首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1323篇
  免费   59篇
  国内免费   9篇
工业技术   1391篇
  2024年   2篇
  2023年   4篇
  2022年   12篇
  2021年   28篇
  2020年   29篇
  2019年   28篇
  2018年   27篇
  2017年   33篇
  2016年   46篇
  2015年   53篇
  2014年   45篇
  2013年   110篇
  2012年   57篇
  2011年   74篇
  2010年   58篇
  2009年   67篇
  2008年   66篇
  2007年   69篇
  2006年   42篇
  2005年   45篇
  2004年   58篇
  2003年   45篇
  2002年   32篇
  2001年   41篇
  2000年   38篇
  1999年   28篇
  1998年   44篇
  1997年   32篇
  1996年   16篇
  1995年   16篇
  1994年   13篇
  1993年   21篇
  1992年   15篇
  1991年   8篇
  1990年   8篇
  1989年   12篇
  1988年   6篇
  1987年   12篇
  1986年   4篇
  1985年   12篇
  1984年   4篇
  1983年   2篇
  1982年   2篇
  1981年   4篇
  1980年   2篇
  1979年   2篇
  1977年   9篇
  1976年   3篇
  1972年   2篇
  1969年   1篇
排序方式: 共有1391条查询结果,搜索用时 46 毫秒
1.
The Davies transformation is a method to transform the steering vector of a uniform circular array (UCA) to one with Vandermonde form. As such, it allows techniques such as spatial smoothing for direction-of-arrival (DOA) estimation in a correlated signal environment, developed originally for uniform linear arrays, to be applied to UCAs. However, the Davies transformation can be highly sensitive to perturbations of the underlying array model. This paper presents a method for deriving a more robust transformation using optimization techniques. The effectiveness of the method is illustrated through a number of DOA estimation examples.  相似文献   
2.
In cellular networks, QoS degradation or forced termination may occur when there are insufficient resources to accommodate handoff requests. One solution is to predict the trajectory of mobile terminals so as to perform resource reservations in advance. With the vision that future mobile devices are likely to be equipped with reasonably accurate positioning capability, we investigate how this new feature may be used for mobility predictions. We propose a mobility prediction technique that incorporates road topology information, and describe its use for dynamic resource reservation. Simulation results are presented to demonstrate the improvement in reservation efficiency compared with several other schemes.  相似文献   
3.
Given a stability region of a polytope of polynomials, the edge theorem can be used to verify certain root-clustering properties of the polytope. The authors consider the inverse problem; starting with a polytope of real polynomials, they present a result that allows the construction of the smallest set of regions in the complex plane which characterizes its zero location  相似文献   
4.
Closed laboratories are becoming an increasingly popular approach to teaching introductory computer science courses. Unlike open laboratories that tend to be an informal environment provided for students to practice their skills with attendance optional, closed laboratories are structured meeting times that support the lecture component of the course, and attendance is required. This paper reports on an integrated approach to designing, implementing, and assessing laboratories with an embedded instructional research design. The activities reported here are parts of a departmentwide effort not only to improve student learning in computer science and computer engineering (CE) but also to improve the agility of the Computer Science and Engineering Department in adapting the curriculum to changing technologies, incorporate research, and validate the instructional strategies used. This paper presents the design and implementation of the laboratories and the results and analysis of student performance. Also described in this paper is cooperative learning in the laboratories and its impact on student learning.  相似文献   
5.
The notion of pseudorandomness is the theoretical foundation on which to consider the soundness of a basic structure used in some block ciphers. We examine the pseudorandomness of the block cipher KASUMI, which will be used in the next‐generation cellular phones. First, we prove that the four‐round unbalanced MISTY‐type transformation is pseudorandom in order to illustrate the pseudorandomness of the inside round function FI of KASUMI under an adaptive distinguisher model. Second, we show that the three‐round KASUMI‐like structure is not pseudorandom but the four‐round KASUMI‐like structure is pseudorandom under a non‐adaptive distinguisher model.  相似文献   
6.
