首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1812篇
  免费   161篇
  国内免费   4篇
化学   42篇
晶体学   1篇
力学   4篇
综合类   3篇
数学   95篇
物理学   58篇
无线电   1774篇
  2024年   11篇
  2023年   38篇
  2022年   35篇
  2021年   48篇
  2020年   46篇
  2019年   51篇
  2018年   48篇
  2017年   70篇
  2016年   70篇
  2015年   75篇
  2014年   116篇
  2013年   95篇
  2012年   95篇
  2011年   115篇
  2010年   99篇
  2009年   121篇
  2008年   112篇
  2007年   156篇
  2006年   149篇
  2005年   119篇
  2004年   83篇
  2003年   71篇
  2002年   64篇
  2001年   42篇
  2000年   21篇
  1999年   3篇
  1998年   2篇
  1997年   6篇
  1996年   8篇
  1995年   3篇
  1994年   2篇
  1993年   3篇
排序方式: 共有1977条查询结果,搜索用时 31 毫秒
11.
胡褆  薛质 《电信快报》2002,(6):9-10,26
文章介绍无线移动自组网中动态源路由策略的路由发现和路由维护,并提出改进思路和今后研究的方向。  相似文献   
12.
Wireless ad hoc networks are temporary formed, infrastructureless networks. Due to the unstable channel conditions and network connectivity, their characteristics impose serious challenges in front of network designers. The layering approach to network design does not fit the ad hoc environment well. Therefore, various cross-layering approaches, where protocol layers actively interact, exchange inherent layer information and fine tune their parameters according to the network status are becoming increasingly popular. This paper presents an in-depth analysis of the latest cross-layering approaches for wireless ad hoc networks supported by several examples. A special emphasis is put on the link and network layer related cross-layer designs. Several link adaptation and efficient service discovery schemes are elaborated through analytical and simulation studies. Their performance shows the potentials of the cross-layering for boosting system characteristics in wireless ad hoc networks. Liljana Gavrilovska currently holds a position of full professor at Faculty of Electrical Engineering, University “St. Cyril and Metodij” – Skopje, Macedonia. She is chief of Telecommunications Laboratory and teaches undergraduate courses in telecommunication networks, data transmission and switching and traffic theory, and graduate courses in wireless, mobile and personal networks, teletraffic engineering and planning, and broadband multiservices networks. In 2000 she joined the Center for PersonKommunikation, Aalborg University, Denmark, as a visiting professor and during 2001--2002 she held a position of associate research professor at the same university. Currently she holds a part-time position of associated research professor with Center for Teleinfrastructur (CTIF). Prof. Gavrilovska was involved in several EU (ACTS ASAP, IST PACWOMAN, MAGNET, TEMPUS) and national/international projects. She published numerous conference and journal papers and participated in several workshops. At the moment she is working on the book “Ad Hoc Networking Towards Seamless Communications” together with prof. R. Prasad. Her research interests include wireless and personal area networks, ad hoc networking, networking protocols, traffic analysis, QoS, and optimization techniques. She is a senior member of IEEE and serves as a Chair of Macedonian Communication Chapter.  相似文献   
13.
To provide responsive information services in a ubiquitous computing environment, service software and system development are indispensable. A component-based ubiquitous information system with a JAIN (Java APIs for Integrated Networks) platform to achieve seamless transmissions and reach-everywhere communications was designed in our research. In this development, numerous ubiquitous service modules were identified: location management, roaming, mobile IP and WAP networking. These component-based network modules were constructed using a component composition language with component specification and interface definition, running on top of a distributed service architecture using a JAIN platform to distribute the ubiquitous information services to mobile users. Two applications, Wireless-Application-Protocol (WAP) Mail and Video-on-Demand (VoD) services, show that the JAIN-like platform with the developed networking components effectively fills the gap for application developers between mobile appliances and various kinds of ubiquitous information services.  相似文献   
14.
