全文获取类型
收费全文 | 9031篇 |
免费 | 983篇 |
国内免费 | 79篇 |
专业分类
化学 | 46篇 |
力学 | 27篇 |
综合类 | 64篇 |
数学 | 53篇 |
物理学 | 444篇 |
无线电 | 9459篇 |
出版年
2024年 | 21篇 |
2023年 | 114篇 |
2022年 | 105篇 |
2021年 | 172篇 |
2020年 | 264篇 |
2019年 | 136篇 |
2018年 | 141篇 |
2017年 | 269篇 |
2016年 | 349篇 |
2015年 | 535篇 |
2014年 | 814篇 |
2013年 | 690篇 |
2012年 | 816篇 |
2011年 | 787篇 |
2010年 | 527篇 |
2009年 | 496篇 |
2008年 | 558篇 |
2007年 | 579篇 |
2006年 | 541篇 |
2005年 | 467篇 |
2004年 | 389篇 |
2003年 | 379篇 |
2002年 | 278篇 |
2001年 | 204篇 |
2000年 | 132篇 |
1999年 | 85篇 |
1998年 | 62篇 |
1997年 | 48篇 |
1996年 | 45篇 |
1995年 | 34篇 |
1994年 | 12篇 |
1993年 | 11篇 |
1992年 | 10篇 |
1991年 | 11篇 |
1990年 | 7篇 |
1989年 | 1篇 |
1988年 | 2篇 |
1982年 | 1篇 |
1981年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 19 毫秒
81.
A Study of Shadowing on Indoor Visible-Light Wireless Communication Utilizing Plural White LED Lightings 总被引:3,自引:1,他引:2
Toshihiko Komine Shinichiro Haruyama Masao Nakagawa 《Wireless Personal Communications》2005,34(1-2):211-225
White LED is considered as a strong candidate for the future lighting technology. We have proposed an optical wireless communication
system that employs white LEDs for indoor wireless networks. In this system, LED is used not only as a lighting device, but
also as a communication device. The transmitter has large optical power and large emission characteristics to function as
lighting device. And the system has specific wireless channel impulse response differing from infrared wireless communication.
In this paper, we discuss about shadowing effect on the system utilizing plural LED lightings including the performance of
ISI based on the impulse response. We consider the downlink transmission based on TDMA and evaluate the shadowing effect caused
by pedestrians with computer simulation. When the shadowing often occurs at 800 Mb/s, the performance of outage call duration
rate and blocking rate are improved by using 3 LED lightings compared with 1 or 2 LED lightings. And, we show that the system
with the optimal number of the LED lighting is robust against shadowing and can accommodate more calls.
Toshihiko Komine was born in Shizuoka, Japan, on November 17, 1978. He received the B.E. and M.E. degrees in Information and Computer Science
from Keio University, Yokohama, Japan, in 2001 and 2003 respectively. He is currently studying for the Ph.D. degree at Department
of Information and Computer Science, Keio University. His current research interests are optical wireless communications and
LED communications.
Shinichiro Haruyama is a professor at Department of Information and Computer Science, Faculty of Science and Technology, Keio University, Yokohama,
Japan. He received an M.S. in engineering science from University of California at Berkeley in 1983 and a Ph.D. in computer
science from the University of Texas at Austin in 1990. He worked for Bell Laboratories of AT{&}T and Lucent Technologies,
U.S.A from 1991 to 1996, and for Sony Computer Science Laboratories, Inc. from 1998 to 2002. His research interests include
reconfigurable system, system design automation, wireless communication, and visible light communication.
Masao Nakagawa was born in Tokyo, Japan in 1946. He received the B.E., M.E. and Ph.D. degrees in electrical engineering from Keio University,
Yokohama, Japan, in 1969, 1971 and 1974 respectively. Since 1973, he has been with the Department of Electrical Engineering,
Keio University, where he is now a Professor. His research interests are in CDMA, consumer Communications, Mobile communications,
ITS (Intelligent Transport Systems), Wireless Home Networks, and Visible light Communication. He received 1989 IEEE Consumer
Electronics Society Paper Award, 1999-Fall Best Paper Award in IEEE VTC, IEICE Achievement Award in 2000, IEICE Fellow Award
in 2001. He was the executive committee chairman on International Symposium on Spread Spectrum Techniques and Applications
in 1992 and the technical program committee chairman of ISITA (International Symposium on Spread Spectrum Techniques and Applications)
in 1994. He is an editor of Wireless Personal Communications and was a guest editor of the special issues on “CDMA Networks
I, II, III and IV” published in IEEE JSAC in 1994 (I and II) and 1996 (III and IV). He chairs the Wireless Home Link sub-committee
in MMAC (Multimedia Mobile Access Communication Promotion Committee). 相似文献
82.
