首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3066篇
  免费   462篇
  国内免费   263篇
电工技术   456篇
综合类   391篇
化学工业   140篇
金属工艺   85篇
机械仪表   229篇
建筑科学   83篇
矿业工程   107篇
能源动力   58篇
轻工业   44篇
水利工程   41篇
石油天然气   491篇
武器工业   46篇
无线电   674篇
一般工业技术   143篇
冶金工业   78篇
原子能技术   6篇
自动化技术   719篇
  2024年   10篇
  2023年   39篇
  2022年   84篇
  2021年   86篇
  2020年   136篇
  2019年   101篇
  2018年   97篇
  2017年   114篇
  2016年   146篇
  2015年   148篇
  2014年   197篇
  2013年   165篇
  2012年   253篇
  2011年   244篇
  2010年   214篇
  2009年   173篇
  2008年   185篇
  2007年   233篇
  2006年   195篇
  2005年   208篇
  2004年   136篇
  2003年   107篇
  2002年   100篇
  2001年   88篇
  2000年   57篇
  1999年   49篇
  1998年   33篇
  1997年   43篇
  1996年   38篇
  1995年   17篇
  1994年   19篇
  1993年   14篇
  1992年   13篇
  1991年   15篇
  1990年   15篇
  1989年   8篇
  1988年   3篇
  1986年   1篇
  1985年   3篇
  1984年   1篇
  1982年   2篇
  1979年   1篇
排序方式: 共有3791条查询结果,搜索用时 46 毫秒
31.
朱胜  杨华中  董在望 《微电子学》2005,35(2):217-220
设计了一个可重用、可升级的基四流水线结构Viterbi译码器.设计中采用了基四流水、前向追踪、同址写回和分块管理技术,并利用处理单元(PE: Process Element)互联技术,对译码器的结构进行了抽象和参数化处理,使卷积码生成多项式、PE个数和回溯深度等可根据实际需要重新配置.在TSMC 0.18 μm CMOS 工艺下, 成功地实现了带删除的64状态(4,1,6) Viterbi 译码器,电路规模仅3万门,译码速率可达12.5 Mbps,功耗为15 mW;在ST 0.13 μm CMOS工艺下,也获得了同样的性能,功耗仅为4.7 mW.该Viterbi译码器已被应用于DAB接收机芯片中.  相似文献   
32.
In this paper, we study scheduling schemes for two‐user two‐way wireless relaying systems. Two transmission modes are considered: point‐to‐point direct transmission and two‐way amplify‐and‐forward relaying. An optimal scheduling scheme that opportunistically selects the best transmission mode for each user is proposed to minimize the sum bit error rate (BER). The performance lower bound of the optimal scheduling scheme is analyzed, and closed‐form expression of the lower‐bound BER is derived. However, for optimal scheduling, the scheduler requires the knowledge of channel state information (CSI) of all links. To reduce the feedback information of CSI, we also propose a suboptimal scheduling scheme that selects the transmission mode using only the CSI of two direct links. Simulation results show that there are 4 dB to 8 dB gains for the proposed optimal and suboptimal schemes over the fixed direct transmission and fixed two‐way relayed transmission scheme. The performance gap between the optimal and suboptimal scheduling schemes is small, which implies a good trade‐off between implementation complexity and system performance.  相似文献   
33.
韦岗  田立斌  彭波 《通信学报》2004,25(8):102-108
提出了一种高效的Internet上语音包丢失恢复技术,采用了基于奇偶校验码的加载式前向纠错编码(PPFEC)技术,可以在网络存在丢包情况下无损恢复大部分丢失帧信息。此外,本文将PPFEC技术与语音编码的错误隐藏技术相结合,提出了一种基于保护重要信息的FEC编码,得到更优的解码质量和带宽的性能折衷。客观音质实验表明,本文方法在各种丢包率情况下表现出良好的效果。  相似文献   
34.
