph.D. degree at Department of Information and Computer Science, Keio University. His current research interests are optical wireless communications and LED communications. Shinichiro Haruyama is a professor at Department of Information and Computer Science, Faculty of Science and Technology, Keio University, Yokohama, Japan. He received an M.S. in engineering science from University of California at Berkeley in 1983 and a Ph.D. in computer science from the University of Texas at Austin in 1990. He worked for Bell Laboratories of AT{&}T and Lucent Technologies, U.S.A from 1991 to 1996, and for Sony Computer Science Laboratories, Inc. from 1998 to 2002. His research interests include reconfigurable system, system design automation, wireless communication, and visible light communication. Masao Nakagawa was born in Tokyo, Japan in 1946. He received the B.E., M.E. and Ph.D. degrees in electrical engineering from Keio University, Yokohama, Japan, in 1969, 1971 and 1974 respectively. Since 1973, he has been with the Department of Electrical Engineering, Keio University, where he is now a Professor. His research interests are in CDMA, consumer Communications, Mobile communications, ITS (Intelligent Transport Systems), Wireless Home Networks, and Visible light Communication. He received 1989 IEEE Consumer Electronics Society Paper Award, 1999-Fall Best Paper Award in IEEE VTC, IEICE Achievement Award in 2000, IEICE Fellow Award in 2001. He was the executive committee chairman on International Symposium on Spread Spectrum Techniques and Applications in 1992 and the technical program committee chairman of ISITA (International Symposium on Spread Spectrum Techniques and Applications) in 1994. He is an editor of Wireless Personal Communications and was a guest editor of the special issues on “CDMA Networks I, II, III and IV” published in IEEE JSAC in 1994 (I and II) and 1996 (III and IV). He chairs the Wireless Home Link sub-committee in MMAC (Multimedia Mobile Access Communication Promotion Committee).  相似文献   
82.
MPEG-4是动态图像专家组(MPEG)标准家庭中的一员,是国际化标准组织为多媒体通信制定的一种解决方案。介绍了MPEG-4支持的新功能和特点,并阐述了MPEG-4的关键技术,在此基础上对MPEG-4在视频点播业务中的应用问题进行了探讨。  相似文献   
83.
SDI接口数字监视设备的设计与实现   总被引:2,自引:0,他引:2  
介绍了一种对SDV(串行数字视频)信号进行解码的设备设计方案,提出了该系统的总体构架,并对该系统的硬件设计、软件设计进行了全面的论述。设计的产品具有较高的性能价格比,已进入了推广阶段。  相似文献   
84.
CDMA2000 1xEV-DO中的分组调度算法   总被引:1,自引:0,他引:1  
移动通信系统需要更好地支持分组数据业务,并满足高速分组数据业务的服务质置要求。这可以通过采用好的调度算法提高平均业务速率和系统整体稳定性实现。针对CDMA2000 1x EV-DO系统的有代表性的调度算法有3种:正比公平算法、速率受限的最大载干比算法、加权公平排队-正比公平(WFQ-PF)联合算法。正比公平调度算法是一种算法简单实用的调度方案,但不能满足用户的服务质景保证;速率受限的最大载干比算法具有比正比公平算法更高的平均吞吐量,可方便地在吞吐量和公平性之间获得很好的折衷;WFQ-PF联合算法具有良好的综合性能,但算法较复杂。  相似文献   
85.
本文对高速摄象系统(包括电视摄象系统和光机式摄象系统)的象质评价方法予以讨论,并用实验方法对目前广泛使用的Kodak SP-2000、NAC HSV-200等高速电视摄象系统及我们自己开发的一维扫描电视摄象系统的象质,在新的定义下给出了评价,对它们的动态精度作了对比性测试,同时和光机式高速摄象系统作了比较。  相似文献   
86.
A Practical Cross-Layer Mechanism For Fairness in 802.11 Networks   总被引:2,自引:0,他引:2  
Many companies, organizations and communities are providing wireless hotspots that provide networking access using 802.11b wireless networks. Since wireless networks are more sensitive to variations in bandwidth and environmental interference than wired networks, most networks support a number of transmission rates that have different error and bandwidth properties. Access points can communicate with multiple clients running at different rates, but this leads to unfair bandwidth allocation. If an access point communicates with a mix of clients using both 1 Mb/s and 11 Mb/s transmission rates, the faster clients are effectively throttled to 1 Mb/s as well. This happens because the 802.11 MAC protocol approximate “station fairness”, with each station given an equal chance to access the media. We provide a solution to provide “rate proportional fairness”, where the 11 Mb/s stations receive more bandwidth than the 1 Mb/s stations. Unlike previous solutions to this problem, our mechanism is easy to implement, works with common operating systems and requires no change to the MAC protocol or the stations. Joseph Dunn received an M.S. in computer science from the University of Colorado at Boulder in 2003, and B. S. in coputer science and mathematics from the University of Arizona in 2001. His research interests are in the general area of computer systems, primarily focusing on security and scalability in distributed systems. He is currently working on his Ph.D. in computer science from the University of Colorado at Boulder. Michael Neufeld received a Ph.D. in Computer Science from the University of Colorado at Boulder in December of 2004, having previously received an M.S. in Computer Science from the University of Colorado at Boulder in 2000 and an A.B. in Computer Science from Princeton University in 1993. His research interests are in the general area of computer system, specifically concentrating on wireless networking, software defind/cognitive radio, and streerable antennas. He is currently a postdoc in the Computer Science department at the University of Calorado at Boulder pursuing research related to software defined radio and new MAC protocols for steerable phase array antennas. Anmol Sheth is a Ph.D. student in Computer Science at the University of Colorado at Boulder. He received his B.S. in Computer Science from the University of Pune, India in 2001. He