首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   263篇
  免费   0篇
电工技术   4篇
化学工业   41篇
金属工艺   1篇
机械仪表   3篇
建筑科学   4篇
能源动力   1篇
轻工业   11篇
水利工程   2篇
无线电   32篇
一般工业技术   55篇
冶金工业   69篇
原子能技术   1篇
自动化技术   39篇
  2023年   1篇
  2022年   9篇
  2021年   16篇
  2020年   2篇
  2019年   3篇
  2018年   5篇
  2017年   3篇
  2016年   2篇
  2015年   1篇
  2014年   7篇
  2013年   13篇
  2012年   10篇
  2011年   8篇
  2010年   7篇
  2009年   11篇
  2008年   6篇
  2007年   7篇
  2006年   12篇
  2005年   4篇
  2004年   6篇
  2003年   12篇
  2002年   6篇
  2001年   4篇
  2000年   4篇
  1999年   13篇
  1998年   24篇
  1997年   15篇
  1996年   8篇
  1995年   7篇
  1994年   7篇
  1993年   4篇
  1992年   2篇
  1991年   2篇
  1990年   1篇
  1989年   3篇
  1986年   1篇
  1983年   2篇
  1982年   1篇
  1981年   2篇
  1978年   1篇
  1977年   3篇
  1976年   5篇
  1972年   1篇
  1971年   1篇
  1966年   1篇
排序方式: 共有263条查询结果,搜索用时 890 毫秒
1.
First-order polarization-mode dispersion (PMD) compensation by means of a polarization controller and a differential delay line is not sufficient to guarantee error-free transmission for 40-Gb/s channels when higher order effects severely increase signal distortion. Higher order mitigation is possible by cascading more than one first-order block. However, only two-stage or three-stage devices remain simple enough to be actually controlled. The performance of such higher order PMD compensators is evaluated by means of numerical simulations. Two different feedback signals have been used, demonstrating that first-order and higher order PMD distortion of nonreturn-to-zero (NRZ) pulses at 40 Gb/s can be strongly mitigated for instantaneous values of the differential group delay (DGD) up to the bit slot, when the compensator is properly controlled.  相似文献   
2.
For pt. I see ibid., p. 102-19. In this part of the paper the authors concentrate on the unique diversification role of the crossover operator in genetic algorithms. The explorative behavior of a generic crossover operator is revealed through a detailed large-sample analysis. Recursive equations for the population distributions are derived for a uniform crossover operator in multi-dimensional continuous space, showing how the crossover operator probes new regions of the solution space while keeping the population within the feasible region. The results of this analysis can be extended to the setting of a discrete space in a straightforward manner, shedding much light on the understanding of the essential role of crossover in genetic algorithms.  相似文献   
3.
Multimedia data from two probability-based exposure studies were investigated in terms of how missing data and measurement-error imprecision affected estimation of population parameters and associations. Missing data resulted mainly from individuals'refusing to participate in certain measurement activities, rather than from field or laboratory problems; it suggests that future studies should focus on methods for maximizing participation rates. Measurement error variances computed from duplicate-sample data were small relative to the inherent variation in the populations; consequently, adjustments in nonparametric percentile estimates to account for measurement imprecision were small. Methods of adjustment based on lognormality assumptions, however, appeared to perform poorly.  相似文献   
4.
We consider the two Wai-Menyuk models of birefringence in periodically spun fibers, and we show that the differential group delay differs significantly for the two models when the spin period approaches or exceeds the fiber beat length. When the fiber correlation length is large, we explain this difference quantitatively, and we explain it qualitatively for any fiber correlation length.  相似文献   
5.
This paper presents a completely new method able to characterize polarization mode dispersion (PMD) properties of randomly birefringent single-mode fibers, using polarization sensitive backscattering technique. We show analytical relationships between evolution of polarization state of backscattered signal with respect to state of polarization of forward one. Our technique allows one to measure differential group delay, beat length, and correlation length at the same time over long single-mode fibers using only one fiber end. Experimental data fit very well with numerical results, confirming the capability of our technique for fast routine characterization of PMD during cabling, before and after installation  相似文献   
6.
As widely acknowledged, 40–50% of all melanoma patients harbour an activating BRAF mutation (mostly BRAF V600E). The identification of the RAS–RAF–MEK–ERK (MAP kinase) signalling pathway and its targeting has represented a valuable milestone for the advanced and, more recently, for the completely resected stage III and IV melanoma therapy management. However, despite progress in BRAF-mutant melanoma treatment, the two different approaches approved so far for metastatic disease, immunotherapy and BRAF+MEK inhibitors, allow a 5-year survival of no more than 60%, and most patients relapse during treatment due to acquired mechanisms of resistance. Deep insight into BRAF gene biology is fundamental to describe the acquired resistance mechanisms (primary and secondary) and to understand the molecular pathways that are now being investigated in preclinical and clinical studies with the aim of improving outcomes in BRAF-mutant patients.  相似文献   
7.
In the last years, the interest in methods and techniques for circumventing the security of the available digital video broadcasting systems is continuously increasing. Digital TV providers are struggling to restrict access to their video contents only to authorized users, by deploying more and more sophisticated conditional access systems. At the state-of-the-art, the most significant menace is the card-sharing activity which exploits a known weakness allowing an authorized subscriber to provide access to digital contents to a potentially large group of unauthorized ones connected over a communication network. This is usually realized by using ad hoc customized devices. Detecting the presence of these illegal systems on a network, by recognizing their related traffic is an issue of primary importance. Unfortunately, to avoid the identification of such traffic, payload obfuscation strategies based on encryption are often used, hindering packet inspection techniques.This paper presents a strategy for the detection of card-sharing traffic, empowered by machine-learning-driven traffic classification techniques and based on the natural capability of wavelet analysis to decompose a traffic time series into several component series associated with particular time and frequency scales and hence allowing its observation at different frequency component levels and with different resolutions. These ideas have been used for the proof-of-concept implementation of an SVM-based binary classification scheme that relies only on time regularities of the traffic and not on the packet contents and hence is immune to payload obfuscation techniques.  相似文献   
8.
This paper is focused on the development and validation of an error kinematic model of a mini spherical robot, aimed at its kinematic calibration. The robot is actually a spatial five-bar linkage, provided with two rotational degrees of freedom. A non-overconstrained kinematics is assumed for the robot in order to provide a simple mathematical model and allow a sensitivity analysis of all the involved geometric parameters. A simplified version of the model is proposed. It differs only for the degree of approximation. A comparison between full and reduced models is presented by means of numerical simulations, analyzing their behavior in a significant region of the robot workspace. In order to validate both of them a robot calibration is carried out on a physical prototype of the robot using a vision system, namely a fixed camera in a eye-to-hand configuration. An iterative algorithm aimed at the experimental identification of the geometric data of the robot is used. Some experimental results show the effectiveness of the study.  相似文献   
9.
Journal of Computer Virology and Hacking Techniques - When designing Wireless Sensor Networks it is important to analyze their security risks and provide adequate solutions for protecting them from...  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号