综述了民机地形感知警告系统(TAWS)及其前视功能的产生背景、发展过程,介绍了TAWS前视功能的主要原理.对前视功能的报警阈值时间设置方法进行了研究,给出了报警阈值时间设置的分析算法模型,并利用Matlab 工具进行了仿真,得到了相应的仿真结果.最后,对进一步提高TAWS前视功能仿真精确度,以及TAWS产品性能优化方法...  相似文献   
35.
40Gb/s(STM-2 5 6)高速时分复用传输技术前景展望   总被引:3,自引:1,他引:3  
随着技术的发展 ,4 0 Gb/ s(STM- 2 5 6 )作为 10 Gb/ s(STM- 6 4)传输业务颗粒的后续者 ,开始逐渐为业界熟悉。就 4 0 Gb/ s这一新兴技术的市场推动因素、应用场合以及影响 4 0 Gb/ s传输的一些关键技术作了介绍 ,并对其将来的应用前景作出展望  相似文献   
36.
In physical layer security,considering imperfect time synchronization,a power allocation scheme was proposed to maximize the system secrecy capacity.By analyzing the residual interference power at the authorized receiver caused by imperfect time synchronization,the optimal power distribution method was given,and the relationship between the optimal interference power and the relative channel quality was discussed.Theory and simulation analysis show that when the synchronization error is small,the synchronization error consumes extra power to reach the preset secrecy capacity,and the interference power increases with its increase.As the synchronization error increases,the secrecy capacity of the system gradually fails to reach the preset target,and may even drop to zero.  相似文献   
37.
In this paper, the closed‐form expressions for outage probability, channel capacity, and average symbol error probability are derived for amplify‐and‐forward multihop relay network. Based on approximation of multihop relay by dual‐hop relay systems, the analytical expressions are obtained for the case when maximal ratio combining technique is employed at each relay while destination node uses selection combining technique. The impact of system and channel parameters on the system performances is investigated, and numerical results are graphically presented. The derived analytical expressions are verified by numerical simulation.  相似文献   
38.
In this paper, we analyze the performance of cognitive amplify‐and‐forward (AF) relay networks with beamforming under the peak interference power constraint of the primary user (PU). We focus on the scenario that beamforming is applied at the multi‐antenna secondary transmitter and receiver. Also, the secondary relay network operates in channel state information‐assisted AF mode, and the signals undergo independent Nakagami‐m fading. In particular, closed‐form expressions for the outage probability and symbol error rate (SER) of the considered network over Nakagami‐m fading are presented. More importantly, asymptotic closed‐form expressions for the outage probability and SER are derived. These tractable closed‐form expressions for the network performance readily enable us to evaluate and examine the impact of network parameters on the system performance. Specifically, the impact of the number of antennas, the fading severity parameters, the channel mean powers, and the peak interference power is addressed. The asymptotic analysis manifests that the peak interference power constraint imposed on the secondary relay network has no effect on the diversity gain. However, the coding gain is affected by the fading parameters of the links from the primary receiver to the secondary relay network. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
39.
In group key management systems adopting lazy updating, the overhead of key updating might be amortized. In this paper, a Dynamic-tree based Lazy group key updating scheme (DT-LGKU) is presented, which consists of four algorithms Init, Update, Derive and Extract. DT-LGKU supports lazy join events and lazy leave events with unbounded number of time intervals, and provides the forward secrecy and the backward secrecy. DT-LGKU is secure if both the Large Integer Factoring problem and RSA problem are hard. The performance evaluation shows that the worst-case complexity of the cryptographic operations used in the Extract algorithms is logarithmic in the number of time intervals, and those of Init, Update, Derive are constant.  相似文献   
40.
探讨在短波数字通信网络中的自适应差错控制系统,对第二代ALE(2^ndALE)和第三代ALE(3^rdALE)系统中的差错控制系统进行计算机仿真,并分析它们在相同通信条件下性能的优劣。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号