has been co-leading the development of the MANTIS operating system. He has co-authored three papers include MAC layer protocol design, energy-efficient wireless communication, and adapting communications to mobility. Dirk Grunwald received his Ph.D. from the University of Illinois in 1989 and joined the University of Colorado the same year. His work addresses research and teaching in the broad area of “computer systems”, which includes computer architecture, operating systems, networks, and storage systems. His interests also include issues in pervasive computing, novel computing models, and enjoying the mountains. He is currently an Associate Professor in the Department of Computer Science and in Electrical and Computer Engineering and is also the Director of the Colorado Center for Information Storage. John Bennett is a Professor of Computer Science with a joint appointment in Electrical and Computer Engineering at the University of Colorado at Boulder. He also serves as Associate Dean for Education in the College of Engineering and Applied Science. He joined the CU-Boulder faculty in 2000, after serving on the faculty of Rice University for 11 years. While at Rice, Bennett pioneered a course in engineering design for both engineering and non-engineering students that has been emulated at several universities and high schools. In addition to other teaching awards, Bennett received the Keck Foundation National Award for Engineering Teaching Excellence for his work on this course. Bennett received his Ph.D. in 1988 from the University of Washington. Prior to completing his doctoral studies, he was a U.S. Naval Officer for several years and founded and served as President of Pacific Mountain Research, Inc., where he supervised the design and development of a number of commercial computing systems. Bennett's primary research interests are broadly focused in the area of distributed systems, and more narrowly in distributed information management and distributed robotic macrosensors.  相似文献   
87.
Image segmentation towards new image representation methods   总被引:1,自引:0,他引:1  
Very low bit-rate video coding has recently become one of the most important areas of image communication and a large variety of applications have already been identified. Since conventional approaches are reaching a saturation point, in terms of coding efficiency, a new generation of video coding techniques, aiming at a deeper “understanding” of the image, is being studied. In this context, image analysis, particularly the identification of objects or regions in images (segmentation), is a very important step. This paper describes a segmentation algorithm based on split and merge. Images are first simplified using mathematical morphology operators, which eliminate perceptually less relevant details. The simplified image is then split according to a quad tree structure and the resulting regions are finally merged in three steps: merge, elimination of small regions and control of the number of regions.  相似文献   
88.
丁青锋  王松 《电信科学》2023,39(4):31-42
针对高铁场景下封闭车厢带来的高信号穿透损耗导致传输速率下降问题,提出一种分布式智能全表面(intelligent omni-surface,IOS)辅助空间调制(spatial modulation,SM)的传输方案。首先,采用SM技术保证索引信息部分不受穿透损耗的影响;然后,为了减小远距离IOS车窗的高路径损耗和功率损耗,根据最大化接收信噪比原则对分布式IOS遍历选择,激活最佳IOS车窗传输SM调制信息。最后,为了减小缺失直视路径增益对系统容量性能的影响,基于功率损耗模型,采用天线移除原则和排序选择方式,对接收天线和IOS单元进行动态选择激活。仿真结果表明,相比于传统中继转发和可重构智能超表面-空间调制(reconfigurable intelligence surface-SM,RIS-SM)方案,所提方案更适合高铁通信场景。并且在功率损耗模型下,联合天线与IOS单元选择的分布式IOS-SM方案仍能够保证系统高性能传输。  相似文献   
89.
针对电力线通信(PLC)和射频(RF)无线通信混合传输的室内通信场景,提出了一种基于角度信息的信道状态信息(AI-CSI)的能效优先传输方案。首先,Wi-Fi无线网络和PLC网络分别作为主网络和次级网络,并且采用认知无线电技术来提高频谱效率的情况下,建立次级网络总能效最大化为目标函数的优化问题。其次,为了求解该问题,通过基于AI-CSI的迫零波束成形方法,获得波束成形权矢量,并进一步提出Dinkelbach与拉格朗日乘子法相结合的优化方法,进行最优的功率分配。最后,计算机仿真结果不仅验证了所提方案的有效性和优越性,而且分析了中继天线数和用户个数等典型参数对系统能效带来的影响,从而为实际系统设计提供了参考和依据。  相似文献   
90.
The technological innovations and wide use of Wireless Sensor Network (WSN) applications need to handle diverse data. These huge data possess network security issues as intrusions that cannot be neglected or ignored. An effective strategy to counteract security issues in WSN can be achieved through the Intrusion Detection System (IDS). IDS ensures network integrity, availability, and confidentiality by detecting different attacks. Regardless of efforts by various researchers, the domain is still open to obtain an IDS with improved detection accuracy with minimum false alarms to detect intrusions. Machine learning models are deployed as IDS, but their potential solutions need to be improved in terms of detection accuracy. The neural network performance depends on feature selection, and hence, it is essential to bring an efficient feature selection model for better performance. An optimized deep learning model has been presented to detect different types of attacks in WSN. Instead of the conventional parameter selection procedure for Convolutional Neural Network (CNN) architecture, a nature-inspired whale optimization algorithm is included to optimize the CNN parameters such as kernel size, feature map count, padding, and pooling type. These optimized features greatly improved the intrusion detection accuracy compared to Deep Neural network (DNN), Random Forest (RF), and Decision Tree (DT) models.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号