Groups of algebraic integers used for coding QAM signals   总被引:2,自引:0,他引:2  
Linear block codes over Gaussian integers and Eisenstein integers were used for coding over two-dimensional signal space. A group of Gaussian integers with 22n elements was constructed to code quadrature amplitude modulation (QAM) signals such that a differentially coherent method can be applied to demodulate the QAM signals. This paper shows that one subgroup of the multiplicative group of units in the algebraic integer ring of any quadratic number field with unique factorization, modulo the ideal (Pn), can be used to obtain a QAM signal space of 2p2n-2 points, where p is any given odd prime number. Furthermore, one subgroup of the multiplicative group of units in the quotient ring Z[ω]/(pn) can be used to obtain a QAM signal space of 6p2n-2 points; one subgroup of the multiplicative group of units in the quotient ring Z[i](pn) can be used to obtain a QAM signal space of 4p2n-2 points which is symmetrical over the quadrants of the complex plane and useful for differentially coherent detection of QAM signals; the multiplicative group of units in the quotient ring Z[ω]/(2n) can be used to obtain a QAM signal space of 3·22n-2 points, where i=√-1, ω=(-1+√-3)/2=(-1+i√3)/2, p is any given odd prime number, Z[i] and Z[ω] are, respectively, the Gaussian integer ring and the Eisenstein integer ring. These multiplicative groups can also be used to construct block codes over Gaussian integers or Eisenstein integers which are able to correct some error patterns  相似文献   
7.
The PBD-Closure of Constant-Composition Codes   总被引:3,自引:0,他引:3  
We show an interesting pairwise balanced design (PBD)-closure result for the set of lengths of constant-composition codes whose distance and size meet certain conditions. A consequence of this PBD-closure result is that the size of optimal constant-composition codes can be determined for infinite families of parameter sets from just a single example of an optimal code. As an application, the sizes of several infinite families of optimal constant-composition codes are derived. In particular, the problem of determining the size of optimal constant-composition codes having distance four and weight three is solved for all lengths sufficiently large. This problem was previously unresolved for odd lengths, except for lengths seven and eleven.  相似文献   
8.
Despite a large body of work on XPath query processing in relational environment, systematic study of queries containing not-predicates have received little attention in the literature. Particularly, several xml supports of industrial-strength commercial rdbms fail to efficiently evaluate such queries. In this paper, we present an efficient and novel strategy to evaluate not -twig queries in a tree-unaware relational environment. not -twig queries are XPath queries with ancestor–descendant and parent–child axis and contain one or more not-predicates. We propose a novel Dewey-based encoding scheme called Andes (ANcestor Dewey-based Encoding Scheme), which enables us to efficiently filter out elements satisfying a not-predicate by comparing their ancestor group identifiers. In this approach, a set of elements under the same common ancestor at a specific level in the xml tree is assigned same ancestor group identifier. Based on this scheme, we propose a novel sql translation algorithm for not-twig query evaluation. Experiments carried out confirm that our proposed approach built on top of an off-the-shelf commercial rdbms significantly outperforms state-of-the-art relational and native approaches. We also explore the query plans selected by a commercial relational optimizer to evaluate our translated queries in different input cardinality. Such exploration further validates the performance benefits of Andes.  相似文献   
9.
In this paper, a feedback model predictive control method is presented to tackle control problems with constrained multivariables for uncertain discrete‐time nonlinear Markovian jump systems. An uncertain Markovian jump fuzzy system (MJFS) is obtained by employing the Takagi‐Sugeno (T‐S) fuzzy model to represent a discrete‐time nonlinear system with norm bounded uncertainties and Markovain jump parameters. To achieve more generality, the transition probabilities of the Markov chain are assumed to be partly unknown and partly accessible. The predictive formulation adopts an on‐line optimization paradigm that utilizes the closed‐loop state feedback controller and is solved using the standard semi‐definite programming (SDP). To reduce the on‐line computational burden, a mode independent control move is calculated at every sampling time based on a stochastic fuzzy Lyapunov function (FLF) and a parallel distributed compensation (PDC) scheme. The robust mean square stability, performance minimization and constraint satisfaction properties are guaranteed under the control move for all admissible uncertainties. A numerical example is given to show the efficiency of the developed approach. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society  相似文献   
10.
Chee -Keng Yap 《Algorithmica》1988,3(1-4):279-288
We give a parallel method for triangulating a simple polygon by two (parallel) calls to the trapezoidal map computation. The method is simpler and more elegant than previous methods. Along the way we obtain an interesting partition of one-sided monotone polygons. Using the best-known trapezoidal map algorithm, ours run in timeO(logn) usingO(n) CREW PRAM processors.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号