MPEG-4是动态图像专家组(MPEG)标准家庭中的一员,是国际化标准组织为多媒体通信制定的一种解决方案。介绍了MPEG-4支持的新功能和特点,并阐述了MPEG-4的关键技术,在此基础上对MPEG-4在视频点播业务中的应用问题进行了探讨。 相似文献
83.
SDI接口数字监视设备的设计与实现 总被引:2,自引:0,他引:2
介绍了一种对SDV(串行数字视频)信号进行解码的设备设计方案,提出了该系统的总体构架,并对该系统的硬件设计、软件设计进行了全面的论述。设计的产品具有较高的性能价格比,已进入了推广阶段。 相似文献
84.
CDMA2000 1xEV-DO中的分组调度算法 总被引:1,自引:0,他引:1
移动通信系统需要更好地支持分组数据业务,并满足高速分组数据业务的服务质置要求。这可以通过采用好的调度算法提高平均业务速率和系统整体稳定性实现。针对CDMA2000 1x EV-DO系统的有代表性的调度算法有3种:正比公平算法、速率受限的最大载干比算法、加权公平排队-正比公平(WFQ-PF)联合算法。正比公平调度算法是一种算法简单实用的调度方案,但不能满足用户的服务质景保证;速率受限的最大载干比算法具有比正比公平算法更高的平均吞吐量,可方便地在吞吐量和公平性之间获得很好的折衷;WFQ-PF联合算法具有良好的综合性能,但算法较复杂。 相似文献
85.
86.
Joseph Dunn Michael Neufeld Anmol Sheth Dirk Grunwald John Bennett 《Mobile Networks and Applications》2006,11(1):37-45
Many companies, organizations and communities are providing wireless hotspots that provide networking access using 802.11b wireless networks. Since wireless networks are more sensitive to variations
in bandwidth and environmental interference than wired networks, most networks support a number of transmission rates that
have different error and bandwidth properties. Access points can communicate with multiple clients running at different rates,
but this leads to unfair bandwidth allocation. If an access point communicates with a mix of clients using both 1 Mb/s and
11 Mb/s transmission rates, the faster clients are effectively throttled to 1 Mb/s as well. This happens because the 802.11
MAC protocol approximate “station fairness”, with each station given an equal chance to access the media. We provide a solution
to provide “rate proportional fairness”, where the 11 Mb/s stations receive more bandwidth than the 1 Mb/s stations. Unlike
previous solutions to this problem, our mechanism is easy to implement, works with common operating systems and requires no
change to the MAC protocol or the stations.
Joseph Dunn received an M.S. in computer science from the University of Colorado at Boulder in 2003, and B. S. in coputer science and
mathematics from the University of Arizona in 2001. His research interests are in the general area of computer systems, primarily
focusing on security and scalability in distributed systems. He is currently working on his Ph.D. in computer science from
the University of Colorado at Boulder.
Michael Neufeld received a Ph.D. in Computer Science from the University of Colorado at Boulder in December of 2004, having previously received
an M.S. in Computer Science from the University of Colorado at Boulder in 2000 and an A.B. in Computer Science from Princeton
University in 1993. His research interests are in the general area of computer system, specifically concentrating on wireless
networking, software defind/cognitive radio, and streerable antennas. He is currently a postdoc in the Computer Science department
at the University of Calorado at Boulder pursuing research related to software defined radio and new MAC protocols for steerable
phase array antennas.
Anmol Sheth is a Ph.D. student in Computer Science at the University of Colorado at Boulder. He received his B.S. in Computer Science
from the University of Pune, India in 2001. He has been co-leading the development of the MANTIS operating system. He has
co-authored three papers include MAC layer protocol design, energy-efficient wireless communication, and adapting communications
to mobility.
Dirk Grunwald received his Ph.D. from the University of Illinois in 1989 and joined the University of Colorado the same year. His work
addresses research and teaching in the broad area of “computer systems”, which includes computer architecture, operating systems,
networks, and storage systems. His interests also include issues in pervasive computing, novel computing models, and enjoying
the mountains. He is currently an Associate Professor in the Department of Computer Science and in Electrical and Computer
Engineering and is also the Director of the Colorado Center for Information Storage.
