全文获取类型
收费全文 | 199篇 |
免费 | 4篇 |
学科分类
工业技术 | 203篇 |
出版年
2023年 | 2篇 |
2022年 | 9篇 |
2021年 | 10篇 |
2020年 | 17篇 |
2019年 | 8篇 |
2018年 | 7篇 |
2017年 | 8篇 |
2016年 | 7篇 |
2015年 | 4篇 |
2014年 | 5篇 |
2013年 | 10篇 |
2012年 | 4篇 |
2011年 | 5篇 |
2010年 | 5篇 |
2009年 | 6篇 |
2008年 | 5篇 |
2007年 | 5篇 |
2006年 | 2篇 |
2005年 | 5篇 |
2004年 | 4篇 |
2003年 | 6篇 |
2002年 | 2篇 |
2001年 | 5篇 |
2000年 | 2篇 |
1998年 | 6篇 |
1997年 | 9篇 |
1996年 | 4篇 |
1995年 | 2篇 |
1994年 | 5篇 |
1993年 | 5篇 |
1992年 | 5篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1986年 | 1篇 |
1983年 | 2篇 |
1981年 | 4篇 |
1979年 | 4篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1975年 | 1篇 |
1974年 | 2篇 |
1973年 | 1篇 |
排序方式: 共有203条查询结果,搜索用时 29 毫秒
1.
2.
Lifang Li Jindal N. Goldsmith A. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2005,51(4):1326-1347
We derive the outage capacity region of an M-user fading multiple-access channel (MAC) under the assumption that both the transmitters and the receiver have perfect channel side information (CSI). The outage capacity region is implicitly obtained by deriving the outage probability region for a given rate vector. Given a required rate and average power constraint for each user, we find a successive decoding strategy and a power allocation policy that achieves points on the boundary of the outage probability region. We discuss the scenario where an outage must be declared simultaneously for all users (common outage) and when outages can be declared individually (individual outage) for each user. 相似文献
3.
Juneja Mamta Saini Sumindar Kaur Gupta Jatin Garg Poojita Thakur Niharika Sharma Aviral Mehta Manan Jindal Prashant 《Multimedia Tools and Applications》2021,80(19):29199-29249
Multimedia Tools and Applications - Prostate cancer (PCa) has become the second most dreadful cancer in men after lung cancer. Traditional approaches used for treatment of PCa were manual, time... 相似文献
4.
5.
Jindal Sumit Kumar Patra Ritayan Banerjee Sayak Paul Arin Kanekal Dadasikandar Kumar Ajay 《Microsystem Technologies》2022,28(7):1653-1661
Microsystem Technologies - Micro-mechanical systems (MEMS) based piezoresistive pressure sensors have significant importance in several pressure sensor devices in real world, i.e., aviation, IoT... 相似文献
6.
There has been an extensive and widespread deployment of wireless local area networks (WLANs) for information access. The transmission, being of a broadcast nature, is vulnerable to security threats and hence, the aspect of security provisioning in these networks has assumed an important dimension. The security of the transmitted data over a wireless channel aims at protecting the data from unauthorized access. The objective is achieved by providing advanced security mechanisms. Implementing strong security mechanisms however, affects the throughput performance and increases the complexity of the communication system. In this paper, we investigate the security performance of a WLAN based on IEEE 802.11b/g/n standards on an experimental testbed in congested and uncongested networks in a single and multi-client environment. Experimental results are obtained for a layered security model encompassing nine security protocols in terms of throughput, response time, and encryption overhead. The performance impact of transmission control protocol and user datagram protocol traffic streams on secure wireless networks has also been studied. Through numerical results obtained from the testbed, we have presented quantitative and realistic findings for both security mechanisms as well as network performance. The tradeoff between the strength of the security protocol and the associated performance is analyzed through computer simulation results. The present real time analysis enables the network designers to make intelligent choices about the implementation of security features and the perceived network performance for a given application scenario. 相似文献
7.
A novel bacterial foraging technique for edge detection 总被引:2,自引:0,他引:2
Om Prakash Verma Madasu HanmandluPuneet Kumar Sidharth ChhabraAkhil Jindal 《Pattern recognition letters》2011,32(8):1187-1196
A new approach for edge detection using a combination of bacterial foraging algorithm (BFA) and probabilistic derivative technique derived from Ant Colony Systems, is presented in this paper. The foraging behavior of some species of bacteria like Escherichia coli can be hypothetically modeled as an optimization process. A group of bacteria search for nutrients in a way that maximizes the energy obtained per unit time spent during the foraging. The proposed approach aims at driving the bacteria through the edge pixels. The direction of movement of the bacteria is found using a direction probability matrix, computed using derivatives along the possible directions. Rules defining the derivatives are devised to ensure that the variation of intensity due to noise is discarded. Quantitative analysis of the feasibility of the proposed approach and its comparison with other standard edge detection operators in terms of kappa and entropy are given. The effect of initial values of parameters of BFA on the edge detection is discussed. 相似文献
8.
A. Norman A. Ahmed J. Chou A. Dalal K. Fortson M. Jindal C. Kurz H. Lee K. Payne R. Rando K. Sheppard E. Sublett J. Sussman I. White 《Computational Economics》2004,23(2):173-192
A consumer entering a new bookstore can face more than 250,000alternatives. The efficiency of compensatory and noncompensatory decisionrulesfor finding a preferred item depends on the efficiency of their associatedinformation operators. At best, item-by-item information operators lead tolinear computational complexity; set information operators, on the other hand,can lead to constant complexity. We perform an experiment demonstrating thatsubjects are approximately rational in selecting between sublinear and linearrules. Many markets are organized by attributes that enable consumers toemploya set-selection-by-aspect rule using set information operations. In cyberspacedecision rules are encoded as decision aids. 相似文献
9.
10.
Abstract An automated system has been developed for mosaicking spaceborne synthetic aperture radar (SAR) imagery. The system is capable of producing multiframe mosaics for large-scale mapping by combining images in both the along-track direction and adjacent cross-track swaths from ascending and descending passes. The system requires no operator interaction and is capable of achieving high registration accuracy. The output product is a geocoded mosaic on a standard map grid such as UTM or polar stereographic. The procedure described in detail in this paper consists essentially of remapping the individual image frames into these standard grids, frame-to-frame image registration and radiometric smoothing of the seams. These procedures are directly applicable to both the Magellan Venus Mapper and a scanning SAR design such as Radarsat, Eos SAR in addition to merging image frames from traditional SAR systems such as SEASAT and SIR-B. With minor modifications, it may also be applied to spaceborne optical sensor data to generate large-scale mosaics efficiently and with a high degree of accuracy. The system has been tested with SEASAT, SIR-B and Landsat TM data. Examples presented in this paper include a 38-frame mosaic of the Yukon River basin in central Alaska, a 33-frame mosaic of southern California and a three-frame terrain-corrected geocoded mosaic of the Wind River basin in Wyoming. 相似文献