首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1313篇
  免费   60篇
  国内免费   9篇
工业技术   1382篇
  2024年   2篇
  2023年   3篇
  2022年   7篇
  2021年   26篇
  2020年   29篇
  2019年   28篇
  2018年   27篇
  2017年   33篇
  2016年   46篇
  2015年   53篇
  2014年   45篇
  2013年   110篇
  2012年   57篇
  2011年   74篇
  2010年   58篇
  2009年   67篇
  2008年   66篇
  2007年   69篇
  2006年   42篇
  2005年   45篇
  2004年   58篇
  2003年   45篇
  2002年   32篇
  2001年   41篇
  2000年   38篇
  1999年   28篇
  1998年   44篇
  1997年   32篇
  1996年   15篇
  1995年   16篇
  1994年   13篇
  1993年   21篇
  1992年   15篇
  1991年   8篇
  1990年   8篇
  1989年   12篇
  1988年   6篇
  1987年   12篇
  1986年   4篇
  1985年   12篇
  1984年   4篇
  1983年   2篇
  1982年   2篇
  1981年   4篇
  1980年   2篇
  1979年   2篇
  1977年   9篇
  1976年   3篇
  1972年   2篇
  1969年   1篇
排序方式: 共有1382条查询结果,搜索用时 15 毫秒
1.
2.
In this paper, we shall generalize the concepts of fairness, TCP-friendliness and TCP-compatibility such that more source adaptation schemes can be designed to support diverse applications over the Internet. A simple but efficient framework, in the form of a monotonic response function (MRF), is proposed for the analysis and the design of memoryless window-based source adaptation protocols by using these concepts. We first derive a necessary and sufficient condition for step-wise convergence to the weighted fairness. It is then used to construct increase-decrease policies. The requirements of our increase-decrease policy are less conservative than those of the CYRF (Choose Your Response Function) that was proposed in . Our MRF is suitable for transmission control protocol (TCP) and user datagram protocol (UDP), and can be used to design TCP-friendly and multimedia-friendly source adaptation schemes. Meanwhile, our MRF can be applied to provide bandwidth differentiation service without any change to the router of the existing Internet.  相似文献   
3.
The Davies transformation is a method to transform the steering vector of a uniform circular array (UCA) to one with Vandermonde form. As such, it allows techniques such as spatial smoothing for direction-of-arrival (DOA) estimation in a correlated signal environment, developed originally for uniform linear arrays, to be applied to UCAs. However, the Davies transformation can be highly sensitive to perturbations of the underlying array model. This paper presents a method for deriving a more robust transformation using optimization techniques. The effectiveness of the method is illustrated through a number of DOA estimation examples.  相似文献   
4.
In cellular networks, QoS degradation or forced termination may occur when there are insufficient resources to accommodate handoff requests. One solution is to predict the trajectory of mobile terminals so as to perform resource reservations in advance. With the vision that future mobile devices are likely to be equipped with reasonably accurate positioning capability, we investigate how this new feature may be used for mobility predictions. We propose a mobility prediction technique that incorporates road topology information, and describe its use for dynamic resource reservation. Simulation results are presented to demonstrate the improvement in reservation efficiency compared with several other schemes.  相似文献   
5.
Given a stability region of a polytope of polynomials, the edge theorem can be used to verify certain root-clustering properties of the polytope. The authors consider the inverse problem; starting with a polytope of real polynomials, they present a result that allows the construction of the smallest set of regions in the complex plane which characterizes its zero location  相似文献   
6.
Closed laboratories are becoming an increasingly popular approach to teaching introductory computer science courses. Unlike open laboratories that tend to be an informal environment provided for students to practice their skills with attendance optional, closed laboratories are structured meeting times that support the lecture component of the course, and attendance is required. This paper reports on an integrated approach to designing, implementing, and assessing laboratories with an embedded instructional research design. The activities reported here are parts of a departmentwide effort not only to improve student learning in computer science and computer engineering (CE) but also to improve the agility of the Computer Science and Engineering Department in adapting the curriculum to changing technologies, incorporate research, and validate the instructional strategies used. This paper presents the design and implementation of the laboratories and the results and analysis of student performance. Also described in this paper is cooperative learning in the laboratories and its impact on student learning.  相似文献   
7.
The notion of pseudorandomness is the theoretical foundation on which to consider the soundness of a basic structure used in some block ciphers. We examine the pseudorandomness of the block cipher KASUMI, which will be used in the next‐generation cellular phones. First, we prove that the four‐round unbalanced MISTY‐type transformation is pseudorandom in order to illustrate the pseudorandomness of the inside round function FI of KASUMI under an adaptive distinguisher model. Second, we show that the three‐round KASUMI‐like structure is not pseudorandom but the four‐round KASUMI‐like structure is pseudorandom under a non‐adaptive distinguisher model.  相似文献   
8.
We propose a decentralized neural network (NN) controller for a class of large-scale nonlinear systems with the strong interconnections. The NNs are used to approximate the unknown subsystems and interconnections. Due to the functional approximation capabilities of NNs, the additional precautions are not required to be made for avoiding the possible control singularity problems. Semiglobal asymptotic stability results are obtained and the tracking error converges to zero. Furthermore, the issue of transient performance of the subsystems is also addressed under an analytical framework.  相似文献   
9.
Groups of algebraic integers used for coding QAM signals   总被引:2,自引:0,他引:2  
Linear block codes over Gaussian integers and Eisenstein integers were used for coding over two-dimensional signal space. A group of Gaussian integers with 22n elements was constructed to code quadrature amplitude modulation (QAM) signals such that a differentially coherent method can be applied to demodulate the QAM signals. This paper shows that one subgroup of the multiplicative group of units in the algebraic integer ring of any quadratic number field with unique factorization, modulo the ideal (Pn), can be used to obtain a QAM signal space of 2p2n-2 points, where p is any given odd prime number. Furthermore, one subgroup of the multiplicative group of units in the quotient ring Z[ω]/(pn) can be used to obtain a QAM signal space of 6p2n-2 points; one subgroup of the multiplicative group of units in the quotient ring Z[i](pn) can be used to obtain a QAM signal space of 4p2n-2 points which is symmetrical over the quadrants of the complex plane and useful for differentially coherent detection of QAM signals; the multiplicative group of units in the quotient ring Z[ω]/(2n) can be used to obtain a QAM signal space of 3·22n-2 points, where i=√-1, ω=(-1+√-3)/2=(-1+i√3)/2, p is any given odd prime number, Z[i] and Z[ω] are, respectively, the Gaussian integer ring and the Eisenstein integer ring. These multiplicative groups can also be used to construct block codes over Gaussian integers or Eisenstein integers which are able to correct some error patterns  相似文献   
10.
The PBD-Closure of Constant-Composition Codes   总被引:3,自引:0,他引:3  
We show an interesting pairwise balanced design (PBD)-closure result for the set of lengths of constant-composition codes whose distance and size meet certain conditions. A consequence of this PBD-closure result is that the size of optimal constant-composition codes can be determined for infinite families of parameter sets from just a single example of an optimal code. As an application, the sizes of several infinite families of optimal constant-composition codes are derived. In particular, the problem of determining the size of optimal constant-composition codes having distance four and weight three is solved for all lengths sufficiently large. This problem was previously unresolved for odd lengths, except for lengths seven and eleven.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号