John Bennett is a Professor of Computer Science with a joint appointment in Electrical and Computer Engineering at the University of Colorado
at Boulder. He also serves as Associate Dean for Education in the College of Engineering and Applied Science. He joined the
CU-Boulder faculty in 2000, after serving on the faculty of Rice University for 11 years. While at Rice, Bennett pioneered
a course in engineering design for both engineering and non-engineering students that has been emulated at several universities
and high schools. In addition to other teaching awards, Bennett received the Keck Foundation National Award for Engineering
Teaching Excellence for his work on this course. Bennett received his Ph.D. in 1988 from the University of Washington. Prior
to completing his doctoral studies, he was a U.S. Naval Officer for several years and founded and served as President of Pacific
Mountain Research, Inc., where he supervised the design and development of a number of commercial computing systems. Bennett's
primary research interests are broadly focused in the area of distributed systems, and more narrowly in distributed information
management and distributed robotic macrosensors. 相似文献
87.
Image segmentation towards new image representation methods 总被引:1,自引:0,他引:1
Diogo Cortez Paulo Nunes Manuel Menezes de Sequeira Fernando Pereira 《Signal Processing: Image Communication》1995,6(6):485-498
Very low bit-rate video coding has recently become one of the most important areas of image communication and a large variety of applications have already been identified. Since conventional approaches are reaching a saturation point, in terms of coding efficiency, a new generation of video coding techniques, aiming at a deeper “understanding” of the image, is being studied. In this context, image analysis, particularly the identification of objects or regions in images (segmentation), is a very important step. This paper describes a segmentation algorithm based on split and merge. Images are first simplified using mathematical morphology operators, which eliminate perceptually less relevant details. The simplified image is then split according to a quad tree structure and the resulting regions are finally merged in three steps: merge, elimination of small regions and control of the number of regions. 相似文献
88.
针对高铁场景下封闭车厢带来的高信号穿透损耗导致传输速率下降问题,提出一种分布式智能全表面(intelligent omni-surface,IOS)辅助空间调制(spatial modulation,SM)的传输方案。首先,采用SM技术保证索引信息部分不受穿透损耗的影响;然后,为了减小远距离IOS车窗的高路径损耗和功率损耗,根据最大化接收信噪比原则对分布式IOS遍历选择,激活最佳IOS车窗传输SM调制信息。最后,为了减小缺失直视路径增益对系统容量性能的影响,基于功率损耗模型,采用天线移除原则和排序选择方式,对接收天线和IOS单元进行动态选择激活。仿真结果表明,相比于传统中继转发和可重构智能超表面-空间调制(reconfigurable intelligence surface-SM,RIS-SM)方案,所提方案更适合高铁通信场景。并且在功率损耗模型下,联合天线与IOS单元选择的分布式IOS-SM方案仍能够保证系统高性能传输。 相似文献
89.
针对电力线通信(PLC)和射频(RF)无线通信混合传输的室内通信场景,提出了一种基于角度信息的信道状态信息(AI-CSI)的能效优先传输方案。首先,Wi-Fi无线网络和PLC网络分别作为主网络和次级网络,并且采用认知无线电技术来提高频谱效率的情况下,建立次级网络总能效最大化为目标函数的优化问题。其次,为了求解该问题,通过基于AI-CSI的迫零波束成形方法,获得波束成形权矢量,并进一步提出Dinkelbach与拉格朗日乘子法相结合的优化方法,进行最优的功率分配。最后,计算机仿真结果不仅验证了所提方案的有效性和优越性,而且分析了中继天线数和用户个数等典型参数对系统能效带来的影响,从而为实际系统设计提供了参考和依据。 相似文献
90.
The technological innovations and wide use of Wireless Sensor Network (WSN) applications need to handle diverse data. These huge data possess network security issues as intrusions that cannot be neglected or ignored. An effective strategy to counteract security issues in WSN can be achieved through the Intrusion Detection System (IDS). IDS ensures network integrity, availability, and confidentiality by detecting different attacks. Regardless of efforts by various researchers, the domain is still open to obtain an IDS with improved detection accuracy with minimum false alarms to detect intrusions. Machine learning models are deployed as IDS, but their potential solutions need to be improved in terms of detection accuracy. The neural network performance depends on feature selection, and hence, it is essential to bring an efficient feature selection model for better performance. An optimized deep learning model has been presented to detect different types of attacks in WSN. Instead of the conventional parameter selection procedure for Convolutional Neural Network (CNN) architecture, a nature-inspired whale optimization algorithm is included to optimize the CNN parameters such as kernel size, feature map count, padding, and pooling type. These optimized features greatly improved the intrusion detection accuracy compared to Deep Neural network (DNN), Random Forest (RF), and Decision Tree (DT) models. 相似文献