全文获取类型
收费全文 | 2515篇 |
免费 | 132篇 |
国内免费 | 48篇 |
学科分类
工业技术 | 2695篇 |
出版年
2021年 | 3篇 |
2020年 | 6篇 |
2019年 | 3篇 |
2018年 | 3篇 |
2017年 | 7篇 |
2016年 | 11篇 |
2015年 | 20篇 |
2014年 | 56篇 |
2013年 | 47篇 |
2012年 | 77篇 |
2011年 | 113篇 |
2010年 | 145篇 |
2009年 | 225篇 |
2008年 | 170篇 |
2007年 | 210篇 |
2006年 | 242篇 |
2005年 | 201篇 |
2004年 | 165篇 |
2003年 | 248篇 |
2002年 | 205篇 |
2001年 | 149篇 |
2000年 | 111篇 |
1999年 | 82篇 |
1998年 | 69篇 |
1997年 | 56篇 |
1996年 | 34篇 |
1995年 | 23篇 |
1994年 | 10篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1985年 | 1篇 |
排序方式: 共有2695条查询结果,搜索用时 192 毫秒
1.
In the last fewyears there has been quite anin-terest in the ad hoc(self-organizing)networks basedon code division multiple access(CDMA)tech-niques[1].Thefocus of this paperisto work on powercontrol algorithms for ad hoc CDMA networks.As-suming that thereis a receive node that receivendif-ferent signals transmitted fromnneighbor transmitnodes throughnchannels that are assigned in oneti me slot and using different spread codes.In order to meet signal-to-interference-ratio(SIR)requirement,th… 相似文献
2.
为了解决固定周期激光测距系统抗杂光干扰性能差的问题,文中提出了一种基于CDMA技术的激光测距系统方法,该系统以FPGA为主控芯片,采用码分多址调制方法生成随机跳变的脉冲信号进行发射,同时在接收到回波后进行相应的门限检测,滤除干扰信号,仅使真实的回波通过并触发计数器停止计数,完成测距过程。实验结果表明,该方法确实能有效的滤除杂光干扰信号,提高激光测距系统的抗干扰性能。 相似文献
3.
Chi Zhang Jun-Rong Liu Da-Wu Gu Wei-Jia Wang Xiang-Jun Lu Zheng Guo Hai-Ning Lu 《计算机科学技术学报》2019,34(5):1079-1095
Time-division multiple access (TDMA) and code-division multiple access (CDMA) are two technologies used in digital cellular networks. The authentication protocols of TDMA networks have been proven to be vulnerable to side-channel analysis (SCA), giving rise to a series of powerful SCA-based attacks against unprotected subscriber identity module (SIM) cards. CDMA networks have two authentication protocols, cellular authentication and voice encryption (CAVE) based authentication protocol and authentication and key agreement (AKA) based authentication protocol, which are used in different phases of the networks. However, there has been no SCA attack for these two protocols so far. In this paper, in order to figure out if the authentication protocols of CDMA networks are sufficiently secure against SCA, we investigate the two existing protocols and their cryptographic algorithms. We find the side-channel weaknesses of the two protocols when they are implemented on embedded systems. Based on these weaknesses, we propose specific attack strategies to recover their authentication keys for the two protocols, respectively. We verify our strategies on an 8-bit microcontroller and a real-world SIM card, showing that the authentication keys can be fully recovered within a few minutes with a limited number of power measurements. The successful experiments demonstrate the correctness and the effectiveness of our proposed strategies and prove that the unprotected implementations of the authentication protocols of CDMA networks cannot resist SCA. 相似文献
4.
5.
6.
Yingliang HeGaobo Yang Ningbo Zhu 《AEUE-International Journal of Electronics and Communications》2012,66(4):305-312
A real-time dual watermarking algorithm of H.264/AVC compressed video is proposed for Video-on-Demand (VOD) service. The copyright information and user information are modulated by CDMA spreading strategies as watermark. At the encoder side, copyright information is embedded into the first non-zero coefficient of Intra 4 × 4 coded blocks in the luminance components of I frames. An effective error compensation mechanism is simultaneously introduced into the embedding process, which strictly restricts the distortion caused by quantization and watermark embedding within a step size of quantization. At the server side, a XOR based mapping rule is utilized for watermark embedding because the number of non-zero coefficients after quantization is quite less in P frames. Every two bits of the private user information is mapped to three non-zero coefficients of P frames. Experimental results on test sequences demonstrate that the proposed approach has just slight influence on bit rate and PSNR with real-time performance for VOD services, and achieves the dual purposes of copyright protection and pirate tracking. 相似文献
7.
8.
围手术期使用血液保护策略,减少血液丢失以及血液制品的使用,从而达到节约血液资源和减少输注血液制品并发症的目的。本文就血液保护策略的研究进展作一些阐述。 相似文献
9.
TD-SCDMA集群系统中会存在各种干扰,一些通过抑制干扰提高系统容量的技术被考虑采纳,如智能天线、多用户检测和功率控制等。传统的功控算法无法消除来自集群群组间的用户干扰。先用波束赋形进行主波瓣外干扰抑制,然后进行多群组联合检测消除波瓣内群组间干扰,从而降低系统对功率控制的要求,提高性能。仿真证明,上述算法能有效降低系统发射功率和抑制干扰。 相似文献
10.
直接序列扩频技术以保密性强和抗多径衰落等优点而获得广泛的应用,针对在多系统兼容工作时出现的邻近通道干扰的问题,从扩频通信的工作原理入手进行分析,分析邻近通道干扰产生的来源,采用基带信号有限脉冲响应(FIR)滤波器的方式,实现邻近通道抑制的要求。在此基础上设计的解决方案,经过实际系统试验验证,可以很好地解决邻近通道干扰的问题。 相似文献