首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6046篇
  免费   1259篇
  国内免费   364篇
化学   441篇
晶体学   5篇
力学   115篇
综合类   41篇
数学   633篇
物理学   1605篇
无线电   4829篇
  2024年   20篇
  2023年   73篇
  2022年   126篇
  2021年   156篇
  2020年   205篇
  2019年   164篇
  2018年   153篇
  2017年   211篇
  2016年   258篇
  2015年   345篇
  2014年   480篇
  2013年   409篇
  2012年   513篇
  2011年   495篇
  2010年   368篇
  2009年   438篇
  2008年   449篇
  2007年   490篇
  2006年   372篇
  2005年   344篇
  2004年   288篇
  2003年   256篇
  2002年   187篇
  2001年   183篇
  2000年   143篇
  1999年   101篇
  1998年   99篇
  1997年   60篇
  1996年   54篇
  1995年   39篇
  1994年   28篇
  1993年   28篇
  1992年   32篇
  1991年   14篇
  1990年   16篇
  1989年   11篇
  1988年   10篇
  1987年   5篇
  1986年   5篇
  1985年   8篇
  1984年   5篇
  1983年   4篇
  1982年   8篇
  1981年   3篇
  1980年   2篇
  1979年   3篇
  1978年   2篇
  1977年   3篇
  1976年   1篇
  1957年   2篇
排序方式: 共有7669条查询结果,搜索用时 31 毫秒
1.
为了解决被动雷达系统中的多发射源定位问题,提出了一种基于多重信号分类(MUSIC)算法和图像膨胀(IE)算法的直接定位方法。该方法结合了谱分析中的MUSIC思想,通过对接收量测协方差矩阵进行特征分析求解目标的位置。首先,在目标个数未知的前提下,利用Akaike信息准则(AIC)来确定模型阶数;然后,推导了基于MUSIC的定位代价函数;之后,利用图像膨胀算法处理得到的代价函数平面;最后,膨胀处理后的输出为目标个数及目标位置的估计值。提出的算法有效地解决了目标检测及提取的问题,能够确定多个目标的位置坐标,为后续的定位性能分析提供可能性,也保证了算法的完整性。进一步地分析了多个临近目标情况下影响目标提取性能的主要因素。  相似文献   
2.
如何在复杂背景下持续有效地检测目标位置,一直是研究者们需要面对的主要挑战。本文在研究红外点状移动目标特征的基础上,根据目标无纹理,无形状的特性,提出一种改进的形态学目标增强算法,并利用目标连续时空不变性检测目标。首先,建立多尺度的图像金字塔,在每层上采用改进的形态学算法快速、粗糙定位小目标。然后进一步的根据目标在时空上的位置相关性,提出基于目标运动特征分析的精确检测方法。得到精确稳定的检测结果。最后实验结果表明与经典的形态学检测算法及其他算法相比,该技术能更有效地检测弱小目标,具有更高的鲁棒性。  相似文献   
3.
