首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   309篇
  免费   24篇
  国内免费   4篇
化学   213篇
晶体学   4篇
力学   1篇
数学   6篇
物理学   60篇
无线电   53篇
  2024年   3篇
  2023年   8篇
  2022年   24篇
  2021年   16篇
  2020年   24篇
  2019年   21篇
  2018年   23篇
  2017年   25篇
  2016年   30篇
  2015年   15篇
  2014年   30篇
  2013年   35篇
  2012年   31篇
  2011年   21篇
  2010年   10篇
  2009年   9篇
  2008年   6篇
  2007年   2篇
  2006年   1篇
  2005年   1篇
  2004年   2篇
排序方式: 共有337条查询结果,搜索用时 14 毫秒
71.
To guarantee the proper functionality of wireless sensor network even in the presence of the potential threats, a well‐designed key management scheme is very important. The assumptions about attackers critically influence the performance of security mechanisms. This paper investigates the problem of node capture from adversarial view point in which the adversary intelligently exploits the different vulnerabilities of the network to establish a cost‐effective attack matrix. To counteract such attacks, the defender or the network designer constructs similar attack matrix. The defender will identify a set of critical nodes and use the key compromise relationship to assign a key dominance rank to each node of the network. The key dominance rank quantifies the possibility of attack on a particular node. It is used to determine the hash chain length. It is also used to improve the security of path key establishment as well as rekeying of the proposed scheme. The performance of the proposed scheme is analyzed with other existing schemes, and it is shown that it outperforms with increased resilience against node capture, reduced number of hash computations, reduced key compromise probability of proxy nodes, and reduced number of revoked links during rekeying process.  相似文献   
72.

Mobile Ad Hoc network comprises of mobile nodes communicating over wireless medium. Due to ease of communication and flexibility, MANET has become an active area of research in wireless communication. However, issues such as limited battery capacity, dynamic topology and node mobility cause frequent link breakage due to which reroute discovery process is required to be initiated resulting in increase in latency and routing overheads. Many research works have been carried out for improvement of an existing routing scheme, however they do not scale-up well to provide stable and energy efficient route. This paper introduces a novel routing algorithm ENH-AODV (Enhanced AODV) that focuses on selection of an efficient route on the basis of quality of both links and nodes impending during route discovery process. In addition, each node maintains a list, consisting of details of nearby nodes with good energy level through hello mechanism. Simulation is carried out over network simulator and results prove that the proposed scheme is more effective and advantageous than AODV in terms of normalized routing load, end to end delay, packet delivery ratio and throughput.

  相似文献   
73.
The software-defined networking is used extensively in data centers that provide centralized control for the widely deployed networking resources. The traffic is shaped by rules created by the controller dynamically without modifying the individual switch. The key component that stores rules which are used to process the flows is the flow table which resides in the ternary content addressable memory. The current commercial OpenFlow appliances accommodate limited entries up to 8000 due to its high cost and high power consumption. There are two issues to be considered, where (1) flow table's inability to provide rules during flow table overflow leads to dropping of incoming packets and (2) the significant amount of rule replacement occurs when the traffic in data centers increases which creates massive route requests to controller creating overhead. The proposed scheme prevents flow table overflow using the robust machine learning algorithm called decision tree (Iterative Dichotomiser 3) that allows the flow table to learn its high prioritized fine-grained entries by means of multiple matching attributes. The entries are classified, and the usual eviction process is replaced by pushing the low important entries into counting bloom filter which acts as a cache to prevent flow entry miss. The simulations were carried out using real-time network traffic datasets, and the comparisons with the various existing schemes prove that the proposed approach reduces 99.99% of the controller's overhead and the entries are minimized to 99% providing extra space for new flows.  相似文献   
74.
A supercapacitor is a solid-state device that can store electrical energy in the form of charges. It represents an advancement in the field of energy storage, as it overcomes many of the shortcomings of batteries. This paper presents an overview of the various types of supercapacitors, electrode materials, and electrolytes, and the future of supercapacitors. Due to their high storage capacity, supercapacitors are commonly used in portable electronic devices such as MP3 players and mobile phones, and in hybrid vehicles and other applications. In electrical and hybrid vehicles, supercapacitors are increasingly used as provisional energy storage for regenerative braking. Various materials are used in electrodes to boost the performance of the supercapacitor. This review presents details regarding the materials and electrolyte, and the improvements in the field of supercapacitors.  相似文献   
75.
We investigate the effects of a movable mirror (cantilever) of an optical cavity on the superfluid properties and the Mott phase boundary of a Bose-Einstein condensate (BEC) in an optical lattice. The Bloch energy, effective mass, Bogoliubov energy and the superfluid fraction are modified due to the mirror motion. The mirror motion is also found to modify the Mott-superfluid phase boundaries. This study reveals that the mirror emerges as a new handle to coherently control the superfluid properties of the BEC.  相似文献   
76.
Abstract

Rhodium-catalyzed intermolecular [3?+?2+2] cycloaddition reactions of bis(methylenecyclopropanes) with different alkynes are described. The rhodium-catalyzed [3?+?2+2] cycloadditions resulted in the formation of functionalized 5–7–3 spirocyclic carbocycles in moderate yields with excellent regio- and chemo-selectivity.  相似文献   
77.
78.
One of the major challenges for protein tertiary structure prediction strategies is the quality of conformational sampling algorithms, which can effectively and readily search the protein fold space to generate near‐native conformations. In an effort to advance the field by making the best use of available homology as well as fold recognition approaches along with ab initio folding methods, we have developed Bhageerath‐H Strgen, a homology/ab initio hybrid algorithm for protein conformational sampling. The methodology is tested on the benchmark CASP9 dataset of 116 targets. In 93% of the cases, a structure with TM‐score ≥ 0.5 is generated in the pool of decoys. Further, the performance of Bhageerath‐H Strgen was seen to be efficient in comparison with different decoy generation methods. The algorithm is web enabled as Bhageerath‐H Strgen web tool which is made freely accessible for protein decoy generation ( http://www.scfbio‐iitd.res.in/software/Bhageerath‐HStrgen1.jsp ). © 2013 Wiley Periodicals, Inc.  相似文献   
79.
A practical, sensitive, and robust UPLC–MS/MS method was developed and validated to quantify lacosamide in human plasma. A simple one-step protein precipitation was used to extract lacosamide and labeled lacosamide-13C, D3 as an internal standard (IS) from 150-μL plasma. The extracts were analyzed on an Eclipse Plus C18 column (50 × 2.1 mm, 1.8 μm) using 0.1% formic acid in water and methanol:acetonitrile (50:50, v/v) under gradient conditions. The extracts were quantified on LCMS-8040 using electrospray ionization source operated in positive ionization and multiple reaction monitoring modes. The method showed good linearity from 0.02 to 20 μg/mL, which was adequate to cover lacosamide concentration assayed in formulations with different strengths. The bioanalytical assay was fully validated as per current regulatory guidelines. The intra-batch and inter-batch precision values of lacosamide were less than 4.6%. Lacosamide was found to be stable at different storage conditions. The extraction recoveries and IS-normalized matrix factors for lacosamide ranged from 97.17 to 99.68% and from 0.973 to 1.012, respectively. The validated method was successfully applied to a pharmacokinetic study with three lacosamide formulations (50, 100, and 200 mg) in 36 healthy subjects. The assay reliability was determined by reanalysis of 81 subject samples.  相似文献   
80.
Wireless Personal Communications - Advanced telemedicine requires the gathering of big data through wireless body area network or internet of things based applications. These networks perform...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号