首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8613篇
  免费   1129篇
  国内免费   292篇
化学   1287篇
晶体学   21篇
力学   208篇
综合类   113篇
数学   1506篇
物理学   624篇
无线电   6275篇
  2024年   22篇
  2023年   58篇
  2022年   164篇
  2021年   191篇
  2020年   287篇
  2019年   277篇
  2018年   248篇
  2017年   311篇
  2016年   372篇
  2015年   437篇
  2014年   652篇
  2013年   622篇
  2012年   602篇
  2011年   646篇
  2010年   474篇
  2009年   441篇
  2008年   569篇
  2007年   549篇
  2006年   473篇
  2005年   461篇
  2004年   359篇
  2003年   368篇
  2002年   329篇
  2001年   240篇
  2000年   227篇
  1999年   148篇
  1998年   99篇
  1997年   71篇
  1996年   60篇
  1995年   36篇
  1994年   48篇
  1993年   25篇
  1992年   27篇
  1991年   14篇
  1990年   16篇
  1989年   17篇
  1988年   11篇
  1987年   13篇
  1986年   11篇
  1985年   17篇
  1984年   9篇
  1983年   6篇
  1982年   4篇
  1981年   8篇
  1979年   5篇
  1978年   2篇
  1977年   3篇
  1974年   1篇
  1972年   1篇
  1959年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
本文首先分析了分组域离线计费方式在运营中存在的局限性,随后介绍了3GPP基于Gy接口的分组域在线计费的基本原理。然后提出了适用于移动运营商的分组域实时计费系统架构,最后提出了分组域实时计费系统在实际部署中应重点关注的问题,并提出了解决方案。  相似文献   
92.
随着多媒体业务的不断发展,如何保证无线网络上的QoS成为一个很重要的问题.基于传统的分层设计方法很难适应快速变化的无线通信环境.主要研究无线网络QoS的跨层设计技术,分析了无线网络的特点及其QoS需求,在此基础上阐述跨层设计的思想和方法,讨论了QoS跨层设计目前存在的问题,对QoS跨层设计技术进行了展望.  相似文献   
93.
本文通过简单的介绍电信运行维护综合管理系统(OMA2000)的技术要求、CORBA技术的背景和内容,分析了计算机网络计算技术的发展趋势,实现了将CORBA标准应用于电信运行维护综合管理系统的开发应用.  相似文献   
94.
设计并实现了基于成都市电子政务网的信息技术服务运维支撑平台,包括服务质量评价系统和运维服务交付系统.该平台符合国家信息技术服务标准,对电子政务网的服务外包企业进行服务交付过程监督和服务质量评价,有效地提升电子政务网对外提供服务的水平和能力,也为标准验证与试点提供技术载体.  相似文献   
95.
In the last years, Service Overlay Networks (SONs) have emerged as a promising means to address some of the issues (e.g. end‐to‐end QoS) affecting the current Internet and to favor the development and deployment of new value‐added Internet services. The deployment of an SON is a capital‐intensive investment, since bandwidth with certain QoS guarantees must be purchased from the individual network domains through bilateral Service Level Agreements. Thus, minimizing the economic cost of the logical end‐to‐end service delivery infrastructure is one of the key objectives for the SON provider. When a SON is aimed at end‐to‐end QoS provisioning, its topology must be designed so as to also satisfy the specific requirements of QoS‐sensitive applications. This paper deals with the problem of planning the SON topology in order to take into account both cost and QoS constraints. More specifically, the paper proposes a set of new algorithms for the design of an optimized SON topology, which minimizes the economic cost while simultaneously meeting bandwidth and delay constraints. A performance comparison among such algorithms is finally carried out. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
96.
在移动通信中,移动性建模技术可以广泛用于移动性管理、无线资源管理、移动切换、话务分析等不同方面。文中首先提出移动性建模的基本假设,并建立一般的移动性模型;在此基础上,详细介绍几类不同的移动性模型,并给出移动性建模的具体应用。  相似文献   
97.
In the last decade, underwater wireless sensor networks have been widely studied because of their peculiar aspects that distinguish them from common terrestrial wireless networks. Their applications range from environmental monitoring to military defense. The definition of efficient routing protocols in underwater sensor networks is a challenging topic of research because of the intrinsic characteristics of these networks, such as the need of handling the node mobility and the difficulty in balancing the energy consumed by the nodes. Depth‐based routing protocol is an opportunistic routing protocol for underwater sensor networks, which provides good performance both under high and low node mobility scenarios. The main contribution of our work is presenting a novel simulator for studying depth‐based routing protocol and its variants as well as novel routing protocols. Our simulator is based on AquaSim–Next Generation, which is a specialized tool for studying underwater networks. With our work, we improve the state of the art of underwater routing protocol simulators by implementing, among other features, a detailed cross‐layer communication and an accurate model of the operational modes of acoustic modem and their energy consumption. The simulator is open source and freely downloadable. Moreover, we propose a novel and completely distributed routing protocol, named residual energy–depth‐based routing. It takes into account the residual energy at the nodes' batteries to select the forwarder nodes and improve the network lifetime by providing a more uniform energy consumption among them. We compare its performance with that of depth‐based routing protocol and a receiver‐based routing protocol implementing a probabilistic opportunistic forwarding scheme.  相似文献   
98.
Detecting malicious behavior is important for preventing security threats in a computer network. Denial of Service (DoS) is among the popular cyber attacks targeted at web sites of high‐profile organizations and can potentially have high economic and time costs. In this paper, several machine learning methods including ensemble models and autoencoder‐based deep learning classifiers are compared and tuned using Bayesian optimization. The autoencoder framework enables to extract new features by mapping the original input to a new space. The methods are trained and tested both for binary and multi‐class classification on Digiturk and Labris datasets, which were introduced recently for detecting various types of DDoS attacks. The best performing methods are found to be ensembles though deep learning classifiers achieved comparable level of accuracy.  相似文献   
99.
在通用协议栈概念的基础上,引入集中式协议栈管理和分散式分层协议管理相结合的新的重配置控制管理功能,提出一种改进的、基于组件的分层可重配置协议栈模型,给出其协议栈重配置方法,详尽阐述了利用面向对象方法实现协议组件分解、合成、替换和通信的软件技术。  相似文献   
100.
The security of space information network (SIN) is getting more and more important now. Because of the special features of SIN (e.g., the dynamic and unstable topology, the highly exposed links, the restricted computation power, the flexible networking methods, and so on), the security protocol for SIN should have a balance between security properties and computation/storage overhead. Although a lot of security protocols have been proposed recently, few can provide overall attacks resistance power with low computation and storage cost. To solve this problem, in this paper we propose a lightweight authentication scheme for space information network. It is mainly based on the self‐updating strategy for user's temporary identity. The scheme consists of two phases, namely, the registration phase and the authentication phase. All the computing operations involved are just hash function (h), the bit‐wise exclusive‐or operation (⊕), and the string concatenation operation (||), which are of low computation cost. The security properties discussion and the attacks–resistance power analysis show that the proposed authentication scheme can defend against various typical attacks, especially denial of service attacks. It is sufficiently secure with the lowest computation and storage costs. Furthermore, the formal security proof in SVO logic also demonstrates that the scheme can satisfy the security goals very well. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号