首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   151篇
  免费   4篇
  国内免费   2篇
工业技术   157篇
  2023年   3篇
  2022年   4篇
  2021年   6篇
  2020年   4篇
  2019年   10篇
  2018年   6篇
  2017年   7篇
  2016年   5篇
  2014年   4篇
  2013年   7篇
  2012年   4篇
  2011年   3篇
  2010年   3篇
  2009年   8篇
  2008年   1篇
  2007年   5篇
  2006年   6篇
  2005年   2篇
  2004年   3篇
  2003年   7篇
  2001年   2篇
  2000年   3篇
  1999年   3篇
  1998年   10篇
  1997年   6篇
  1996年   2篇
  1995年   5篇
  1994年   4篇
  1993年   3篇
  1992年   3篇
  1991年   2篇
  1990年   4篇
  1989年   1篇
  1988年   2篇
  1987年   2篇
  1986年   2篇
  1984年   2篇
  1983年   1篇
  1976年   1篇
  1968年   1篇
排序方式: 共有157条查询结果,搜索用时 0 毫秒
1.
From theory to practice: an overview of MIMO space-time coded wireless systems   总被引:39,自引:0,他引:39  
This paper presents an overview of progress in the area of multiple input multiple output (MIMO) space-time coded wireless systems. After some background on the research leading to the discovery of the enormous potential of MIMO wireless links, we highlight the different classes of techniques and algorithms proposed which attempt to realize the various benefits of MIMO including spatial multiplexing and space-time coding schemes. These algorithms are often derived and analyzed under ideal independent fading conditions. We present the state of the art in channel modeling and measurements, leading to a better understanding of actual MIMO gains. Finally, the paper addresses current questions regarding the integration of MIMO links in practical wireless systems and standards.  相似文献   
2.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
3.
An adaptive genetic-based signature learning system for intrusion detection   总被引:1,自引:0,他引:1  
Rule-based intrusion detection systems generally rely on hand crafted signatures developed by domain experts. This could lead to a delay in updating the signature bases and potentially compromising the security of protected systems. In this paper, we present a biologically-inspired computational approach to dynamically and adaptively learn signatures for network intrusion detection using a supervised learning classifier system. The classifier is an online and incremental parallel production rule-based system.A signature extraction system is developed that adaptively extracts signatures to the knowledge base as they are discovered by the classifier. The signature extraction algorithm is augmented by introducing new generalisation operators that minimise overlap and conflict between signatures. Mechanisms are provided to adapt main algorithm parameters to deal with online noisy and imbalanced class data. Our approach is hybrid in that signatures for both intrusive and normal behaviours are learnt.The performance of the developed systems is evaluated with a publicly available intrusion detection dataset and results are presented that show the effectiveness of the proposed system.  相似文献   
4.
5.
We develop analytical and numerical conditions to determine whether limit cycle oscillations synchronize in diffusively coupled systems. We examine two classes of systems: reaction–diffusion PDEs with Neumann boundary conditions, and compartmental ODEs, where compartments are interconnected through diffusion terms with adjacent compartments. In both cases the uncoupled dynamics are governed by a nonlinear system that admits an asymptotically stable limit cycle. We provide two-time scale averaging methods for certifying stability of spatially homogeneous time-periodic trajectories in the presence of sufficiently small or large diffusion and develop methods using the structured singular value for the case of intermediate diffusion. We highlight cases where diffusion stabilizes or destabilizes such trajectories.  相似文献   
6.
Si-doped GaAs/AlGaAs multi-quantum wells structures grown by molecular beam epitaxy on (100) and (311)B GaAs substrates have been studied by using conventional deep-level transient spectroscopy (DLTS) and high-resolution Laplace DLTS techniques. One dominant electron-emitting level is observed in the quantum wells structure grown on (100) plane whose activation energy varies from 0.47 to 1.3 eV as junction electric field varies from zero field (edge of the depletion region) to 4.7 × 106 V/m. Two defect states with activation energies of 0.24 and 0.80 eV are detected in the structures grown on (311)B plane. The Ec-0.24 eV trap shows that its capture cross-section is strongly temperature dependent, whilst the other two traps show no such dependence. The value of the capture barrier energy of the trap at Ec-0.24 eV is 0.39 eV.  相似文献   
7.
Developing selective and coherent polymorphic crystals at the nanoscale offers a novel strategy for designing integrated architectures for photonic and optoelectronic applications such as metasurfaces, optical gratings, photodetectors, and image sensors. Here, a direct optical writing approach is demonstrated to deterministically create polymorphic 2D materials by locally inducing metallic 1T′-MoTe2 on the semiconducting 2H-MoTe2 host layer. In the polymorphic-engineered MoTe2, 2H- and 1T′- crystalline phases exhibit strong optical contrast from near-infrared to telecom-band ranges (1–1.5 µm), due to the change in the band structure and increase in surface roughness. Sevenfold enhancement of third harmonic generation intensity is realized with conversion efficiency (susceptibility) of ≈1.7 × 10−7 (1.1 × 10−19 m2 V−2) and ≈1.7 × 10−8 (0.3 × 10−19 m2 V−2) for 1T′ and 2H-MoTe2, respectively at telecom-band ultrafast pump laser. Lastly, based on polymorphic engineering on MoTe2, a Schottky photodiode with a high photoresponsivity of 90 AW−1 is demonstrated. This study proposes facile polymorphic engineered structures that will greatly benefit realizing integrated photonics and optoelectronic circuits.  相似文献   
8.
9.
A generalised method is derived to compute the error probabilities of singular value decomposition (SVD)-based receivers for a multiple-input multiple-output (MIMO) system with uncoded transmission. The method can be used for a wide class of flat fading environments, including independent and identically distributed (i.i.d.) and semi-correlated Rayleigh and i.i.d. Ricean channels. Although the method is applied to equal-power binary phase shift keying, it can easily be extended to higher-order M-ary phase shift keying (M-PSK) and M-ary quadrature amplitude modulation (M-QAM) signal constellations and adaptive 'water-filling' schemes. The error probability curves derived from closed-form formulas and simulations demonstrate very close agreement. The error performances of channel inversion, minimum mean square error and zero forcing receivers are compared with the SVD receiver for a single-user system. The impact of multiple users is considered by studying the performance of an adaptive MIMO SVD transmission scheme operating in a cellular environment. In particular, the effect of inter-cell interference on the performance of the scheme is quantified, modelling the interference as increased Gaussian noise. A number of cellular layouts are examined and the impact of the resulting singal-to-interference and noise ratio on the constellation sizes that can be supported, the BER and so on is considered. The primary metric used for our performance analysis is the error-free transmission rate, which is derived for our adaptive system. For the cellular scenarios considered, it can be found that the effect of interference is considerable and the performance of the adaptive MIMO SVD scheme is only marginally better than that provided by conventional diversity methods.  相似文献   
10.
Various Lactobacillus species possess antidiarrheal properties due to their probiotic effects and could be utilized in the form of fermented foods for the treatment of diarrheal disease. Diarrhea is the condition of having 3 or more loose or watery bowel movements per day. This disease is a global problem causing several million deaths each year, and the major victims are children. So its prevention and control is crucial. For the treatment of diarrheal disease, antibiotics and oral rehydration solutions are used, but these therapies are not always effective to reduce the duration and frequency of diarrhea and of increase consistency. Recent studies have demonstrated the effectiveness of the natural mode (fermented food) of disease management because of its easy availability, low cost, and efficacy against diarrhea.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号