首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11311篇
  免费   1432篇
  国内免费   1268篇
电工技术   466篇
综合类   1306篇
化学工业   136篇
金属工艺   131篇
机械仪表   599篇
建筑科学   231篇
矿业工程   183篇
能源动力   39篇
轻工业   71篇
水利工程   74篇
石油天然气   58篇
武器工业   97篇
无线电   4101篇
一般工业技术   384篇
冶金工业   54篇
原子能技术   18篇
自动化技术   6063篇
  2024年   57篇
  2023年   163篇
  2022年   267篇
  2021年   342篇
  2020年   406篇
  2019年   300篇
  2018年   294篇
  2017年   426篇
  2016年   471篇
  2015年   523篇
  2014年   938篇
  2013年   873篇
  2012年   848篇
  2011年   825篇
  2010年   724篇
  2009年   699篇
  2008年   814篇
  2007年   910篇
  2006年   722篇
  2005年   710篇
  2004年   618篇
  2003年   539篇
  2002年   406篇
  2001年   382篇
  2000年   189篇
  1999年   130篇
  1998年   103篇
  1997年   86篇
  1996年   75篇
  1995年   79篇
  1994年   37篇
  1993年   12篇
  1992年   15篇
  1991年   7篇
  1990年   7篇
  1989年   4篇
  1988年   5篇
  1987年   2篇
  1985年   2篇
  1980年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
本文给出了一种适用于高数据速率和高速移动环境下的新型有效的信道估计方法-双正交通道信道估计方法(CETOC,Channel Estimation by using Two Orthogonal Channels),这种信道估计方法通过采用两个独立通道的联合估计,可以有效的克服快衰落的影响,从而使得在快衰落信道下应用多维状态调制成为可能.  相似文献   
52.
基于移动端多天线系统的无线衰落信道模型   总被引:11,自引:11,他引:0  
根据当前无线移动通信对多天线移动接收端性能仿真的要求,讨论并建立了适于空时信号处理的移动端矢量信道模型。通过分析无线移动信道特点。研究了影响接收信号幅度相位的诸多因素,建立了相应的数学模型。并对随机参数选取进行了探讨。其中考虑到移动端接收信号到达角扩散的特点,采用GBSB椭圆模型产生了适于移动端接收信号仿真的随机角度,改进了一种瑞利衰落生成算法。最后信道的数值仿真结果符合理论和经验。同时,通过TD-SCDMA系统链路级仿真,也证明了该信道模型的有效性。  相似文献   
53.
本详细描述了移动IP的工作过程,并介绍了移动IP的隧道技术和IPSec,最后对移动IP技术中存在几个热点问题进行了讨论。  相似文献   
54.
The development of future mobile networks will be driven, in large part, by content and web based services. In this paper, we examine several performance, scalability and architectural challenges faced by future mobile web applications and how advanced mobile content delivery techniques can address these challenges. We review existing content delivery using a taxonomy that consists of three categories: network scaling, end system acceleration, and content and protocol optimization. While wireline content delivery focuses on network and server scalability, mobile content delivery will likely benefit most from optimizing radio link usage. We also present our ongoing work in this area, which extends the functionality of edge caching to the terminal, uses user interest correlation information to maintain low terminal power consumption and adds a new dimension to radio resource management. This revised version was published online in August 2006 with corrections to the Cover Date.  相似文献   
55.
To provide responsive information services in a ubiquitous computing environment, service software and system development are indispensable. A component-based ubiquitous information system with a JAIN (Java APIs for Integrated Networks) platform to achieve seamless transmissions and reach-everywhere communications was designed in our research. In this development, numerous ubiquitous service modules were identified: location management, roaming, mobile IP and WAP networking. These component-based network modules were constructed using a component composition language with component specification and interface definition, running on top of a distributed service architecture using a JAIN platform to distribute the ubiquitous information services to mobile users. Two applications, Wireless-Application-Protocol (WAP) Mail and Video-on-Demand (VoD) services, show that the JAIN-like platform with the developed networking components effectively fills the gap for application developers between mobile appliances and various kinds of ubiquitous information services.  相似文献   
56.
徐配忠 《电信科学》2003,19(4):29-31
我国移动通信制造业在2G上晚了十年,未能取得相应的市场份额。但在3G领域,已经逐渐同步业界先进水平。如何改变现有市场格局,我国移动通信业面临全新的机会和重大的挑战,本就我国WCDMA系统产业化现状做了简要论述。  相似文献   
57.
When designing an accurate automated guidance system for vehicles, a major problem is sliding and pseudo-sliding effects. This is especially the case in agricultural applications, where five-centimetre accuracy with respect to the desired trajectory is required, although the vehicles are moving on slippery ground. It has been established that RTK GPS was a very suitable sensor to achieve automated guidance with such high precision: several control laws have been designed for vehicles equipped with this sensor, and provide the expected guidance accuracy as long as the vehicles do not slide. In previous work, further control developments have been proposed to take sliding into account: guidance accuracy in slippery environments has been shown to be preserved, except transiently at the beginning/end of curves. In this paper, the design of this control law is first recalled and discussed. A Model Predictive Control method is then applied in order to preserve accuracy of guidance even during these curvature transitions. Finally, the overall control scheme is implemented, and improvements with respect to previous guidance laws are demonstrated through full-scale experiments.  相似文献   
58.
In 3 experiments, the authors investigated spatial updating in augmented reality environments. Participants learned locations of virtual objects on the physical floor. They were turned to appropriate facing directions while blindfolded before making pointing judgments (e.g., "Imagine you are facing X. Point to Y"). Experiments manipulated the angular difference between the learning heading and the imagined heading and between the actual heading and the imagined heading. The effect of actual-imagined on pointing latency was observed for naive users but not for users with brief training or instructions concerning the fact that objects can move with body movements. The results indicated that naive users used an environment-stabilized reference frame to access information arrays, but with experience and instruction the nature of the representation changed from an environment stabilized to a body stabilized reference frame. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
59.
Even with attractive computational advantages, mobile agent technology has not developed its full potential due to various security issues. This paper proposes a method called Private Key Consignment to solve the problem of how to protect the data carried by mobile agents. It exploits new functionalities and mechanism provided by the trusted computing technology, and adopts both public key and symmetric key cryptographic means for data and key protection. The most notable feature of this method is that it protects the private key of the agent by consigning it to a tamper proof hardware, thus, enabling convenient and secure use of the private key. It provides a new scheme of mobile agents' data protection.  相似文献   
60.
Verifiable Distributed Oblivious Transfer and Mobile Agent Security   总被引:1,自引:0,他引:1  
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting mobile agents not only is possible, but also can be implemented efficiently. This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399 and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003. Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases, and wireless networks. On the theoretical side, he is interested in cryptography and game theory. Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS) at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998 and 2001).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号