Frequency Insertion Strategy for Channel Assignment Problem   总被引:1,自引:0,他引:1  
This paper presents a new heuristic method for quickly finding a good feasible solution to the channel assignment problem (CAP). Like many other greedy-type heuristics for CAP, the proposed method also assigns a frequency to a call, one at a time. Hence, the method requires computational time that increases only linear to the number of calls. However, what distinguishes the method from others is that it starts with a narrow enough frequency band so as to provoke violations of constraints that we need to comply with in order to avoid radio interference. Each violation is then resolved by inserting frequencies at the most appropriate positions so that the band of frequencies expands minimally. An extensive computational experiment using a set of randomly generated problems as well as the Philadelphia benchmark instances shows that the proposed method perform statistically better than existing methods of its kind and even yields optimum solutions to most of Philadelphia benchmark instances among which two cases are reported for the first time ever, in this paper. Won-Young Shin was born in Busan, Korea in 1978. He received B.S. in industrial engineering from Pohang University of Science and Technology (POSTECH) in 2001 and M.S in operation research and applied statistics from POSTECH in 2003. Since 2003 he has been a researcher of Agency for Defense Development (ADD) in Korea. He is interested in optimization of communication system and applied statistics. Soo Y. Chang is an associate professor in the Department of Industrial Engineering at Pohang University of Science and Technology (POSTECH), Pohang, Korea. He teaches linear programming, discrete optimization, network flows and operations research courses. His research interests include mathematical programming and scheduling. He has published in several journals including Discrete Applied Mathematics, Computers and Mathematics with Application, IIE Transactions, International Journal of Production Research, and so on. He is a member of Korean IIE, and ORMSS. Jaewook Lee is an assistant professor in the Department of Industrial Engineering at Pohang University of Science and Technology (POSTECH), Pohang, Korea. He received the B.S. degree in mathematics with honors from Seoul National University, and the Ph.D. degree from Cornell University in applied mathematics in 1993 and 1999, respectively. He is currently an assistant professor in the department of industrial engineering at the Pohang University of Science and Technology (POSTECH). His research interests include nonlinear systems, neural networks, nonlinear optimization, and their applications to data mining and financial engineering. Chi-Hyuck Jun was born in Seoul, Korea in 1954. He received B.S. in mineral and petroleum engineering from Seoul National University in 1977, M.S. in industrial engineering from Korea Advanced Institute of Science and Technology in 1979 and Ph.D. in operations research from University of California, Berkeley, in 1986. Since 1987 he has been with the department of industrial engineering, Pohang University of Science and Technology (POSTECH) and he is now a professor and the department head. He is interested in performance analysis of communication and production systems. He has published in several journals including IIE Transactions, IEEE Transactions, Queueing Systems and Chemometrics and Intelligent Laboratory Systems. He is a member of IEEE, INFORMS and ASQ.  相似文献   
4.
3G Wideband CDMA systems adopt the Orthogonal Variable Spreading Factor code tree as the channelization codes management for achieving high data rate transmission in personal multimedia communications. It assigns a single channelization code for each accepted connection. Nevertheless, it wastes the system capacity when the required rate is not powers of two of the basic rate. One good solution is to assign multiple codes for each accepted connection but it causes two inevitable drawbacks: long handoff delay and new call setup delay due to high complexity of processing with multiple channelization codes, and high cost of using more number of rake combiners. Especially, long handoff delay may result in more call dropping probability and higher Grade of Service, which will degrade significantly the utilization and revenue of the 3G cellular systems. Therefore, we propose herein an adaptive efficient codes determination algorithm based on the Markov Decision Process analysis approach to reduce the waste rate and reassignments significantly while providing fast handoff. Numerical results demonstrate that the proposed approach yields several advantages, including the lowest GOS, the least waste rate, and the least number of reassignments. Meanwhile, the optimal number of rake combiners is also analyzed in this paper. This research was supported in part by the National Science Council of Taiwan, ROC, under contract NSC-93-2213-E-324-018.  相似文献   
5.
