首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2244篇
  免费   52篇
  国内免费   30篇
电工技术   1篇
综合类   1897篇
化学工业   4篇
机械仪表   2篇
能源动力   1篇
石油天然气   1篇
武器工业   1篇
无线电   316篇
一般工业技术   22篇
冶金工业   1篇
自动化技术   80篇
  2023年   1篇
  2022年   3篇
  2021年   3篇
  2020年   1篇
  2019年   38篇
  2018年   73篇
  2017年   91篇
  2016年   97篇
  2015年   87篇
  2014年   117篇
  2013年   113篇
  2012年   132篇
  2011年   136篇
  2010年   158篇
  2009年   184篇
  2008年   176篇
  2007年   179篇
  2006年   182篇
  2005年   180篇
  2004年   175篇
  2003年   76篇
  2002年   15篇
  2001年   21篇
  2000年   34篇
  1999年   8篇
  1998年   12篇
  1997年   9篇
  1996年   3篇
  1995年   6篇
  1994年   6篇
  1993年   3篇
  1992年   1篇
  1991年   4篇
  1990年   2篇
排序方式: 共有2326条查询结果,搜索用时 0 毫秒
31.
基于混沌序列的良好相关性和随机性,提出了一种使用混沌序列降低多输入多输出雷达波形自相关旁瓣和互相关的方法.通过不同初值迭代得到混沌序列,然后经过相应的量化和四相编码得到混沌波形.由于不同混沌波形的自相关旁瓣不相关,同时,不同混沌波形的互相关也不相关,因此通过多脉冲压缩积累能够有效地降低自相关旁瓣和互相关在多输入多输出雷达中的影响.输出结果具有较低的旁瓣峰值,从而提高了检测性能。  相似文献   
32.
在综合分析现有基于密文策略属性加密方案的基础上,针对现有基于密文策略属性加密方案较少考虑属性权重的现状,将权重的概念引入到基于密文策略的属性加密方案中,提出了基于密文策略的权重属性加密方案,证明了在选择权重属性集模型下安全性。并将此方案引入到云计算环境下,给出了系统级的基于密文策略的权重属性加密方案。分析表明,基于密文策略权重属性的加密方案相比现有方案更适用于云计算环境。  相似文献   
33.
With the rank-1 constraint, a method for camera intrinsic parameters calculation based on spheres is proposed. The geometric interpretation of the rank-1 constraint is explored from the relation of the image of the absolute conic and the sphere image. Three algebraic equations are derived from the rank-1 constraint. The relation of the sphere images and the camera intrinsic parameters is clearly interpreted in vision geometry. Finally, a nonlinear optimized method is used with the three constraint equations for improving the accuracy. Experimental results show that our method is robust. Compared with the traditional method, it can improve the accuracy of the results of the intrinsic parameters.  相似文献   
34.
建立了一种RS码编码参数的盲识别新方法.该方法利用本原元的校检作用并行搜索码长和域,提高了盲识别的效率;略掉不符合本原元校检的码字,增强了码根搜寻的可靠性;利用码根的连续性采用前进-倒退法搜索生成多项式,简化计算,提高了搜索速度.仿真结果表明,新算法在90%识别率的误比特率上限上有明显提高.  相似文献   
35.
We focus our attention on how to get optimal performance of concurrent transmission in heterogeneous networks. An equivalent queuing model is used to analyze the end-to-end delay performance of perfect splitting strategy with the theoretical delay bound found. Furthermore, two splitting algorithms, Minimum Queuing Delay based splitting strategy (MQD) and Unified Queuing Management Based Splitting Strategy (UQM), are presented based on the joint resources scheduled in different RATs (Radio Access Technology). In the two-RAT scenario, the two-dimensional discrete-state continuous-time Markov process is used to analyze our schemes with close-formed solutions found. Simulation results demonstrate that our proposed flow splitting strategies utilize the system resources efficiently and outperform current strategies, getting close to the theoretical delay bound especially in the heavy load region.  相似文献   
36.
A rate-compatible puncturing algorithm for network LDPC codes is proposed to achieve the minimum error probability, and decoding error probability is derived. The algorithm for finding variable nodes to be deleted based on the tanner graph of network LDPC codes is proposed, which is aimed at minimizing the decoding error probability and optimizing the puncturing pattern. Simulation results illustrate that, at BER=10-4, the proposed rate-compatible network LDPC codes have a coding gain of about 0.4dB compared with the codes obtained via the existing punctured methods.  相似文献   
37.
A range spread target detection algorithm based on the normal distribution test is proposed. Based on the fact that the range spread target signal generally does not follow normal distribution, the range spread target detection problem is equivalent to the normal distribution test problem. Analysis show that the normal distribution test detector has the characteristic of constant false alarm rate. The performance of the proposed detector is analyzed. Numerical experimental results based on simulation and measured high range resolution profile data show that the proposed detector outperform the energy integration detector.  相似文献   
38.
In the traditional Space Time Division Multiple Access (STDMA) protocol, the time slot is not allocated dynamically and the idle slots potentially exist. To address the issue, based on fuzzy logic control and Multiple Input Multiple Output (MIMO) technology, a novel STDMA protocol (MIMO-STDMA) is proposed. In MIMO-STDMA, the number of slots and the frame length allocated to a mobile node are determined dynamically through the judgment and calculation based on regulation of the fuzzy controller. Utilizing the reservation and stream control gain of MIMO, in the allocated slots, a node employs full antennas to transmit data. On the contrary, in the unallocated slots the node reserves the transmission by 4-way handshaking with the carrier sense. Finally, simulations are conducted to evaluate the performance of the proposed protocol. The results show that the MIMO-STDMA outperforms the STDMA in terms of throughput and slot utilization.  相似文献   
39.
According to the analysis of the relationship between the impedance and bandwidth of the dipole antenna, a novel elliptical plane internal antenna feeding by a coaxial line is presented. It consists of an elliptical monopole and a rectangular grounding piece and has the virtues of broad band, high gain and small size. The antenna can be used for ultrahigh frequency (UHF) partial discharge (PD) detection in the gas-insulated switchgear (GIS). The size is achieved by using the simulation software Ansoft HFSS and the optimum size of total antenna is 90mm×45mm. A prototype is constructed and studied, and then measured. The antenna covers a large band from 781MHz to 2.00GHz, with the VSWR less than 2.5 and a max gain of 3.55dB. Simulated and tested results are in good agreement and the radiation pattern and gain characteristics are given.  相似文献   
40.
Cryptanalysis of Li et al.'s authentication protocol shows that it is vulnerable to masquerade attack, session key disclosure attack and forge smart card attack. To overcome these security flaws, an improved protocol is presented. This protocol proves secure against some possible attacks. Besides, the improved scheme maintains the features of identity anonymity, concise registration, simple operation, and so on.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号