首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   151篇
  免费   4篇
  国内免费   2篇
工业技术   157篇
  2023年   3篇
  2022年   4篇
  2021年   6篇
  2020年   4篇
  2019年   10篇
  2018年   6篇
  2017年   7篇
  2016年   5篇
  2014年   4篇
  2013年   7篇
  2012年   4篇
  2011年   3篇
  2010年   3篇
  2009年   8篇
  2008年   1篇
  2007年   5篇
  2006年   6篇
  2005年   2篇
  2004年   3篇
  2003年   7篇
  2001年   2篇
  2000年   3篇
  1999年   3篇
  1998年   10篇
  1997年   6篇
  1996年   2篇
  1995年   5篇
  1994年   4篇
  1993年   3篇
  1992年   3篇
  1991年   2篇
  1990年   4篇
  1989年   1篇
  1988年   2篇
  1987年   2篇
  1986年   2篇
  1984年   2篇
  1983年   1篇
  1976年   1篇
  1968年   1篇
排序方式: 共有157条查询结果,搜索用时 128 毫秒
1.
From theory to practice: an overview of MIMO space-time coded wireless systems   总被引:39,自引:0,他引:39  
This paper presents an overview of progress in the area of multiple input multiple output (MIMO) space-time coded wireless systems. After some background on the research leading to the discovery of the enormous potential of MIMO wireless links, we highlight the different classes of techniques and algorithms proposed which attempt to realize the various benefits of MIMO including spatial multiplexing and space-time coding schemes. These algorithms are often derived and analyzed under ideal independent fading conditions. We present the state of the art in channel modeling and measurements, leading to a better understanding of actual MIMO gains. Finally, the paper addresses current questions regarding the integration of MIMO links in practical wireless systems and standards.  相似文献   
2.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
3.
Developing selective and coherent polymorphic crystals at the nanoscale offers a novel strategy for designing integrated architectures for photonic and optoelectronic applications such as metasurfaces, optical gratings, photodetectors, and image sensors. Here, a direct optical writing approach is demonstrated to deterministically create polymorphic 2D materials by locally inducing metallic 1T′-MoTe2 on the semiconducting 2H-MoTe2 host layer. In the polymorphic-engineered MoTe2, 2H- and 1T′- crystalline phases exhibit strong optical contrast from near-infrared to telecom-band ranges (1–1.5 µm), due to the change in the band structure and increase in surface roughness. Sevenfold enhancement of third harmonic generation intensity is realized with conversion efficiency (susceptibility) of ≈1.7 × 10−7 (1.1 × 10−19 m2 V−2) and ≈1.7 × 10−8 (0.3 × 10−19 m2 V−2) for 1T′ and 2H-MoTe2, respectively at telecom-band ultrafast pump laser. Lastly, based on polymorphic engineering on MoTe2, a Schottky photodiode with a high photoresponsivity of 90 AW−1 is demonstrated. This study proposes facile polymorphic engineered structures that will greatly benefit realizing integrated photonics and optoelectronic circuits.  相似文献   
4.
Journal of Computer Science and Technology - The Slingshot interconnect designed by HPE/Cray is becoming more relevant in high-performance computing with its deployment on the upcoming exascale...  相似文献   
5.
An adaptive genetic-based signature learning system for intrusion detection   总被引:1,自引:0,他引:1  
Rule-based intrusion detection systems generally rely on hand crafted signatures developed by domain experts. This could lead to a delay in updating the signature bases and potentially compromising the security of protected systems. In this paper, we present a biologically-inspired computational approach to dynamically and adaptively learn signatures for network intrusion detection using a supervised learning classifier system. The classifier is an online and incremental parallel production rule-based system.A signature extraction system is developed that adaptively extracts signatures to the knowledge base as they are discovered by the classifier. The signature extraction algorithm is augmented by introducing new generalisation operators that minimise overlap and conflict between signatures. Mechanisms are provided to adapt main algorithm parameters to deal with online noisy and imbalanced class data. Our approach is hybrid in that signatures for both intrusive and normal behaviours are learnt.The performance of the developed systems is evaluated with a publicly available intrusion detection dataset and results are presented that show the effectiveness of the proposed system.  相似文献   
6.
The severely distorting channels limit the use of linear equalizers and the use of the nonlinear equalizers then becomes justifiable. Neural-network-based equalizers, especially the multilayer perceptron (MLP)-based equalizers, are computationally efficient alternative to currently used nonlinear filter realizations, e.g., the Volterra type. The drawback of the MLP-based equalizers is, however, their slow rate of convergence, which limit their use in practical systems. In this work, the effect of whitening the input data in a multilayer perceptron-based decision feedback equalizer (DFE) is evaluated. It is shown from computer simulations that whitening the received data employing adaptive lattice channel equalization algorithms improves the convergence rate and bit error rate performances of multilayer perceptron-based DFE. The adaptive lattice algorithm is a modification to the one developed by Ling and Proakis (1985). The consistency in performance is observed in both time-invariant and time-varying channels. Finally, it is found in this work that, for time-invariant channels, the MLP DFE outperforms the least mean squares (LMS)-based DFE. However, for time-varying channels comparable performance is obtained for the two configurations.  相似文献   
7.
8.
9.
This study concerns the investigation of dissipation, adsorption, and degradation of triazophos in different soils from Pakistan. These processes help in the disappearance of pesticide from the environment. Gas chromatography was used for dissipation and adsorption analysis while for degradation study mass spectrometer was used in addition of gas chromatography (GC-MS). The dissipation rate of triazophos in three different soils was 90% over 30 days with average half-life of 9.059 days. From dissipation study it was inferred that rate is variable in each soil due to climatic changes, soil nature and soil-pesticide interactions. Adsorption experiment has revealed that the adsorption of this pesticide to soil follows the pseudo first order kinetic model with rate constant value of 0.479/h and Freundlich isotherm with adsorption capacity of 1.832 mol/g. Degradation study has displayed two major metabolites, one is phosphorothioic acid, S-[2-[(1-cyano-1-methylethyl) amino]-2-oxoethyl] O,O-diethyl ester at retention time of 9.136 and the other is sulfotep at 14.304 min. The leaching potential of triazophos was also calculated from its half-life and organic carbon content present in soil which was 1.688 representing it as non leacher pesticide.  相似文献   
10.
We develop analytical and numerical conditions to determine whether limit cycle oscillations synchronize in diffusively coupled systems. We examine two classes of systems: reaction–diffusion PDEs with Neumann boundary conditions, and compartmental ODEs, where compartments are interconnected through diffusion terms with adjacent compartments. In both cases the uncoupled dynamics are governed by a nonlinear system that admits an asymptotically stable limit cycle. We provide two-time scale averaging methods for certifying stability of spatially homogeneous time-periodic trajectories in the presence of sufficiently small or large diffusion and develop methods using the structured singular value for the case of intermediate diffusion. We highlight cases where diffusion stabilizes or destabilizes such trajectories.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号