Depending on whether bidirectional links or unidirectional links are used for communications, the network topology under a given range assignment is either an undirected graph referred to as the bidirectional topology, or a directed graph referred to as the unidirectional topology. The Min-Power Bidirectional (resp., Unidirectional) k-Node Connectivity problem seeks a range assignment of minimum total power subject to the constraint that the produced bidirectional (resp. unidirectional) topology is k-vertex connected. Similarly, the Min-Power Bidirectional (resp., Unidirectional) k-Edge Connectivity problem seeks a range assignment of minimum total power subject to the constraint the produced bidirectional (resp., unidirectional) topology is k-edge connected. The Min-Power Bidirectional Biconnectivity problem and the Min-Power Bidirectional Edge-Biconnectivity problem have been studied by Lloyd et al. [23]. They show that range assignment based the approximation algorithm of Khuller and Raghavachari [18], which we refer to as Algorithm KR, has an approximation ratio of at most 2(2 – 2/n)(2 + 1/n) for Min-Power Bidirectional Biconnectivity, and range assignment based on the approximation algorithm of Khuller and Vishkin [19], which we refer to as Algorithm KV, has an approximation ratio of at most 8(1 – 1/n) for Min-Power Bidirectional Edge-Biconnectivity. In this paper, we first establish the NP-hardness of Min-Power Bidirectional (Edge-) Biconnectivity. Then we show that Algorithm KR has an approximation ratio of at most 4 for both Min-Power Bidirectional Biconnectivity and Min-Power Unidirectional Biconnectivity, and Algorithm KV has an approximation ratio of at most 2k for both Min-Power Bidirectional k-Edge Connectivity and Min-Power Unidirectional k-Edge Connectivity. We also propose a new simple constant-approximation algorithm for both Min-Power Bidirectional Biconnectivity and Min-Power Unidirectional Biconnectivity. This new algorithm applies only to Euclidean instances, but is best suited for distributed implementation. A preliminary version of this work appeared in the proceedings of the 2nd International Conference on AD-HOC Network and Wireless (Adhoc-Now 2003). Research performed in part while visiting the Max-Plank-Institut fur Informatik. Gruia Calinescu is an Assistant Professor of Computer Science at the Illinois Institute of Technology since 2000. He held postdoc or visiting researcher positions at DIMACS, University of Waterloo, and Max-Plank Institut fur Informatik. Gruia has a Diploma from University of Bucharest and a Ph.D. from Georgia Insitute of Technology. His research interests are in the area of algorithms. Peng-Jun Wan has joined the Computer Science Department at Illinois Institute of Technology in 1997 and has been an Associate Professor since 2004. He received his Ph.D. in Computer Science from University of Minnesota in 1997, M.S. in Operations Research and Control Theory from Chinese Academy of Science in 1993, and B.S. in Applied Mathematics from Tsinghua University in 1990. His research interests include optical networks and wireless networks.  相似文献   
6.
In this paper we study the optimization issues of ring networks employing novel parallel multi‐granularity hierarchical optical add‐drop multiplexers (OADMs). In particular, we attempt to minimize the number of control elements for the off‐line case. We present an integer linear programming formulation to obtain the lower bound in optimization, and propose an efficient heuristic algorithm called global bandwidth resource assignment that is suitable for the design of large‐scale OADM networks.  相似文献   
7.
目标被动式跟踪评述   总被引:2,自引:0,他引:2  
刘春恒  梁彦  周东华 《现代雷达》2003,25(9):5-7,10
首先介绍了目标被动跟踪的发展状况,然后按照不同的量测源分别对现有的被动跟踪方法进行讨论,并给出了各种方法的适用范围和各自的优缺点。最后试探性地给出目标被动跟踪的发展趋势,及其需要解决的重点、难点问题。  相似文献   
8.
基于扩展分形和CFAR特征融合的SAR图像目标识别   总被引:3,自引:0,他引:3  
研究了多信息融合技术在SAR图像目标识别中的应用。将扩展分形特征(Extended Fractal)与双参数恒虚警特征(Double Parameter CFAR)形成的多信息进行融合处理。运用Dempster-Shafer证据理论,在决策层对SAR图像中的像素进行识别分类。实验结果表明通过融合对像素分类的准确性明显好于单特征的检测结果,减少了虚警概率,提高了系统的识别能力。  相似文献   
9.
一种通用型的目标数据仿真   总被引:5,自引:1,他引:4  
王霄红 《现代雷达》2004,26(4):32-34
给出了一种通用型的雷达目标模拟器 ,它能够方便直观的产生各种特征的三维目标轨迹 ,可实时离散出目标点迹 ,为雷达数据处理及精度分析提供数据来源。目标轨迹由一组特征点定义 ,修改方便 ,应用灵活  相似文献   
10.
多传感器目标的模糊识别   总被引:5,自引:0,他引:5  
根据模糊理论,采用信息融合技术和模糊识别技术,讨论了在多类传感器网内进行多目标模糊识别的一般原理和方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号