全文获取类型
收费全文 | 1812篇 |
免费 | 161篇 |
国内免费 | 4篇 |
专业分类
化学 | 42篇 |
晶体学 | 1篇 |
力学 | 4篇 |
综合类 | 3篇 |
数学 | 95篇 |
物理学 | 58篇 |
无线电 | 1774篇 |
出版年
2024年 | 11篇 |
2023年 | 38篇 |
2022年 | 35篇 |
2021年 | 48篇 |
2020年 | 46篇 |
2019年 | 51篇 |
2018年 | 48篇 |
2017年 | 70篇 |
2016年 | 70篇 |
2015年 | 75篇 |
2014年 | 116篇 |
2013年 | 95篇 |
2012年 | 95篇 |
2011年 | 115篇 |
2010年 | 99篇 |
2009年 | 121篇 |
2008年 | 112篇 |
2007年 | 156篇 |
2006年 | 149篇 |
2005年 | 119篇 |
2004年 | 83篇 |
2003年 | 71篇 |
2002年 | 64篇 |
2001年 | 42篇 |
2000年 | 21篇 |
1999年 | 3篇 |
1998年 | 2篇 |
1997年 | 6篇 |
1996年 | 8篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1993年 | 3篇 |
排序方式: 共有1977条查询结果,搜索用时 31 毫秒
11.
12.
Liljana Gavrilovska 《Wireless Personal Communications》2006,37(3-4):271-290
Wireless ad hoc networks are temporary formed, infrastructureless networks. Due to the unstable channel conditions and network connectivity, their characteristics impose serious challenges in front of network designers. The layering approach to network design does not fit the ad hoc environment well. Therefore, various cross-layering approaches, where protocol layers actively interact, exchange inherent layer information and fine tune their parameters according to the network status are becoming increasingly popular. This paper presents an in-depth analysis of the latest cross-layering approaches for wireless ad hoc networks supported by several examples. A special emphasis is put on the link and network layer related cross-layer designs. Several link adaptation and efficient service discovery schemes are elaborated through analytical and simulation studies. Their performance shows the potentials of the cross-layering for boosting system characteristics in wireless ad hoc networks.
Liljana Gavrilovska currently holds a position of full professor at Faculty of Electrical Engineering, University “St. Cyril and Metodij” – Skopje, Macedonia. She is chief of Telecommunications Laboratory and teaches undergraduate courses in telecommunication networks, data transmission and switching and traffic theory, and graduate courses in wireless, mobile and personal networks, teletraffic engineering and planning, and broadband multiservices networks. In 2000 she joined the Center for PersonKommunikation, Aalborg University, Denmark, as a visiting professor and during 2001--2002 she held a position of associate research professor at the same university. Currently she holds a part-time position of associated research professor with Center for Teleinfrastructur (CTIF). Prof. Gavrilovska was involved in several EU (ACTS ASAP, IST PACWOMAN, MAGNET, TEMPUS) and national/international projects. She published numerous conference and journal papers and participated in several workshops. At the moment she is working on the book “Ad Hoc Networking Towards Seamless Communications” together with prof. R. Prasad. Her research interests include wireless and personal area networks, ad hoc networking, networking protocols, traffic analysis, QoS, and optimization techniques. She is a senior member of IEEE and serves as a Chair of Macedonian Communication Chapter. 相似文献
13.
To provide responsive information services in a ubiquitous computing environment, service software and system development are indispensable. A component-based ubiquitous information system with a JAIN (Java APIs for Integrated Networks) platform to achieve seamless transmissions and reach-everywhere communications was designed in our research. In this development, numerous ubiquitous service modules were identified: location management, roaming, mobile IP and WAP networking. These component-based network modules were constructed using a component composition language with component specification and interface definition, running on top of a distributed service architecture using a JAIN platform to distribute the ubiquitous information services to mobile users. Two applications, Wireless-Application-Protocol (WAP) Mail and Video-on-Demand (VoD) services, show that the JAIN-like platform with the developed networking components effectively fills the gap for application developers between mobile appliances and various kinds of ubiquitous information services. 相似文献
14.
