首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   344篇
  免费   15篇
  国内免费   6篇
电工技术   59篇
综合类   48篇
化学工业   2篇
金属工艺   2篇
机械仪表   3篇
建筑科学   7篇
矿业工程   2篇
能源动力   1篇
无线电   141篇
一般工业技术   10篇
冶金工业   8篇
自动化技术   82篇
  2023年   1篇
  2022年   1篇
  2020年   1篇
  2019年   2篇
  2018年   1篇
  2017年   3篇
  2016年   2篇
  2015年   3篇
  2014年   13篇
  2013年   26篇
  2012年   18篇
  2011年   17篇
  2010年   20篇
  2009年   21篇
  2008年   15篇
  2007年   12篇
  2006年   14篇
  2005年   16篇
  2004年   14篇
  2003年   28篇
  2002年   27篇
  2001年   23篇
  2000年   13篇
  1999年   20篇
  1998年   10篇
  1997年   8篇
  1996年   10篇
  1995年   7篇
  1994年   4篇
  1993年   2篇
  1991年   2篇
  1989年   1篇
  1988年   1篇
  1987年   2篇
  1985年   2篇
  1984年   2篇
  1983年   1篇
  1982年   1篇
  1955年   1篇
排序方式: 共有365条查询结果,搜索用时 15 毫秒
21.
基于远程自动抄表应用的低压电力线载波通信技术研究   总被引:3,自引:0,他引:3  
深入分析了低压电力线的信道特性,对几种典型低压电力线载波通信集成芯片在远程自动抄表领域的应用进行了研究,分析了应用中遇到的困难,并提出了相应解决方案。  相似文献   
22.
Abstract

Resources such as Wideband Code Division Multiple Access (WCDMA) Orthogonal Variable Spreading Factor (OVSF) codes are considered scarce and valuable in modern cellular networks, therefore operators must use them efficiently. The author proposes an evaluation model for predicting OVSF single‐code allocation performance in WCDMA networks. In this paper, two performance measures‐call blocking probability (CBP) and bandwidth utilization (BU)‐are adopted to solve a utilization optimization problem. Specifically, a given traffic statistic and a specified maximum CBP constraint are applied to maximize BU in a Node‐B. Operators can use the results to deploy their codes flexibly and to improve profitability.  相似文献   
23.
Abstract

The convergence of computing, communications, and traditional educational technologies enables teaching faculty and librarians to discuss, plan, create, and implement fundamentally unique strategies for providing access to people, information, and the teaching/learning process. A tripartite strategy for achieving these goals is presented. The three critical areas are: (1) Content (how to put together search strategies, look for information, process it, sift it, and organize it); (2) Process (how to use the technology to maximum benefit); and (3) Lobbying (in the areas of information policy, financial resources, and technological infrastructure). An action plan is proposed to provide both inspiration and guidance to help accomplish these goals.  相似文献   
24.
3.3IP电信网的商业模型及其相关技术 商业模型是要由技术来支持的,不同的商业模型导致不同技术的产生.Internet是从军网、科研网逐步发展过来的.从本质上来讲,Internet的设计理念是一种非赢利性的系统体系的设计理念,最典型的例子就是引起Internet爆炸性发展的Web的设计就是非赢利性的,电信运营商是无法来经营W eb业务而据此赢利的.Internet的泡沫出现,以及泡沫破灭后,产业的大滑坡,当然是与炒作有关,但最本质的还是技术因素,因为Web是一种不可赢利的技术,要用一个不能赢利的系统赚钱,除了炒作外别无它路可走..COM的大量倒闭,网络公司的相继破产,其根源是商业模型及其相关的技术问题.  相似文献   
25.
王伟东  王薇 《电讯技术》2007,47(4):60-62
介绍了一种利用双音多频(DTMF)信号进行数据通信的接口电路,具体阐述了该电路的组成原理以及软硬件的实现方法.  相似文献   
26.
在工作中坚持以人为本的方针,征地拆迁调查工作要根据工程项目实际需要分阶段灵活安排,思路要敏锐,观念要跟上国家宏观产业调控的需求。  相似文献   
27.
Many development organizations try to minimize faults in software as a means for improving customer satisfaction. Assuring high software quality often entails time-consuming and costly development processes. A software quality model based on software metrics can be used to guide enhancement efforts by predicting which modules are fault-prone. This paper presents statistical techniques to determine which predictions by a classification tree should be considered uncertain. We conducted a case study of a large legacy telecommunications system. One release was the basis for the training dataset, and the subsequent release was the basis for the evaluation dataset. We built a classification tree using the TREEDISC algorithm, which is based on 2 tests of contingency tables. The model predicted whether a module was likely to have faults discovered by customers, or not, based on software product, process, and execution metrics. We simulated practical use of the model by classifying the modules in the evaluation dataset. The model achieved useful accuracy, in spite of the very small proportion of fault-prone modules in the system. We assessed whether the classes assigned to the leaves were appropriate by statistical tests, and found sizable subsets of modules with uncertain classification. Discovering which modules have uncertain classifications allows sophisticated enhancement strategies to resolve uncertainties. Moreover, TREEDISC is especially well suited to identifying uncertain classifications.  相似文献   
28.
Abstract.  Drawing upon actor-network theory, this article analyses the socio-technological construction of China's strategy for the telecommunications market transformation. We define the telecommunications market as the non-human actor. The public and society, the state, and the operators constitute three groups of human actors representing the social interests in the telecommunications industry. We have observed that these actors' interests are influenced by the situation of technology advance, the telecommunications development level, the macro reform progress and the national policies concerning the political and economic systems, and the international trend in telecommunications reforms. Owing to the dynamics of these contextual elements and the struggle of actors to inscribe their interests into the national strategy, China has transformed the telecommunications market by four stages, each stage with specific foci. Our case study demonstrates that the applications of actor-network theory can be extended to investigate the formulation of a national strategy. The research design in which the social and technological contexts are dynamically connected with strategy formulation can be drawn upon by other actor-network studies.  相似文献   
29.
介绍了SDH光接入网在鞍山供电公司通信系统组网中的应用,并对通信系统组网原则发表了自己的见解。  相似文献   
30.
本对低压电力线载波通讯信道的参数特性和影响通讯质量的因素进行了定性分析;为了提高通信通讯质量提出了载波通讯中心频率的选择方法;给出了中心频率注入耦合和检出通讯中心频率的原理框图及实际电路,并对此进行了原理性说明。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号