首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   210篇
  免费   6篇
工业技术   216篇
  2023年   2篇
  2022年   9篇
  2021年   10篇
  2020年   19篇
  2019年   8篇
  2018年   8篇
  2017年   9篇
  2016年   7篇
  2015年   4篇
  2014年   5篇
  2013年   10篇
  2012年   5篇
  2011年   5篇
  2010年   5篇
  2009年   6篇
  2008年   5篇
  2007年   5篇
  2006年   2篇
  2005年   5篇
  2004年   4篇
  2003年   6篇
  2002年   2篇
  2001年   5篇
  2000年   2篇
  1998年   11篇
  1997年   9篇
  1996年   5篇
  1995年   4篇
  1994年   5篇
  1993年   5篇
  1992年   5篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
  1986年   1篇
  1983年   2篇
  1981年   4篇
  1979年   4篇
  1978年   1篇
  1977年   2篇
  1976年   3篇
  1975年   1篇
  1974年   2篇
  1973年   1篇
排序方式: 共有216条查询结果,搜索用时 218 毫秒
1.
2.
We derive the outage capacity region of an M-user fading multiple-access channel (MAC) under the assumption that both the transmitters and the receiver have perfect channel side information (CSI). The outage capacity region is implicitly obtained by deriving the outage probability region for a given rate vector. Given a required rate and average power constraint for each user, we find a successive decoding strategy and a power allocation policy that achieves points on the boundary of the outage probability region. We discuss the scenario where an outage must be declared simultaneously for all users (common outage) and when outages can be declared individually (individual outage) for each user.  相似文献   
3.
X-SAR interferometry: first results   总被引:10,自引:0,他引:10  
Repeat-pass interferometry data were acquired during the first and second SIR-C/X-SAR missions in April and October 1994. This paper presents the first results from X-SAR interferometry at four different sites. The temporal separations were one day and six months. At two sites the coherence requirements were met, resulting in high quality interferograms. A digital elevation model in ground range geometry has been derived. The limitations of the X-SAR interferometry are discussed  相似文献   
4.
Multimedia Tools and Applications - Prostate cancer (PCa) has become the second most dreadful cancer in men after lung cancer. Traditional approaches used for treatment of PCa were manual, time...  相似文献   
5.
6.
Microsystem Technologies - Micro-mechanical systems (MEMS) based piezoresistive pressure sensors have significant importance in several pressure sensor devices in real world, i.e., aviation, IoT...  相似文献   
7.
There has been an extensive and widespread deployment of wireless local area networks (WLANs) for information access. The transmission, being of a broadcast nature, is vulnerable to security threats and hence, the aspect of security provisioning in these networks has assumed an important dimension. The security of the transmitted data over a wireless channel aims at protecting the data from unauthorized access. The objective is achieved by providing advanced security mechanisms. Implementing strong security mechanisms however, affects the throughput performance and increases the complexity of the communication system. In this paper, we investigate the security performance of a WLAN based on IEEE 802.11b/g/n standards on an experimental testbed in congested and uncongested networks in a single and multi-client environment. Experimental results are obtained for a layered security model encompassing nine security protocols in terms of throughput, response time, and encryption overhead. The performance impact of transmission control protocol and user datagram protocol traffic streams on secure wireless networks has also been studied. Through numerical results obtained from the testbed, we have presented quantitative and realistic findings for both security mechanisms as well as network performance. The tradeoff between the strength of the security protocol and the associated performance is analyzed through computer simulation results. The present real time analysis enables the network designers to make intelligent choices about the implementation of security features and the perceived network performance for a given application scenario.  相似文献   
8.
A novel bacterial foraging technique for edge detection   总被引:2,自引:0,他引:2  
A new approach for edge detection using a combination of bacterial foraging algorithm (BFA) and probabilistic derivative technique derived from Ant Colony Systems, is presented in this paper. The foraging behavior of some species of bacteria like Escherichia coli can be hypothetically modeled as an optimization process. A group of bacteria search for nutrients in a way that maximizes the energy obtained per unit time spent during the foraging. The proposed approach aims at driving the bacteria through the edge pixels. The direction of movement of the bacteria is found using a direction probability matrix, computed using derivatives along the possible directions. Rules defining the derivatives are devised to ensure that the variation of intensity due to noise is discarded. Quantitative analysis of the feasibility of the proposed approach and its comparison with other standard edge detection operators in terms of kappa and entropy are given. The effect of initial values of parameters of BFA on the edge detection is discussed.  相似文献   
9.
A consumer entering a new bookstore can face more than 250,000alternatives. The efficiency of compensatory and noncompensatory decisionrulesfor finding a preferred item depends on the efficiency of their associatedinformation operators. At best, item-by-item information operators lead tolinear computational complexity; set information operators, on the other hand,can lead to constant complexity. We perform an experiment demonstrating thatsubjects are approximately rational in selecting between sublinear and linearrules. Many markets are organized by attributes that enable consumers toemploya set-selection-by-aspect rule using set information operations. In cyberspacedecision rules are encoded as decision aids.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号