A routing framework for providing robustness to node failures in mobile ad hoc networks 总被引:2,自引:0,他引:2
Nodes in a mobile ad hoc network are often vulnerable to failures. The failures could be either due to fading effects, battery drainage, or as a result of compromised nodes that do not participate in network operations. Intermittent node failures can disrupt routing functionalities. As such, it is important to provide redundancy in terms of providing multiple node-disjoint paths from a source to a destination. In line with this objective, we first propose a modified version of the widely studied ad hoc on-demand distance vector routing protocol to facilitate the discovery of multiple node-disjoint paths from a source to a destination. We find that very few of such paths can be found. Furthermore, as distances between sources and destinations increase, bottlenecks inevitably occur and thus, the possibility of finding multiple paths is considerably reduced. We conclude that it is necessary to place what we call reliable nodes (in terms of both being robust to failure and being secure) in the network to support efficient routing operations. We propose a deployment strategy that determines the positions and the trajectories of these reliable nodes such that we can achieve a framework for reliably routing information. We define a notion of a reliable path which is made up of multiple segments, each of which either entirely consists of reliable nodes, or contains a preset number of multiple paths between the end points of the segment. We show that the probability of establishing a reliable path between a random source and destination pair increases tremendously even with a small number of reliable nodes when we use our algorithm to appropriately position these reliable nodes. 相似文献
15.
The mobile ad hoc network (MANET) has recently been recognized as an attractive network architecture for wireless communication. Reliable broadcast is an important operation in MANET (e.g., giving orders, searching routes, and notifying important signals). However, using a naive flooding to achieve reliable broadcasting may be very costly, causing a lot of contention, collision, and congestion, to which we refer as the broadcast storm problem. This paper proposes an efficient reliable broadcasting protocol by taking care of the potential broadcast storm problem that could occur in the medium-access level. Existing protocols are either unreliable, or reliable but based on a too costly approach. Our protocol differs from existing protocols by adopting a low-cost broadcast, which does not guarantee reliability, as a basic operation. The reliability is ensured by additional acknowledgement and handshaking. Simulation results do justify the efficiency of the proposed protocol. 相似文献
16.
The area covered by a mobile ad hoc network consists of obstacles that inhibit transmission and areas where communications
can take place. Physical structures, such as buildings, that block transmission, or lakes, where forwarding nodes cannot be
located, are permanent obstacles. Temporary obstacles are created as mobile nodes enter or leave an area. Our hypothesis is
that the spaces between nearby obstacles are bottlenecks that inhibit the flows in the network. We partition the network into
areas that are encompassed by obstacles and bottlenecks. All of the nodes in an area are treated as a single super node, and
the bottlenecks between areas are the links between the super nodes. As individual nodes move, the flows and paths in the
model change more slowly than the paths and flows between the individual nodes. We apply flow control algorithms to the model
and perform admission control within a super node based on the flows that are assigned by the flow control algorithm. We apply
the model to the Columbia University campus, and use max–min, fair bottleneck flow control to assign the flows. Our hypothesis
is verified for this example. 相似文献
17.
Yawar Abbas Bangash Waseem Iqbal Saddaf Rubab Abdul Waheed Khan Waqas Aman 《International Journal of Communication Systems》2023,36(17):e5601
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy. 相似文献
18.
为了进一步提高城市道路交通网络的通行效率,粒子群优化和神经网络等多种智能优化算法受到越来越多的关注。近年来,深度学习技术的普及与应用大幅提升了城市交通网络的节点识别效率,而交通网络的节点调度又扩展了深度学习技术的应用。文中详细分析了交通节点调度所面临的关键问题,归纳并总结了相关网络节点分配的研究现状。在此基础上,深入研讨了城市交通网络节点调度与深度学习的应用前景,并对交通网络节点分配优化策略的未来研究方向进行了展望。 相似文献
19.
Farhana Ajaz Mohd Naseem Gulfam Ahamad 《International Journal of Communication Systems》2023,36(10):e5490
In vehicular ad hoc networks (VANETs), communication takes place between vehicles to vehicles, the vehicles to the road side units, and vice-versa. The basic purpose of these communications is to share and exchange tremendous amount of data and information. For efficient information sharing, a systematic and structured connection establishment algorithm is needed. In VANETs, each connected node of the network need to be assigned a unique address. Hence, an algorithm is needed for the proper assignment of unique address to all nodes in the network. This paper explains different types of IP address protocols in VANETs. We have also explained advantage and disadvantage of existing IP address allocation protocols in VANETs. 相似文献
20.
This paper presents an approach to power-conserving routing of ad hoc mobile wireless networks. This approach relies on entropy-constrained routing algorithms, which were developed by utilizing the information-theoretic concept of the entropy to gradually reduce the uncertainty associated with route discovery through a deterministic annealing process. Entropy-constrained routing algorithms were tested using a single performance metric related to the distance between the nodes and to the power consumption associated with packet transmission. This paper also expands the versatility of entropy-constrained routing algorithms by making them capable of discovering routes based on multiple performance metrics. In this study, the second performance metric employed for route discovery relied on the power availability in the nodes of the network. The proposed routing approach was evaluated in terms of the power consumption associated with the routing of packets over an ad hoc mobile network in a variety of operating conditions. 相似文献