Nodes in a mobile ad hoc network are often vulnerable to failures. The failures could be either due to fading effects, battery drainage, or as a result of compromised nodes that do not participate in network operations. Intermittent node failures can disrupt routing functionalities. As such, it is important to provide redundancy in terms of providing multiple node-disjoint paths from a source to a destination. In line with this objective, we first propose a modified version of the widely studied ad hoc on-demand distance vector routing protocol to facilitate the discovery of multiple node-disjoint paths from a source to a destination. We find that very few of such paths can be found. Furthermore, as distances between sources and destinations increase, bottlenecks inevitably occur and thus, the possibility of finding multiple paths is considerably reduced. We conclude that it is necessary to place what we call reliable nodes (in terms of both being robust to failure and being secure) in the network to support efficient routing operations. We propose a deployment strategy that determines the positions and the trajectories of these reliable nodes such that we can achieve a framework for reliably routing information. We define a notion of a reliable path which is made up of multiple segments, each of which either entirely consists of reliable nodes, or contains a preset number of multiple paths between the end points of the segment. We show that the probability of establishing a reliable path between a random source and destination pair increases tremendously even with a small number of reliable nodes when we use our algorithm to appropriately position these reliable nodes.  相似文献   
15.
The mobile ad hoc network (MANET) has recently been recognized as an attractive network architecture for wireless communication. Reliable broadcast is an important operation in MANET (e.g., giving orders, searching routes, and notifying important signals). However, using a naive flooding to achieve reliable broadcasting may be very costly, causing a lot of contention, collision, and congestion, to which we refer as the broadcast storm problem. This paper proposes an efficient reliable broadcasting protocol by taking care of the potential broadcast storm problem that could occur in the medium-access level. Existing protocols are either unreliable, or reliable but based on a too costly approach. Our protocol differs from existing protocols by adopting a low-cost broadcast, which does not guarantee reliability, as a basic operation. The reliability is ensured by additional acknowledgement and handshaking. Simulation results do justify the efficiency of the proposed protocol.  相似文献   
16.
The area covered by a mobile ad hoc network consists of obstacles that inhibit transmission and areas where communications can take place. Physical structures, such as buildings, that block transmission, or lakes, where forwarding nodes cannot be located, are permanent obstacles. Temporary obstacles are created as mobile nodes enter or leave an area. Our hypothesis is that the spaces between nearby obstacles are bottlenecks that inhibit the flows in the network. We partition the network into areas that are encompassed by obstacles and bottlenecks. All of the nodes in an area are treated as a single super node, and the bottlenecks between areas are the links between the super nodes. As individual nodes move, the flows and paths in the model change more slowly than the paths and flows between the individual nodes. We apply flow control algorithms to the model and perform admission control within a super node based on the flows that are assigned by the flow control algorithm. We apply the model to the Columbia University campus, and use max–min, fair bottleneck flow control to assign the flows. Our hypothesis is verified for this example.  相似文献   
17.
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy.  相似文献   
18.
卢东祥 《电子科技》2023,36(3):81-86
为了进一步提高城市道路交通网络的通行效率,粒子群优化和神经网络等多种智能优化算法受到越来越多的关注。近年来,深度学习技术的普及与应用大幅提升了城市交通网络的节点识别效率,而交通网络的节点调度又扩展了深度学习技术的应用。文中详细分析了交通节点调度所面临的关键问题,归纳并总结了相关网络节点分配的研究现状。在此基础上,深入研讨了城市交通网络节点调度与深度学习的应用前景,并对交通网络节点分配优化策略的未来研究方向进行了展望。  相似文献   
19.
In vehicular ad hoc networks (VANETs), communication takes place between vehicles to vehicles, the vehicles to the road side units, and vice-versa. The basic purpose of these communications is to share and exchange tremendous amount of data and information. For efficient information sharing, a systematic and structured connection establishment algorithm is needed. In VANETs, each connected node of the network need to be assigned a unique address. Hence, an algorithm is needed for the proper assignment of unique address to all nodes in the network. This paper explains different types of IP address protocols in VANETs. We have also explained advantage and disadvantage of existing IP address allocation protocols in VANETs.  相似文献   
20.
This paper presents an approach to power-conserving routing of ad hoc mobile wireless networks. This approach relies on entropy-constrained routing algorithms, which were developed by utilizing the information-theoretic concept of the entropy to gradually reduce the uncertainty associated with route discovery through a deterministic annealing process. Entropy-constrained routing algorithms were tested using a single performance metric related to the distance between the nodes and to the power consumption associated with packet transmission. This paper also expands the versatility of entropy-constrained routing algorithms by making them capable of discovering routes based on multiple performance metrics. In this study, the second performance metric employed for route discovery relied on the power availability in the nodes of the network. The proposed routing approach was evaluated in terms of the power consumption associated with the routing of packets over an ad hoc mobile network in a variety of operating conditions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号