首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   413篇
  免费   83篇
  国内免费   8篇
化学   12篇
力学   11篇
综合类   5篇
数学   123篇
物理学   74篇
无线电   279篇
  2024年   3篇
  2023年   6篇
  2022年   15篇
  2021年   20篇
  2020年   21篇
  2019年   26篇
  2018年   12篇
  2017年   18篇
  2016年   17篇
  2015年   15篇
  2014年   28篇
  2013年   26篇
  2012年   49篇
  2011年   46篇
  2010年   22篇
  2009年   32篇
  2008年   22篇
  2007年   19篇
  2006年   22篇
  2005年   11篇
  2004年   15篇
  2003年   13篇
  2002年   4篇
  2001年   3篇
  2000年   8篇
  1999年   3篇
  1998年   5篇
  1997年   5篇
  1996年   2篇
  1995年   5篇
  1994年   5篇
  1991年   1篇
  1989年   2篇
  1986年   2篇
  1982年   1篇
排序方式: 共有504条查询结果,搜索用时 31 毫秒
1.
在编制遥测数据处理软件的过程中,面对大量的测试数据,经常需要编写高效率的数据过滤器。本文讨论了一种通过采用跨单元、跨类访问Delphi类的私有域的方法实现快速删除TList批连续结点的新算法,并通过测试结果得到验证。  相似文献   
2.
Di  Nicolas D. 《Ad hoc Networks》2004,2(1):65-85
In wireless sensor networks that consist of a large number of low-power, short-lived, unreliable sensors, one of the main design challenges is to obtain long system lifetime without sacrificing system original performance (sensing coverage and sensing reliability). To solve this problem, one of the potential approaches is to identify redundant nodes at the sensing interface and then assign them an off-duty operation mode that has lower energy consumption than the normal on-duty mode. In our previous work [J. Wireless Commun. Mobile Comput. 3 (2003) 271; Processing of ACM Wireless Sensor Network and Application Workshop 2002, September 2002], we proposed a node-scheduling scheme, which can provide a 100% sensing coverage preservation capability. This, however, requires each node to be aware of its own and its neighbors’ location information. Also, in that scheme, each node has to do accurate geometrical calculation to determine whether to take an off-duty status. In this paper, we propose and study several alternative node-scheduling schemes, which cannot completely preserve the original system coverage, but are nonetheless light-weighted and flexible compared with the previous one. Our simulation results compare these schemes with the previous one and demonstrate their effectiveness.  相似文献   
3.
In this paper we prove three conjectures of Revers on Lagrange interpolation for fλ(t)=|t|λ,λ>0, at equidistant nodes. In particular, we describe the rate of divergence of the Lagrange interpolants LN( fλ,t) for 0<|t|<1, and discuss their convergence at t=0. We also establish an asymptotic relation for max|t|1| |t|λLN( fλ,t)|. The proofs are based on strong asymptotics for |t|λLN( fλ,t), 0|t|<1.  相似文献   
4.
基于C8051F040的CAN总线通讯系统设计   总被引:7,自引:0,他引:7  
田奕  刘秀红 《现代电子技术》2006,29(15):29-30,33
作为一种很有前途的现场总线,CAN总线通信相对于一般的串行通信总线,他的实时性、可靠性和灵活性的特点更加突出。介绍了C8051F040内部集成的CAN控制器的使用方法,给出了以此芯片为核心的CAN总线智能节点通讯接口的硬件和软件设计,实际的运行验证了设计的正确性。其设计通用性好、可靠性高、性价比高,具有广泛的应用前景。  相似文献   
5.
A Markovian network process describes the movement of discrete units among a set of nodes that process the units. There is considerable knowledge of such networks, often called queueing networks, in which the nodes operate independently and the routes of the units are independent. The focus of this study, in contrast, is on networks with dependent nodes and routings. Examples of dependencies are parallel processing across several nodes, blocking of transitions because of capacity constraints on nodes, alternate routing of units to avoid congestion, and accelerating or decelerating the processing rate at a node depending on downstream congestion. We introduce a general network process representing the numbers of units at the nodes and derive its equilibrium distribution. This distribution takes the form of a product of functions of vectors in which the arguments of the functions satisfy an interchangeability property. This new type of distribution may apply to other multi-variate processes as well. A basic idea in our approach is a linking of certain micro-level balance properties of the network routing to the processing rates at the nodes. The link is via routing-balance partitions of nodes that are inherent in any network. A byproduct of this approach is a general characterization of blocking of transitions without the restriction that the process is reversible, which had been a standard assumption. We also give necessary and sufficient conditions under which a unit moving in the network sees a time average for the unmoved units (called the MUSTA property). Finally, we discuss when certain flows between nodes in an open network are Poisson processes.This research was sponsored in part by Air Force Office of Scientific Research contract 84-0367.  相似文献   
6.
恶意用户通过向数据融合中心发送伪造的频谱感知数据,解决自身频谱资源短缺问题,但会极大地降低频谱感知系统的检测概率。为了解决此问题,提出了基于模糊K means++的数据融合算法。该算法首先引入模糊处理机制处理样本的数据特征值,以此来增加样本间的差异性;然后将模糊处理后的数据发送到融合中心,融合中心采用离群点挖掘的方法排除恶意用户,并对保留下来的用户进行融合,使样本向量具有鲁棒性;最后运用K means++算法对样本向量进行聚类。该算法利用轮盘法选择聚类中心,可有效抵御恶意用户的攻击,提高系统感知性能;无需知晓信号与噪声的分布等一些先验信息,也避免了繁杂的门限推导。从仿真结果可以看出,该算法对抵御恶意用户攻击具有突出的效果,有效提升了协同频谱感知系统的稳定性和鲁棒性。  相似文献   
7.
基于极大权的最小连通支配集启发式算法   总被引:17,自引:2,他引:17       下载免费PDF全文
阎新芳  孙雨耕  胡华东 《电子学报》2004,32(11):1774-1777
Ad hoc无线网络中基于最小连通支配集(MCDS)的路由是一个引人瞩目的方法,文中提出了一种基于极大权的MCDS的启发式算法,确保了性能强的主机担任网关节点的角色,能更好的协调管理网络中其他的节点,从而保持MCDS的相对稳固性并为全网中的广播和路由操作提供一个高效的通信基础.仿真结果表明,该算法能在保证生成权和极大的连通支配集的同时也确保它的极小性,因此能有效地用于基于MCDS的路由设计中.  相似文献   
8.
The mathematical model of the injection molding process is characterized by evolutionary inequalities with an elliptic principal part and a Volterra term. Existence and uniqueness of the solution of these problems are derived by means of an argument based on the Banach fixed point theorem. Regularity results are obtained by using the penalty and Rothe method. The results can be considered as a starting point for the numerical treatment and for the application to injection molding.  相似文献   
9.
10.
林海伦  李焱  王伟平  岳银亮  林政 《通信学报》2015,36(Z1):141-148
提出一种高效的基于段模式的检测恶意URL的方法,该方法首先解析已标注的恶意URL中的域名、路径名和文件名3个语义段,然后通过建立以三元组为词项的倒排索引快速计算恶意URL每个语义段的模式,最后基于倒排索引查找到的段模式来判定给定的URL是否是恶意URL。不仅如此,该方法还支持基于Jaccard的随机域名识别技术来判定包含随机域名的恶意URL。实验结果表明,与当前先进的基准方法相比,该方法具有较好的性能和可扩展性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号